Discovery and Monitoring in Business Industries
VerifiedAdded on 2023/03/31
|9
|2071
|81
AI Summary
This research paper examines the concept of discovery and monitoring in the area of businesses and discusses a journal article on the topic. It explores the content of the paper, research methods used, findings, and conclusion.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Discovery and monitoring
STUDENT NAME STUDENT ID 0
STUDENT NAME STUDENT ID 0
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction................................................................................................................................2
Intention or content of the paper................................................................................................2
Research methods.......................................................................................................................3
Introduction............................................................................................................................3
Research design......................................................................................................................3
Research strategy....................................................................................................................4
Data gathering process...........................................................................................................4
Data analysis method..............................................................................................................4
Findings of the article.................................................................................................................5
Highlighted issues by the authors..............................................................................................5
Conclusion of the paper.............................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Introduction................................................................................................................................2
Intention or content of the paper................................................................................................2
Research methods.......................................................................................................................3
Introduction............................................................................................................................3
Research design......................................................................................................................3
Research strategy....................................................................................................................4
Data gathering process...........................................................................................................4
Data analysis method..............................................................................................................4
Findings of the article.................................................................................................................5
Highlighted issues by the authors..............................................................................................5
Conclusion of the paper.............................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Introduction
Monitoring is a kind of process which is used in the business industries for controlling and
evaluating a large number of data sets. Business analysis with processes extracted from the
real-life scheme is one of the important approaches for increasing the overall performance of
businesses. The purpose of this study is to examine the concept of discovery and monitoring
along with their significance in the area of businesses. A journal paper will be discussed in
this study in order to analyse the key aspects of the monitoring process. The title of the paper
is “Business Monitoring Framework for Process Discovery with Real-Life Logs” (Abe, and
Kudo, 2014). This journal article described the concept of business monitoring approach and
identified their importance in the real-time processing system. There are various sections will
be included in this research, for example, the content of the paper, research methods used by
the authors, findings, issue highlighted by the investigators and conclusion of the paper.
Intention or content of the paper
This journal article is completely based on the discovery and monitoring process which was
written by Mari Abe and Michiharu Kudo. The key goal of this article is to describe the idea
of the business monitoring process and evaluate monitoring framework for processing the
discovery system with real life logs (Abe, and Kudo, 2014). As stated by the researchers,
business analysis by using monitoring approach is an effective technique which can help
companies for improving the overall performance of their business. It is identified that
process mining play a crucial character in the analysis of real-life logs developed from
enterprise applications (Weber, et al., 2016).
By using monitoring process companies and business industries can enhance their
performance and reduce the risk factors linked with their services and products. Mainly, the
present condition of an enterprise is visualized and analysed based on the extracted workflow.
In this research paper, the writers analysed the process discovery and monitoring process
which can help the companies for understanding key concepts of monitoring frameworks
(Stavrou, et al., 2014). Moreover, the authors also defined the abstraction level of the
monitoring system based on the inclusion relation of the correlation. In order to improve the
quality of the research, the writers included the results of other journal papers and conducted
a literature review. However, there are numbers of developed processes for data warehousing
which can analyse process logs (Koetter, and Kochanowski, 2015).
Monitoring is a kind of process which is used in the business industries for controlling and
evaluating a large number of data sets. Business analysis with processes extracted from the
real-life scheme is one of the important approaches for increasing the overall performance of
businesses. The purpose of this study is to examine the concept of discovery and monitoring
along with their significance in the area of businesses. A journal paper will be discussed in
this study in order to analyse the key aspects of the monitoring process. The title of the paper
is “Business Monitoring Framework for Process Discovery with Real-Life Logs” (Abe, and
Kudo, 2014). This journal article described the concept of business monitoring approach and
identified their importance in the real-time processing system. There are various sections will
be included in this research, for example, the content of the paper, research methods used by
the authors, findings, issue highlighted by the investigators and conclusion of the paper.
Intention or content of the paper
This journal article is completely based on the discovery and monitoring process which was
written by Mari Abe and Michiharu Kudo. The key goal of this article is to describe the idea
of the business monitoring process and evaluate monitoring framework for processing the
discovery system with real life logs (Abe, and Kudo, 2014). As stated by the researchers,
business analysis by using monitoring approach is an effective technique which can help
companies for improving the overall performance of their business. It is identified that
process mining play a crucial character in the analysis of real-life logs developed from
enterprise applications (Weber, et al., 2016).
