compliance check

162
Process Compliance Measurement based on Behavioural Pro

Upload: tony-davis

Post on 17-Jul-2016

22 views

Category:

Documents


1 download

DESCRIPTION

Compliance Check

TRANSCRIPT

Page 1: Compliance Check

Process Compliance Measurement based onBehavioural Pro

Page 2: Compliance Check

lesMatthias Weidlich1, Artem Polyvyanyy1, Nirmit Desai2, and Jan Mendling31 Hasso Plattner Institute at the University of Potsdam, Germany(Matthias.Weidlich,Artem.Polyvyanyy)@hpi.uni-potsdam.de2 IBM India Research Labs, [email protected] Humboldt-Universit�at zu Berlin, [email protected]. Process compliance measurement is getting increasing attentionin companies due to stricter legal requirements and market pressurefor operational excellence. On the other hand, the metrics to quantify processcompliance have only been de

Page 3: Compliance Check

ned recently. A major criticism pointsto the fact that existing measures appear to be unintuitive. In this paper,we trace back this problem to a more foundational question: which notionof behavioural equivalence is appropriate for discussing compliance? Wepresent a quanti

Page 4: Compliance Check

cation approach based on behavioural pro

Page 5: Compliance Check

les, which isa process abstraction mechanism. Behavioural pro

Page 6: Compliance Check

les can be regardedas weaker than existing equivalence notions like trace equivalence, andthey can be calculated e�ciently. As a validation, we present a respectiveimplementation that measures compliance of logs against a normativeprocess model. This implementation is being evaluated in a case studywith an international service provider.1 IntroductionCompliance management is becoming increasingly important. Companies seek fora better control of their processes not only to satisfy new legal requirements butalso to leverage cost-saving opportunities through standardization of businessoperations. Once non-compliant cases of operations are detected, the companycan either update its process model to cover the respective case or it can imposenew mechanisms to enforce best practice execution. In this way, compliancemanagement is a central piece in the puzzle of advancing a company towards ahigher degree of process maturity.In order to make compliance management work in practice, it is required togather detailed information on the execution of particular business processes.In recent years, process mining has emerged as a technique that automaticallyreworks process logs data such that managerial decision making can be sup-ported [1]. Most importantly, certain key measures of compliance managementcan easily be quanti

Page 7: Compliance Check

ed. Therefore, some compliance metrics have been proposedin recent literature, e.g., by Medeiros et al. [2], and Rozinat and van der Aalst [3].2 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan MendlingThese metrics check a set of logs against a normative process model to calculatethe degree of compliance.The aforementioned metrics have a few drawbacks. On the one hand, theyrely on state-based techniques that involve replaying the logs. They are basedon the notion of trace equivalence, which is a weak notion in the linear time {branching time spectrum [4]. As a consequence, these approaches have to copewith the state explosion problem in order to achieve e�cient computation [5].That, in turn, leads to the application of heuristics that have to be tuned fora certain setting. On the other hand, these metrics have been tested by Gerkeet al. [6] for their applicability in a case study with a German air carrier. As itturned out, these metrics yielded non-compliance values that are signi

Page 8: Compliance Check

cantlysmaller than the degree of non-compliance perceived by the business users. Whileadaptations to the metrics have been proposed, the conceptual basis in termsof trace equivalence remains unchanged. These results, along with the inherentcomplexity of state-space based approaches, suggest to choose a di�erent approachfor measuring compliance.In this paper, we approach the problem from the perspective of relationsbetween pairs of activities or log events, respectively, instead of trying to replaylogs according to a rather strict notion of equivalence. Thus, our contribution isa foundation of compliance measurement in a notion that is more relaxed thantrace equivalence. We utilize behavioural pro

Page 9: Compliance Check

les as a base line to calculate novelcompliance metrics. As behavioural pro

Page 10: Compliance Check

les can be calculated e �ciently, we avoidperformance issues of existing state-based metrics. We implemented our approachand validated it on an industry case study. In this context, our metrics showed agood approximation of the compliance as perceived by the business users.Against this background, the paper is structured as follows. Section 2 discussesthe challenge of measuring compliance by means of an example and elaborates onexisting compliance metrics. Subsequently, Section 3 presents preliminaries forour investigations. Section 4 introduces compliance metrics based on behaviouralpro

Page 11: Compliance Check

les. Based thereon, Section 5 presents

Page 12: Compliance Check

ndings from our validation, for whichwe implemented a prototype and tested it on real-world logs. Section 6 discussesour approach in the light of related work. Finally, Section 7 concludes the paperand identi

Page 13: Compliance Check

es topics for future research.2 BackgroundIn this section, we discuss the challenges of measuring behavioural compliance.Fig. 1 shows the example of a BPMN process model that includes 11 activities,all named with a capital letter. The diamonds de

Page 14: Compliance Check

ne the routing behaviour of theBPMN model. Once I and A have been executed, there is a choice being madewhether the branch including B is executed or as an exclusive alternative, thebranch leading to the diamond with the plus sign. The latter option leads to aparallel execution of the sequences C, D, E and F, G, H. Finally, these branchesare synchronized and control is passed through the merge node (with the X inthe diamond) towards the completion of the process after execution of O.Process Compliance Measurement based on Behavioural Pro

Page 15: Compliance Check

les 3I A C D EF G HJBOFig. 1. Example of a BPMN process modelThe challenge of compliance measurement is to quantify the degree to which acertain set of logs matches a normative process model. Logs (or log

