Advancing_Process_Audits_With_Process_Mining_A_Systematic_Review_of_Trends_Challenges_and_Opportunities
Advancing_Process_Audits_With_Process_Mining_A_Systematic_Review_of_Trends_Challenges_and_Opportunities
ABSTRACT This systematic literature review focuses on the research area of process audits and explores
the potential of process mining techniques for their enhancement. Traditional process audits, being manual
and sample-based, heavily rely on auditors’ expertise and preferences. With the emergence of process
mining (PM), there exists an opportunity to improve traditional process audits. However, prior to initiating
a PM project specifically for audits, it is crucial to understand the benefits and challenges associated
with the implementation. Through a systematic analysis of research articles from six reputable scholarly
literature indexing databases, this review reveals how integrating PM into the auditing landscape introduces
automation, transparency, and efficiency in addition to overcoming the limitations of traditional process
audits. The findings of this review provide valuable insights to identify the benefits of PM-based audits and
comprehend the challenges that must be addressed to fully realize the potential of PM techniques in process
audits.
INDEX TERMS Audits, business process audits, process compliance checking, process mining, systematic
literature review.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
68340 VOLUME 11, 2023
M. Imran et al.: Advancing Process Audits With PM
disseminated. In the upcoming subsections, a detailed explo- tional auditing, and examining the challenges associated with
ration of the three major steps of the review process has been process mining-based audits:
undertaken.
RQ1. What are the current research trends and advance-
ments in the application of process mining for
A. REVIEW PLANNING
business process audits, revealing various aspects of
process mining-based audits?
In this section, the review planning process for this systematic
RQ2. How can process mining address the limitations of
review has been outlined. The planning phase of this review
traditional business process audits and what opportu-
involved the formulation of research questions, the develop-
nities does it offer in this context?
ment of a search strategy, and the establishment of criteria for
RQ3. What are the key challenges associated with utilizing
selection of studies. The aim of outlining the review plan is
process mining for business process audits?
to ensure transparency, replicability, and comprehensiveness.
2) REVIEW PROTOCOL
1) RESEARCH QUESTIONS The development of the review protocol involved formulating
The following three research questions were formulated with search strings, selecting suitable databases for the search, and
the aim of conducting a quantitative analysis of the scientific definition of the inclusion and exclusion criteria. Each of
literature, exploring the potential of process mining in tradi- these subsections is detailed below.
a title-based inter-database and intra-database deduplication nal audit types. Various process mining tools have also been
process was conducted. Subsequently, the screening process employed to perform business process audits. The types of
of the articles was carried out based on the inclusion and contributions made in the literature include empirical studies,
exclusion criteria, including the titles and abstracts. After- case studies, frameworks, and guidelines. In the following
ward, a full-text screening of the articles that passed the sections, we discuss the results of each of these aspects in
previous screening stages was conducted. Finally, answers more detail:
from the selected articles were recorded using an Excel sheet.
1) TYPE OF CONTRIBUTIONS
1) DATA COLLECTION AND ANALYSIS
The contribution types of studies refer to the ways in which
The information pertaining to each research question was the presented research contributed to the audit field. We iden-
collected using Microsoft Excel form which also helped in tified four main types of contributions made by researchers
quantitative analysis of the collected data. namely the proposal of methods, models, tools, and empiri-
The last step of the review process consisted of reporting cal cases. Methodological contributions involved proposing
the findings, which will be described in the following section. new audit methods or refining of existing methodologies.
Model as contribution involved putting forward a conceptual
C. REPORTING THE FINDINGS framework of audit analytics. Empirical cases consisted of
In this phase, the review results are reported. The overall the studies that evaluated the findings of exiting studies in
study screening process is illustrated in the form of PRISMA the form of experimental evaluations or case studies. Propos-
diagram in Fig. 4. ing a tool as contribution involved introducing new tool or
A total of seventy research articles were identified as rele- explaining how improved tool can aid in improving process
vant to addressing the research questions. The distribution of mining based audits.
included studies by year and publication type is presented in It is important to note that some of the studies may have
Fig. 5. and Fig. 6, respectively. multiple contribution types such as proposing a methodology
As illustrated in Fig. 5, there was an increasing trend in and performing its evaluation in context of other methodolo-
frequency of publication over time, although a decline in gies. However, the selection of contribution types in this paper
recent years can also be observed. Fig. 6. Demonstrates that is based on the specific objectives of each study. Among con-
the included studies were evenly distributed between con- tribution these types, empirical cases were the most prevalent,
ference and journal publications. Nevertheless, conference as depicted in Fig. 7. Studies presenting auditing methods
publications slightly outnumbered journal publications. were the second most common type of contribution to the
The detailed findings relevant to each research question field, while those offering auditing models or tools were
will be reported in the subsequent results section. relatively scarce.
IV. RESULTS
2) APPLICATION DOMAIN
In this section, the review findings have been presented.
The research questions formulated in the review planning This section presents a broad categorization of studies based
section were used to guide the analysis and organization of on their application domain, providing insight into the focus
the results. of PM-based audits in specific domains. The distribution of
The section begins by presenting the findings related to studies, as shown in Fig. 8, indicates that a significant amount
each research question in detail, supported by tables, figures, of research has been conducted in the domains of financial
and relevant statistics. Overall, this section provides insights auditing and healthcare.
into the opportunities and challenges of using process min- In addition to healthcare, studies on the compliance audit
ing for business process audits and can serve as a valuable of the help desk were found, which is an instantiation of
resource for researchers and practitioners in this field. Customer Relationship Management (CRM), used to evalu-
ate system effectiveness for customer satisfaction. Security
A. RQ 1: WHAT ARE THE CURRENT RESEARCH TRENDS assessment remained the fourth most dominant domain for
AND ADVANCEMENTS IN THE APPLICATION OF PROCESS assessing the organization’s exposure to external threats,
MINING FOR BUSINESS PROCESS AUDITS, REVEALING with intrusion detection being the most common applica-
VARIOUS ASPECTS OF PROCESS MINING-BASED AUDITS? tion. However, less attention has been paid to the logistic,
This subsection presents the results of the analysis of the liter- procurement, and production domains, which are crucial for
ature on the use of process mining for business process audit. determining the efficiency of an organizational process.
In the literature analysis, various aspects were examined,
including the application domain, audit type, tools, process 3) AUDIT TYPE
mining technique used, and types of contributions made by The internal audit process aims to ensure compliance with
researchers. The study findings demonstrate that process- both internal and external regulations with more focus on the
mining-based business process auditing is employed across efficiency of organizational processes and the effectiveness
various application domains, with a greater emphasis on inter- of implemented business rules [35], [36]. Typically, internal
categorized into five primary themes, which will be discussed literature, it was found that the use of unsupervised log
in detail as follows. data, which records organizational activities in a human-
independent manner, promotes objectivity in the auditing
process. By analyzing the entire population data, the need
1) SAMPLING UNCERTAINTY CHALLENGE to select a representative sample is eliminated, preventing
The primary limitation of traditional audits as identified audit data from being biased by the auditors’ preferences and
based on the literature was reliance on random sam- interests [78].
ples. [88], [91] to detect deviations from standard operating
procedures [51], which can introduce errors and subjectiv-
ity into the process. Moreover, random sampling provides 2) RESOURCE-INTENSIVE AUDIT
only a partial view of the process [63], [76], [78]. In con- The second most prevalent limitation of traditional audit as
trast, process mining-based audits use complete log data, identified in literature was its resource intensiveness. Part of
providing concrete evidence and increasing auditors’ confi- traditional audit activities such as source document review
dence in the audit process [38], [78], [91]. From the analysis and interviews can be time-consuming and require additional
TABLE 5. Comparison of limitations of traditional audits and corresponding enhancement opportunities offered by process mining techniques.
human resources to collect samples [35]. In contrast, it was audit results [88]. In contrast, findings suggest that process
found that process mining leverages log data, which is typi- mining-based auditing activities ensure transparency in the
cally stored in centralized locations like servers, streamlining audit process through the use of explicit data and an objective
the data collection process. As a result, auditors can concen- audit process [41]. The validity of the outcomes can be easily
trate on other auditing tasks, rather than investing much time verified at any point in time by repeating the same activities.
in data collection [35]. However, the sampling strategy used in conventional audits
makes it difficult to obtain the same outcomes again [88].
