View
290
Download
6
Category
Tags:
Preview:
DESCRIPTION
Presentation of the paper: Role-Activity Diagrams Modeling Based on Workflow Mining WeiDong Zhao; Weihui Dai; Anhua Wang; Xiaochun Fang Computer Science and Information Engineering, 2009 WRI World Congress on , vol.4, no., pp.301,305, March 31 2009-April 2 2009 DOI: 10.1109/CSIE.2009.992
Citation preview
Role-activity Diagrams Modeling Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - onur@onuryilmaz.me
Outline
Introduction
Basic Concepts
Role Mining
Conclusions
Introduction
Role Activity Diagram (RAD) a basic role-oriented process model
ProcessModels
Activity-based Process Models
Role-oriented Process Models
Introduction
Describe business processes as
actors and their interactions from the organization perspective
Role-oriented Process Models
Introduction
Adapted from cross-functional process models
Using sub-processes to describe process roles’ responsibility
So as to highlight the interaction between roles
Role-activity diagrams (RAD)
Introduction
RAD requires a deep knowledge of processes and organizational model so as to identify roles.
Role-activity diagrams (RAD)
Introduction
Workflow management systems produce lots of logs
Process mining can reconstructprocess models from real workflow logs
Thus workflow mining may be a more objective method for role identification
Workflow Mining
Introduction
•This paper is based on hypotheses:
• Actors playing the same role have similar duties, abilities and
characteristics
• Activities performed by these actors stand for their work
• So roles can be identified by discovering actors with similar work from
workflow logs
Introduction Existing Methods
α algorithm can mine the WF-net
the dependence between activities
Organizational mining
actors are the center of business processes and social networks can be drawn
out by analyzing business relations among actors
Introduction Existing Methods
Role engineering
the role-mining tool ORCA aggregates permissions bottom-up
into a role hierarchy using clustering analysis interactively
with the aid of business experts
IntroductionWhat is presented?
Workflow mining is used for role identification taking the work similarity of actors as a criterion
Role mining, the interaction between roles are analyzed through social network diagrams among actors, and finally role-activity diagrams is mined.
Basic Concepts
Set of all activities in workflow logs
A = {a1, a2,…, am}
m = |A| is the number of activities in workflow logs
Basic Concepts
Set of all process actors
P = {p1, p2,…, pn}
where n is the number of actors
Basic Concepts
Set of all workflow instances in logs I
and for any workflow instance i ∈ I, i= (a1 a2 … ak),
AS(i) is the set of activities in the instance i
sequence of activities a1 a2 … ak represents the actual
execution ordering.
Basic Concepts
Activity b depends on activity a, a>b
If
such that
According to definition, a>b means that activity b is executed after
activity a and there exists no other activities between.
Basic Concepts
Activity b depends on activity a directly (direct dependence)
if for each workflow instance i ∈ I, there only exists a>b but not b>a
Dependence between activity a and b is consistent in all workflow
instances. It hints that there exists state transition from activity a to
b.
Basic Concepts
Given I, we can find all the activity pairs, which accord with the direct
dependence.
The activity pairs is denoted as DEP
Basic Concepts
Clothing production system
a inquiry and quoting
b contract signing
c prototype designing
d fabric requiring
e fabric drawing
f fabric purchasing
g fabric processing
Basic Concepts
6 workflow instances
i1 = {abcg},
i2 = {abdecg},
i3 = {abcdeg},
i4= {abdeg},
i5 = {abdceg},
i6 = {abdfecg}
WF-net model using the α algorithm
Basic Concepts
DEP of the clothing production
workflow
{(a, b), (a, c), (a, d), (a, e), (a, f), (a, g),
(b, c), (b, d), (b, e), (b, f), (b, g), (c, g),
(d, e), (d, f), (d, g), (e, g),(f, e), (f, g)}
WF-net model using the α algorithm
Basic Concepts
Adjacent activity set adjAS
where S and Av are two activity sets
For any activity in adjAS(b), it belongs to Av but not S, and there
exists dependence between the activity and other activities in S
Basic Concepts
In this paper, roles are identified by the ratio of the times actors
executing each activity to the total times of these actors executing all
activities
total of pi executing
related activities
times(pi, aj) is the times of
pi executing aj
Tom 100 times in total, in which “Fabric requiring” is executed 30 times, thus
R(Tom, Fabric requiring) = 0.3
Basic Concepts
Vector of activity execution in the work of the actor pi
S(pi, Au)=(R(pi, a1), R(pi, a2),…,R(pi, ak))
k-dimension vector of activities the actor pi takes charge of
For example,
R(Tom, fabric requiring)=0.3
R(Tom, fabric checkout) = 0.4
R(Tom, production inspection) = 0.05,
vector of Tom (0.3, 0.4, 0.05)
Basic Concepts
Difference degree of activity set Au
average difference of activity execution by the actors.
Larger difference degree means more difference between actors in
their work.
In this paper, the difference degree is used to identify process roles.
