role-activity diagrams modeling based on workflow mining
DESCRIPTION
Presentation of the paper: Role-Activity Diagrams Modeling Based on Workflow Mining WeiDong Zhao; Weihui Dai; Anhua Wang; Xiaochun Fang Computer Science and Information Engineering, 2009 WRI World Congress on , vol.4, no., pp.301,305, March 31 2009-April 2 2009 DOI: 10.1109/CSIE.2009.992TRANSCRIPT
![Page 1: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/1.jpg)
Role-activity Diagrams Modeling Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - [email protected]
![Page 2: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/2.jpg)
Outline
Introduction
Basic Concepts
Role Mining
Conclusions
![Page 3: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/3.jpg)
Introduction
Role Activity Diagram (RAD) a basic role-oriented process model
ProcessModels
Activity-based Process Models
Role-oriented Process Models
![Page 4: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/4.jpg)
Introduction
Describe business processes as
actors and their interactions from the organization perspective
Role-oriented Process Models
![Page 5: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/5.jpg)
Introduction
Adapted from cross-functional process models
Using sub-processes to describe process roles’ responsibility
So as to highlight the interaction between roles
Role-activity diagrams (RAD)
![Page 6: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/6.jpg)
Introduction
RAD requires a deep knowledge of processes and organizational model so as to identify roles.
Role-activity diagrams (RAD)
![Page 7: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/7.jpg)
Introduction
Workflow management systems produce lots of logs
Process mining can reconstructprocess models from real workflow logs
Thus workflow mining may be a more objective method for role identification
Workflow Mining
![Page 8: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/8.jpg)
Introduction
•This paper is based on hypotheses:
• Actors playing the same role have similar duties, abilities and
characteristics
• Activities performed by these actors stand for their work
• So roles can be identified by discovering actors with similar work from
workflow logs
![Page 9: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/9.jpg)
Introduction Existing Methods
α algorithm can mine the WF-net
the dependence between activities
Organizational mining
actors are the center of business processes and social networks can be drawn
out by analyzing business relations among actors
![Page 10: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/10.jpg)
Introduction Existing Methods
Role engineering
the role-mining tool ORCA aggregates permissions bottom-up
into a role hierarchy using clustering analysis interactively
with the aid of business experts
![Page 11: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/11.jpg)
IntroductionWhat is presented?
Workflow mining is used for role identification taking the work similarity of actors as a criterion
Role mining, the interaction between roles are analyzed through social network diagrams among actors, and finally role-activity diagrams is mined.
![Page 12: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/12.jpg)
Basic Concepts
Set of all activities in workflow logs
A = {a1, a2,…, am}
m = |A| is the number of activities in workflow logs
![Page 13: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/13.jpg)
Basic Concepts
Set of all process actors
P = {p1, p2,…, pn}
where n is the number of actors
![Page 14: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/14.jpg)
Basic Concepts
Set of all workflow instances in logs I
and for any workflow instance i ∈ I, i= (a1 a2 … ak),
AS(i) is the set of activities in the instance i
sequence of activities a1 a2 … ak represents the actual
execution ordering.
![Page 15: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/15.jpg)
Basic Concepts
Activity b depends on activity a, a>b
If
such that
According to definition, a>b means that activity b is executed after
activity a and there exists no other activities between.
![Page 16: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/16.jpg)
Basic Concepts
Activity b depends on activity a directly (direct dependence)
if for each workflow instance i ∈ I, there only exists a>b but not b>a
Dependence between activity a and b is consistent in all workflow
instances. It hints that there exists state transition from activity a to
b.
![Page 17: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/17.jpg)
Basic Concepts
Given I, we can find all the activity pairs, which accord with the direct
dependence.