3) CREDIBILITY AND VALIDITY CHALLENGE
One of the primary challenges associated with traditional
audits is the issue of credibility and validity. The subjectiv- 4) LIMITED SCOPE
ity and uncertainty inherent in traditional sampling methods Traditional audits typically focus on data analytics [93].
raise concerns about the accuracy and reliability of the However, process mining goes beyond these techniques to
enable end-to-end, multi-perspective audits that offer deep dover [69]. Security and segregation of duty analysis also
insights into how processes are executed. By utilizing log enable the detection of activities performed by unauthorized
data, multi-perspective audits at multiple levels, including personnel [28]. Typical audit analytics that employ sampling
organizational, departmental, and even individual employee approaches can only uncover partial violations, in contrast,
levels, can be facilitated through process mining. These types process mining has the capability to identify a wider range
of audits can contribute to a more comprehensive under- of irregularities or deviations. [63], [76], [78]. Additionally,
standing of the processes and assist in identifying areas for it was found that comparatively process mining equips audi-
improvement, thereby adding value to continuous process tors with the necessary tools to examine computer-based
improvement efforts. [28], [71]. transactions.
Findings further suggest that the retrospective nature of In the next section, the findings related to the third research
traditional audits, which are often conducted annually, can question will be discussed.
be overcome by process mining, which enables internal
and external audits to be conducted at any time of the C. RQ 3: WHAT ARE THE KEY CHALLENGES ASSOCIATED
year [16], [35]. The utilization of continuous auditing brings WITH UTILIZING PROCESS MINING FOR BUSINESS
these audits closer to operational support, allowing for near- PROCESS AUDITS?
real-time audits during process execution. Ad-hoc audits Despite having the potential to improve the auditing pro-
conducted for efficiency assessment purposes can assist in cess, the implementation of process mining is not immune
continuous process improvement. to challenges and limitations, which must be understood
and addressed to ensure its effectiveness. In this section,
5) LIMITED ANALYTICAL CAPABILITIES the challenges associated with the application of process
Comparing the analytical capabilities of both audit types, mining-based audits are intended to be presented. Based on
it was found that in traditional audits, the detection of some the findings corresponding to research question 3, the rele-
novel audit perspectives has limited support such as interac- vant challenges are presented in Table 6. Furthermore, each
tion analysis [69], segregation of duty analysis [28], detection of these challenges are briefly elaborated in the subsequent
of security violations [63], and full activity order analy- subsections:
sis. Interaction analysis in process mining shows how staff
members communicate and hand over work across depart- 1) COMPLEXITY CHALLENGE
ments and staff members, helping to detect violations of Real-life processes can be complex, with a variety of
interaction restrictions and standard procedures for work han- behaviors required to achieve goals. When modeling
such processes with process mining techniques, the limitations that need be understood before auditing process
outcome can be a difficult-to-understand, spaghetti-like using specific process discovery algorithm. Throughout the
model representation due to fine-granular details in the literature, the selection of suitable algorithms in different
logs [43], [46], [67], [76], [89]. Literature analysis revealed auditing scenarios remained influenced by the researchers’
that auditors encounter significant challenges when utilizing choice in process mining-based auditing.
process mining techniques for auditing purposes, with com-
plexity being the most notable obstacle. [96]. Although some 4) HANDLING NOISE AND ANOMALIES
methods like clustering, abstraction, filtration, and pattern When conducting process mining-based audits, real-life event
mining can help deal with this issue [102]; however, effective logs can present challenges due to the presence of anomalies.
utilization of such methods introduces yet another challenge To accurately identify true positive anomalies, the effec-
for auditors. Since there is a tradeoff between complexity tive management of log noise and the ability to distinguish
and model precision [102], simplifying the processes can between abnormal behavior and behavior that may appear
decrease the level of evidence needed for audits thereby unusual but is actually normal is crucial for auditors [90].
reducing confidence on audit findings. Researchers argue that failure to detect unusual behavior and
understand its impact on the organization can lead to inac-
2) LOG EXTRACTION AND TRANSFORMATION curate conclusions about anomalous behavior, particularly in
Process mining leverages event logs to extract knowledge financial auditing where the consequences of misinterpreting
about process execution, offering the advantage of consid- anomalous behavior can be significant [106], [107]. As such,
ering the entire population of logs compared to traditional all unusual behavior must be carefully analyzed by auditors,
auditing methods [38], [78], [91]. However, it was found who should consider its potential impact before drawing any
that constructing these logs into suitable representations conclusions regarding the validity of a financial audit [92].
for process mining tools is challenging due to the lack of
skills required for selecting appropriate process instances and 5) DATA AVAILABILITY AND INACCURACY CHALLENGE
attributes [10]. Another challenge arises when the executions Findings suggest that in the context of business process
of multiple processes are recorded in the same log, making audits, process mining faces significant challenges due to data
it difficult to select the right process to audit [72]. This issue availability and data inaccuracy. Data availability challenges
arises due to the presence of relevant data required to verify arise when critical data is missing, incomplete, or outdated,
a statement but its inability to be associated with a particular thereby hindering the ability to obtain a comprehensive
case [13]. Moreover, it was also found that incomplete, and understanding of the audited process [13]. On the other
biased data collection can also hinder the usability of process hand, data inaccuracy challenges occur when data is entered
mining based audits such as if the data used for the analysis incorrectly or processing errors occur, leading to incorrect
is incomplete or biased, it can lead to inaccurate results. conclusions. Despite the current digital age, several organi-
As an example, the exclusion of certain process steps or zations still rely on a paper-based environment for carrying
activities from the analysis could result in an incomplete or out organizational activities [42], [47], [93]. To address
inaccurate depiction of the process. Similarly, if the data is these challenges, proactive collaboration between auditors
biased towards certain types of process executions, the overall and the audited organization is necessary to enhance data
process may not be accurately represented [13]. Therefore, management processes, employ data cleansing techniques,
if preprocessing steps are not adequately considered, they and rely on multiple data sources to ensure accuracy. Over-
may introduce bias into the analysis and findings. coming these challenges is crucial to the success of process
mining-based audits and the accuracy of the conclusions
3) REPRESENTATIONAL AND ALGORITHMIC BIAS drawn from them. According to [13], it is common for real
Visual analytics play a significant role in understanding how world processes to involve certain activities that are not
a process is executed. The extracted process models and captured by the IT applications supporting them. Such as,
insights heavily depend on the quality of the representation of the verification of product quality might be recorded in the
the data [103]. The analysis of literature reveals that there is IT application as a simple binary outcome of ‘‘Satisfac-
a range of process mining algorithms to model the execution tory’’ or ‘‘Unsatisfactory,’’ whereas in reality, an individual
of the process. The popular process mining algorithm, Fuzzy may perform multiple checks that cumulatively determine
miner [104] yields a directly-follows graph. The Inductive the final judgement. The accuracy and reliability of pro-
miner [105] generates petri net notation, while Heuristic cess mining-based audits are significantly challenged by this
miner produces a heuristics-net that can be converted into aspect.
a Petri net [16]. An appropriate representation of data can
facilitate auditors in detecting anomalies and deviations from 6) PRIVACY CONCERNS
typical behavior, thereby aiding in the identification of poten- Ensuring data privacy is a critical consideration in process
tial fraud and irregularities. However, it was found that each mining, as the event logs used for analysis may contain
of the process discovery algorithms have drawbacks and personal and sensitive information about the organization’s
personnel. The audit data and findings must be protected from can be attributed to the fact that several tasks in these domains
misuse and exposure. The logs utilized for process mining are performed manually and beyond the scope of traditional
are commonly in CSV format, encompassing a wealth of information systems.
