<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>  Analysing  Volvo  IT  Belgium       Incident-­‐  and  Problem  Management   Data  Using  Automated  Business   Process  Discovery  </article-title>
      </title-group>
      <abstract>
        <p>I     nternational  Business  Pro cess  Intelligence  2013  Competition  </p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Author:  
 
Date:    
 
Address:  
   
   
   
 </p>
      <p>John  Hansen,  ChangeGroup  Partner  
1st  July  2013  </p>
    </sec>
    <sec id="sec-2">
      <title>Introduction  </title>
      <p> 
The  purpose  of  this  document  is  to  answer  the  questions  raised  by  Volvo  IT  Belgium  
in  the  International  Business  Process  Intelligence  2013  competition.  The  scope  of  
this  analysis  is  the  questions  raised  (described  in  the  “Issues  To  Be  Solved”  section).  
Volvo  IT  Belgium  has  provided  live  data  files  with  logged  information  from  their  
incident  management  and  problem  management  system  VINST.  Furthermore  a  
manual  for  the  VINST  system  and  a  description  of  the  issues  to  solve  has  been  
provided.  
 </p>
      <sec id="sec-2-1">
        <title>Tools  Used  </title>
        <p> 
In  order  to  solve  the  case  the  following  tools  has  been  user:  
 
•
•
•
•</p>
        <p>Enterprise  Archictect  9.1  (Sparx  Systems)  
Disco  1.3.0  (Fluxicon)  
Excel  (Microsoft  Excel  for  Mac  2011)  </p>
        <p>Word  (Microsoft  Word  for  Mac  2011)  
 
 
1. Importing  log  files  into  Disco  
2. Auto-­‐generating  As-­‐Is  processes  using  Disco  
3. Getting  to  know  the  process  –  analysing  As-­‐Is  processes  in  Disco,  and  
documenting  the  As-­‐Is  processes  in  BPMN  using  ChangeGroup  Business  
Process  approach  to  ensure  traceability  and  familiarity  with  the  process  
4. Verifying  that  manual  process  discovery  was  not  needed  in  order  to  answer  
the  questions  in  scope  
5. Performing  business  process  mining  and  discovery  using  Disco  analysis  and  </p>
        <p>Excel  
 </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Getting  To  Know  The  Process  </title>
      <p> 
In  order  to  getting  to  know  the  process  automatic  process  discovery  has  been  used  
(by  using  Disco).    This  excludes  manual  processes  such  as  for  example  Event  
Management  or  “Updating  the  knowledgebase”  during  problem  management.    
 
The  identified  process  has  been  diagrammed  using  our  team’s  normal  approach  
using  BPMN  notation  –  the  reason  for  this  and  the  business  process  documentation  
is  outlined  in  Appendix1.  
 
 
 </p>
    </sec>
    <sec id="sec-4">
      <title>Issues  To  Be  Solved  </title>
      <p> </p>
      <sec id="sec-4-1">
        <title>Push  To  Front  –  Issue  </title>
        <p> </p>
      </sec>
      <sec id="sec-4-2">
        <title>Push  To  Front  Issue    -­‐  Description  </title>
        <p> 
When  an  incident  is  raised,  at  first,  the  service  desk  captures  it.  If  the  incident  can  
not  be  resolved  by  the  1st  line  support  teams  (mainly  service  desk)  the  incident  is  
escalated  to  2nd  line  and  3rd  line  support  teams.  
 
The  goal  of  the  incident  management  process  is  to  solve  the  incidents,  or  at  least  
most  of  the  incidents  by  the  first  level  support  (teams  mainly  in  the  Service  Desk).  If  
this  strategy  is  followed  the  handling  of  incidents  will  be  much  more  efficient.    
 
 
The  “push  to  front”  works  if  the  1st  line  support  team  can  set  the  SR  to  resolve  
without  interference  of  a  2nd  or  a  3rd  line  support  team.  
 
The  following  questions  are  raised  by  the  client  and  will  be  handled  in  the  “Push  To  
Front  Analysis”  section:  
 
1) For  what  products  is  the  push  to  front  mechanism  most  used  and  where  not?  </p>
        <p>The  product  information  is  available  in  the  ’corrected  structure’  field    
2) Where  in  the  organisation  is  the  push  to  front  process  most  implemented  
(field  =involved  organisation),  specifcally  if  we  compare  the  Org  line  A2  with  
the  Org  line  C    
3) What  functions  are  most  in  line  with  the  push  to  front  process?    
 </p>
      </sec>
      <sec id="sec-4-3">
        <title>Push  To  Front  -­‐  Analysis  </title>
        <p> 
Ad  1)  
 
The  incidents  have  been  filtered  so  that  only  incidents  resolved  by  1st  line  support  
are  kept  in  scope.  
 
