Page 45 - 2023-Vol19-Issue2
P. 45
41 | Andreswari, Millenia, Rizky, Haniyah & Mufti
group ict netherlands,” e-Proceeding of Engineering,
2015.
[4] A. R. C. Maita, L. C. Martins, C. R. Lopez Paz, L. Raf-
ferty, P. C. Hung, S. M. Peres, and M. Fantinato, “A
systematic mapping study of process mining,” Enter-
prise Information Systems, vol. 12, no. 5, pp. 505–549,
2018.
Fig. 6. Distribution of assignment activity frequency [5] A. A. Hermawan, “Analisis konteks proses bisnis anali-
sis konteks proses bisnis berdasarkan event log business
IV. CONCLUSION process context analysis based on event log,” J. Penelit.
dan Pengemb. Komun. dan Inform, vol. 3, no. 1, pp. 133–
Based on the testing result of the Rabobank Group ICT inci- 149, 2014.
dent event log with process mining, it is shown in a spaghetti
process model at the discovery stage generated by Disco and [6] S. Dadashnia, T. Niesen, P. Hake, P. Fettke, N. Mehdiyev,
ProM. The use of the fuzzy miner and heuristic miner algo- and J. Evermann, “Identification of distinct usage pat-
rithms with the simplification process produces a graph of terns and prediction of customer behavior,” BPI Chal-
the relationship that can be observed. iDHM is used on the lenge, 2016.
heuristic miner with direct conformance capability and auto-
matic best dependency settings with parameter observation [7] A. Bautista, S. Akbar, A. Alvarez, T. Metzger, and
frequency thresholds of 0.1, dependency measure thresholds M. Reaves, “Process mining in information technology
of 0.9, binding frequency thresholds of 0.1, and condition incident management: A case study at volvo belgium.,”
quality thresholds of 0.5. In Fuzzy Miner, the preserve thresh- 2013.
old value is 0.05, the utility ratio is 0.85, the edge cutoff is
0.05, and the node cutoff is 0.05. In terms of incidents, it is [8] A. Jalali, “Exploring different aspects of users be-
known that the division of the work area is not good, causing haviours in the dutch autonomous administrative au-
a team to work on a lot of events while other teams only work thority through process cubes,” Business Process Intelli-
on one event. Therefore, it is necessary to divide the team with gence (BPI) Challenge, 2016.
clear and balanced areas and workloads in business processes
so that incidents do not recur. [9] C. Moreira, E. Haven, S. Sozzo, and A. Wichert, “Pro-
cess mining with real world financial loan applications:
CONFLICT OF INTEREST Improving inference on incomplete event logs,” PLoS
One, vol. 13, no. 12, p. e0207806, 2018.
The authors have no conflict of relevant interest to this article.
[10] M. A. Agung, A. P. Kurniati, and A. A. Gozali, “Analisis
REFERENCES dan implementasi process mining menggunakan fuzzy
mining (studi kasus: Dataset bpi challenge 2014),” ePro-
[1] E. Bazhenova, S. Buelow, and M. Weske, “Discovering ceedings of Engineering, vol. 2, no. 2, 2015.
decision models from event logs,” pp. 237–251, 2016.
[11] L. S. Putri and G. Ramantoko, “Implementasi process
[2] B. N. A. Hidayat, A. P. Kurniati, et al., “Process model mining dengan metode process discovery studi kasus
extension using heuristics miner:(case study: Incident pada aplikasi integrated flexible learning experience
management of volvo it belgium),” pp. 73–78, 2016. (iflex),” Jurnal Ekonomi: Journal of Economic, vol. 11,
no. 02, 2020.
[3] R. Mangunsong, A. Kurniati, and M. Sabariah, “Analysis
and implementation of process mining with heuristic [12] I. Singh, A. S. Sabitha, and A. Bansal, “Student perfor-
miner algorithm case study: Event logs of rabobank mance analysis using clustering algorithm,” pp. 294–299,
2016.
[13] A. Jalali, “Graph-based process mining,” pp. 273–285,
2021.
[14] I. H. Kwon, “Book review: Process mining: discovery,
conformance and enhancement of business processes,”