Page 16: Compliance Check

les) representobserved execution sequences of activities from the normative process model. Inthe desirable case the logs completely comply with the behaviour de

Page 17: Compliance Check

ned by theprocess model. In this case, the logs are valid execution sequences. In practice,however, observed execution sequences often deviate from prede

Page 18: Compliance Check

ned behaviour.This may be the case when the execution order is not explicitly enforced by theinformation system that records the logs. In fact, it is also possible that peopledeliberately work around the system [1]. This may result in logs such as thefollowing for the process model in Fig. 1.� Log L1 = I; A;C;D; F; G;E;H;O� Log L2 = I; A;C;B;E; F;H;O� Log L3 = I; A;E;D;C;H; G;O; F� Log L4 = I;C;D; FFrom these four logs, only the

Page 19: Compliance Check

rst one is also a valid execution sequence, i.e.,it can be completely replayed by the process model. Still, the other logs capturea good share of the behaviour de

Page 20: Compliance Check

ned in the model. Such cases make it necessaryto measure compliance a posteriori.Compliance measurement has recently been approached using state-basedconcepts from the Petri nets theory. The idea of the

Page 21: Compliance Check

tness measure proposedby Medeiros et al. [2] is to replay the log through the model. Activities that areenabled in the model when they appear in the log are counted and related to theoverall number of activities. If an activity is not enabled, the respective Petri nettransition is forced to

Page 22: Compliance Check

re, which produces a token on each of its output places.In this way, one can quantify compliance of the logs against the process model asa ratio of enabled activities to the total number of activities. For example, inFig. 1, log L1 can be completely replayed and has therefore a compliance value of1. Instead, log L2 can be replayed solely until B appears in the log. This activityis then

Page 23: Compliance Check

red without being enabled. The same holds for E and H. Therefore,three

Page 24: Compliance Check

rings are non-compliant from the eight

Page 25: Compliance Check

rings altogether, yielding a

Page 26: Compliance Check

tnessvalue of 0:63. In log L3, activities E, D, H, and G are forced to

Page 27: Compliance Check

re althoughthey are not enabled. Thus, altogether, only I, A, C, O, and F are

Page 28: Compliance Check

red correctlyfrom nine tasks. Therefore, the

Page 29: Compliance Check

tness is 0:56. Finally, for log L4, the absence ofactivity A in the log implies a non-compliant

Page 30: Compliance Check

ring of C and D, such that

Page 31: Compliance Check

tnessis two out of four, which is 0:5.4 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan MendlingAs mentioned above, the metrics proposed by Medeiros et al. are based oncomputationally hard state space exploration, which has to be addressed usingheuristics for the general case. In addition, other work reports on these metrics asyielding compliance values which are signi

Page 32: Compliance Check

cantly lower than what is consideredto be correct by domain experts [6]. Therefore, for our notion of log compliance,we do not try to replay the log through the model. Instead, we identify di�erenttypes of constraints that a process model can impose for a pair of activities on theexecution order activities, such as exclusiveness (B and C in Fig. 1) and order (Cand E in Fig. 1). Based thereon, the preservation of these constraints is leveragedto assess the compliance of a given log. Besides constraints in terms of executionorder, we also take the obligation to execute a single activity in a process modelinto account. Evidently, activities that are de

Page 33: Compliance Check

ned as being mandatory in theprocess model have to occur in a log, or can be expected to occur in future ifthe process has not yet completed. An example for such a mandatory activity inthe model in Fig. 1 is activity A. A third group of constraints that we evaluaterelates to the causal coupling of executions for a pair of activities. That is, theoccurrence of one activity implies the occurrence of another activity. For instance,both activities, C and E, are optional for the completion of the example process.Still, the occurrence of C implies the occurrence of E, i.e., their execution iscausally coupled.While these behavioural constraints are not addressed in existing compliancemetrics, we show how they can be leveraged in order to assess the compliance ofa log in the remainder of this paper.3 PreliminariesThis section gives preliminaries for our work in terms of a formal framework.For our investigations we use a notion of a process model that is based on agraph containing activity nodes and control nodes, which, in turn, captures thecommonalities of process description languages. Thus, the subset of BPMN usedin our initial example can be traced back to the following de

Page 34: Compliance Check

nition of a processmodel.De

Page 35: Compliance Check

nition 1. (Process Model) A process model is a tuple P = (A; ai; ao;C; F; T)with� A as a non-empty set of activity nodes, and C as a set of control nodes, Aand C are disjoint,� ai 2 A as an initial activity, ao 2 A as a

Page 36: Compliance Check

nal activity,� F � ((A n faog) [ C) � ((A n faig) [ C) as the ow relation, and� T : C 7! fand; or; xorg as a function that assigns a type to control nodes.In the remainder of this paper, the identity relation for activities is denotedby idA, i.e., (a; a) 2 idA for all a 2 A. Further on, we do not formalise theexecution semantics of a process model, but assume an interpretation of themodel following on common process description languages, such as BPMN, EPCs,or UML activity diagrams. It is worth to mention that we do not assume aProcess Compliance Measurement based on Behavioural Pro

Page 37: Compliance Check

les 5certain de

Page 38: Compliance Check

nition of semantics for the inclusive OR construct, which raises seriousissues in cyclic structures. We solely assume the existence of such a de

Page 39: Compliance Check

nition.Under the assumption of a de

Page 40: Compliance Check

nition of execution semantics, the set of all validexecution sequences, as well as the notion of a process log, can be de

