BP Reader 2
BP Reader 2
Purpose of Reader
These excerpts of academic articles are updated annually and have been compiled for your
course so that students can have access to recent research and multiple perspectives on the
topics being covered. This also saves cost as no textbook is prescribed. Please ensure for
copyright purposes that this reader is not distributed.
If we are focused on the organization, then the customer is outside the organization.
We can apply this same concept inside an organization, if we simply regard any
process that receives another process’s outputs as its customer. Thus, in Figure 5.3, we see
that processes can be both the supplier of one process and the customer of another.
In this case Process D has two external customers, Processes E and F. Before the manager
of Process D should consider examining whatever internal measures are used to
evaluate Process D, he or she should be sure that Process D’s outputs are satisfying its
customers, Process E and Process F. The logic here is the same as it is on the enterprise
level. It doesn’t make any sense to decrease the cost or to increase the productivity of
Process D if, as a result, the process is no longer able to deliver the products or services
it provides to Processes E and F. Once the external measures are defined and it’s clear
that Process D can consistently meet its external commitments, then, while keeping its
external measures constant, the process manager should focus on improving internal
measures.
Figure 5.4 illustrates the Widget sales cycle we just described. If you know that your
salespeople are scheduled to make 100 sales calls this quarter, you can predict that you will
be making about 20 sales. Thus, sales calls scheduled is a leading indicator of successful
sales. It comes rather late in the sales cycle, however, and may not give you much time to
make corrections. The best leading indicator, in this case, would be to track leads. A quick
calculation shows that you get one sale for each 100 leads. Or, to look at it a little differently,
to increase your sales by 15 in a quarter, you will need to get 1500 more leads. If you track
leads per month, you will know at the end of the first month in the quarter if you are on track.
If you aren’t, you will need to sharply increase the effectiveness of your lead-generation
process in the second month or you will be unlikely to meet your goal.
References
Harmon, P. (2014). Business process change: a business process management guide for managers
and process professionals.
Harmon, P. (2019). Business process change: a business process management guide for managers
and process professionals. Morgan Kaufmann.
Risk Management
According to Sadgrove (2016) there have been three risk management ages. While the first
age focused only on hazards, businesses now focus on hazards as well as opportunities. Now
risk is controlled rather than just being insured. In this course we focus on hazards or negative
risk and its controls. Risk management is becoming more important because legislation is
getting tougher and insurance is more expensive and difficult.
Risk Identification
Risk identification involves clearly identifying various threats (risks) and opportunities. The
causes and effects of each risk must be understood so effective responses can be made.
Risk identification is an important step in risk assessment, to determine what could cause a
potential loss, and to gain insight into how and why the loss might happen (Wei et al., 2016).
A threat is the potential to harm assets. We call the combination pair of threat and
vulnerability as threat–vulnerability pair. An organisation should identify their assets, threats,
Identify
Identify Identify Identify Identify
Existing
Assets Threats Vulnerabilities Consequences
Controls
Figure 12: The Gartner Business Risk Model (Proctor & Smith, 2018).
Risk Analysis
Risk analysis answers two basic questions: “What is the likelihood of particular risk
occurring?” and “What is the impact if a particular risk occurs?” Risks can be analysed
qualitatively or quantitatively. Qualitative risk analysis is the process of prioritizing risks for
subsequent further analysis or action by assessing and combining their probability
(likelihood) and impact as shown in Figure 13. Risk is viewed not just in terms of financial
impact and probability, but also subjective criteria such as health and safety impact,
• Performance Cluster: Processes occurring with high frequency and low variability. This
cluster is about processes which are performed very often (high frequency). Each
the BPM Context Matrix can also be used to inform and guide the selection of relevant digital
technologies, such as process mining and robotic process automation (RPA).
• To give a few examples, process mining has been identified as a promising means to
advance companies' process management approaches (Grisold et al., 2021) but many
organizations find it challenging to find value-adding applications areas where to start.
Using the BPM Context Matrix, it becomes obvious that it is about the high frequency
processes that would allow for meaningful results from process mining as these
processes provide a sufficient amount of digital trace data to be analyzed. Further, the
cluster particularly interesting for process mining is the agility cluster; if we have
sufficient data, we can pinpoint the high variability of process executions. According to
our study, managing processes in the agility cluster should actually aim at “challenging”
the variability, meaning to further investigate variability regarding its value creation.
Guiding questions can be: Is it necessary?, Is it value-adding?, Or is the variability
avoidable and preventable?