information that extends beyond the requirements of auditing, Regarding the audit types, the findings revealed a stronger
including personal information [97]. The presence of such emphasis on internal audit types. This tendency towards inter-
rich personal information raises security and privacy concerns nal audit types signifies that that process mining based audit
to prevent misuse of such data for non-auditing purposes. It is approach is effective for evaluating internal controls of the
believed by researchers that the existing privacy preservation organizations, however it remains immature for external audit
techniques [63], [64], [72] are insufficient in ensuring privacy. of an organization. The limited availability of research works
Therefore, there is an urgent need for further research on on external audit types can be attributed to the absence of
dealing with privacy issues [97]. an external reference model that enables compliance check-
ing against external boundaries. However, it is worth noting
7) INTEGRATING PM INTO AUDIT LANDSCAPE that the assessment of efficiency and effectiveness against
Another relevant challenge found in the literature was the standard benchmarks does not necessarily require a distinct
integration of process mining into the existing audit land- reference model.
scape [7]. The absence of a reference process model for In terms of trends on tool usage, ProM and Disco
auditing in organizations often results in ad-hoc execution have remained dominant process mining tools. However,
of these tasks [71]. Furthermore, since the scope of process researchers have expressed concerns regarding the fuzzy
mining-based audit is restricted solely to the activities per- miner algorithm employed by popular tools like Disco
formed within the system [59], the activities executed outside and Celonis, as they believe it can produce misleading
the system boundaries are unlogged and thus cannot be inves- results [108]. Therefore, it is essential for researchers to
tigated by process mining-based techniques [7], [60], [71]. consider this aspect carefully when selecting appropriate
Moreover, findings revealed scarcity of studies on cross- auditing tools. The occurrence of erroneous outcomes due to
organizational audits. misleading results can lead to a distorted representation of
In summary, the results section highlighted the limitations reality, potentially leading to the failure of the entire auditing
of traditional business process auditing techniques and the endeavor.
potential of process mining to overcome them. While process Results on application of process mining techniques in
mining-based audits were found to be effective for evaluating business process audits revealed two types of process mining
internal controls, their maturity for external auditing remains techniques that remained under focus: process discovery and
a challenge. Furthermore, data availability, interpretation of conformance assessment. However, it is worth noting that
audit results, and ethical and privacy concerns were identified the enhancement perspective of auditing, which focuses on
as additional challenges that hinder the adoption of pro- improving the process by addressing identified bottlenecks
cess mining based audits. In the subsequent section, a more during process discovery and conformance assessment, has
detailed discussion of these findings will be presented. been overlooked in the literature. Combined with predictive
and continuous auditing, process improvement techniques
V. DISCUSSION can significantly improve auditing activities by enabling
The discussion section aims to provide an in-depth analysis real-time audit of the process inefficiencies and anomaly
and interpretation of the findings obtained from the study. detection. Real-time auditing of process inefficiencies and
The objective of this study was to reveal trends in utiliza- anomaly detection can enable auditors to identify and address
tion of process mining for business process audits, investigate issues as they occur, rather than waiting until the end of a
the limitations of traditional business process audits and reporting period. This can lead to more timely and effective
explore the opportunities that process mining offers to corrective actions and ultimately result in improved organi-
overcome these limitations. Additionally, the objective also zational performance. Future research in this direction should
included identifying the challenges associated with the imple- focus on developing process improvement techniques that are
mentation of process mining in auditing. specifically tailored for process mining-based audits. This
In context of trends in the usage of process mining in audit, can involve the development of new algorithms and methods
the findings reveal that researchers have primarily focused for identifying bottlenecks and inefficiencies, as well as the
on experimental studies and utilizing existing tools rather integration of predictive and continuous auditing into the
than developing new auditing models and tools. In context audit process.
of trends in the application domain, there has been notable The review on how process mining overcomes limi-
interest in process mining-based methods in the financial tations of traditional audits suggests that process mining
and healthcare auditing fields. This interest stems from the offers several advantages over traditional audits. Leveraging
sensitivity of these domains such as the potential for causing full-population data remained the foundation of all the advan-
financial harm to a company. However, there has been rela- tages that process mining offers over traditional audits. It was
tively less emphasis on auditing opportunities in the logistics found that traditional audit poses a risk of bias in auditing
management, procurement, and production domains. This process since it requires manual collection of representative
samples, which are subject to the preference and expertise mining, and data management. One prospective direction for
of the auditor. Process mining overcomes this limitation future research in this direction can be investigation of meth-
by removing the need for sample collection and enables ods for ensuring the validity and reliability of event logs used
a full-population-based audit, which promotes a transpar- for process mining-based auditing. For instance, researchers
ent, reproducible, unbiased, and objective audit process that could explore techniques for identifying and correcting errors
increases both the auditor and the auditee’s trust in the audit- and inconsistencies in event logs, or the validation of event
ing process. The identified opportunities indicate that the logs against other sources of data, such as interviews or
process mining-based audit approach has the potential to observations. Additionally, researchers could investigate the
offer a more comprehensive understanding of the processes, impact of diverse types of errors or inconsistencies on the
uncover process inefficiencies, and identify bottlenecks that results of process mining-based auditing, in order to develop
may go unnoticed in a traditional audit. This approach can be guidelines for identifying and addressing such issues.
particularly advantageous when conducting audits on com- In addition to aforementioned challenges, the review find-
plex and interconnected processes, as it helps to uncover ings also emphasized the challenges of bias, privacy, and
significant issues that may be overlooked by traditional ethical concerns. The process of auditing a business pro-
audits. cess often involves sensitive information that requires careful
Aside from the several opportunities it presents, it was management and protection. For instance, in case of a loan
also observed that there are certain challenges that delay application process [13], [100], during the process audit,
the adoption of process mining over traditional audits in it may be discovered that a loan application was unjustly
audit domain. These challenges remained mainly associated denied. Without identifying the root cause, the disclosure
with difficulty in interpreting audit results and the avail- of such findings can potentially create uncertainty for other
ability of data required for process mining-based audits. applicants whose requests were also denied. Therefore, it is
Several organizations continue to manage their business pro- crucial to maintain anonymity when handling event logs
cesses manually, making it impossible to undertake process exported from the relevant IT applications. Neglecting to
mining-based audits due to the lack of available data. Further- address such cases can lead to ethical issues and introduces a
more, process mining-based audits encounter the challenge risk of bias into the audit process.
of detecting auditing actions that were performed beyond the Although a comprehensive coverage of the literature was
scope of information system. This type of audit is possible attempted, it is important to acknowledge that the validity
using traditional audits by visually observing the process of the findings in this review may be threatened by cer-
activities. Some of the researchers [13] have already empha- tain limitations. Six well-known scholarly literature indexing
sized upon the potential of pattern recognition techniques databases were relied upon for our literature search, with a
to overcome this limitation in order to enhance the overall specific focus on journal articles and conference proceedings.
accuracy and reliability of the audit process. The groundwork In order to ensure the quality and avoid the inclusion of
of Kratsch et al. [109] can give a new direction to overcome grey literature, all other sources and articles were excluded.
this challenge by using image recognition techniques over However, the inclusion of additional sources may have a
video recordings of human activities, thereby enabling the slight impact on the study findings. It is worth mentioning
audit of activities beyond the scope of the information system. that several conference proceedings, specifically those pub-
Although not specifically focused on audits, the work of lished as book chapters in the popular Springer lecture notes
Kratsch et al. [109] lays a foundation for future research to series, as well as snowballed papers, were not affected by our
tackle the challenge of missing data and eliminate barriers selection criteria.
associated with data unavailability. Auditing a dynamic and The implementation of PM-based audit is a complex pro-
evolving process change requires a different approach, which cess that requires the expertise of professionals in the process
is yet another unaddressed challenge. The recent Covid-19 mining domain [110]. Auditors have long relied on traditional
outbreak serves as a prime example of this issue as orga- audit methods, and the transition towards PM-based audits
nizations had to abruptly transition from on-premises work requires training auditors to adopt this novel approach. The
practices to off-premises and online modes. This sudden application of process mining techniques in auditing remains
and significant process change poses a unique challenge for hindered by several challenges that need to be overcome to
auditing. fully realize their potential.
