Document Type : Research Paper


1 Department of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran.

2 Department of Industrial Engineering, K.N.Toosi University of Technology, Tehran, Iran


Risk is a destructive phenomenon, which is an integral part of any business. Process mining is a form of a business process analysis based on the recorded process data by information systems, whose its aim is to discover process, control, data, organizational and social structures from event logs. A process mining project methodology (PMPM) is considered as especially useful in the process mining project, which a comprehensive methodology that can be used as an efficient and effective approach for applying process mining in practice. This methodology made us sure that all important activities are performed and prevented of redundant work. This paper utilizes the PMPM for risk reduction to increase the organization agility against competitors and obtain the more market share. Evaluating the case study results with trace alignment method confirms expert confirmations. Trace alignment shows interesting patterns and provide better insight on process executions.


[1]                 Hatefi, M. A., Seyedhoseini, S. M. and Noori, S. (2007). Risk response actions selection. The International Journal of Applied Management and Technology, Vol. 5, No. 1, pp 385-408.
[2]                 Fehr-Duda, H., Bruhin, A., Epper, T. and Schubert, R. (2010). Rationality on the rise: Why relative risk aversion increases with stake  size.  Journal  of  Risk  Uncertain, No. 40, pp. 147–180.
[3]                 Ray, B., Apte, C., McAuliffl, K. and Deleris, L. (2008). Harnessing Uncertainty: The Future of Risk Analytics.IBM research report.
[4]                 Gusmão, C. M. G. (2003). ISO, CMMI and PMBOK Risk Management: a Comparative Analysis, Cristine Martins Gomes de.The International Journal of Applied Management and Technology, Vol. 1, No. 1, pp. 65-75.
[5]                 Shaw, G.K. (2010). A risk management model for the tourism industry in South Africa. Ph.D Thesis. The Potchefstroom Campus of the North-West University.
[6]                 Smith, D. and Fischbacher, M. (2009). The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience. Risk Management Journal, Vol. 11, No. 1, pp. 1–12.
[7]                 Zhao, G.Y., Zhao, G., Lv, C. and Sun, Y.F. (2010). Risk Management Technology for Missile Operational Support. International Conference on Management of Innovation and Technology (ICMIT), IEEE Press, pp. 1259-1263.
[8]                 Karadsheh, L. A. (2010). A framework for integrating knowledge management with risk management for information technology projects.Ph.D. thesis.Lawrence Technological University, College of Management.
[9]                 El Sheikh, A. A. R. and Alnoukari, M. (2011). Business Intelligence and Agile Methodologies for Knowledge-Based Organizations:Cross-Disciplinary Applications, 1st Edition, IGI Global.
[10]             Aalst, W. V. D.(2011). Process Mining: Making Knowledge Discovery Process Centric. SIGKDD ExplorationsJournal, Vol. 13, No. 20, pp.25-49.
[11]             Heijden, V. D. (2012). Process Mining Project Methodology: Developing a General Approach to Apply Process Mining in Practice. M.Sc. thesis.TUE.School of Industrial Engineering.
[12]             Rozinat, A., Alves de Medeiros, A.K., G¨unther, C.W., Weijters, A.J.M. M. and  Aalst, W. V. D.(2007). The Need for a Process Mining Evaluation Framework in Research and Practice: Position Paper. Proceeding of the 2007 international conference on Business process management (BPM'07), pp. 84-89.
[13]             Caron, F., Vanthienen, J. and Baesens. B. (2013).Comprehensive Rule-Based Compliance Checking and Risk Management with Process Mining.Decision Support Systems Journal, Vol. 54, No. 3, pp. 1357-1369.
[14]             Jans, M., van der Werf, J. M., Lybaert, N. and Vanhoof, K. (2011). A business process mining application for internal transaction fraud mitigation.Expert Systems with Applications Journal, Vol. 38, No. 10, pp. 13351–13359.
[15]             Jans, M., Lybaert, N., Vanhoof, K. and van der Werf, J.M. (2010). Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study. International Research Symposium on Accounting Information Systems.
[16]             Yang, W. S. and Hwang, S. Y.( 2006). A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with ApplicationsJournal, Vol.31, No.1, pp.56–68.
69        Applying the Process Mining Project Methodology for...
[17]             Werner, M., Gehrke, N. and Nüttgens, M. (2012). Business Process Mining and Reconstruction for Financial Audits.45th Hawaii International Conference on System Sciences, pp. 5350-5359.
[18]             Aalst, W. V. D. and Dustdar, S. (2012). Process Mining Put into Context.Internet Computing Journals, IEEE Press, Vol. 16, No. 1, pp.82-86.
[19]             Buijs, J.C.A.M. (2010). Mapping Data Sources to XES in a Generic Way.M.Sc. thesis.Department of Mathematics and Computer Science, Eindhoven University of Technology.
[20]             Aalst, W. V. D. (2011). Process Mining Discovery, Conformance and Enhancement of Business Processes. 1st Edition, Springer.
[21]             Verbeek, H.M.W., Buijs, J. C. A. M., Dongen, B. F. V. and Aalst, W. V. D. (2010).ProM6 : The Process Mining Toolkit.In La Rosa, M. (Ed.).Proceedings of the Business Process Management 2010 Demonstration Track, pp. 34-39.
[22]             Liu, Y., Zhang, H., Li, C. and Jiao, R.J. (2012). Workflow simulation for operational decision support using event graph through process mining.Decision Support Systems Journal, Vol. 52, No. 3, pp.685–697.
[23]             Aalst, W. V. D., Reijers, H. A., Weijters, A. J. M. M., Dongen, B. F., Alves de Medeiros, A. K., Song, M. And Verbeek, H. M. W. (2007). Business process mining: An industrial application.Information Systems Journal, Vol. 32, No. 5, pp.713-732.
[24]             Lakshmanan, G. and Khalaf, R. (2012). Leveraging Process Mining Techniques to Analyze Semi-Structured Processes.IT Professional Journal, IEEE Press,Vol. 15 , No. 5, pp. 22-30.
[25]             Li, J., Ouyang, J. and Feng, M. (2011). A Heuristic Genetic Process Mining Algorithm.Seventh International Conference on Computational Intelligence and Security, pp.15-19.
[26]             Bose, R.P.J.C., Aalst, W. V. D. (2010). Trace alignment in process mining: opportunities for process diagnostics.Proceeding of the 8th international conference on Business Process Management (BPM'10), pp.227-242.