• To give another example: Robotic Process Automation (RPA) can have immediate
implications for processes associated with the performance cluster. Given the high
frequency and low variability, standardization and automation are management
imperatives in this cluster in order to make processes more efficient and effective.
Hence, RPA can be particularly useful to automate recurrent steps in the performance
Process Mining is a process analysis method that aims to discover, monitor and improve
real processes (processes not assumed) by extracting knowledge easily from available
event logs in the systems of current information of an organization. It goes beyond the pure
presentation of the key data of the process, recognizing the contextual relationships of the
processes, presenting them in the form of graphic analysis in order to diagnose problems
and suggest improvements in the quality of the process models. With Process Mining it will
be possible to detect or diagnose problems based on facts and not on conjectures or
intuitions. Process mining seeks the confrontation between event data (observed behavior)
and process models (hand-made or automatically discovered). Through the pairing of event
data and process models, it will be possible to check compliance, detect deviations, predict
delays, support decision making and recommend process redesigns.
Process mining exploits the information recorded in event logs to perform an analysis of the
real process afterwards. There are three main types of process mining:
1. Discovery, which takes an event log and produces a process model without using
any prior information, only with the help of Process Mining algorithms.
2. Conformance, where the event records (real processes) and the corresponding
process models (ideal and predefined processes in BPMN) are compared, and the
resulting coincidences or differences are identified, in order to diagnose the
deviations or inefficiencies between the process model derivative business and ideal
processes.
3. Enhancement (extension), where the process models are adapted and improved
according to the data of the real process.
How companies can prepare for the coming “AI-first” world (Davenport &
Mittal, 2023)
Some of the most successful and most technological organizations in the world have
declared their intention to be all-in on artificial intelligence – “AI fueled.” Google described it
as “a world that is AI-first, where computing becomes universally available—at home, at
work, in the car or on the go—and interacting .. . becomes much more natural and intuitive,
and above all, more intelligent.” Companies aiming to be AI- intensive in a variety of
industries share the goal of intuitive technology and pervasive intelligence and are applying
those objectives in their sectors, such as financial services, manufacturing or health care.
To achieve substantial value from AI, executives should consider deploying AI tools
systematically across every key function and enterprise operation to support new business
process designs and data-driven decision-making. Likewise, AI should drive new product
and service offerings and business models. Today, using AI in this aggressive fashion can
confer industry leadership. Eventually, it may become simply table stakes for survival.
Many companies are using rules-based robotic process automation (RPA) to automate back-
office structured workflows, but increasing numbers are combining RPA with machine
learning to enhance their decision- making. Virtual reality and other forms of simulations,
digital twins and metaverses are technologies that employ various forms of AI and are likely
to become more widely adopted in the future.
In contrast to the business process engineering movement of the early 1990s, where
headcount reduction was the primary driver, the emphasis in the era of AI is on
augmentation. While many have predicted that AI would replace humans, AI-powered
companies see the primary goal as discovering how to get the best out of both by
redesigning jobs, reskilling workers and becoming more efficient and effective in the
process. The closest connection between traditional process improvement and AI is rules-
based robotic process automation (RPA). For example, retirement and financial services
firm, Voya, has embedded an automation center of excellence within its Continuous
Improvement Center, which generally uses Lean and Six Sigma methods. A few companies
have effectively combined process reengineering and forms of AI other than RPA. DBS
Bank, for example, used AI to enable major process improvements in its anti-money-
laundering (AML) efforts, as well as in its customer centers in India and Singapore. For
companies addressing how AI can make possible dramatic improvements in business
processes, a new technology powered by AI called “process mining,” takes a lot of the
detailed work out of process improvement. It is catching on rapidly in many process-oriented
companies.
Process Mining meets Artificial Intelligence and Machine Learning (Veit et al.,
2017)
Process mining is a technique for the reconstruction, analysis, and improvement of business
processes using recorded event data from transactional IT systems [1,2,3]. Applied process
mining analysis usually starts with the explorative investigation of the process model
reproduced from the raw event data. This manual discovery aims to identify common
process deviations, undesired patterns, and sources of inefficiencies [2]. To better
understand business operations, the examined process data is often extended by additional
information beyond the event data (e.g. the net value or quantity of a purchase order). This
extended data model enables users to conduct advanced analyses to get deeper insights
into the process (e.g. creating an OLAP table including different dimensions and KPIs
References
Augusto, A., Conforti, R., Dumas, M., La Rosa, M., Maggi, F. M., Marrella, A., ... & Soo, A. (2018).
Automated discovery of process models from event logs: Review and benchmark. IEEE
Transactions on Knowledge and Data Engineering.