By using monitoring process companies and business industries can enhance their
performance and reduce the risk factors linked with their services and products. Mainly, the
present condition of an enterprise is visualized and analysed based on the extracted workflow.
In this research paper, the writers analysed the process discovery and monitoring process
which can help the companies for understanding key concepts of monitoring frameworks
(Stavrou, et al., 2014). Moreover, the authors also defined the abstraction level of the
monitoring system based on the inclusion relation of the correlation. In order to improve the
quality of the research, the writers included the results of other journal papers and conducted
a literature review. However, there are numbers of developed processes for data warehousing
which can analyse process logs (Koetter, and Kochanowski, 2015).
A recent study conducted by Vera-Baquero, Colomo-Palacios, and Molloy, (2016)
implemented a process cubes which enables analysing process logs by collecting outcomes
into the data cubes. As compared with the current paper the authors provided in-depth
analysis and provided various data analysing process. It is observed that the key idea behind
the monitoring process can be applied to the real consumers and it also improve the overall
capability of the system for sensing and performing more complex tasks.
In the previous study, the authors described a model-driven mechanism for creating a
business monitoring application in the organizations. As compared with the current research
paper Cabanillas, et al., (2013) analysed that most real-life system logs are produced for the
system used in the business industries. Such kind of system also provides a platform for
solving problems related to business and the logs were not developed to reuse in the system.
However, the monitoring process used in the business needs an event monitor runtime and
event subscriber which is known as a monitoring context. The researchers also proposed
monitoring contexts and a runtime which allow extracting metrics and process instances
simultaneously in the single system.
Research methods
Introduction
The examination procedure is a key piece of each exploration that gives a stage to controlling
and checking the nature of the work. In the wake of dissecting this paper, it has discovered
that the authors' embraced different sorts of techniques while leading the examination (Vom
Brocke, Zelt, and Schmiedel, 2016). These techniques included blended research structure,
auxiliary information gathering approach; inquire about methodology, and spellbinding
substance examination, etc. By utilizing these techniques the creators basically looked into
the idea of the monitoring process and accomplished points of the examination.
Research design
It is a significant piece of the exploration procedure segment that helped the creators for
delivering a viable theory and points of the examination. In this paper, the analysts utilized a
mixed research structure which included both qualitative and quantitative procedures
(Knuplesch, Reichert, and Kumar, 2016). These kinds of strategies gave a stage to the
creators for decreasing mistakes and issues happened in the examination and improved the
presentation of the exploration. For the most part, the subjective structure concentrated on the
implemented a process cubes which enables analysing process logs by collecting outcomes
into the data cubes. As compared with the current paper the authors provided in-depth
analysis and provided various data analysing process. It is observed that the key idea behind
the monitoring process can be applied to the real consumers and it also improve the overall
capability of the system for sensing and performing more complex tasks.
In the previous study, the authors described a model-driven mechanism for creating a
business monitoring application in the organizations. As compared with the current research
paper Cabanillas, et al., (2013) analysed that most real-life system logs are produced for the
system used in the business industries. Such kind of system also provides a platform for
solving problems related to business and the logs were not developed to reuse in the system.
However, the monitoring process used in the business needs an event monitor runtime and
event subscriber which is known as a monitoring context. The researchers also proposed
monitoring contexts and a runtime which allow extracting metrics and process instances
simultaneously in the single system.
Research methods
Introduction
The examination procedure is a key piece of each exploration that gives a stage to controlling
and checking the nature of the work. In the wake of dissecting this paper, it has discovered
that the authors' embraced different sorts of techniques while leading the examination (Vom
Brocke, Zelt, and Schmiedel, 2016). These techniques included blended research structure,
auxiliary information gathering approach; inquire about methodology, and spellbinding
substance examination, etc. By utilizing these techniques the creators basically looked into
the idea of the monitoring process and accomplished points of the examination.