The activity pairs is denoted as DEP
![Page 18: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/18.jpg)
Basic Concepts
Clothing production system
a inquiry and quoting
b contract signing
c prototype designing
d fabric requiring
e fabric drawing
f fabric purchasing
g fabric processing
![Page 19: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/19.jpg)
Basic Concepts
6 workflow instances
i1 = {abcg},
i2 = {abdecg},
i3 = {abcdeg},
i4= {abdeg},
i5 = {abdceg},
i6 = {abdfecg}
WF-net model using the α algorithm
![Page 20: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/20.jpg)
Basic Concepts
DEP of the clothing production
workflow
{(a, b), (a, c), (a, d), (a, e), (a, f), (a, g),
(b, c), (b, d), (b, e), (b, f), (b, g), (c, g),
(d, e), (d, f), (d, g), (e, g),(f, e), (f, g)}
WF-net model using the α algorithm
![Page 21: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/21.jpg)
Basic Concepts
Adjacent activity set adjAS
where S and Av are two activity sets
For any activity in adjAS(b), it belongs to Av but not S, and there
exists dependence between the activity and other activities in S
![Page 22: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/22.jpg)
Basic Concepts
In this paper, roles are identified by the ratio of the times actors
executing each activity to the total times of these actors executing all
activities
total of pi executing
related activities
times(pi, aj) is the times of
pi executing aj
Tom 100 times in total, in which “Fabric requiring” is executed 30 times, thus
R(Tom, Fabric requiring) = 0.3
![Page 23: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/23.jpg)
Basic Concepts
Vector of activity execution in the work of the actor pi
S(pi, Au)=(R(pi, a1), R(pi, a2),…,R(pi, ak))
k-dimension vector of activities the actor pi takes charge of
For example,
R(Tom, fabric requiring)=0.3
R(Tom, fabric checkout) = 0.4
R(Tom, production inspection) = 0.05,
vector of Tom (0.3, 0.4, 0.05)
![Page 24: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/24.jpg)
Basic Concepts
Difference degree of activity set Au
average difference of activity execution by the actors.
Larger difference degree means more difference between actors in
their work.
In this paper, the difference degree is used to identify process roles.
![Page 25: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/25.jpg)
Times of activities from workflow logs
Basic Concepts Example
![Page 26: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/26.jpg)
Percentages of activities
Basic Concepts Example
![Page 27: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/27.jpg)
Percentages of activities
S(p101, {a}) = (0.625), S(p107, {a}) = (0.533)
AG({a}) = (0.625 + 0.533)/2 = 0.579
Basic Concepts Example
![Page 28: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/28.jpg)
Percentages of activitiesDifference degree of {a, b}
S(p101, {a, b}) = (0.625, 0.375),S(p107, {a,b}) = (0.533, 0.466), S(p115, {a, b}) = (0, 0.277)
AG({a, b}) = ( (0.625 + 0.533) /3, (0.375 + 0.466 + 0.277)/3 ) = (0.386, 0.373)
D({a, b}) = 0.27
Basic Concepts Example
![Page 29: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/29.jpg)
Role Mining
It is assumed that
Actors who play the same role are responsible for the sub-process (activity set) whose
difference degree is less than the predefined threshold T
![Page 30: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/30.jpg)
Role MiningMining the activity set executed by each role
Discover sub-processes in which
activities are executed by actors
playing the same roles
![Page 31: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/31.jpg)
Input:
the activity set A,
dependence set DEP
threshold T
Output:
sub-processescorresponding to each role
![Page 32: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/32.jpg)
If 1 is left
Select the smallestdifference degree
Adjacent activityset from dependentones
Add if not exceeding thethreshold
![Page 33: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/33.jpg)
{a} has the leastdependence degree D({a}) = 0.046
adjAS(a) = {b}
activity b is addedand D({a, b}) = 0.27
ExampleThreshold T= 0.33
the adjacent activity set of {a, b} {c, d}
D({a, b, c}) = 0.345 D({a, b, d}) = 0.379
Both larger than T.
Roles: {a, b}
![Page 34: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/34.jpg)
{d} has the leastdependence degree D({d}) = 0.051
adjAS(d) = {c, e, f}.
activity c is addedand D({d, c})=0.164
e is added andD({d, c, e})=0.219
d→f and f→e, f is added to the activity set forprinciple of order preserving.
