<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Daniel Viner, Matthias Stierle, Martin Matzner Institute of Information Systems, University of Erlangen-Nuremberg Nuremberg</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>ABBYY Timeline (ABBYY)</title>
    </sec>
    <sec id="sec-2">
      <title>ARIS Process Mining (Software AG)</title>
    </sec>
    <sec id="sec-3">
      <title>Celonis Process Mining (Celonis SE)</title>
    </sec>
    <sec id="sec-4">
      <title>Disco (Fluxicon BV)</title>
    </sec>
    <sec id="sec-5">
      <title>EverFlow (EverFlow)</title>
    </sec>
    <sec id="sec-6">
      <title>LANA Process Mining (Lana Labs GmbH) MEHRWERK ProcessMining (Mehrwerk GmbH)</title>
    </sec>
    <sec id="sec-7">
      <title>Minit (Minit j.s.a.)</title>
    </sec>
    <sec id="sec-8">
      <title>PAFnow (Process Analytics Factory GmbH) ProDiscovery (Puzzle Data Co., Ltd.)</title>
      <p>QPR ProcessAnalyzer
(QPR Software Plc)
Signavio Process Intelligence
(Signavio GmbH)
upfront to better understand what features and capabilities
the vendors offer. Vendors were asked to grant access to all
features in the demo environment to ensure all available features
can be explored. The experimental approach also included
the screening of all available knowledge bases and product
documentations made accessible by the vendor. The derived
criteria set was applied in three steps. In Phase 1, a test scenario
was conducted for every tool using the same logs and files. In
Phase 2, the results were compared with each other to identify
inconsistent terminology and discrepancy in the level of detail.
The final assessment was conducted in Phase 3. After testing,
follow-up workshops were conducted with every vendor to
clarify open questions and to get additional context for features.
The exchange with the vendors also served as a quality gate
for the correctness of the test results.</p>
      <sec id="sec-8-1">
        <title>C. Testing Setup</title>
        <p>The software testing was conducted primarily using event
logs of Purchase-to-Pay (P2P) processes with their respective
“happy path” reference models in BPMN format.</p>
        <sec id="sec-8-1-1">
          <title>III. SOFTWARE ANALYSIS</title>
        </sec>
      </sec>
      <sec id="sec-8-2">
        <title>A. Analysed Software</title>
        <p>In the course of the study, 16 tools capable of mining event
log files were analysed, see Table I. The study was carried out
in spring 2020.</p>
        <p>The website is mainly built on three layers. While the
homepage (first layer) introduces the discipline of process
mining, typical use cases and our criteria overview, the “Tools”
page (second layer) lists brief profiles of all tools which are
linked to the detailed tool profile pages (third layer). An
introductory paragraph briefly describes the vendor and the
strengths of its software. Eight criteria categories examine
the availability and extent of tested functionality while one
criteria category provides general information. The “Distinctive
Focus and Features” section provides additional context by
highlighting outstanding functionality. In order to offer users
visual impressions of a tool, every profile is enriched with
a “featured video” provided by the vendor and up to seven
screenshots, of which five are defined and two undefined
(proprietary). Also, any two selected tool profiles can be
contrasted with each other through a side-by-side comparison.</p>
      </sec>
      <sec id="sec-8-3">
        <title>C. Software Criteria</title>
        <p>The software criteria derived from the literature review and
experimental software testing represents the core of this study.
The criteria were grouped into nine categories depicted in
Tables II - X in the appendix.</p>
        <p>Category General gives a brief overview of the vendor and
key aspects of the tool. Data Management examines
functionalities and factors related to the extraction, transformation
and loading (ETL) of process data into the process mining
tool. The Process Discovery category examines process graph
capabilities and process analysis features such as benchmarking
and rework analysis. Conformance Checking is a fundamental
process mining feature to identify deviations between the actual
“as is” process and an “a-priori” reference model. This category
considers all relevant factors pertaining to conformance
checking. The Operational Support criteria examine the availability
of forward-looking capabilities to help users anticipate the
outcome of running cases and facilitate decision making with
the help of intelligent recommendations. Views, Monitoring and
Reporting addresses the ability to monitor processes with the
help of metrics and visualisations to support decision making.
Additional criteria examine available languages and means of
collaboration to share insights with other users. While process
enhancement functionality such as performance metrics in the
process graph is partly covered in the aforementioned criteria
categories, Advanced Enhancement Capabilities investigates
further capabilities that add a new perspective to the graph or
the overall process. Lastly, Security &amp; Compliance addresses
role-based access control and the availability of audit logs.</p>
        <p>IV. CONTRIBUTIONS, LIMITATIONS AND OUTLOOK
The study of 16 process mining solutions with commercial
licenses showed that the maturity level of the investigated
software is highly varying. While some vendors offer basic
discovery functionality without conformance checking in some
cases, other vendors offer more elaborate features such as
process simulation, predictive analytics and decision rule
mining. We observe a potential trend: The boundaries between
mere process mining functionality and other disciplines such as
process modelling (BPMN), business intelligence and Machine
Learning become more and more blurred.</p>
        <p>The software selection is based on software listed in
commercial reports and hence reflects a non-exhaustive picture
of the market. Further, open-source software was not analysed.