Research design
It is a significant piece of the exploration procedure segment that helped the creators for
delivering a viable theory and points of the examination. In this paper, the analysts utilized a
mixed research structure which included both qualitative and quantitative procedures
(Knuplesch, Reichert, and Kumar, 2016). These kinds of strategies gave a stage to the
creators for decreasing mistakes and issues happened in the examination and improved the
presentation of the exploration. For the most part, the subjective structure concentrated on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
hypothetical parts of the exploration theme which are acquired from the literature survey and
quantitative plan permits numerical information about the business procedure the board.
Research strategy
The research strategy is a key part of the research which helps the researchers for converting
the steps into a form an effective structure. In this research paper, there are various research
strategies included for example literature review, observation, secondary data and so on
(Calabro, Lonetti, and Marchetti, 2015). The authors conducted a literature review for
analysing the opinions of other investigators and improved the quality of research. The
observation of data regarding the monitoring process is also obtained from the previous
papers. So, using such types of methods the authors effectively conducted the research and
reduced the drawbacks of previous papers.
Data gathering process
In the wake of checking on the paper, it is distinguished that the writers pursued the
secondary sort of information collecting process that gave actualities and data about the
monitoring and discovery process. A literature survey helped the writers for acquiring the
optional information about the examination point and a couple of different assets are
additionally utilized for getting hypothetical actualities, for instance, valuable papers, explore
considers, and online books. In this manner utilizing this sort of information getting
technique, the creators successfully accomplished points and objectives of the examinations
and decreased the disadvantages of past investigations.
Data analysis method
The data analysis is a type of technique which is used in the research for analysing the data in
an effective way that provides reliable results and findings of the research. In this journal
article, the creators received a content analysis process due to their capacity to assess the
outcomes and discoveries of the exploration subject. Also, an SPSS device is utilized for
recognizing the important certainties and contentions about the gathered data. Consequently,
utilizing these sorts of research techniques the analysts picked up a powerful end and
fundamentally broke down the idea of the business process the board.
Findings of the article
This paper is based on the monitoring framework and the authors critically reviewed the
concept of both monitoring and discovery process. In this paper, the authors found that
quantitative plan permits numerical information about the business procedure the board.
Research strategy
The research strategy is a key part of the research which helps the researchers for converting
the steps into a form an effective structure. In this research paper, there are various research
strategies included for example literature review, observation, secondary data and so on
(Calabro, Lonetti, and Marchetti, 2015). The authors conducted a literature review for
analysing the opinions of other investigators and improved the quality of research. The
observation of data regarding the monitoring process is also obtained from the previous
papers. So, using such types of methods the authors effectively conducted the research and
reduced the drawbacks of previous papers.
Data gathering process
In the wake of checking on the paper, it is distinguished that the writers pursued the
secondary sort of information collecting process that gave actualities and data about the
monitoring and discovery process. A literature survey helped the writers for acquiring the
optional information about the examination point and a couple of different assets are
additionally utilized for getting hypothetical actualities, for instance, valuable papers, explore
considers, and online books. In this manner utilizing this sort of information getting
technique, the creators successfully accomplished points and objectives of the examinations
and decreased the disadvantages of past investigations.
Data analysis method
The data analysis is a type of technique which is used in the research for analysing the data in
an effective way that provides reliable results and findings of the research. In this journal
article, the creators received a content analysis process due to their capacity to assess the
outcomes and discoveries of the exploration subject. Also, an SPSS device is utilized for
recognizing the important certainties and contentions about the gathered data. Consequently,
utilizing these sorts of research techniques the analysts picked up a powerful end and
fundamentally broke down the idea of the business process the board.
Findings of the article
This paper is based on the monitoring framework and the authors critically reviewed the
concept of both monitoring and discovery process. In this paper, the authors found that
monitoring is a reliable approach from the perspective of the business because it provides a
platform for improving the effectiveness of the businesses (Leontjeva, et al., 2016). The
authors developed and implemented a run time monitoring system for log analysis and
evaluating which can help companies for analysing the overall performance of their
businesses and services.
It is identified that the designed monitor framework has the ability for extracting process in
very less time and also derive the effective metrics in the system by using logs (Backmann, et
al., 2013). The researchers used a secondary research method for obtaining reliable
information about the research topic and also analysed the results and outcomes of other
journal papers based on the monitoring process. In this paper, the authors also tested the
monitoring framework in the real-time system log and identified that the monitoring process
can effectively improve the efficiency of the businesses.