Roles: {a, b}, {d, c, e, f}
ExampleThreshold T= 0.33
![Page 35: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/35.jpg)
{g} is the only remainder
Roles: {a, b}, {d, c, e, f}, {g}
ExampleThreshold T= 0.33
![Page 36: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/36.jpg)
Role MiningMining the activity set executed by each role
{a,b}
{a,b}
{a,b}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{g}
{g}
{g}
![Page 37: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/37.jpg)
RAD Modeling
Activity set taken by each role makes up sub-processes in
RAD modeling and the sub-processes
Can be identified by presented algorithm
In this paper, the interaction between roles based on social
network analysis is modeled.
![Page 38: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/38.jpg)
RAD Modeling
Activity dependence between process actors pi, pj is denoted as
rel(pi, pj) = {(a, b)|i ∈ I, i = (a1a2…a b…ak), pi, pj∈ P,
a is executed by pi,
b is executed by pj , and a → b.
Interaction between roles based on the activity dependence
between actors.
![Page 39: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/39.jpg)
RAD Modeling
If there exists direct dependence between activity a and b, and
in a workflow instance, activity a is executed by the actor pi and
activity b is executed by actor pj, then the activity pair (a, b)
shows that pj depends on pi.
Person pi Role Ri
Role Rj
Activity ap
Activity aq
Assigned
Assigned
Responsible
Responsible
Dependence
(From workflow log)
Person pj
![Page 40: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/40.jpg)
RAD Modeling
Example:
p105
Planning Manager
Technician
b
c
Responsible
Responsible
b c
p115
In RAD modeling
connection(planning manager, technician) = {b}is found
![Page 41: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/41.jpg)
RAD Modeling
Example:
ab
c
d
g
f
![Page 42: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/42.jpg)
RAD ModelingThreshold Values
By comparison, it seems that we can get better role identification
results when T is set between 0.3 and 0.4
It needs further probative work
![Page 43: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/43.jpg)
Conclusion
How to identify roles and their interactions is necessary
for RAD modeling but most of methods for addressing
the issue seem to be subjective
In this paper, workflow mining is used to discover process
roles
![Page 44: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/44.jpg)
ConclusionFuture Work
Threshold T is not easy to choose
More research should be done to mine workflow models
with the loop-structure
![Page 45: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/45.jpg)
References
[1] Zhao Weidong , Huang Lihua(2004). Role-based multi-agent workflow systems. Chinese Journal ofManagement Science, vol7, no2, pp 55-62(in Chinese)
[2] Mentzas G, Christos, Kavadias S(2001). Modeling business process with workflow systems: an evaluation ofalternative approaches. International Journal of Information Management,vol 21,no.2 ,pp123-135
[3] Phalp K T, Henderson P, Walters R J, et al(1998). RolEnact: role-based enactable models of business processes.Information and Software Technology, vol40,no.3, pp123-133
[4] Ould M. Business Processes: Modeling and analysis for reengineering and improvement, New York:John Wiley& Sons, 1995
[5] Wil M.P V, Weijters A J(2003). Process mining: a research agenda, Computers in Industry, vol.53, no.3, pp231-244
[6] Wil M.P V, Song M(1998). Discovering models of software processes from event-based data], ACM Transactionson Software Engineering and Methodology, vol.7,no.3, pp215-249
[7] Wil M.P V, Song M(2004). Mining social networks: Uncovering interaction patterns in business processes, BusinessProcess Management,pp244-260
[8] Schlegelmich J, Steffens U(2005). Role mining with ORCA. Proceedings of the tenth ACM symposium on Access
control models and technologies. Stockholm, Sweden: SACMAT,pp168-176
[9] Liu D R, Shen M(2003). Workflow modeling for virtual processes: An order-preserving process-view approach.Information Systems, vol.28,no.6,pp505-532
![Page 46: Role-Activity Diagrams Modeling Based on Workflow Mining](https://reader034.vdocuments.mx/reader034/viewer/2022052506/55763deed8b42ac31b8b46cd/html5/thumbnails/46.jpg)
Role-activity Diagrams Modeling Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - [email protected]