Page 41: Compliance Check

ned asfollows.De

Page 42: Compliance Check

nition 2. (Execution Sequence, Execution Log) The set of execution se-quences EP for a process model P = (A; ai; ao;C; F; T) is the set of all lists of theform faig � A� � faog, that can be created following on the execution semantics ofP. An execution log LP that has been observed for P is a non-empty list of theform A�.Note that we speak of an execution sequence of a process model, solely in case thesequence is valid regarding the process model, i.e., it can be completely replayedby the model. In contrast, a log is a non-empty sequence over the activities of aprocess model. As a short-hand notation, we use AL � A to refer to the subsetof activities of a process model that is contained in log L.In order to capture the constraints imposed by a process model on the order ofactivity execution, we rely on the concept of a behavioural pro

Page 43: Compliance Check

le [7]. Behaviouralpro

Page 44: Compliance Check

le de

Page 45: Compliance Check

nes relations for all pairs of activities of a process model. These relations,in turn, might be interpreted as the essential behavioural characteristics speci

Page 46: Compliance Check

edby the models. All behavioural relations are based on the notion of weak order.That is, two activities are in weak order, if there exists an execution sequence inwhich one activity occurs after the other. Here, only the existence of an executionsequence is required.De

Page 47: Compliance Check

nition 3 (Weak Order (Process Model)). Let P = (A; ai; ao;C; F; T)be a process model and EP its set of execution sequences. The weak order relation�P � (A � A) contains all pairs (x; y), such that there is an execution sequence

nj = x and nk = y.Based thereon, we de

Page 48: Compliance Check

ne the relations of the behavioural pro

Page 49: Compliance Check

le for pairs ofactivities. Each pair can be related by weak order in three di�erent ways.De

Page 50: Compliance Check

nition 4 (Behavioural Pro

Page 51: Compliance Check

le (Process Model)). Let P = (A; ai; ao;C; F; T) be a process model. A pair (x; y) 2 (A � A) is in at most one of thefollowing relations:� The strict order relation P , i � x �P y and y 6 �P x.� The exclusiveness relation +P , i� x 6�P y and y 6 �P x.� The interleaving order relation jjP , i� x �P y and y �P x.The set BP = f P ;+P ; jjP g is the behavioural pro

Page 52: Compliance Check

le of P.Note that we say that a pair (x; y) is in reverse strict order, denoted by x ??1P y,if and only if y P x. Interleaving order is also referred to as observationconcurrency. Further on, the relations of the behavioural pro

Page 53: Compliance Check

le along withreverse strict order partition the Cartesian product of activities [7]. We illustrate6 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan Mendlingthe relations of the behavioural pro

Page 54: Compliance Check

le by means of our example model in Fig. 1.Here, for instance, it holds I D. Evidently, strict order does not imply theactual occurrence, i.e., activity D might not be executed. Further on, B + Cas both activities will never occur in a single valid execution sequence of themodel, and CjjG as C might occur before G and vice versa. Note that it holdsBjjJ due to the control ow cycle. That is, an occurrence of J is followed by anoccurrence of B. Further on, an activity is either said to be exclusive to itself(e.g., I +I) or in interleaving order to itself (e.g., BjjB). The former holds, whenan activity cannot be repeated, whereas the latter implies that the activity ispart of a control ow cycle.The concept of a behavioural pro

Page 55: Compliance Check

le relates pairs of activities according totheir order of potential occurrence, whereas further behavioural characteristicsare not considered. Both, the fact that an activity is mandatory for processcompletion and causality between activities are not covered. Causality, in turn,involves two orthogonal aspects, i.e., the order of activity occurrences and theircausal coupling (the occurrence of one activity enforces the occurrence of anotheractivity). While the former is already addressed by the behavioural pro

Page 56: Compliance Check

le interms of the (reverse) strict order relation, the latter is not captured. In order tocope with these aspects, the behavioural pro

Page 57: Compliance Check

le is extended by a fourth relation,yielding the causal behavioural pro

Page 58: Compliance Check

le.De

Page 59: Compliance Check

nition 5 (Causal Behavioural Pro

Page 60: Compliance Check

le (Process Model)).Let P = (A; ai; ao;C; F; T) be a process model.� A pair (x; y) 2 (A �A) is in the co-occurrence relation �P , i� for all executionsequences � = n1; : : : ; nm in EP it holds ni = x with 1 � i � m implies thatthere is an index j 2 f1; : : : ;mg, such that nj = y.� The set B+P = BP [ f�P g is the causal behavioural pro

Page 61: Compliance Check

le of P.Given a process model P = (A; ai; ao;C; F; T), the set of mandatory activitiesAM � A is given by all activities that are co-occurring with the initial activity,that is, AM = fa 2 A j ai �P ag. Moreover, causality holds between twoactivities a1; a2 2 A, if they are in strict order, a1 P a2 and the occurrence ofthe

Page 62: Compliance Check

rst implies the occurrence of the second, a1 �P a2. Again, we refer to theexample in Fig. 1 for illustration purposes. In this model, there are only threemandatory activity, namely AM = fI; A;Og. Moreover, it holds C � E andE � C. Thus, all complete execution sequences of the process model that containactivity C are required to also contain activity E, and vice versa. In addition,the model speci

Page 63: Compliance Check

es a strict order relation between both activities, C E, suchthat we speak of a causal dependency from C to E.4 Measuring Compliance based on Behavioural Pro

Page 64: Compliance Check

lesThis section introduces compliance metrics based on behavioural pro

Page 65: Compliance Check

les. First,Section 4.1 shows how the concepts introduced in the previous section can belifted to logs. Second, we elaborate on a hierarchy between the relations of thebehavioural pro