Furthermore  incident  cases  that  involves  2nd  or  3rd  line  support  teams  are  excluded  
from  the  analysis.    
 
So,  As  it  can  be  seen  from  the  illustration  below  40%  (3012  cases)  of  all  cases  
resolved  by  1st  level  support  have  involved  2nd  or  3rd  line  support  at  some  point  in  
the  incident  management  process  –  which  represents  a  “push-­‐to-­‐front”  behaviour.  
 
 
At  first  sight,  it  seems  like  especially  PROD424  is  involved  in  “Push  To  Front”.  
 
The  Top  products  not  being  involved  in  “Push  To  Front”  based  on  relative  event  
frequency  are  outlined  below.    
 
 
 
6  
 
Even  though  Org  Line  C  is  most  represented  in  the  “Push-­‐To-­‐Front”  then  relatively  
seen  Org  Line  A2  is  more  likely  to  do  “Push-­‐To-­‐Front”.  
 
 
Ad  3)  
 
The  teams  most  involved  in  “Push  To  Front”  process  based  on  event  frequency  
involvement  in  the  “push  to  front”  cases,  where  an  event  is  directly  followed  by  an  
event  in  a  2nd  or  a  3rd  line  support  team,  are  outlined  below:  
 
 
Notice  that  in  this  statistic  the  team  receiving  and  completing  the  event  without  
doing  any  push-­‐to-­‐front  will  also  be  “punished”  however,  it  seems  like  all-­‐other-­‐
things-­‐equal  that  this  gives  the  right  picture.  
 
A  next-­‐step  action  analyses  could  be  done  in  order  to  filter  out  those  events  
followed  directly  by  the  Level2  Completed  process.  
 
When  this  is  not  done  here,  it  is  mainly  because  it  is  “dangerous”  in  any  way  to  jump  
to  conclusions    -­‐  for  example,  it  could  be  that  a  team  receiving  an  incident  from  
another  team  is  simply  sending  back  the  incident  to  the  sender  in  order  to  stop  this  
“push  to  front”  behaviour.  That  action  will  statistically  be  punished  even  though  it  is  
a  good  action.  
 
Therefore  it  has  been  decided  that  the  analysis  given  is  a  true  all-­‐other-­‐things-­‐equal  
picture.  
 
Push  To  Front  -­‐  Conclusion  
 
23,15%  of  all  incidents  runs  through  3  core  processes,  as  illustrated  below,  which  is  
where  calls  are  closed  immediately  in  the  call.  
 
 
 
 
 
However,  “Push  To  Front”  is  an  issue.    
 
 
40%  (3012  cases)  of  all  cases  resolved  by  1st  level  support  have  involved  2nd  or  3rd  
line  support  at  some  point  in  the  incident  management  process.  Since  those  40%  
cases  bounces  back  to  1st  line  support  it  could  indicate  that  the  2nd  and  3rd    line  
support  are  involved  too  early.  
 
 
It  seems  like  PROD424  is  much  involved  in  “Push  To  Front”.  However,  there  is  not  a  
clear  pattern  that  a  certain  Product  is  more  likely  to  involve  “Push-­‐To-­‐Front”.  
 
Even  though  Org  Line  C  is  most  represented  in  the  “Push-­‐To-­‐Front”  then  relatively  
seen  Org  Line  A2  is  more  likely  to  do  “Push-­‐To-­‐Front”.  
 
 
 </p>
      </sec>
      <sec id="sec-4-4">
        <title>Ping  Pong  Behaviour  –  Issue  </title>
        <p> </p>
      </sec>
      <sec id="sec-4-5">
        <title>Ping  Pong  Behaviour  –  Description  </title>
        <p> 
In  an  ideal  world  an  incident  is  solved  quick  and  with  interference  of  not  too  many  
support  teams.  However,  it  occurs  that  support  teams  start  to  send  incidents  to  each  
other  again  and  again  (ping  pong)  which  off  course  is  an  unwanted  situation.  There  is  
definitely  a  correlation  between  the  ping  pong  behaviour  and  the  total  life  time  of  an  
incident.    
 
