DOI QR코드

DOI QR Code

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data

로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석

  • 한관희 (경상국립대학교 산업시스템공학부)
  • Received : 2022.07.05
  • Accepted : 2022.07.30
  • Published : 2022.10.28

Abstract

The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

최근 들어 기업정보 시스템의 성공적인 활용은 기업의 효과적인 전략 수행과 기업 경영 목적 달성에 핵심적인 역할을 하고 있다. 기업정보 시스템의 도입 성공 여부를 결정하는 인자 중의 하나가 시스템 활용도로서, 정보시스템 활용도를 측정하는 효과적인 방안을 마련하는 것은 기업 경영에서 매우 중요하다. 본 연구에서는 프로세스 마이닝 기법을 이용한 로그 데이터 분석을 통해 정보 시스템 활용도를 평가한다. 즉, 기본적인 접속 로그 통계뿐만 아니라 정보시스템을 실제로 사용하는 순서를 패턴화하고 유사 사용 기능을 군집화하여, 정보시스템 설계시에 예상하였던 시스템 사용 순서/기능과 실제 현황을 비교함으로써 기존 정보시스템을 개선하거나 확장하는데 피드백을 제공하고자 한다.

Keywords

References

  1. S. Petter, W. DeLone, and E. McLean, "Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships," European Journal of Information Systems, Vol.17, No.3, pp.236-263, 2003.
  2. W. H. Delone and E. R. McLean, "The DeLone and McLean Model of Information Systems Success: a Ten-Year Update," Journal of Management Information Systems, Vol.9, No.4, pp.9-30, 2008.
  3. W. M. Van der Aalst and A. J. M. M. Weijters, "Process Mining: a Research Agenda," Computers in Industry, Vol.53, No.3, pp.231-244, 2004. https://doi.org/10.1016/j.compind.2003.10.001
  4. W. Van der Aalst, "Process Mining: Discovery, Conformance and Enhancement of Business Processes," Springer Science & Business Media, 2016.
  5. W. Van der Aalst, T. Weijters, and L. Maruster, "Workflow Mining: Discovering Process Models from Event Logs", IEEE Transactions on Knowledge and Data Engineering, Vol.16, No.9, pp.1128-1142, 2004. https://doi.org/10.1109/TKDE.2004.47
  6. W. M. Van der Aalst, H. A. Reijers, and M. Song, "Discovering Social Networks from Event Logs," Computer Supported Cooperative Work (CSCW), Vol.14, No.6, pp.549-593, 2005. https://doi.org/10.1007/s10606-005-9005-9
  7. A. Rozinat and W. M. Van der Aalst, "Conformance Checking of Processes Based on Monitoring Real Behavior," Information Systems, Vol.33, No.1, pp.64-95, 2008. https://doi.org/10.1016/j.is.2007.07.001
  8. A. F. Barisic and M. P. bach, "The Intensity of Human Resources Information Systems Usage and Organizational Performance," Interdisciplinary Description of Complex Systems, Vol.17, No.3-B, pp.567-597, 2019.
  9. M. J. Cuellar, E. R. McLean, and R. D. Johnson, "The Measurement of Information System Use: Preliminary Considerations," Proceedings of the 2006 ACM SIGMIS CPR conference on Computer Personnel Research, pp.164-168, ACM, Claremont, CA USA, 2006.
  10. H. K. Edwards, "System Utilization and Changes in Implemented Information Systems: a Case Study," IAENG International Journal of Computer Science, Vol.33, No.1, pp.68-73, 2007.
  11. C. T. Lopes, and G. David, "Higher Education Web Information System Usage Analysis with a Data Webhouse," International Coference on Computational Science and Its Applications (ICCSA 2006), pp.78-87, Springer Berlin Heidelberg, 2006.
  12. T. W. Yan, M. Jacobsen, H. Garcia-Molina, and U. Dayal, "From User Access Patterns to Dynamic Hypertext Linking," Computer Networks and ISDN Systems, Vol.28, No.7, pp.1007-1014, 1996. https://doi.org/10.1016/0169-7552(96)00051-7
