Generating event logs from non-process-aware systems enabling business process mining

As information systems age they become legacy information systems (LISs), embedding business knowledge not present in other artefacts. LISs must be modernised when their maintainability falls below acceptable limits but the embedded business knowledge is valuable information that must be preserved t...

Full description

Saved in:
Bibliographic Details
Published inEnterprise information systems Vol. 5; no. 3; pp. 301 - 335
Main Authors Pérez-Castillo, Ricardo, Weber, Barbara, Pinggera, Jakob, Zugal, Stefan, de Guzmán, Ignacio García-Rodríguez, Piattini, Mario
Format Journal Article
LanguageEnglish
Published Taylor & Francis 01.08.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:As information systems age they become legacy information systems (LISs), embedding business knowledge not present in other artefacts. LISs must be modernised when their maintainability falls below acceptable limits but the embedded business knowledge is valuable information that must be preserved to align the modernised versions of LISs with organisations' real-world business processes. Business process mining permits the discovery and preservation of all meaningful embedded business knowledge by using event logs, which represent the business activities executed by an information system. Event logs can be easily obtained through the execution of process-aware information systems (PAISs). However, several non-process-aware information systems also implicitly support organisations' business processes. This article presents a technique for obtaining event logs from traditional information systems (without any in-built logging functionality) by statically analysing and modifying LISs. The technique allows the modified systems to dynamically record event logs. The approach is validated with a case study involving a healthcare information system used in Austrian hospitals, which shows the technique obtains event logs that effectively and efficiently enable the discovery of embedded business processes. This implies the techniques provided within the process mining field, which are based on event logs, may also be applied to traditional information systems.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1751-7575
1751-7583
DOI:10.1080/17517575.2011.587545