The  following  questions  are  raised  by  the  client  and  will  be  handled  in  the  “Ping  Pong  
Behaviour  Analysis”  section:  
 
 
1) What  are  the  functions,  organisation,  support  teams  responsible  for  most  of  
the  “ping  pong”?    
2) What  products  are  most  affected  by  it?    
1. Support  Teams  are  identified  by  column  “org:group”  
2. Only  Use  Cases  involving  a  sequence  of  events  where  more  than  1  support  
team  is  involved  potentially  have  “ping  pong”  behaviour  
3. Only  Use  Cases  involving  6  or  more  events  is  potentially  having  “ping  pong”  
behaviour.  With  fewer  than  6  events  it  is  unlikely  that  more  than  two  support  
teams  are  involved  and  therefore  no  “ping  pong”  behaviour  applies.  
4. Only  when  an  event  is  of  the  type  “Accepted  –  In  Progress”,  Accepted  –  
Assigned”,  or  “Queued  –  Awaiting  Assignment”  it  is  a  potential  “ping  pong”  
action.  The  reasoning  behind  is  that  if  the  event  is  from  proves  level2  
“Completed”  the  support  team  handling  the  “Completed  process  is  not,  in  
that  instance,  participating  in  “ping  pong”  behaviour,  but  is  actually  handling  
the  incident  or  problem.  
5. Those  organisation  units  most  involved  in  events  after  filtering  out  cases  and  
events  as  specified  in  bullet  1  –  bullet  4  are  most  likely  to  be  participation  in  
“ping  pong”  behaviour.  
6. Incidents  reassigned  to  another  person  within  the  same  team,  is  not  
considered  “ping  pong”  but  just  a  way  of  levelling  the  work  load.  
7. Problems  (both  open  and  closed)  are  not  continued  from  Incidents  regarding  
“ping  pong”  behaviour.  Meaning  if  an  Incident  is  not  identified  as  “ping  pong”  
behaviour,  it  does  not  become  a  “ping  pong”  behaviour  based  on  the  incident  
being  transferred  to  Problem  Management.  When  an  incident  is  transferred  
to  Problem  Management  the  Incident  Management  process  is  ended.  
Ad  1)    
 
The  process  diagram  below  is  the  filtered  Incidents  process  (filtered  according  to  
bullet  1  –  bullet  4).  The  process  diagram  illustrates  where  the  “ping  pong”  behaviour  
is  involved.  The  “ping  pong”  behaviour  is  especially  introduced  by;  queuing  and  
reassigning  the  incident  to  another  team  or  by  assigning  the  incident  to  another  
Support  Line.  
 
 
 
 
 
 
 
 
 
 
Another  thing  to  consider  is  that  sending  an  issue  from  one  support  level  up  to  the  
next  support  level  is  not  necessarily  a  bad  thing  (e.g.  sending  an  Incident  from  
Support  Line  1  to  Support  Line  2,  because  escalation  might  be  needed  in  order  to  
close  the  Incident.  However,  that  action  will  be  punished  in  this  analysis.  
 
It  has  been  decided  that  this  is  not  changing  the  observations  and  conclusions  –  
basically  because,  as  it  can  be  seen  from  the  figure  below,  the  majority  of  Incidents  
involved  in  “ping  pong”  behaviour  are  low  or  medium  Incidents.  This  tells  that  it  is  
probably  the  easy  Incidents  that  are  “ping  pong’ed”  and  those  should  really  be  
closed  right  away  by  the  Support  Team  receiving  it  .  Furthermore,  it  seems  like  the  
Incidents  that  should  or  could  be  escalated  (the  high  impact  Incidents)  are  in  fact  not  
involved  very  much  in  “ping  pong”  behaviour.  
 
 
 
Ad  1)  –  Open  Problems  
 
Only  2%  of  the  Open  Problem  cases  involve  “ping  pong”  behaviour.  As  illustrated  in  
the  figure  below  the  “ping  pong”  process  is  basically  around  the  process  “Queued  –  
Awaiting  Assignment”.  
 
 
The  “ping  pong”  behaviour  is  so  low  in  Open  Problem  that  it  does  not  seem  to  be  an  
issue.  Overall,  it  seems  like  the  Open  Problems  are  handled  correct  according  to  the  
intended  process.  
 
 
Ad  2)  “Ping  pong”  Behaviour  Divided  On  Products  
 
Since  the  “ping  pong”  behaviour  is  only  an  issue  in  the  Incident  Management  
process,  the  analysis  on  what  products  are  most  involved  in  “ping  pong”  behaviour  is  
performed  on  Incidents  only.  
 
 
 
 
 
 </p>
      </sec>
      <sec id="sec-4-6">
        <title>Wait  User  -­‐  Issue  </title>
        <p>Wait  user  -­‐  Knowing  that  there  is  a  lot  of  KPI’s  measuring  the  total  resolution  time  of  
an  incident  people  tries  to  find  workarounds  that  stop  the  clock  from  ticking.  One  
way  of  doing  this  is  manually  giving  an  incident  the  substatus  ’wait  user’.  Allthough  
there  are  guidelines  not  to  use  this  substatus  (unless  someone  is  really  waiting  for  an  
enduser  of  course),  some  people  (action  owners)  are  breaking  this  guideline.    
 