Another fundamental challenge of process mining-based
auditing that remained unaddressed in the literature was the VI. CONCLUSION
generation of a trustworthy event log for audit. No studies In conclusion, based on a systematic review of relevant liter-
were observed pertaining to this aspect of auditing, as most ature, this study examined different perspectives of process
of the studies primarily remained focused on the analysis mining usage in business process audits and demonstrated
and investigation phases, rather than evaluating the validity how process mining overcomes the limitations of traditional
and reliability of the log being investigated. Addressing this audit. Additionally, the specific challenges related to inte-
challenge requires a multi-disciplinary approach, involving gration of process mining into audit landscape were also
researchers from different domains, such as auditing, process highlighted.
The study revealed scarcity of new auditing models and [14] W. van der Aalst et al., ‘‘Process mining manifesto,’’ in Proc. Business
tools and immaturity of process mining towards external Process Manag. Workshops, in Lecture Notes in Business Informa-
tion Processing, F. Daniel, K. Barkaoui, and S. Dustdar, Eds. Berlin,
auditing of business processes. Enhancement perspective Germany: Springer-Verlag, 2012, pp. 169–194, doi: 10.1007/978-3-642-
of process mining in audits remained largely unexplored. 28108-2_19.
Findings further reveal that Process mining offers several [15] D. Sledgianowski, M. Gomaa, and C. Tan, ‘‘Toward integration of big
data, technology and information systems competencies into the account-
advantages over traditional audits, the foundation of which ing curriculum,’’ J. Accounting Educ., vol. 38, pp. 81–93, Mar. 2017, doi:
is an objective and reproducible audit process. On the other 10.1016/j.jaccedu.2016.12.008.
hand, challenges in adoption of process mining over tradi- [16] M. Jans and M. Hosseinpour, ‘‘How active learning and process mining
can act as continuous auditing catalyst,’’ Int. J. Accounting Inf. Syst.,
tional audits include lack of expertise, unavailability of log vol. 32, pp. 44–58, Mar. 2019, doi: 10.1016/j.accinf.2018.11.002.
data and generation of a trustworthy event log. Privacy and [17] T. M. Barboza, F. M. Santoro, K. C. Revoredo, and R. M. M. Costa,
‘‘A case study of process mining in auditing,’’ in Proc. 15th Brazilian
ethical concerns also need attention.
Symp. Inf. Syst., May 2019, pp. 1–8, doi: 10.1145/3330204.3330241.
The identified challenges point towards several future [18] T. G. Erdogan and A. Tarhan, ‘‘Systematic mapping of process mining
research directions. For instance, there is a need to develop studies in healthcare,’’ IEEE Access, vol. 6, pp. 24543–24567, 2018, doi:
10.1109/ACCESS.2018.2831244.
process improvement techniques specifically tailored for pro- [19] M. R. Dallagassa, C. dos Santos Garcia, E. E. Scalabrin, S. O. Ioshii,
cess mining-based audits. This may involve the development and D. R. Carvalho, ‘‘Opportunities and challenges for applying pro-
of new algorithms and methods that may satisfy both process cess mining in healthcare: A systematic mapping study,’’ J. Ambient
Intell. Humanized Comput., vol. 13, no. 1, pp. 165–182, Jan. 2022,
mining and audit perspective. Another potential avenue for doi: 10.1007/s12652-021-02894-7.
further research is the development of methods to ensure the [20] E. Rojas, J. Munoz-Gama, M. Sepúlveda, and D. Capurro, ‘‘Process
validity and reliability of event logs used for process mining mining in healthcare: A literature review,’’ J. Biomed. Informat., vol. 61,
pp. 224–236, Jun. 2016, doi: 10.1016/j.jbi.2016.04.007.
based audits. [21] M. S. Sundari, K. Lakshmaiah, and E. Foundation, ‘‘Process mining
in healthcare systems: A critical review and its future,’’ Int. J. Emerg.
Trends Eng. Res., vol. 8, no. 9, pp. 5197–5208, Sep. 2020, doi:
REFERENCES
10.30534/ijeter/2020/50892020.
[1] W. van der Aalst, Data Science in Action. Berlin: Springer Berlin Heidel- [22] M. A. Ghazal, O. Ibrahim, and M. A. Salama, ‘‘Educational process min-
berg, 2016, doi: 10.1007/978-3-662-49851-4_1. ing: A systematic literature review,’’ in Proc. Eur. Conf. Electr. Eng. Com-
[2] J. P. Russell, Process Auditing and Techniques, 2nd ed. Milwaukee, WI, put. Sci. (EECS), Nov. 2017, pp. 198–203, doi: 10.1109/EECS.2017.45.
USA: ASQ Quality Press, 2013. [23] M. Macak, L. Daubner, M. F. Sani, and B. Buhnova, ‘‘Process mining
[3] J. M. E. M. van der Werf, H. M. W. Verbeek, and W. M. P. van der Aalst, usage in cybersecurity and software reliability analysis: A systematic
‘‘Context-aware compliance checking,’’ in Business Process Manage- literature review,’’ Array, vol. 13, Mar. 2022, Art. no. 100120, doi:
ment (Lecture Notes in Computer Science), vol. 7481. Berlin, Germany: 10.1016/j.array.2021.100120.
Springer, 2012, pp. 98–113, doi: 10.1007/978-3-642-32885-5_7. [24] C. D. S. Garcia, A. Meincheim, E. R. Faria Junior, M. R. Dallagassa,
D. M. V. Sato, D. R. Carvalho, E. A. P. Santos, and E. E. Scalabrin,
[4] E. Roubtsova and N. Wiersma, ‘‘Involvement of business roles in auditing
‘‘Process mining techniques and applications—A systematic mapping
with process mining,’’ in Communications in Computer and Information
study,’’ Exp. Syst. Appl., vol. 133, pp. 260–295, Nov. 2019, doi:
Science. Cham, Switzerland: Springer, 2019, pp. 24–44.
10.1016/j.eswa.2019.05.003.
[5] V.-L. Enzo, ‘‘Using process mining to improve productivity in banks,’’ in [25] A. R. C. Maita, L. C. Martins, C. R. LṖaz, L. Rafferty, P. C. K. Hung,
Advances in Information and Communication (Lecture Notes in Networks S. M. Peres, and M. Fantinato, ‘‘A systematic mapping study of process
and Systems). Cham, Switzerland: Springer, 2022, pp. 982–1000, doi: mining,’’ Enterprise Inf. Syst., vol. 12, no. 5, pp. 505–549, May 2018, doi:
10.1007/978-3-030-98015-3_66. 10.1080/17517575.2017.1402371.
[6] S. Srivastava, G. Srivastava, and R. Bhatnagar, ‘‘Analysis of [26] M. Jans, B. Depaire, and K. Vanhoof, ‘‘Does process mining add to inter-
process mining in audit trails of organization,’’ in Algorithms nal auditing? An experience report,’’ in Enterprise, Business-Process and
for Intelligent Systems. Singapore: Springer, 2020, pp. 611–618, Information Systems Modeling (Lecture Notes in Business Information
doi: 10.1007/978-981-15-4936-6_66. Processing), vol. 81, Berlin, Germany: Springer, 2011, pp. 31–45, doi:
[7] M. Werner, M. Wiese, and A. Maas, ‘‘Embedding process mining 10.1007/978-3-642-21759-3_3.
into financial statement audits,’’ Int. J. Accounting Inf. Syst., vol. 41, [27] D. A. Appelbaum, A. Kogan, and M. A. Vasarhelyi, ‘‘Analytical pro-
Jun. 2021, Art. no. 100514, doi: 10.1016/j.accinf.2021.100514. cedures in external auditing: A comprehensive literature survey and
[8] M. J. Jans, ‘‘Process mining in auditing: From current limitations to framework for external audit analytics,’’ J. Accounting Literature, vol. 40,
future challenges,’’ in Proc. Business Process Management Workshops. no. 1, pp. 83–101, Jun. 2018, doi: 10.1016/j.acclit.2018.01.001.