Page 66: Compliance Check

le in Section 4.2. Based thereon, we introduce the compliancemetrics in Section 4.3.Process Compliance Measurement based on Behavioural Pro

Page 67: Compliance Check

les 74.1 Causal Behavioural Pro

Page 68: Compliance Check

les for LogsIn order to lift the concept of behavioural pro

Page 69: Compliance Check

les to logs,

Page 70: Compliance Check

rst and foremost, wehave to clarify the notion of weak order for logs. Following on the de

Page 71: Compliance Check

nition givenfor process models, two activities are in weak order in a log, if the

Page 72: Compliance Check

rst occursbefore the second.De

Page 73: Compliance Check

nition 6 (Weak Order (Log)). Let LP = n1; : : : ; nm be a log of a processmodel P = (A; ai; ao;C; F; T). The weak order relation �L � (AL�AL) containsall pairs (x; y), such that there exists two indices j; k 2 f1; : : : ;m ?? 1g withj < k � m for which holds nj = x and nk = y.Based thereon, we de

Page 74: Compliance Check

ne the behavioural pro

Page 75: Compliance Check

le of a log.De

Page 76: Compliance Check

nition 7 (Behavioural Pro

Page 77: Compliance Check

le (Log)). Let LP = n1; : : : ; nm be a log ofa process model P = (A; ai; ao;C; F; T). A pair (x; y) 2 (AL � AL) is in at mostone of the following relations:� The strict order relation L, i� x �L y and y 6�L x.� The interleaving order relation jjL, i � x �L y and y �L x.The set BL = f L; jjLg is the behavioural pro

Page 78: Compliance Check

le of L.Again, the pair (x; y) is in reverse strict order, denoted by x ??1L y, if andonly if y L x. The relations of the behavioural pro

Page 79: Compliance Check

le along with reverse strictorder partition the Cartesian product of elements of a log. For the exemplary logL3 = I; A;E;D;C;H; G;O; F, for instance, it holds C F and D ??1 A.It is worth to mention that there are fundamental di�erences when interpretingthe behavioural pro

Page 80: Compliance Check

le for a process model and a log. On the one hand, in contrastto the pro

Page 81: Compliance Check

le of a process model, we cannot observe exclusiveness between twoactivities in a single log. On the other hand, activities that might be enabledconcurrently in a process model (e.g., C and G in our example) are related byinterleaving order in the behavioural pro

Page 82: Compliance Check

le of the model (CjjG). However, ifboth activities are not part of a control-ow cycle, they might be related by strictorder or reverse strict order in the pro

Page 83: Compliance Check

le of a corresponding log. For instance,for the log L3 = I; A;E;D;C;H; G;O; F, we observe C G as the behaviouralrelation for activities C and G.Moreover, we can also lift the de

Page 84: Compliance Check

nition of a causal behavioural pro

Page 85: Compliance Check

le toprocess logs. Obviously, all elements of a log are co-occurring.De

Page 86: Compliance Check

nition 8 (Causal Behavioural Pro

Page 87: Compliance Check

le (Log)). Let LP = n1; : : : ; nm bea log of a process model P = (A; ai; ao;C; F; T)� The co-occurrence relation �L= (AL �AL) contains all pairs of log elements.� The set B+L = BL [ f�Lg is the causal behavioural pro

Page 88: Compliance Check

le of L.4.2 A Hierarchy of Behavioural RelationsAs mentioned above, there is a fundamental di �erence between behaviouralpro

Page 89: Compliance Check

les of process models and of logs. The former de

Page 90: Compliance Check

nes relations based on8 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan Mendlingthe set of all possible execution sequences, whereas the latter considers onlyone observed execution sequence as de

Page 91: Compliance Check

ned by the log. In order to cope withthis phenomenon, we introduce a hierarchy between the relations of behaviouralpro

Page 92: Compliance Check

les (we neglect the co-occurrence relation at this stage). The idea is to orderthe behavioural relations based on their strictness. We consider the exclusivenessrelation as the strongest relation, as it completely disallows two activities to occurtogether in an execution sequence. In contrast, the interleaving order relationcan be seen as the weakest relation. It allows two activities to occur in any orderin an execution sequence. Consequently, the strict order and reverse strict orderrelation are intermediate relations, as they disallow solely a certain order oftwo activities. We formalize this hierarchy between behavioural relations as asubsumption predicate. Given two behavioural relations between a pair of twoactivities, this predicate is satis

Page 93: Compliance Check

ed, if and only if the

Page 94: Compliance Check

rst relation is equal orweaker than the second.De

Page 95: Compliance Check

nition 9 (Subsumption Predicate). Given two behavioural relationsR;R0 2 f ; ??1;+; jjg of the same or di �erent behavioural pro

Page 96: Compliance Check

les, the sub-sumption predicate S(R;R0) is satis

Page 97: Compliance Check

ed, i� (R 2 f ; ??1g ^ R0 = +) or R = R0or R = jj.Again, we illustrate this concept using the example model in Fig. 1 and the logL3 = I; A;E;D;C;H; G;O; F. As mentioned above, for activities C and G, itholds CjjG in the pro

Page 98: Compliance Check

le of the process model and C G in the pro

Page 99: Compliance Check

le of thelog. The former speci

Page 100: Compliance Check

es that C and G might occur in any order in an executionsequence, owing to the interleaving semantics of activities that are enabledconcurrently. The latter, in turn, captures the fact that the occurrences of C andG in the log are ordered. However, we see that there is a subsumption relationbetween both relations, as S(jj; ) is satis