Highlighted issues by the authors
There are numbers of issues and problems highlighted and discovered by the authors and also
proposed the effective solutions related to the monitoring process. The authors highlighted
that most real-life scheme logs are developed for a diagnoses system which produces server
failures related issues. Moreover, it is found that the logs were not designed and produced for
reusing the system which creates a problem for the business industries. The researchers also
argued that for changing the axes of analysis process as per the consumer’s requirement is a
key problem which requires more efforts and time. However, it also requires the numbers of
logs for extracting the workflow which is a problem on the analysis technique with process
discovery which takes more time rather than other. Therefore, all these problems or issues are
highlighted by the authors in the journal paper and also reviewed the key aspects of the
monitoring framework.
Conclusion of the paper
This research paper is described as the key concept of the monitoring process and developed
a monitoring framework for real-life logs. After reviewing the paper, it is concluded that the
developed monitoring framework is a more effective process which can be used in the
companies for controlling the performance of their businesses. In this research paper, the
authors also identified the challenges and problem linked to the monitoring framework.
Moreover, the authors also designed and implemented a run time monitoring system for log
platform for improving the effectiveness of the businesses (Leontjeva, et al., 2016). The
authors developed and implemented a run time monitoring system for log analysis and
evaluating which can help companies for analysing the overall performance of their
businesses and services.
It is identified that the designed monitor framework has the ability for extracting process in
very less time and also derive the effective metrics in the system by using logs (Backmann, et
al., 2013). The researchers used a secondary research method for obtaining reliable
information about the research topic and also analysed the results and outcomes of other
journal papers based on the monitoring process. In this paper, the authors also tested the
monitoring framework in the real-time system log and identified that the monitoring process
can effectively improve the efficiency of the businesses.
Highlighted issues by the authors
There are numbers of issues and problems highlighted and discovered by the authors and also
proposed the effective solutions related to the monitoring process. The authors highlighted
that most real-life scheme logs are developed for a diagnoses system which produces server
failures related issues. Moreover, it is found that the logs were not designed and produced for
reusing the system which creates a problem for the business industries. The researchers also
argued that for changing the axes of analysis process as per the consumer’s requirement is a
key problem which requires more efforts and time. However, it also requires the numbers of
logs for extracting the workflow which is a problem on the analysis technique with process
discovery which takes more time rather than other. Therefore, all these problems or issues are
highlighted by the authors in the journal paper and also reviewed the key aspects of the
monitoring framework.
Conclusion of the paper
This research paper is described as the key concept of the monitoring process and developed
a monitoring framework for real-life logs. After reviewing the paper, it is concluded that the
developed monitoring framework is a more effective process which can be used in the
companies for controlling the performance of their businesses. In this research paper, the
authors also identified the challenges and problem linked to the monitoring framework.
Moreover, the authors also designed and implemented a run time monitoring system for log
analysis and it can simultaneously extract data and material from the system and also derived
the effective matrices in the single log. The results of this study show that the monitoring
framework can improve the effectiveness of the business in a reliable manner.
Conclusion
From the above discussion, it is concluded that the monitoring and discovery both are very
reliable processes from the perspective of the business which increase the efficiency of the
services provided by an organization. This research report critically reviewed a research
paper which is based on the monitoring and discovery process. This paper is completely
related to the business process management because in which the authors reviewed a process
which helps business for managing their works. From the research paper, it has found that the
authors provided complete information about the monitoring process and developed a
framework for real-life logs that has the potential for extracting process in very less time.
Therefore, using such kind of paper and the study the students can enhance their skills and
experience in the area of business process management along with the monitoring process.
the effective matrices in the single log. The results of this study show that the monitoring
framework can improve the effectiveness of the business in a reliable manner.
Conclusion
From the above discussion, it is concluded that the monitoring and discovery both are very
reliable processes from the perspective of the business which increase the efficiency of the
services provided by an organization. This research report critically reviewed a research
paper which is based on the monitoring and discovery process. This paper is completely
related to the business process management because in which the authors reviewed a process
which helps business for managing their works. From the research paper, it has found that the
authors provided complete information about the monitoring process and developed a
framework for real-life logs that has the potential for extracting process in very less time.