Berlin, Germany: Springer, 2012, pp. 394–397, doi: 10.1007/978-3-642- [28] M. Jans, M. Alles, and M. Vasarhelyi, ‘‘The case for process min-
28115-0_37. ing in auditing: Sources of value added and areas of application,’’
[9] W. M. P. van der Aalst, K. M. van Hee, J. M. van der Werf, and Int. J. Accounting Inf. Syst., vol. 14, no. 1, pp. 1–20, Mar. 2013, doi:
M. Verdonk, ‘‘Auditing 2.0: Using process mining to support tomorrow’s 10.1016/j.accinf.2012.06.015.
auditor,’’ Computer, vol. 43, no. 3, pp. 90–93, Mar. 2010, doi: 10.1109/ [29] M. Jans, M. G. Alles, and M. A. Vasarhelyi, ‘‘A field study on the use
MC.2010.61. of process mining of event logs as an analytical procedure in audit-
ing,’’ Accounting Rev., vol. 89, no. 5, pp. 1751–1773, Sep. 2014, doi:
[10] M. Jans, ‘‘Auditor choices during event log building for process mining,’’
10.2308/accr-50807.
J. Emerg. Technol. Accounting, vol. 16, no. 2, pp. 59–67, Sep. 2019, doi:
[30] M. Hashmi, G. Governatori, H.-P. Lam, and M. T. Wynn, ‘‘Are we
10.2308/jeta-52496.
done with business process compliance: State of the art and challenges
[11] A. P. Kurniati, G. P. Kusuma, and G. A. Ary Wisudiawan, ‘‘Designing ahead,’’ Knowl. Inf. Syst., vol. 57, no. 1, pp. 79–133, Oct. 2018, doi:
application to support process audit using process mining,’’ J. Theor. 10.1007/s10115-017-1142-1.
Appl. Inf. Technol., vol. 80, no. 3, pp. 473–480, 2015. [31] M. Elhagaly, K. Drvoderic, R. G. Kippers, and F. A. Bukhsh, ‘‘Evolution
[12] P. Gottschalk and P. Gottschalk, ‘‘Internal investigation approaches,’’ in of compliance checking in process mining discipline,’’ in Proc. 2nd Int.
Investigating White-Collar Crime. Cham, Switzerland: Springer, 2018, Conf. Comput., Math. Eng. Technol. (iCoMET), Jan. 2019, pp. 1–6, doi:
pp. 57–72, doi: 10.1007/978-3-319-68916-6_5. 10.1109/ICOMET.2019.8673437.
[13] N. J. Wiersma. (2017). The Use of Process Mining in Business [32] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and
Process Auditing. Open Univ. The Netherlands. [Online]. Available: S. Linkman, ‘‘Systematic literature reviews in software engineering—A
https://1library.net/document/z1rdxxeq-use-process-mining-business- systematic literature review,’’ Inf. Softw. Technol., vol. 51, no. 1, pp. 7–15,
process-auditing.html Jan. 2009, doi: 10.1016/j.infsof.2008.09.009.
[33] M. Gusenbauer and N. R. Haddaway, ‘‘Which academic search systems [50] F. A. Bukhsh and H. Weigand, ‘‘Compliance checking of shipment
are suitable for systematic reviews or meta-analyses? Evaluating retrieval request by utilizing process mining concepts: An evaluation of smart
qualities of Google scholar, PubMed, and 26 other resources,’’ Res. Synth. auditing framework,’’ in Proc. Int. Conf. Frontiers Inf. Technol. (FIT),
Methods, vol. 11, no. 2, pp. 181–217, Mar. 2020, doi: 10.1002/jrsm.1378. Dec. 2017, pp. 235–240, doi: 10.1109/FIT.2017.00049.
[34] A. Martín-Martín, E. Orduna-Malea, M. Thelwall, and E. Delgado López- [51] Y. Sun, L. AI-Khazrage, and Ö. Özümerzifon, ‘‘Generating high
Cózar, ‘‘Google scholar, web of science, and scopus: A systematic com- quality samples of process cases in internal audit,’’ in Business
parison of citations in 252 subject categories,’’ J. Informetrics, vol. 12, Process Management Forum (Lecture Notes in Business Informa-
no. 4, pp. 1160–1177, Nov. 2018, doi: 10.1016/J.JOI.2018.09.002. tion Processing). Cham, Switzerland: Springer, 2021, pp. 263–279,
[35] W. van der Aalst, K. van Hee, J. M. van der Werf, A. Kumar, doi: 10.1007/978-3-030-85440-9_16.
and M. Verdonk, ‘‘Conceptual model for online auditing,’’ Decis. [52] J. Liang, M. Yang, J. Yang, and Y. Deng, ‘‘Identification of human
Support Syst., vol. 50, no. 3, pp. 636–647, Feb. 2011, doi: operation deviation using a conformance checking technique,’’ in
10.1016/j.dss.2010.08.014. Proc. Int. Conf. Power Syst. Technol., Dec. 2021, pp. 551–555,
[36] H. Li, J. Dai, T. Gershberg, and M. A. Vasarhelyi, ‘‘Understanding usage doi: 10.1109/POWERCON53785.2021.9697743.
and value of audit analytics for internal auditors: An organizational [53] I. Tawakkal, A. P. Kurniati, and G. A. A. Wisudiawan, ‘‘Implementing
approach,’’ Int. J. Accounting Inf. Syst., vol. 28, pp. 59–76, Mar. 2018, heuristic miner for information system audit based on DSS01 COBIT5
doi: 10.1016/j.accinf.2017.12.005. (Case study: CV Narnia distribution),’’ in Proc. Int. Conf. Comput.,
[37] M. Mueller-Wickop, N. Schultz, and M. Peris. (2013). Towards Key Con- Control, Informat. its Appl. (IC3INA), Oct. 2016, pp. 197–202, doi:
cepts for Process Audits—A Multi-Method Research Approach. Accessed: 10.1109/IC3INA.2016.7863049.
Jun. 27, 2020. [Online]. Available: https://www.researchgate.net/ [54] P. Arpasat, P. Porouhan, and W. Premchaiswadi, ‘‘Improvement of
publication/261026820_Towards_Key_Concepts_for_Process_Audits_- call center customer service in a Thai bank using disco fuzzy mining
_A_Multi-Method_Research_Approach algorithm,’’ in Proc. 13th Int. Conf. ICT Knowl. Eng. (ICT Knowl. Eng.),
Nov. 2015, pp. 90–96, doi: 10.1109/ICTKE.2015.7368477.