Page 101: Compliance Check

ed. Evidently, this information has tobe taken into account when assessing compliance of logs. This stems from thefact that logs do not hint at potential interleaving execution of activities.4.3 Compliance MetricsFor our measurements of compliance between a process model and a log, weconsider three aspects separately, namely execution order, mandatory activities,and casual coupling. While the last two aspects address the question what shouldbe contained in the log (activities that are mandatory in a global sense or that areimplied by the occurrence of other activities in the log), the

Page 102: Compliance Check

rst aspect clari

Page 103: Compliance Check

eshow these activities should be ordered in the log. While each of these aspects isassessed by a separate compliance degree, their values may be aggregated into asingle compliance degree.Execution order compliance is motivated by the fact that the order of executionof activities as speci

Page 104: Compliance Check

ed by the log should be in line with the ordering constraintsas imposed by the process model. Evidently, the question whether there is such adi�erence is of limited usefulness. Instead, any deviation has to be quanti

Page 105: Compliance Check

ed toallow for thorough compliance analysis. We achieve such a quanti

Page 106: Compliance Check

cation basedProcess Compliance Measurement based on Behavioural Pro

Page 107: Compliance Check

les 9on the notion of behavioural pro

Page 108: Compliance Check

les and the hierarchy of behavioural relations.That is, we analyse the Cartesian product of activities that are contained in a logand determine, whether the behavioural relation for a pair of activities in the logis subsumed by the relation speci

Page 109: Compliance Check

ed in the process model. Based thereon, thedegree of behavioural compliance is de

Page 110: Compliance Check

ned as a ratio of consistent behaviouralrelations relative to the number of activity pairings in the log. Note that forthe case of a behavioural relation that holds between an activity and itself, thesubsumption predicate cannot be applied. If an activity can occur at most oncein the process model (it is exclusive to itself), it is not allowed to occur multipletimes in the log (it cannot be in interleaving order to itself), whereas the oppositecase (exclusive in the log, in interleaving order in the model), as well as equalrelations, are considered to be compliant. Based thereon, we de

Page 111: Compliance Check

ne executionorder compliance.De

Page 112: Compliance Check

nition 10 (Execution Order Compliance). Let LP = n1; : : : ; nm be alog of a process model P = (A; ai; ao;C; F; T). Then, the set SR � (AL � AL)contains all pairs of activities (x; y), for which the behavioural relation in LPis subsumed by the relation in P, i.e., 8 R 2 (BP [ f ??1P g);R0 2 (BL [ f ??1Lg) [ (xRy ^ xR0y) ) (S(R;R0) _ (x = y ^ R = jjP ^ R0 = +L)) ]. The degreeof execution order compliance of LP to P is de

Page 113: Compliance Check

ned asECLP = jSRjj(AL � AL)j:Note that the compliance degree ECLP for a log is between zero, i.e., no executionorder compliance at all, and one indicating full execution order compliance. It isworth to mention that this degree is independent of the size of the process model,as solely the activity pairs found in the log are considered in the computation.Given the log L3 = I; A;E;D;C;H; G;O; F and our initial example (cf., Fig.1),we see that various order constraints imposed by the model are not satis

Page 114: Compliance Check

ed.For instance, D E and G H are speci

Page 115: Compliance Check

ed in the model, whereas we haveD ??1 E and G ??1 H in the pro

Page 116: Compliance Check

le of the log. That, in turn, leads to anexecution order compliance degree of EC = 6781 � 0:83 for this particular log.Due to the fact that execution order compliance relates solely to the orderingconstraints, we embrace further process characteristics for compliance measure-ments. In particular, we take the mandatory activities that are required forcompletion of the process into account. The ratio of mandatory activities of theprocess model that are contained in the log, and all mandatory activities wouldbe a straight-forward measure for this aspect. However, we want to consider alsologs that might not have completed yet, such that missing mandatory activitiesmight be added later on. In order to cope with this, not all mandatory activitiesof the process model are required to occur in the log. Instead, we consider onlythose mandatory activities, for which we can deduce from the log that theyshould have been observed already. That is, a mandatory activity is considered,if it is either in the log, or it is in strict order with one of the activities in the log.De

Page 117: Compliance Check

nition 11 (Mandatory Execution Compliance). Let LP = n1; : : : ; nmbe a log of a process model P = (A; ai; ao;C; F; T) and AM = fa 2 A j ai �P ag10 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan Mendlingthe set of mandatory activities of P. Then, the set EAM � AM contains allmandatory activities a1 that are in the log or can be expected to be in the log,i.e., a1 2 AL or 9 a2 2 AL [ a1 6= a2 ^ a1 P a2 ]. The degree of mandatoryexecution compliance of LP to P is de

Page 118: Compliance Check

ned asMCLP =(1 if EAM = ;,jAL\AMjjEAMj else.Consider the log L4 = I;C;D; F of our initial example. The process model inFig. 1 speci