It is important to note that the software listing represents only
a snapshot of the tools’ capabilities and features in terms of
information timeliness. Vendors are continuously improving
their products and extend the functionalities with periodic
releases.</p>
        <p>A follow-up study could examine the perspective of
organisations on the relevance of the suggested criteria. Interviews may
be conducted with organisations interested in process mining
as well as organisations with already implemented process
mining software.</p>
        <sec id="sec-8-3-1">
          <title>ACKNOWLEDGEMENT</title>
          <p>The authors would like to express their gratitude to all
vendors that participated in this study for their time and effort.</p>
          <p>Criterion</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Company Size</title>
    </sec>
    <sec id="sec-10">
      <title>Free Trial</title>
    </sec>
    <sec id="sec-11">
      <title>Licenses</title>
    </sec>
    <sec id="sec-12">
      <title>Deployment</title>
    </sec>
    <sec id="sec-13">
      <title>Embedded In</title>
      <sec id="sec-13-1">
        <title>APPENDIX</title>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>Visual comparison 37, Metric comparison 37</title>
      <p>(2 filtered sets of the same process can be
compared with each other visually and metrically)</p>
    </sec>
    <sec id="sec-15">
      <title>Visual comparison 37, Metric comparison 37</title>
      <p>(Processes of 2 different event logs can be
compared with each other visually and metrically)</p>
    </sec>
    <sec id="sec-16">
      <title>Yes/No - The software delivers a list of root causes for selected or defined anomalies/symptoms</title>
    </sec>
    <sec id="sec-17">
      <title>List of metrics by which the variants can be classified/sorted</title>
    </sec>
    <sec id="sec-18">
      <title>Activity List 37, Case List 37, Case List for Variants 37</title>
    </sec>
    <sec id="sec-19">
      <title>Yes/No - User can access a case view with respective case activities and metrics</title>
    </sec>
    <sec id="sec-20">
      <title>Yes/No - User can identify rework, i.e. loops and self-loops, through pre-configured dashboards or filtering</title>
    </sec>
    <sec id="sec-21">
      <title>List of all transitions 37, From-to activities 37</title>
      <p>Brief description</p>
    </sec>
    <sec id="sec-22">
      <title>Yes/No - User can compare as-is process with a target process, e.g. happy path</title>
    </sec>
    <sec id="sec-23">
      <title>Import model 37 (&lt;model types&gt;), Auto-create</title>
      <p>from as-is 37, Create new 37</p>
    </sec>
    <sec id="sec-24">
      <title>Yes/No - Deviations from a target process can</title>
      <p>be visualised in the process graph
Yes/No - List of identified conformance
violations for undesired activities, missing activities
and non-compliant activity sequence</p>
    </sec>
    <sec id="sec-25">
      <title>Yes/No - Breach of the four-eyes principle can be detected for any 2 selected activities</title>
    </sec>
    <sec id="sec-26">
      <title>Yes/No - User can filter by the condition “activity A is (not) directly followed by activity B”</title>
    </sec>
    <sec id="sec-27">
      <title>Yes/No - Root causes can be automatically</title>
      <p>identified for selected conformance violations</p>
    </sec>
    <sec id="sec-28">
      <title>Decision Rule Mining</title>
    </sec>
    <sec id="sec-29">
      <title>Role-Based Access User Authentication</title>
      <p>Brief description</p>
    </sec>
    <sec id="sec-30">
      <title>Events (&lt;formats&gt;), Cases (&lt;formats&gt;), Variants (&lt;formats&gt;)</title>
      <p>Yes/No</p>
    </sec>
    <sec id="sec-31">
      <title>Custom charts 37, Custom tables 37</title>
    </sec>
    <sec id="sec-32">
      <title>Yes/No - User can define custom metric/KPI</title>
      <p>through a formula using own syntax, or by
selection of any imported numerical attribute
with the option of at least 5 different aggregation
types, e.g. mean, median and percentiles
Yes/No - User can define thresholds for
metrics/KPIs or charts to emphasise (non-)acceptable
values by colour highlighting</p>
    </sec>
    <sec id="sec-33">
      <title>Yes/No - User can choose from at least 5 different chart types</title>
    </sec>
    <sec id="sec-34">
      <title>Latitude &amp; longitude coordinates 37, Location</title>
      <p>by attribute (e.g. country codes, city names) 37
(Visualisation of process-related locations in a
world map graph)</p>
    </sec>
    <sec id="sec-35">
      <title>Yes/No - Applied filter settings can be reused at a later point in time</title>
    </sec>
    <sec id="sec-36">
      <title>List of all available languages in the GUI</title>
    </sec>
    <sec id="sec-37">
      <title>Share selection 37, &lt;collaboration features&gt;</title>
      <p>(Sharing applied filter settings with other users;
List of all additional means to collaborate and
share insights, e.g. comment feature)
Brief description</p>
    </sec>
    <sec id="sec-38">
      <title>Yes/No - Capability to visually add organisational</title>
      <p>
        perspective by grouping of activities and org.