[38] M. Jans, J. M. van der Werf, N. Lybaert, and K. Vanhoof, ‘‘A business
process mining application for internal transaction fraud mitigation,’’ [55] R. Andrews, S. Suriadi, M. Wynn, A. H. M. T. Hofstede, and
Exp. Syst. Appl., vol. 38, no. 10, pp. 13351–13359, Sep. 2011, doi: S. Rothwell, ‘‘Improving patient flows at St. Andrew’s war memorial hos-
10.1016/j.eswa.2011.04.159. pital’s emergency department through process mining,’’ in Bus. Process
Management Cases. Cham, Switzerland: Springer 2018, pp. 311–333,
[39] G. Schumann, F. Kruse, and J. Nonnenmacher, ‘‘A practice-oriented,
doi: 10.1007/978-3-319-58307-5_17.
control-flow-based anomaly detection approach for internal process
[56] K. Koosawad, N. Saguansakdiyotin, P. Palangsantikul, P. Porouhan,
audits,’’ in Service-Oriented Computing. Cham, Switzerland: Springer,
and W. Premchaiswadi, ‘‘Improving sales process of an automotive
2020, pp. 533–543, doi: 10.1007/978-3-030-65310-1_39.
company with fuzzy miner techniques,’’ in Proc. 16th Int. Conf. ICT
[40] C. Chuchaimongkhon, P. Porouhan, and W. Premchaiswadi, ‘‘A study Knowl. Eng. (ICT&KE), Nov. 2018, pp. 1–6, doi: 10.1109/ICTKE.2018.
to investigate time durations of a call center customer service using 8612390.
transition systems,’’ in Proc. 14th Int. Conf. ICT Knowl. Eng. (ICT&KE),
[57] J. Sakchaikun, S. Tumswadi, P. Palangsantikul, P. Porouhan, and
Nov. 2016, pp. 93–97, doi: 10.1109/ICTKE.2016.7804104.
W. Premchaiswadi, ‘‘IT help desk service workflow relationship with
[41] Y. Wang, F. Caron, J. Vanthienen, L. Huang, and Y. Guo, ‘‘Acquiring process mining,’’ in Proc. 16th Int. Conf. ICT Knowl. Eng. (ICT KE),
logistics process intelligence: Methodology and an application for a Chi- Nov. 2018, pp. 1–5, doi: 10.1109/ICTKE.2018.8612381.
nese bulk port,’’ Exp. Syst. Appl., vol. 41, no. 1, pp. 195–209, Jan. 2014,
[58] F. Mannhardt and A. D. Landmark, ‘‘Mining railway traffic con-
doi: 10.1016/j.eswa.2013.07.021.
trol logs,’’ Transp. Res. Proc., vol. 37, pp. 227–234, Jan. 2019, doi:
[42] J. Štolfa, M. Kopka, S. Štolfa, O. Kobìrský, and V. Snášel, ‘‘An application 10.1016/j.trpro.2018.12.187.
of process mining to invoice verification process in SAP,’’ in Proc. 4th Int. [59] J. Maldonado-Mahauad, M. Pérez-Sanagustín, R. F. Kizilcec, N. Morales,
Conf. Innov. Bio-Inspired Comput. Appl., vol. 2014, vol. 237, pp. 61–74, and J. Munoz-Gama, ‘‘Mining theory-based patterns from big data:
doi: 10.1007/978-3-319-01781-5_6. Identifying self-regulated learning strategies in massive open online
[43] G. O. Spagnolo, E. Marchetti, A. Coco, P. Scarpellini, A. Querci, courses,’’ Comput. Hum. Behav., vol. 80, pp. 179–196, Mar. 2018, doi:
F. Fabbrini, and S. Gnesi, ‘‘An experience on applying process min- 10.1016/j.chb.2017.11.011.
ing techniques to the tuscan port community system,’’ in Software [60] S.-K. Lee, B. Kim, M. Huh, S. Cho, S. Park, and D. Lee, ‘‘Mining trans-
Quality. The Future of Systems- and Software Development (Lecture portation logs for understanding the after-assembly block manufacturing
Notes in Business Information Processing), vol. 238, Cham, Switzerland: process in the shipbuilding industry,’’ Exp. Syst. Appl., vol. 40, no. 1,
Springer, 2016, pp. 49–60, doi: 10.1007/978-3-319-27033-3_4. pp. 83–95, Jan. 2013, doi: 10.1016/j.eswa.2012.07.033.
[44] T. Zhu, Y. Guo, A. Ju, J. Ma, and X. Wang, ‘‘An insider threat [61] S. N. Araghi, F. Fontanili, E. Lamine, L. Tancerel, and F. Benaben,
detection method based on business process mining,’’ Int. J. ‘‘Monitoring and analyzing patients’ pathways by the application of
Bus. Data Commun. Netw., vol. 13, no. 2, pp. 83–98, Jul. 2017, process mining, SPC, and I-RTLS,’’ IFAC-PapersOnLine, vol. 51, no. 11,
doi: 10.4018/ijbdcn.2017070107. pp. 980–985, 2018, doi: 10.1016/j.ifacol.2018.08.480.
[45] R. Gerhardt, J. F. Valiati, and J. V. C. D. Santos, ‘‘An investigation to [62] F. Caron, J. Vanthienen, K. Vanhaecht, E. V. Limbergen, J. De Weerdt,
identify factors that lead to delay in healthcare reimbursement process: and B. Baesens, ‘‘Monitoring care processes in the gynecologic oncology
A Brazilian case,’’ Big Data Res., vol. 13, pp. 11–20, Sep. 2018, doi: department,’’ Comput. Biol. Med., vol. 44, pp. 88–96, Jan. 2014, doi:
10.1016/j.bdr.2018.02.006. 10.1016/j.compbiomed.2013.10.015.
[46] D. Myers, S. Suriadi, K. Radke, and E. Foo, ‘‘Anomaly detection for [63] R. Accorsi and T. Stocker, ‘‘On the exploitation of process mining
industrial control systems using process mining,’’ Comput. Secur., vol. 78, for security audits: The conformance checking case,’’ in Proc. 27th
pp. 103–125, Sep. 2018, doi: 10.1016/j.cose.2018.06.002. Annu. ACM Symp. Appl. Comput., Mar. 2012, pp. 1709–1716, doi:
[47] S. Yoo, M. Cho, E. Kim, S. Kim, Y. Sim, D. Yoo, H. Hwang, and 10.1145/2245276.2232051.
M. Song, ‘‘Assessment of hospital processes using a process mining [64] R. Accorsi, T. Stocker, and G. Müller, ‘‘On the exploitation of pro-
technique: Outpatient process analysis at a tertiary hospital,’’ Int. J. cess mining for security audits: The process discovery case,’’ in Proc.
Med. Informat., vol. 88, pp. 34–43, Apr. 2016, doi: 10.1016/j.ijmedinf. 28th Annu. ACM Symp. Appl. Comput., Mar. 2013, pp. 1462–1468, doi:
2015.12.018. 10.1145/2480362.2480634.
[48] A. S. Dzihni, R. Andreswari, and M. A. Hasibuan, ‘‘Business pro- [65] J. M. E. M. van der Werf and H. M. W. Verbeek, ‘‘Online com-
cess analysis and academic information system audit of helpdesk pliance monitoring of service landscapes,’’ in Proc. Business Pro-
application using genetic algorithms a process mining approach,’’ Pro- cess Manag. Workshops, in Lecture Notes in Business Information
cedia Comput. Sci., vol. 161, pp. 903–909, 2019, doi: 10.1016/j.procs. Processing, vol. 202, Cham, Switzerland: Springer, 2015, pp. 89–95,
2019.11.198. doi: 10.1007/978-3-319-15895-2_8.
[49] M. Siek and R. M. G. Mukti, ‘‘Business process mining from e-commerce [66] E. Rojas, A. Cifuentes, A. Burattin, J. Munoz-Gama, M. Sepúlveda, and
event web logs: Conformance checking and bottleneck identification,’’ in D. Capurro, ‘‘Performance analysis of emergency room episodes through
Proc. 2nd Int. Conf. Biosph. Harmon. Adv. Res., Apr., vol. 2021, vol. 729, process mining,’’ Int. J. Environ. Res. Public Health, vol. 16, no. 7,
no. 1, p. 12133, doi: 10.1088/1755-1315/729/1/012133. pp. 251–263, 2019, doi: 10.3390/ijerph16071274.
[67] D. Myers, K. Radke, S. Suriadi, and E. Foo, ‘‘Process discovery [86] M. Ebrahim and S. A. H. Golpayegani, ‘‘Anomaly detection in
for industrial control system cyber attack detection,’’ in Proc. business processes logs using social network analysis,’’ J. Com-
IFIP Adv. Inf. Commun. Technol., vol. 502, 2017, pp. 61–75, put. Virol. Hacking Techn., vol. 18, no. 2, pp. 127–139, Jun. 2022,
doi: 10.1007/978-3-319-58469-0_5. doi: 10.1007/s11416-021-00398-8.
