BCO5501 Business Process Engineering
Assignment 2: BPM Article Review
For this assignment you are to select and review an academic paper on Business Process Management. The paper you select must be directly relevant to business process engineering or business process management. You must identify at least 3 other relevant articles and use them to support your review. A possible source of papers are the Proceedings of the 11t h through 13th International Conference on Business Process Management (BPM) (see below), but the paper can be from any academic conference or other relevant Journal. All students must select a different paper, thus the paper must be approved by your lecturer before proceeding.
Incase two students are wanting to review the same paper the first who email the lecturer will be allocated that paper. Your response should be limited to 2000 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you must use other sources to support your discussion. Citation of sources is mandatory and must be in the Harvard style. Many students fail this assignment because they do not know or use the basic skills required for writing a review essay. Help on how to write a review essay is available via the Victoria University Website. Another site with helpful ideas is at:
Your review report must include:
• Title Page: The title of the assignment, the name of the paper you are reviewing and its authors.
• Introduction: A statement of the purpose for your essay and a brief outline of how you will discuss the selected article (one
or two paragraphs). Make sure to identify the article being reviewed.
• Body: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Discuss the conclusions of the article and how they are relevant to Business Process Management. Comparing ideas in the article you are reviewing to other articles discussing related topics will add significant strength to your paper. Note that it is expected that there will be many citations referring to the paper you are reviewing.
• Conclusion: A summary of the points you have made in the body of the paper. These should match your stated purpose.
The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two
• References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name.
Follow the Harvard style. The footer must include your name, student ID, and page number. The following links may assist in finding the required readings through the VU library (‘SpringerLink’ database):
Review on Process Management Introduction
The chosen research for reviewing is a Business Process Management workshop. It was the 13th International Workshop held at Innsbruck, Austria on 31st August 2015. Business process management or BPM. The research focused on the specialised and distinguished forum for researchers as well as practitioners in the field of Business Process Management (Goetsch & Davis, 2014). The conference had focused on identifying the innovative research in the field of BPM that involved various theories, frameworks, methods, techniques, findings and architecture.
In fact, these workshops focus on generating various research topics, presentation of emerging research, and in-depth focus in the fields of research. The chosen topic of discussion from is the Ontology Driven Extraction of Event Logs and Relational Database. A review would be conducted on the paper analysing the various aspects of Process mining. Process mining in simple terms is an emerging discipline (Weske, 2012). It helps to uncover, monitor and improve the realistic process by knowledge extraction from the event logs, actual process executions within a provided organisational setting. The essay would help to outline the Process management and provide an overview of the entire paper.
Process mining focuses on monitoring, improving the real processes and extracting the information from the event logs. Various types of mining methods are utilised for process mining and the processes have successfully produced the results. The methods of process mining can identify the real processes and identifies the deviation from the normative processing. It analyses and bottlenecks the waste production, and flow time prediction (Arvanitis, et al., 2012). The logs, which are generated from the above issues, are created utilising identified process and question set. The traces identifies and considers a life cycle in relation to particular scale. Two cases of 654423 and 655526 have been considered for the study. The registration of the case 654423 had spent 300 euros. The duration of the action begins from start and continues until the end. There is transactional information like assign, start, complete, suspend and abort.
It is determined that the application of process mining is related to faithful event logs that adhere to the accepted standards which guarantee a quality level. In real-world situations, the event logs are not provided but it is represented in an indirect manner within the information system of the organisation. This situation requires the need of methodologies, tools and techniques for acquiring these event logs from the systems.
The problem identified in the study is taken from real-world situation. John is attempting to understand how the users utilise the web portal for submitting the conference papers. He is to utilise process-mining method within the system data. He is planning to utilise the knowledge to restructure the portal and develop an improved user experience (Hammer, 2015). Conceptual schematics is utilised by the organisation that would help to understand the application domain of the process management. There are concepts and relations that would be captured in order to manage the conference and outline the operations of the system. However, there is no actual data in this provided case of abstraction. While implementing the process mining method to the system there were problems regarding mismatch and process orientation.
The information, which was to be studied, had to be acquired using a domain ontology. It focuses on process-related aspects of tracing, event, resourcing, timestamp and others. There have been three identified technical problems in the situation.
The work covers manage the identified issues that through utilisation of a novel combination of methods acquired from intelligent data access and integration. A well tested OBDA framework is to be utilised for the purpose. It would help to connect raw data with the domain ontology and overcome the mismatch impedance (Dumas, et al., 2013). In order to deal with the second identified issue, event log ontology, which can mirror the XES, is used to define the event and acquire an annotation language for the users. This method helps to acquire the semantic links among the constitutive elements within the domain ontology that correlates with XES. John is recommended to utilise an annotation language that would enrich the domain ontology.
In terms of conclusion novel methodology and technology which would flexibly acquire the event logs from the legacy, rationalistic data source. It would leverage the ontology-based data through an access paradigm. It is especially focused on the multi-perspective based process. The process mining would reflect the event logs from various data that can be acquired from the ontological annotation. The framework chosen has been able to materialise the event logs from the legacy data. There would be the possibility of maintaining logs in a virtual manner and acquire the log related information at any moment in time. There are three lines of research acquired from the study (D'Alvano & Hidalgo, 2012). The application framework with real-world application or case study, improving the framework of the visual interface and the benchmark of various data access strategies.
The overall research work has been effective in its objectives and has been able to address the problems. The problems have further laid down the foundation of carrying out a research on finding the solution to the problems. The problems have been based on real-world situation and have been analysed to find the solutions utilising practical works (Hammer, 2015). Furthermore, the analysis introduced for the purpose has been designed from the carefully designed framework. I have helped to acquire new lines of research from the study. These lines of research have provided the further scope of the study.