entities such as resources and departments [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
Yes/No - The impact of specific process
alternations (e.g. adjusting resource allocation and work
times for activities) on the overall process can
be simulated
      </p>
    </sec>
    <sec id="sec-39">
      <title>Yes/No - Automatic derivation of rules for decision points based on case-related data such as case-level attributes [9]</title>
      <p>Brief description</p>
    </sec>
    <sec id="sec-40">
      <title>Yes/No - Access to projects, dashboards or certain process data can be restricted for any user in the system via user roles or user-specific access permissions</title>
    </sec>
    <sec id="sec-41">
      <title>List of all means of authentication for user login,</title>
      <p>e.g. 2FA, LDAP, Active Directory</p>
    </sec>
    <sec id="sec-42">
      <title>Yes/No - Capability to trigger alerts defined by the user via query/filter, KPI threshold or a particular time interval</title>
    </sec>
    <sec id="sec-43">
      <title>Yes/No - Capability to predict the future outcome of a running case based on historic data [2]</title>
    </sec>
    <sec id="sec-44">
      <title>Yes/No - Capability to suggest potential next actions in order to meet a particular business goal, e.g. minimising cycle time [2] TABLE IX</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          , “Academic View:
          <article-title>Development of the Process Mining Discipline,” in Process Mining in Action</article-title>
          . Principles, Use Cases and Outlook, L. Reinkemeyer, Ed. Cham: Springer,
          <year>2020</year>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          , Process Mining: Data Science in Action, 2nd ed. Berlin: Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dell'Orto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Cotroneo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Carbone</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Riccardi</surname>
          </string-name>
          , “Process Mining: A Database of Applications,”
          <year>2020</year>
          ,
          <string-name>
            <given-names>HSPI</given-names>
            <surname>Report</surname>
          </string-name>
          . [Online]. Available: https://www.hspi.it/wp-content/uploads/2020/01/ HSPI Process Mining Database
          <year>2020</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>MarketsandMarkets</given-names>
            <surname>Research</surname>
          </string-name>
          , “Process Analytics Market - Global Forecast to
          <year>2023</year>
          ,”
          <year>2018</year>
          . [Online]. Available: https://www.marketsandmarkets.com/ Market-Reports/process-analytics-market-
          <volume>254139591</volume>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kerremans</surname>
          </string-name>
          , “
          <article-title>Market Guide for Process Mining</article-title>
          ,”
          <year>2019</year>
          ,
          <string-name>
            <given-names>Gartner</given-names>
            <surname>Report</surname>
          </string-name>
          . [Online]. Available: https://www.gartner.com/en/documents/ 3939836/market-guide
          <article-title>-for-process-mining</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Burnett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vijayan</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Makan</surname>
          </string-name>
          , “Process Mining - The New Juggernaut Driving Digital Transformation,”
          <year>2019</year>
          , Everest Group Report, Research Note EGR-2019
          <string-name>
            <surname>-</surname>
          </string-name>
          38-V-
          <volume>3085</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Burnett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Modi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Makan</surname>
          </string-name>
          and U. Shahdeo, “Process Mining - Technology
          <source>Vendor Landscape with Products PEAK Matrixr Assessment</source>
          <year>2020</year>
          ,”
          <year>2020</year>
          , Everest Group Report. [Online]. Available: https: //www2.everestgrp.com/reportaction/EGR-2020
          <string-name>
            <surname>-</surname>
          </string-name>
          38-R-3576/Marketing
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Koplowitz</surname>
          </string-name>
          , “Now Tech:
          <article-title>Process Mining And Documentation</article-title>
          ,
          <string-name>
            <surname>Q1</surname>
          </string-name>
          <year>2020</year>
          .
          <article-title>Forrester's Overview Of 21 Process Mining</article-title>
          And Documentation Providers,”
          <year>2020</year>
          ,
          <string-name>
            <given-names>Forrester</given-names>
            <surname>Report</surname>
          </string-name>
          . [Online]. Available: https://www.forrester.com/report/Now+Tech+Process+Mining+ And+Documentation+Q1+
          <year>2020</year>
          /-/E-RES158955
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          and W. van der Aalst, “
          <article-title>Decision Mining in ProM,” in Business Process Management</article-title>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Fiadeiro</surname>
          </string-name>
          and
          <string-name>
            <surname>A</surname>
          </string-name>
          . Sheth, Eds., vol.
          <volume>4102</volume>
          . Berlin, Heidelberg: Springer,
          <year>2006</year>
          , pp.
          <fpage>420</fpage>
          -
          <lpage>425</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>