Page 119: Compliance Check

es three mandatory activities, i.e., activities I, A, and O. Whileactivity I is in the log, activity A is not, although we know that it should havebeen observed already owing to the strict order relation between A and C, D,and E, respectively. The mandatory activity O is not required to occur in the log,as the log does not contain any activity that is in strict order with O. Therefore,the log contains one out of two expected mandatory activities, such that theexecution compliance degree is MC = 0:5. Note that the mandatory executioncompliance degree might be overestimated. That is, a mandatory activity mightbe part of a control ow cycle, while the log does not contain any activity that isin strict order with the mandatory activity. In this case, the mandatory activitywill not be considered in the mandatory execution compliance degree. This holds,even though the log might already contain activities that can only be reachedafter executing the mandatory activity in the process model.The mandatory execution compliance relates to activities that should beobserved in each log as they are required for completion of the process. Still,there might be dependencies between the occurrences of activities even thoughthey are not mandatory. In the model in Fig.1, for instance, neither activity Cnor E are mandatory for completion. However, there is a causal relation betweenboth, as the occurrence of C implies the occurrence of E. While the correctnessof the order of occurrence for both activities has already been incorporated in thenotion of execution order compliance, the causal coupling of their occurrenceshas still to be taken into account. Therefore, for each activity a in the log, wealso check whether activities for which the occurrence is implied by a are alsoin the log. Again, we have to consider the eventuality of incomplete logs, suchthat this requirement must hold only in case there is su�cient evidence that theimplication is not satis

Page 120: Compliance Check

ed. That is, there is another activity in the log for whichthe model speci

Page 121: Compliance Check

es strict order to the activity under investigation.De

Page 122: Compliance Check

nition 12 (Causal Coupling Compliance). Let LP = n1; : : : ; nm be alog of a process model P = (A; ai; ao;C; F; T). Then, the set ECM � (�P nidA)contains all pairs of co-occurring activities (a1; a2), such that the

Page 123: Compliance Check

rst activity isin the log, while the second activity is in the log or can be expected to be in thelog, i.e., a1 2 AL and a2 2 AL _ 9 a3 2 AL [ a2 P a3 ]. The degree of causalcoupling compliance of LP to P is de

Page 124: Compliance Check

ned asCCLP =(1 if ECM = ;,j(AL�AL)nidAL\�P jjECMj else.Process Compliance Measurement based on Behavioural Pro

Page 125: Compliance Check

les 11Table 1. Compliance results for the logs of the initial example (cf., Section 2)EC MC CC CLog Execution Mandatory Causal OverallOrder Execution Coupling ComplianceL1 = I; A;C;D; F; G;E;H;O 1.00 1.00 1.00 1.00L2 = I; A;C;B;E; F;H;O 0.88 1.00 0.80 0.89L3 = I; A;E;D;C;H; G;O; F 0.83 1.00 1.00 0.94L4 = I;C;D; F 1.00 0.50 0.69 0.73We illustrate causal coupling compliance using our initial example and the logL2 = I; A;C;B;E; F;H;O. Although all mandatory activities are contained inthe log, we see that, for instance, C � D is not satis

Page 126: Compliance Check

ed. This is penalised asthe log contains E and it holds D E in the process model. In other words,the occurrence of E in the log provides us with evidence that we should haveobserved D, too. Thus, the absence of this activity impacts on the causal couplingcompliance. Note that the same holds true for all co-occurrence relations involvingactivity G, such that the degree of causal coupling compliance is CC = 3341 � 0:80for this particular log. It is worth to mention that the causal coupling compliancedegree might be overestimated. An example for this phenomenon would be the logI; A; J for the model in Fig. 1. There is a causal coupling J � B in this model.However, the absence of B would not be penalised as there is no activity in thelog that is in strict order for B and, therefore, would provide us with su�cientevidence that B should have been observed already.Given compliance degrees for the three aspects, execution order, mandatoryactivities, and casual coupling, we can aggregate the compliance degree of a log.De

Page 127: Compliance Check

nition 13 (Log Compliance). Let LP = n1; : : : ; nm be a log of a processmodel P = (A; ai; ao;C; F; T). The compliance of LP to P is de

Page 128: Compliance Check

ned asCLP =13(ECLP + MCLP + CCLP ):Applied to our example process model and the four exemplary logs introducedin Section 2, our compliance metrics yield the results illustrated in Table 1. Asexpected, the

Page 129: Compliance Check

rst log L1, which represents a valid execution sequence of theprocess model satis

Page 130: Compliance Check

es all constraints, such that our metric indicates full overallcompliance. In contrast, the execution order constraints are not fully satis

Page 131: Compliance Check

ed inthe second log L2 (e.g., the exclusiveness in the model between B and C is brokenin the log). In addition, the causal coupling is not completely respected in thelog either, as discussed above. Further on, for the log L3, the execution order isnot completely in line with the process model. Regarding the log L4, we alreadydiscussed the absence of a mandatory activity that should have been observed,leading to a mandatory execution compliance degree below one. Note that thisalso impacts on the causal coupling compliance. Thus, a mandatory executioncompliance degree smaller than one, will also be reected in the causal couplingcompliance degree. However, the opposite does not hold true, as illustrated for12 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan MendlingCreateissueCustomerextensionIssuedetailsResolutionplanChangemanagementMonitortarget datesRiskmanagementProposal toclose (PTC)CloseissueRejectPTCFig. 2. BPMN model of the Security Incident Management Process (SIMP)the log L2. Although this log shows full mandatory execution compliance, itscausal coupling compliance degree is below one.5 Case Study: Security Incident Management ProcessTo demonstrate and evaluate our approach, we apply it to the Security IncidentManagement Process (SIMP) | which is an issue management process used inglobal service delivery centres. The process and the logs have been minimallymodi