Therefore, using such kind of paper and the study the students can enhance their skills and
experience in the area of business process management along with the monitoring process.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
Abe, M. and Kudo, M., (2014) Business monitoring framework for process discovery with
real-life logs. In International Conference on Business Process Management, 12(8), pp. 416-
423.
Backmann, M., Baumgrass, A., Herzberg, N., Meyer, A. and Weske, M., (2013) Model-
driven event query generation for business process monitoring. In International Conference
on Service-Oriented Computing, 12(6), pp. 406-418.
Cabanillas, C., Baumgrass, A., Mendling, J., Rogetzer, P. and Bellovoda, B., (2013) Towards
the enhancement of business process monitoring for complex logistics chains.
In International Conference on Business Process Management, 12(8), pp. 305-317).
Calabro, A., Lonetti, F. and Marchetti, E., (2015) Monitoring of business process execution
based on performance indicators. In 2015 41st Euromicro Conference on Software
Engineering and Advanced Applications, 6(7), pp. 255-258.
Knuplesch, D., Reichert, M. and Kumar, A., (2016) Visually monitoring multiple
perspectives of business process compliance. In International Conference on Business
Process Management, 16(8), pp. 263-279.
Koetter, F. and Kochanowski, M., (2015) A model-driven approach for event-based business
process monitoring. Information Systems and e-Business Management, 13(1), pp.5-36.
Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M. and Maggi, F.M., (2016)
Complex symbolic sequence encodings for predictive monitoring of business processes.
In International Conference on Business Process Management, 15(8), pp. 297-313.
Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D., (2014) Business Process Modeling
for Insider threat monitoring and handling. In International Conference on Trust, Privacy and
Security in Digital Business, 16(9), pp. 119-131.
Vera-Baquero, A., Colomo-Palacios, R. and Molloy, O., (2016) Real-time business activity
monitoring and analysis of process performance on big-data domains. Telematics and
Informatics, 33(3), pp.793-807.
Abe, M. and Kudo, M., (2014) Business monitoring framework for process discovery with
real-life logs. In International Conference on Business Process Management, 12(8), pp. 416-
423.
Backmann, M., Baumgrass, A., Herzberg, N., Meyer, A. and Weske, M., (2013) Model-
driven event query generation for business process monitoring. In International Conference
on Service-Oriented Computing, 12(6), pp. 406-418.
Cabanillas, C., Baumgrass, A., Mendling, J., Rogetzer, P. and Bellovoda, B., (2013) Towards
the enhancement of business process monitoring for complex logistics chains.
In International Conference on Business Process Management, 12(8), pp. 305-317).
Calabro, A., Lonetti, F. and Marchetti, E., (2015) Monitoring of business process execution
based on performance indicators. In 2015 41st Euromicro Conference on Software
Engineering and Advanced Applications, 6(7), pp. 255-258.
Knuplesch, D., Reichert, M. and Kumar, A., (2016) Visually monitoring multiple
perspectives of business process compliance. In International Conference on Business
Process Management, 16(8), pp. 263-279.
Koetter, F. and Kochanowski, M., (2015) A model-driven approach for event-based business
process monitoring. Information Systems and e-Business Management, 13(1), pp.5-36.
Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M. and Maggi, F.M., (2016)
Complex symbolic sequence encodings for predictive monitoring of business processes.
In International Conference on Business Process Management, 15(8), pp. 297-313.
Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D., (2014) Business Process Modeling
for Insider threat monitoring and handling. In International Conference on Trust, Privacy and
Security in Digital Business, 16(9), pp. 119-131.
Vera-Baquero, A., Colomo-Palacios, R. and Molloy, O., (2016) Real-time business activity
monitoring and analysis of process performance on big-data domains. Telematics and
Informatics, 33(3), pp.793-807.
Vom Brocke, J., Zelt, S. and Schmiedel, T., (2016) On the role of context in business process
management. International Journal of Information Management, 36(3), pp.486-495.
Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A. and Mendling, J., (2016)
Untrusted business process monitoring and execution using blockchain. In International
Conference on Business Process Management, 16(7), pp. 329-347.
management. International Journal of Information Management, 36(3), pp.486-495.
Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A. and Mendling, J., (2016)
Untrusted business process monitoring and execution using blockchain. In International
Conference on Business Process Management, 16(7), pp. 329-347.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.