 
The  following  questions  are  raised  by  the  client  and  will  be  handled  in  the  “Wait  
User  Analysis”  section:  
 
1) Who  is  making  most  use  of  this  substatus  (action  owner)?    
2) What  is  the  behaviour  per  support  team,  function,  organisation  etc?    
3) (mis)-­‐usage  per  location?    
 
Assumption:  Wait-­‐User  should  only  be  used  by  system  generated  (by  “Siebel”)  
issues,  because  those  issues  are  just  raised  and  waiting  for  user  action  and  to  be  
handled.  
 
33%  of  the  Incidents  cases  involve  one  or  more  events  of  “Accept  –  Wait  User”  
where  the  event  is  not  registered  by  the  system  (Siebel).  
 </p>
        <p> 
Figure  16  -­‐  Incidents  "Accept  -­‐  Wait  User"  Not  Set  By  the  System  (Siebel)  
 
An  interesting  observation  is  that  the  High  impact  cases  are  not  frequently  having  
Wait-­‐User  abuse  (see  figure  below).  This  indicates  that  the  Wait-­‐User  is  indeed  used  
as  an  abuse  in  order  to  stop  the  clock,  because  a  real  usage  for  “Wait-­‐User”  added  
from  the  action  owner  –  for  example  asking  for  more  background  information  –  
would  probably  be  more  relevant  for  High  impact  cases  than  for  Low  and  Medium  
impact  cases.  
 
 
Ad  1)  
 
 
In  the  figure  below  the  usage  and  abuse  of  “Wait-­‐User”  is  outlined  based  on  
Resource  Country.  From  that  overview  it  seems  like  Sweden,  Poland,  and  India  are  
most  likely  to  abuse  the  “Wait-­‐User”  status.  However,  from  looking  at  the  table  
below  the  figure  where  the  “wait-­‐user”  abuse  is  related  to  the  relative  involvement  
from  the  country  it  is  obvious  that  Sweden  is  high  on  the  list  because  Sweden  is  
involved  in  many  cases  in  the  first  place,  and  therefore  are  involved  in  many  “Wait-­‐
user”  abuses  –  but  Thailand  and  India  are  actually  doing  more  “wait-­‐user”  abuse  
relatively  seen.  
 
 
 
 
 
 
 
 
 
 
 
Figure  19  -­‐    The  18  Teams  Most  Involved  In  "Wait-­‐User"  Incident  Management  Abuse  Are  Registered  For  63,4%  
Of  The  Events  
 
 
 
 
 
 
 </p>
      </sec>
      <sec id="sec-4-7">
        <title>Process  conformity  per  organisation  -­‐  Issue  </title>
        <p> 
The  following  question  is  raised  by  the  client  and  will  be  handled  in  the  “Process  
Conformity  Analysis”  section:  
 
In  general  the  Volvo  IT  organisation  is  spread  in  two  organisations  :  Org  line  A2  and  
Org  line  C.  It  would  be  interesting  to  see  how  conform  or  how  much  in  line  every  
organisation  is  with  the  incident  and  problem  management  processes.  
19  
 
 
 
 
 </p>
      </sec>
      <sec id="sec-4-8">
        <title>Process  conformity  per  organisation  –  Analysis  </title>
        <p> 
 
Conformity  With  Incident  Management  Process  
 
The  main  process  for  Incident  Management  is  outlined  in  “Incidents  Management  
1.0  Level2”  where  Level  2  is  outlined  and  in  the  diagram  below  where  the  events  has  
been  filtered  to  exclude  unwanted  process  flows:  Queuing  and  “Ping  pong”  
behaviour.  
 
Figure  25  -­‐  Incidents  Management  Main  Process  Flow  
 
30%  of  the  Incidents  Management  cases  follow  the  main  process  flow.  
 
 
Figure  26  -­‐  Incidents  Management  -­‐  Organisations  Following  The  Main  Process  
Conformity  With  Problem  Management  Process  
 
The  main  process  for  Problem  Management  is  outlined  in  “Incidents  Management  
1.0  Level2”  where  Level  2  is  outlined  and  in  the  diagram  below  where  the  events  has  
been  filtered  to  exclude  unwanted  process  flows:  Queuing  and  “Ping  pong”  
behaviour.  
 
 
Figure  28  -­‐  Problem  Management  Main  Process  
 
46%  of  the  cases  follow  the  Problem  Management  Main  Process.  As  it  can  be  seen  
from  the  two  figures  below  Org  Line  C  seems  to  be  most  in  line  with  the  Problem  
Management  process.  
 
 
 
                                                                                                              
1  http://www.bpmn.org  
2  http://en.wikipedia.org/wiki/Value_chain  
3  http://www.uml.org  
 
    
    
 
25  
 
 
26  
 
 
 
 
29  </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>