Page 132: Compliance Check

ed to remove con

Page 133: Compliance Check

dential information. Fig. 2 shows the BPMN model ofSIMP solicited from domain experts.SIMP is used in one of IBM's global service delivery centres that providesinfrastructure management and technical support to customers. When a customerreports a problem or requests a change, an issue is created, spawning a newinstance of the process. Details about the issue may be updated, a plan to resolvethe issue must be created, and change management related activities may beperformed if required. Then, target dates for issue resolution may be monitoredand relevant risks may be documented. A Customer Extension of target datesmay be processed during any of the above activities (parallel path). Once thesteps for resolution are taken and veri

Page 134: Compliance Check

ed, the resolver must propose to close theissue. Based on the evidence that the issue is indeed resolved, the issue creatormay close the issue. Otherwise, the proposal must be rejected.For the SIMP process we analysed 852 logs, each consisting of a set of logentries. Such a log entry has an activity name, activity description, and thetime-stamp marking the time of execution of the activity. Although the processis standardized and documented, it is not orchestrated via workow tools in theIBM's global service delivery centre under investigation. Instead, it is manuallycarried out. Hence, the employees are free to deviate from the process. As a result,the logs may or may not specify valid execution sequences of the process model.For each log, we analysed its compliance using the metrics proposed in thispaper. Table 2 gives a summary of this analysis in terms of the average compliancevalue of all logs, the observed minimal and maximal compliance values, and theshare of fully compliant logs. The compliance values were discussed with themanager of the process. The average values reect the manager's perception thatSIMP is running satisfactory and most cases are handled in a compliant way. Asthe minimum values show, it was also possible to identify cases of low compliance.Process Compliance Measurement based on Behavioural Pro

Page 135: Compliance Check

les 13Table 2. Compliance results for the SIMP process derived from 852 logsEC MC CC CExecution Mandatory Causal OverallOrder Execution Coupling ComplianceAverage Value 0.99 0.96 0.95 0.96Min Value 0.31 0.60 0.50 0.61Max Value 1.00 1.00 1.00 1.00Logs with Value of 1.00 78.64% 84.15% 84.15% 76.17%We are not able to directly compare our results with the approach proposedin [2]. This is mainly due to the inherent complexity of the state space exploration,which is exponential in the general case. Even a maximally reduced Petri net ofour SIMP process contains a lot of silent steps owing to several activities, forwhich execution is optional. That, in turn, leads to a signi

Page 136: Compliance Check

cant increase of thestate space to investigate when trying to replay a log. While compliance valuesmight still be derived following the most greedy strategy, these results are of alimited validity as they highly underestimate the degree of compliance. However,it is worth to mention that even with the most greedy strategy, computation ofthe compliance values for all logs took around 15 seconds. In contrast, computingthe compliance metrics proposed in this paper for all logs, in turn, could be donewithin milliseconds. Moreover, an isolated analysis of a sample of 30 logs forwhich computation of the

Page 137: Compliance Check

tness metric is possible with a 5-step-ahead strategyrevealed that the

Page 138: Compliance Check

tness compliance values are all lower than the values derivedby our metrics. This is in line with the criticism of [6] that the

Page 139: Compliance Check

tness conceptappears to be too strict. These di�erences probably stem from the di �erentnormalisation of any behavioural deviation. The

Page 140: Compliance Check

tness metric relates tokensadditionally created (removed) to the number of all consumed (produced) tokenswhen replaying a log. In contrast, our approach considers violations on the levelof relations between activities. Therefore, a single violation according to ournotion, can be reected multiple times in the

Page 141: Compliance Check

tness metric.The adaptations of [6] could not be compared either to our values since therespective implementation is not publicly available. But as they are also de

Page 142: Compliance Check

nedon state concepts, we can assume results similar to those obtained above.6 Related WorkIn this section we discuss the relation of our work to compliance measurement,behavioural equivalence, and process similarity.Compliance measures are at the core of process mining. Similar relations,but not exactly those of behavioural pro

Page 143: Compliance Check

les, are used in [8] to characterisea process as a pre-processing step for deriving a model. As mentioned before,the work in [2,3] proposes a

Page 144: Compliance Check

tness measure for process mining, while, basedthereon, adaptations are discussed in [6]. In this paper, we demonstrated thatour approach bene

Page 145: Compliance Check

ted from the e�cient calculation of the behavioural pro

Page 146: Compliance Check

les14 Matthias Weidlich, Artem Polyvyanyy, Nirmit Desai, Jan Mendlingfrom free-choice process models as de

Page 147: Compliance Check

ned in [7]. In fact, behavioural pro

Page 148: Compliance Check

les canbe derived in O(n3) time with n as the number of activities of a process model.Therefore, in contrast to the

Page 149: Compliance Check

tness calculation, our metrics can be computedwithin milliseconds. Further on, following on the criticism of [6], our case studyprovided us with evidence that our metrics are close to managers' perceptionof compliance. The detection of di�erences between process models, not theirmeasurement, is also discussed in related work. The approaches presented in [9,10]provides a systematic framework of diagnosis and resolution of such mismatches.The concept of behavioural pro

Page 150: Compliance Check

le in general relates to di �erent notionsof behavioural equivalence such as trace equivalence and bisimulation. Thesenotions build on state concepts and can often not be calculated as e�ciently asbehavioural pro

Page 151: Compliance Check

les. They also yield only a true or false answer and they arenot directly applicable to execution sequences [11,12]. Behaviour inheritance isclosely related to these notions. Basten et al. [13] de