[68] S. C. de Alvarenga, S. Barbon, R. S. Miani, M. Cukier, and [87] N. Adams, A. Augusto, M. Davern, and M. L. Rosa, ‘‘Why do banks
B. B. Zarpelão, ‘‘Process mining and hierarchical clustering to help find bus. Process compliance so challenging? An Australian perspective,’’
intrusion alert visualization,’’ Comput. Secur., vol. 73, pp. 474–491, in Proc. Int. Conf. Bus. Process Manag., vol. 1, 2022, pp. 3–20, doi:
Mar. 2018, doi: 10.1016/j.cose.2017.11.021. 10.1007/978-3-031-16171-1_1.
[69] K. Ganesha, S. M. S. Raj, and S. Dhanush, ‘‘Process mining approach [88] M. Werner, ‘‘Financial process mining—Accounting data structure
for efficient utilization of resources in a hospital,’’ in Proc. Int. Conf. dependent control flow inference,’’ Int. J. Accounting Inf. Syst., vol. 25,
Innov. Inf., Embedded Commun. Syst. (ICIIECS), Mar. 2017, pp. 1–5, doi: pp. 57–80, May 2017, doi: 10.1016/j.accinf.2017.03.004.
10.1109/ICIIECS.2017.8275886. [89] S. Stephan, J. Lahann, and P. Fettke, ‘‘A case study on the application of
[70] A. Fares, J. Gama, and P. Campos, ‘‘Process mining for analyzing cus- process mining in combination with journal entry tests for financial audit-
tomer relationship management systems: A case study,’’ in Learning from ing,’’ in Proc. Annu. Hawaii Int. Conf. Syst. Sci., 2021, pp. 5718–5727.
Data Streams in Evolving Environments. Cham, Switzerland: Springer,
[90] R. Post, I. Beerepoot, X. Lu, S. Kas, S. Wiewel, A. Koopman, and
2019, pp. 209–221, doi: 10.1007/978-3-319-89803-2_9.
H. Reijers, ‘‘Active anomaly detection for key item selection in process
[71] A. Thaduri, S. M. Famurewa, A. K. Verma, and U. Kumar, ‘‘Pro-
auditing,’’ in Proc. Int. Conf. Process Min., vol. 1, 2022, pp. 167–179,
cess mining for maintenance decision support,’’ in System Performance
doi: 10.1007/978-3-030-98581-3_13.
and Management Analytics. Singapore: Springer, 2019, pp. 279–293,
[91] F. Corradini, F. Marcantoni, A. Morichetta, A. Polini, B. Re, and
doi: 10.1007/978-981-10-7323-6_23.
[72] J. De Weerdt, A. Schupp, A. Vanderloock, and B. Baesens, ‘‘Process M. Sampaolo, ‘‘Enabling auditing of smart contracts through process
mining for the multi-faceted analysis of business processes—A case mining,’’ in From Software Engineering to Formal Methods and Tools,
study in a financial services organization,’’ Comput. Ind., vol. 64, no. 1, and Back (Lecture Notes in Computer Science), vol. 11865. Cham,
pp. 57–67, Jan. 2013, doi: 10.1016/j.compind.2012.09.010. Switzerland: Springer, 2019, pp. 467–480, doi: 10.1007/978-3-030-
[73] M. Gupta, A. Sureka, and S. Padmanabhuni, ‘‘Process mining multiple 30985-5_27.
repositories for software defect resolution from control and organizational [92] M. Werner and N. Gehrke, ‘‘Multilevel process mining for financial
perspective,’’ in Proc. 11th Work. Conf. Mining Softw. Repositories, audits,’’ IEEE Trans. Services Comput., vol. 8, no. 6, pp. 820–832,
May 2014, pp. 122–131, doi: 10.1145/2597073.2597081. Nov. 2015, doi: 10.1109/TSC.2015.2457907.
[74] R. Dolak and J. Botlik, ‘‘Process mining of event logs from [93] G. Baader and H. Krcmar, ‘‘Reducing false positives in fraud detection:
horde helpdesk,’’ in Smart Technologies and Innovation for a Sus- Combining the red flag approach with process mining,’’ Int. J. Accounting
tainable Future. Cham, Switzerland: Springer, 2019, pp. 303–309, Inf. Syst., vol. 31, pp. 1–16, Dec. 2018, doi: 10.1016/j.accinf.2018.03.004.
doi: 10.1007/978-3-030-01659-3_35. [94] I. I. Febriansyah, R. Sarno, and R. N. Anggraini, ‘‘Decision tree and
[75] T. Chiu and M. Jans, ‘‘Process mining of event logs: A case study fuzzy logic in the audit of information system for tax letter issuance,’’
evaluating internal control effectiveness,’’ Accounting Horizons, vol. 33, in Proc. Int. Electron. Symp. (IES), Aug. 2022, pp. 581–586, doi:
no. 3, pp. 141–156, Sep. 2019, doi: 10.2308/acch-52458. 10.1109/IES55876.2022.9888372.
[76] Z. Paszkiewicz, ‘‘Process mining techniques in conformance testing of [95] E. Roubtsova and N. Wiersma, ‘‘A practical extension of frameworks
inventory processes: An industrial application,’’ in Proc. Int. Conf. Bus. for auditing with process mining,’’ in Proc. 13th Int. Conf.
Inf. Syst., 2013, pp. 302–313. Eval. Novel Approaches Softw. Eng., 2018, pp. 406–415, doi:
[77] W. Premchaiswadi and P. Porouhan, ‘‘Process modeling and bottleneck 10.5220/0006798904060415.
mining in online peer-review systems,’’ SpringerPlus, vol. 4, no. 1, [96] J.-F. Rodríguez-Quintero, A. Sánchez-Díaz, L. Iriarte-Navarro, A. Maté,
Dec. 2015, doi: 10.1186/s40064-015-1183-4. M. Marco-Such, and J. Trujillo, ‘‘Fraud audit based on visual analysis: A
[78] P. Zerbino, D. Aloini, R. Dulmin, and V. Mininno, ‘‘Process-mining- process mining approach,’’ Appl. Sci., vol. 11, no. 11, p. 4751, May 2021,
enabled audit of information systems: Methodology and an appli- doi: 10.3390/app11114751.
cation,’’ Exp. Syst. Appl., vol. 110, pp. 80–92, Nov. 2018, doi: [97] F. M. Bade, C. Vollenberg, J. Koch, J. Koch, and A. Coners, ‘‘The dark
10.1016/j.eswa.2018.05.030. side of process mining. How identifiable are users despite technologically
[79] Z. Huang, X. Lu, and H. Duan, ‘‘Resource behavior measure and appli- anonymized data? A case study from the health sector,’’ in Proc. Int. Conf.
cation in business process management,’’ Exp. Syst. Appl., vol. 39, no. 7, Bus. Process Manag., vol. 1, 2022, pp. 219–233, doi: 10.1007/978-3-031-
pp. 6458–6468, Jun. 2012, doi: 10.1016/j.eswa.2011.12.061. 16103-2_16.