Times of activities from workflow logs
Basic Concepts Example
Percentages of activities
Basic Concepts Example
Percentages of activities
S(p101, {a}) = (0.625), S(p107, {a}) = (0.533)
AG({a}) = (0.625 + 0.533)/2 = 0.579
Basic Concepts Example
Percentages of activitiesDifference degree of {a, b}
S(p101, {a, b}) = (0.625, 0.375),S(p107, {a,b}) = (0.533, 0.466), S(p115, {a, b}) = (0, 0.277)
AG({a, b}) = ( (0.625 + 0.533) /3, (0.375 + 0.466 + 0.277)/3 ) = (0.386, 0.373)
D({a, b}) = 0.27
Basic Concepts Example
Role Mining
It is assumed that
Actors who play the same role are responsible for the sub-process (activity set) whose
difference degree is less than the predefined threshold T
Role MiningMining the activity set executed by each role
Discover sub-processes in which
activities are executed by actors
playing the same roles
Input:
the activity set A,
dependence set DEP
threshold T
Output:
sub-processescorresponding to each role
If 1 is left
Select the smallestdifference degree
Adjacent activityset from dependentones
Add if not exceeding thethreshold
{a} has the leastdependence degree D({a}) = 0.046
adjAS(a) = {b}
activity b is addedand D({a, b}) = 0.27
ExampleThreshold T= 0.33
the adjacent activity set of {a, b} {c, d}
D({a, b, c}) = 0.345 D({a, b, d}) = 0.379
Both larger than T.
Roles: {a, b}
{d} has the leastdependence degree D({d}) = 0.051
adjAS(d) = {c, e, f}.
activity c is addedand D({d, c})=0.164
e is added andD({d, c, e})=0.219
d→f and f→e, f is added to the activity set forprinciple of order preserving.
Roles: {a, b}, {d, c, e, f}
ExampleThreshold T= 0.33
{g} is the only remainder
Roles: {a, b}, {d, c, e, f}, {g}
ExampleThreshold T= 0.33
Role MiningMining the activity set executed by each role
{a,b}
{a,b}
{a,b}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{g}
{g}
{g}
RAD Modeling
Activity set taken by each role makes up sub-processes in
RAD modeling and the sub-processes
Can be identified by presented algorithm
In this paper, the interaction between roles based on social
network analysis is modeled.
RAD Modeling
Activity dependence between process actors pi, pj is denoted as
rel(pi, pj) = {(a, b)|i ∈ I, i = (a1a2…a b…ak), pi, pj∈ P,
a is executed by pi,
b is executed by pj , and a → b.
Interaction between roles based on the activity dependence
between actors.
RAD Modeling
If there exists direct dependence between activity a and b, and
in a workflow instance, activity a is executed by the actor pi and
activity b is executed by actor pj, then the activity pair (a, b)
shows that pj depends on pi.
Person pi Role Ri
Role Rj
Activity ap
Activity aq
Assigned
Assigned
Responsible
Responsible
Dependence
(From workflow log)
Person pj
RAD Modeling
Example:
p105
Planning Manager
Technician
b
c
Responsible
Responsible
b c
p115
In RAD modeling
connection(planning manager, technician) = {b}is found
RAD Modeling
Example:
ab
c
d
g
f
RAD ModelingThreshold Values
By comparison, it seems that we can get better role identification
results when T is set between 0.3 and 0.4
It needs further probative work
Conclusion
How to identify roles and their interactions is necessary
for RAD modeling but most of methods for addressing
the issue seem to be subjective
In this paper, workflow mining is used to discover process
roles
ConclusionFuture Work
Threshold T is not easy to choose
More research should be done to mine workflow models
with the loop-structure
References
[1] Zhao Weidong , Huang Lihua(2004). Role-based multi-agent workflow systems. Chinese Journal ofManagement Science, vol7, no2, pp 55-62(in Chinese)
[2] Mentzas G, Christos, Kavadias S(2001). Modeling business process with workflow systems: an evaluation ofalternative approaches. International Journal of Information Management,vol 21,no.2 ,pp123-135
[3] Phalp K T, Henderson P, Walters R J, et al(1998). RolEnact: role-based enactable models of business processes.Information and Software Technology, vol40,no.3, pp123-133
[4] Ould M. Business Processes: Modeling and analysis for reengineering and improvement, New York:John Wiley& Sons, 1995
[5] Wil M.P V, Weijters A J(2003). Process mining: a research agenda, Computers in Industry, vol.53, no.3, pp231-244
[6] Wil M.P V, Song M(1998). Discovering models of software processes from event-based data], ACM Transactionson Software Engineering and Methodology, vol.7,no.3, pp215-249
[7] Wil M.P V, Song M(2004). Mining social networks: Uncovering interaction patterns in business processes, BusinessProcess Management,pp244-260
[8] Schlegelmich J, Steffens U(2005). Role mining with ORCA. Proceedings of the tenth ACM symposium on Access
control models and technologies. Stockholm, Sweden: SACMAT,pp168-176
[9] Liu D R, Shen M(2003). Workflow modeling for virtual processes: An order-preserving process-view approach.Information Systems, vol.28,no.6,pp505-532
Role-activity Diagrams Modeling Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - onur@onuryilmaz.me
Recommended