Skip to main content

Process Mining in Business Process Redesign

$199.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Who trusts this:
Trusted by professionals in 160+ countries
Your guarantee:
30-day money-back guarantee — no questions asked
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Adding to cart… The item has been added

This curriculum spans the full lifecycle of a multi-workshop process mining initiative, from scoping and data integration through discovery, deviation analysis, and redesign, mirroring the iterative diagnostic and implementation cycles seen in enterprise process improvement programs.

Module 1: Establishing Process Mining Objectives and Scope

  • Selecting which business processes to prioritize for mining based on operational pain points, regulatory exposure, and potential ROI from redesign.
  • Defining the boundaries of process instances (e.g., order-to-cash start and end events) to ensure consistent trace extraction from source systems.
  • Negotiating access to transactional data across departments with competing priorities and data ownership concerns.
  • Determining whether to include exception handling paths or focus only on standard workflows in initial analysis.
  • Aligning stakeholder expectations on what constitutes a "successful" process mining outcome—compliance, cycle time reduction, or cost savings.
  • Deciding whether to conduct a pilot on a single process variant or scale across multiple units from the outset.

Module 2: Data Extraction and Event Log Construction

  • Mapping disparate data sources (ERP, CRM, BPM) to the IEEE XES or CSV event log format while preserving case, activity, and timestamp semantics.
  • Resolving inconsistent or missing timestamps by applying business rules or imputation methods without distorting process flow.
  • Handling composite cases where a single business transaction spans multiple system-generated case IDs.
  • Filtering out test, sandbox, or administrative transactions that pollute real process behavior analysis.
  • Dealing with event attribute truncation or data type mismatches when extracting from legacy databases.
  • Establishing refresh mechanisms for event logs to support longitudinal analysis without overloading source systems.

Module 3: Process Discovery and Model Generation

  • Choosing between discovery algorithms (e.g., Inductive Miner, Heuristic Miner) based on log completeness and noise levels.
  • Adjusting frequency and dependency thresholds in Heuristic Miner to balance model simplicity and behavioral accuracy.
  • Interpreting spaghetti-like process maps by applying filtering strategies (e.g., frequency-based, performance-based) to isolate dominant paths.
  • Deciding when to split a discovered model by organizational unit, region, or customer segment to uncover variation causes.
  • Validating discovered models against known process documentation or SME interviews to identify undocumented workarounds.
  • Documenting model assumptions such as concurrency handling and loop detection for auditability.

Module 4: Conformance Checking and Deviation Analysis

  • Selecting a reference model for comparison—whether based on official policy, best-practice templates, or idealized workflows.
  • Configuring alignment-based conformance checking to identify deviations while managing computational load on large logs.
  • Distinguishing between harmful deviations (e.g., control violations) and beneficial ones (e.g., efficiency shortcuts).
  • Quantifying the operational impact of non-conformance by linking deviations to downstream outcomes like rework or delays.
  • Handling partial traces in conformance checking when event logs lack complete start-to-end coverage.
  • Reporting deviation findings in a way that avoids blaming individuals while highlighting systemic root causes.

Module 5: Performance and Bottleneck Analysis

  • Calculating end-to-end processing times while accounting for waiting, handover, and rework loops across activities.
  • Attributing delays to specific organizational roles or system interfaces using timestamp and resource field analysis.
  • Identifying resource contention by analyzing queuing patterns before high-utilization activities.
  • Adjusting for calendar-aware processing times (e.g., excluding weekends, holidays, or shift hours) in cycle time metrics.
  • Correlating performance outliers with external factors such as seasonality, system outages, or staffing changes.
  • Setting performance benchmarks based on historical data percentiles rather than arbitrary targets.

Module 6: Redesign Recommendation Development

  • Ranking process improvement opportunities by impact (e.g., time saved) and feasibility (e.g., system constraints).
  • Proposing role consolidation or task automation only after validating task repetition and decision logic from event data.
  • Designing parallel paths in redesigned workflows where sequence analysis shows unnecessary serial dependencies.
  • Specifying data retention rules for new process variants to ensure future mining remains viable.
  • Integrating control points in redesigned processes to enable future compliance monitoring via mining.
  • Documenting assumptions behind each redesign proposal to support impact simulation and stakeholder review.

Module 7: Change Implementation and Monitoring

  • Coordinating with IT teams to instrument new or modified processes with sufficient logging for future mining.
  • Establishing baseline metrics pre-implementation to measure the effect of redesign interventions.
  • Configuring ongoing process mining dashboards to detect regression or new deviations post-deployment.
  • Handling versioning of process models when multiple variants coexist during transition periods.
  • Updating access controls and data extraction jobs as process ownership or system landscapes change.
  • Conducting periodic mining cycles to identify emergent inefficiencies or adaptation drift over time.