[80] P. Jaisook and W. Premchaiswadi, ‘‘Time performance analysis of med- [98] G. Kipping, D. Djurica, S. Franzoi, T. Grisold, L. Marcus, S. Schmid,
ical treatment processes by using disco,’’ in Proc. 13th Int. Conf. J. V. Brocke, J. Mendling, and M. Röglinger, ‘‘How to leverage pro-
ICT Knowl. Eng. (ICT Knowl. Eng.), Nov. 2015, pp. 110–115, doi: cess mining in organizations—Towards process mining capabilities,’’
10.1109/ICTKE.2015.7368480. in Proc. Int. Conf. Bus. Process Manag., vol. 1, 2022, pp. 40–46, doi:
[81] M. Macak, I. Vanát, M. Merjavý, T. Jevocin, and B. Buhnova, ‘‘Towards
10.1007/978-3-031-16103-2_5.
process mining utilization in insider threat detection from audit logs,’’
[99] I. Beerepoot, C. Di Ciccio, H. A/ Reijers, S. Rinderle-Ma, W. Bandara,
in Proc. 7th Int. Conf. Social Netw. Anal., Manage. Secur. (SNAMS),
A. Burattin, D. Calvanese, T. Chen, I. Cohen, B. Depaire, and G. Di
Dec. 2020, pp. 1–6, doi: 10.1109/SNAMS52053.2020.9336573.
Federico, ‘‘The biggest business process management problems to solve
[82] W. Pulsanong, P. Porouhan, S. Tumswadi, and W. Premchaiswadi, ‘‘Using
before we die,’’ Comput. Ind., vol. 146, Apr. 2023, Art. no. 103837, doi:
inductive miner to find the most optimized path of workflow process,’’ in
10.1016/J.COMPIND.2022.103837.
Proc. 15th Int. Conf. ICT Knowl. Eng. (ICT&KE), Nov. 2017, pp. 1–5,
doi: 10.1109/ICTKE.2017.8259633. [100] K. Sirisong, P. Palangsantikul, P. Arpasat, S. Intarasema, and
[83] J.-F. Jimenez, G. Zambrano-Rey, S. Aguirre, and D. Trentesaux, ‘‘Using S. Tumswadi, ‘‘Analysis of a bank’s lending approval system using
process-mining for understating the emergence of self-organizing manu- process mining,’’ in Proc. 19th Int. Conf. ICT Knowl. Eng. (ICT&KE),
facturing systems,’’ IFAC-PapersOnLine, vol. 51, no. 11, pp. 1618–1623, Nov. 2021, pp. 1–4, doi: 10.1109/ICTKE52386.2021.9665411.
2018, doi: 10.1016/j.ifacol.2018.08.258. [101] Y. Wang, J. Hulstijn, and Y.-H. Tan, ‘‘Regulatory supervision with com-
[84] A. S. Khatavakhotan and S. H. Ow, ‘‘Development of a soft- putational audit in international supply chains,’’ in Proc. 19th Annu.
ware risk management model using unique features of a proposed Int. Conf. Digit. Government Res., Governance Data Age, May 2018,
audit component,’’ Malaysian J. Comput. Sci., vol. 28, no. 2, pp. 1–10, doi: 10.1145/3209281.3209319.
pp. 110–131, Jun. 2015, Accessed: Aug. 15, 2022. [Online]. Available: [102] M. Imran, M. A. Ismail, S. Hamid, and M. H. N. M. Nasir,
https://ejournal.um.edu.my/index.php/MJCS/article/view/6858 ‘‘Complex process modeling in process mining: A systematic
[85] A. Lopata, R. Butleris, S. Gudas, K. Rudžioniene, L. Žioba, I. Veitaite, review,’’ IEEE Access, vol. 10, pp. 101515–101536, 2022, doi:
D. Dilijonas, E. Grišius, and M. Zwitserloot, ‘‘Financial process mining 10.1109/ACCESS.2022.3208231.
characteristics,’’ in Information and Software Technologies (Commu- [103] A. Kaouni, G. Theodoropoulou, A. Bousdekis, A. Voulodimos, and
nications in Computer and Information Science), vol. 1665. Cham, G. Miaoulis, ‘‘Visual analytics in process mining for supporting business
Switzerland: Springer, 2022, pp. 209–220, doi: 10.1007/978-3-031- process improvement,’’ Front. Artif. Intell. Appl., vol. 338, pp. 5–6, 2021,
16302-9_16. doi: 10.3233/FAIA210089.
[104] C. W. Günther, ‘‘Process mining in flexible environments,’’ Inf. SURAYA HAMID (Member, IEEE) received
Syst. IE&IS, Eindhoven Univ. Technol., Eindhoven, The Netherlands, the B.I.T. degree in industrial computing and
Tech. Rep. 200911996, 2009, doi: 10.6100/IR644335. the M.I.T. degree in computer science from the
[105] S. J. J. Leemans, D. Fahland, and W. M. P. van der Aalst, National University of Malaysia, in 1998 and
‘‘Discovering block-structured process models from event logs 2000, respectively, and the Ph.D. degree from
containing infrequent behaviour,’’ in Proc. Bus. Process Management the Department of Computing and Information
Workshops. Cham, Switzerland: Springer, 2014, pp. 66–78, Systems, The University of Melbourne, in 2013.
doi: 10.1007/978-3-319-06257-0_6.
She is currently an Associate Professor with the
[106] F. Bezerra, J. Wainer, and W. M. P. van der Aalst, ‘‘Anomaly detection
Department of Information Systems, Faculty of
using process mining,’’ in Enterprise, Business-Process and Information
Systems Modeling (Lecture Notes in Business Information Processing)
Computer Science and Information Technology,
vol. 29. Berlin, Germany: Springer, 2009, pp. 149–161, doi: 10.1007/978- University of Malaya, Malaysia. She was involved in various research,
3-642-01862-6_13. leading to the publication of several academic articles in the areas of infor-
[107] R. B. Bahaweres, J. Trawally, I. Hermadi, and A. I. Suroso, ‘‘Foren- mation systems specifically on social informatics, educational technology,
sic audit using process mining to detect fraud,’’ J. Phys. Conf., information services, e-learning, and big data initiative related.
vol. 1779, no. 1, Feb. 2021, Art. no. 012013, doi: 10.1088/1742-
6596/1779/1/012013.
[108] W. M. P. van der Aalst, ‘‘Process discovery from event data: Relating
models and logs through abstractions,’’ WIREs Data Mining Knowl.
Discovery, vol. 8, no. 3, p. e1244, May 2018, doi: 10.1002/widm.1244.
[109] W. Kratsch, F. König, and M. Röglinger, ‘‘Shedding light on blind spots—
Developing a reference architecture to leverage video data for process
mining,’’ Decis. Support Syst., vol. 158, Jul. 2022, Art. no. 113794, doi:
10.1016/J.DSS.2022.113794.
[110] C. Feliciano and R. Quick, ‘‘Innovative information technology in audit-
ing: Auditors’ perceptions of future importance and current auditor
expertise,’’ Accounting Eur., vol. 19, no. 2, pp. 311–331, May 2022, doi:
10.1080/17449480.2022.2046283.
MOHAMMAD IMRAN received the B.S. degree MAIZATUL AKMAR ISMAIL (Member, IEEE)
in information technology from the University received the bachelor’s degree from the University
of Balochistan, in 2013, and the M.S. degree in of Malaya, Malaysia, the master’s degree from
information technology from the Balochistan Uni- the University of Putra Malaysia, and the Ph.D.
versity of Information Technology, Engineering & degree in computer science from the University of
Management Sciences (BUITEMS), in 2017. He is Malaya, in 2010. She has over 15 years of teaching
currently a Faculty Member with the Department experience since she started her career, in 2001,
of Information Technology, Faculty of Information as a Lecturer with the University of Malaya, where
and Communication Technology, BUITEMS. His she is currently an Associate Professor with the
research interests include the domains of business Department of Information Systems, Faculty of
process intelligence, business process management, and process mining, Computer Science and Information Technology. She was involved in various
with a special focus on dealing with complexity and understandability studies, leading to the publication of several academic papers in the areas of
issues in process mining. In addition to his research endeavors, he holds information systems specifically on semantic web, educational technology,
a wide range of experience in programming the Microsoft.Net platform. and information systems. She hopes to extend her research beyond informa-
From 2016 to 2018, he led the Web Team of the IEEE Conference on tion systems in her quest to elevate the quality of teaching and learning.
Computers, Electronic and Electrical Engineering (ICE Cube).