Page 152: Compliance Check

ne protocol inheritanceand projection inheritance based on labelled transition systems and branchingbisimulation. A model inherits the behaviour of a parent model, if it shows thesame external behaviour when all actions that are not part of the parent model areeither blocked (protocol inheritance) or hidden (projection inheritance). Similarideas have been presented in [14,15]. The boolean characteristics of these notionshave been criticized as inadequate for many process measurement scenarios [2].The question of process similarity has been addressed from various angles.Focussing on behavioural aspects, [16,17] introduce similarity measures basedon an edit distance between workows. Such an edit distance might be basedon the language of the workow, the underlying automaton, or based on then-gram representation of the language. A similar approach is also taken in [18],in which the authors measure similarity based on high-level change operationsthat are needed to transform one model into another. Close to our behaviouralabstraction of a behavioural pro

Page 153: Compliance Check

le are causal footprints as introduced in [19]. Theauthors also show how the footprints can be leveraged to determine the similaritybetween process models. All these similarity notions are either expensive in termsof calculation, whereas behavioural pro

Page 154: Compliance Check

les can be calculated e �ciently.7 ConclusionIn this paper, we have discussed the challenges of providing compliance measure-ments in an appropriate and e�cient way. Our contribution is a novel proposalfor metrics based on behavioural constraints on pairs of tasks for compliancemeasurement. In this way, we avoided performance problems of state-based met-rics by using behavioural pro

Page 155: Compliance Check

les as the underlying equivalence notion. Our logcompliance metric covers three aspects including execution order, mandatory exe-cution, and causal coupling, which can all be derived from the causal behaviouralpro

Page 156: Compliance Check

le. We implemented these metrics and tested them in a case study.In future work, we aim to study the merits of our novel approach in furtherindustry collaborations. The performance gain of using behavioural pro

Page 157: Compliance Check

les is ofserious importance for various use cases. Up until now, compliance measurementProcess Compliance Measurement based on Behavioural Pro

Page 158: Compliance Check

les 15had to be conducted oine in a batch mode due to being very time consum-ing. We aim to investigate those scenarios where an instantaneous compliancemeasurement is valuable. In particular, compliance measurement in the

Page 159: Compliance Check

nancialindustry might eventually bene

Page 160: Compliance Check

t from this innovation, e.g., to cancel runningtransactions that exhibit non-compliant behaviour.References1. van der Aalst, W., Reijers, H., Weijters, A., van Dongen, B., de Medeiros, A., Song,M., Verbeek, H.: Business process mining: An industrial application. Inf. Syst.32(5) (2007) 713{7322. de Medeiros, A., van der Aalst, W., Weijters, A.: Quantifying process equivalencebased on observed behavior. Data Knowl. Eng. 64(1) (2008) 55{743. Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based onmonitoring real behavior. Inf. Syst. 33(1) (2008) 64{954. Glabbeek, R.: The Linear Time { Brancing Time Spectrum I. The semantics ofconcrete, sequential processes. In: Handbook of Process Algebra. Elsevier (2001)5. Valmari, A.: The state explosion problem. In: Lectures on Petri Nets I: BasicModels, Advances in Petri Nets. Volume 1491 of LNCS., Springer (1998) 429{5286. Gerke, K., Cardoso, J., Claus, A.: Measuring the compliance of processes withreference models. In: OTM Conferences (1). LNCS 5870, Springer (2009) 76{937. Weidlich, M., Mendling, J., Weske, M.: Computation of behavioural pro

Page 161: Compliance Check

les ofprocess models. Technical report, Hasso Plattner Institute (June 2009)8. Aalst, W., Weijters, A., Maruster, L.: Workow mining: Discovering process modelsfrom event logs. IEEE Trans. Knowl. Data Eng. 16(9) (2004) 1128{11429. K�uster, J.M., Gerth, C., F�orster, A., Engels, G.: Detecting and resolving processmodel di�erences in the absence of a change log. [20] 244{26010. Dijkman, R.M.: Diagnosing di�erences between business process models. [20]261{27711. Glabbeek, R., Goltz, U.: Re

Page 162: Compliance Check

nement of actions and equivalence notions for concurrentsystems. Acta Inf. 37(4/5) (2001) 229{32712. Hidders, J., Dumas, M., Aalst, W., Hofstede, A., Verelst, J.: When are two workowsthe same? In: CATS. Volume 41 of CRPIT. (2005) 3{1113. Basten, T., Aalst, W.: Inheritance of behavior. JLAP 47(2) (2001) 47{14514. Ebert, J., Engels, G.: Observable or Invocable Behaviour - You Have to Choose.Technical Report 94-38, Leiden University (December 1994)15. Schre, M., Stumptner, M.: Behavior-consistent specialization of object life cycles.ACM Trans. Softw. Eng. Methodol. 11(1) (2002) 92{14816. Wombacher, A.: Evaluation of technical measures for workow similarity based ona pilot study. In: OTM Conferences (1). LNCS 4275 (2006) 255{27217. Wombacher, A., Rozie, M.: Evaluation of workow similarity measures in servicediscovery. In: Service Oriented Electronic Commerce. LNI 80. (2006) 51{7118. Li, C., Reichert, M., Wombacher, A.: On measuring process model similarity basedon high-level change operations. In : ER. LNCS 5231 (2008) 248{26419. Dongen, B., Dijkman, R.M., Mendling, J.: Measuring similarity between businessprocess models. In: CAiSE. Volume 5074 of LNCS., Springer (2008) 450{46420. Dumas, M., Reichert, M., Shan, M., eds.: Business Process Management, 6thInternational Conference, Proceedings. Volume 5240 of LNCS, Springer (2008)