  13. R. Kohavi, "Mining E-commerce Data: the Good, the Bad, and the Ugly," Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data mining, pp.8-13, ACM, San Francisco CA USA, 2001.
  14. M. S. Chen, J. S. Park, and P. S. Yu, "Data Mining for Path Traversal Patterns in a Web Environment," Proceedings of the 16th International Conference on Distributed Computing Systems, pp.385-392, IEEE, Hong Kong, 1996.
  15. T. Li, Y. Jiang, C. Zeng, B. Xia, and Z. Liu, "FLAP: An End-to-End Event Log Analysis Platform for System Management," Proceedings of 23rd ACM SIGKDD International Conference on Konoledge Discovery and Data Mining, pp.1547-1556, Halifax, NS, Canada, 2017.
  16. M. Leemans, W. M. P. Van der Aalst, and M. G. J. Van den Brand, "The Statechart Workbench: Enabling Scalable Software Event Log Analysis Using Process Mining," 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering, pp.502-506, Campobasso, Italy, 2018.
  17. M. Jans, J. M. van der Werf, N. Lybaert, and K. Vanhoof, "A Business Process Mining Application for Internal Transaction Fraud Mitigation," Expert Systems with Applications, Vol.38, No.10, pp.13351-13359, 2011. https://doi.org/10.1016/j.eswa.2011.04.159
  18. K. H. Han, B. Hwang, and J. Jeon, "A Navigation Pattern Analysis of University Department's Websites Using a Processing Mining Approach," Innovations in Education and Teaching International, Vol.52, No.5, pp.485-498, 2015. https://doi.org/10.1080/14703297.2013.832634
  19. T. Chiu and M. Jans, "Process Mining of Event Logs: A Case Study Evaluating Internal Control Effectiveness," Accounting Horizons, Vol.33, No.3, pp.141-156, 2019. https://doi.org/10.2308/acch-52458
  20. F. Caron, J. Vanthienen, and B. A. Baesens, "Comprehensive Investigation of the Applicability of Process Mining Techniques for Enterprise Risk Management," Computers in Industry, Vol.64, No.4, pp.464-475, 2013. https://doi.org/10.1016/j.compind.2013.02.001
  21. J. De Weerdt, A. Schupp, A. Vanderloock, and B. Baesens, "Process Mining for the Multi-Faceted Analysis of Business Processes-A Case Study in a Financial Services Organization," Computers in Industry, Vol.64, No.1, pp.57-67, 2013. https://doi.org/10.1016/j.compind.2012.09.010
  22. S. H. Choi, K. H. Han, and G. H. Lim, "Analysis of a Repair Processes Using a Process Mining Tool," Journal of the Korea Contents Association, Vol.13, No.4, pp.399-406, 2013. https://doi.org/10.5392/JKCA.2013.13.04.399
  23. A. Sahraeidolatkhaneh and K. H. Han, "Integrated Framework of Process Mining and Simulation Approaches for the Efficient Diagnosis and Design of Business Process," Journal of the Korea Contents Association, Vol.17, No.5, pp.44-55, 2017. https://doi.org/10.5392/JKCA.2017.17.07.044
  24. D. R. Ferreira and E. Vasilyev, "Using Logical Decision Trees to Discover the Cause of Process Delays from Event Logs," Computers in Industry, Vol.70, pp.194-207, 2015. https://doi.org/10.1016/j.compind.2015.02.009
  25. W. M. Van der Aalst, M. H. Schonenberg, and M. Song, "Time Prediction Based on Process Mining. Information Systems, Vol.36, No.2, pp.450-475, 2011. https://doi.org/10.1016/j.is.2010.09.001
  26. ProM Documentation (v6.11) https://www.promtools.org/doku.php?id=docs:start#prom_documentation, 2022.