<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards a Framework for Context-Aware Resource Behaviour Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maximilian Völker</string-name>
          <email>maximilian.voelker@student.hpi.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luise Pufahl</string-name>
          <email>luise.pufahl@tu-berlin.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hasso Plattner Institute, University of Potsdam</institution>
          ,
          <addr-line>14482 Potsdam</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Software and Business Engineering</institution>
          ,
          <addr-line>Technische Universitaet Berlin, Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>5</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>For the successful and eficient execution of business processes, resources are essential. However, it is dificult to predict or plan executions appropriately, as the behaviour of resources, especially human workers, highly varies depending on the individual and the context. Although there are several metrics to describe resource behaviour in research, the reasons for their behaviour and the influence of the environment, like the workload, have been less explored. Extracting resource-related metrics from event logs and analysing them for possible relationships opens the opportunity to understand resource behaviour and improve working conditions. In this work, a framework for analysing correlations between resource behaviour and environment is motivated and briefly sketched.</p>
      </abstract>
      <kwd-group>
        <kwd>Resource Behaviour</kwd>
        <kwd>Business Processes</kwd>
        <kwd>Process Mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Resources play a crucial role for the correct execution of business processes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
and their behaviour heavily afects the overall performance of the processes they
are involved in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. But unlike machines, human resources do not show constant
behaviour at work: their working speed varies, they might batch work or are only
available part-time [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In addition, humans have diferent preferences regarding
their work-items or co-workers, which is reflected in their behaviour [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        From a temporal perspective, workers most likely change their behaviour
and preferences over time due to personal development or adjustments to a new
environment or circumstances. In the area of work psychology, for example, the
arousal, i.e. stress, of workers is recognised to be related to their performance,
known as the Yerkes-Dodson law [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        In the context of business process technology, the behaviour and decisions of
resources, as well as process-related circumstances, are incidentally captured in
event logs. Metrics like workload, processing speed, waiting times and preferences
in terms of task selection can, for example, be derived from the event log [
        <xref ref-type="bibr" rid="ref1 ref6">1, 6</xref>
        ],
provided resource information is available for tasks. However, even though many
researchers state that human resources and their behaviour greatly afect overall
process performance, there is only little research on mining and, more importantly,
understanding the behaviour of human resources in the context of the process
execution [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>In the remainder of the paper, related work regarding resource metrics is
presented in Sect. 2. Section 3 introduces the concept for a new framework for
resource behaviour analysis.
2</p>
      <p>
        Foundations
So far, several metrics to measure the behaviour and performance of human
resources have been proposed. For example, Swennen et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] introduce the
notions of Resource Frequency, Resource Involvement, and Resource Specialisation,
indicating how active resources are and in how many cases they participate. In
terms of resource behaviour, Suriadi et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] describe how to extract the queuing
discipline (bounded to FIFO, LIFO or Priority) that resources show and Martin
et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] propose an approach for detecting batching in resource behaviour. In
addition, Pika et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] provide examples for metrics in the following categories:
Skills, Utilisation, Preference, Productivity and Collaboration.
      </p>
      <p>
        Although several papers describe diferent metrics for resource behaviour,
only a few consider them in context. But former research already showed that
correlations between resource-related metrics can be found in process logs:
Nakatumba et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] confirmed the Yerkes-Dodson law by extracting the workload
and processing times from process logs and performing a regression analysis.
      </p>
      <p>
        Another exception in the context of correlating resource metrics is the
comprehensive framework developed by Pika et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]: They present an approach for
extracting time series of Resource Behaviour Indicators (RBI) from event logs
using SQL-like queries. In later work, this framework was extended to include
the aspect of the connections between resource behaviour and diferent outcomes
by including a regression analysis of their RBIs [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, there are some
points for improvements, e.g. regarding the scope and complexity of the metrics
available for analysis and the reuse or export of calculations.
3
      </p>
      <p>A Framework for Context-Aware Resource Behaviour
Analysis
Due to the limitations of existing work, we plan to develop a framework for
context-aware resource analysis with a three-step approach as shown in Fig. 1.
Metric Selection For examining the behaviour of resources not only the
analysispart plays an important role but also the metrics themselves must be considered
in detail beforehand. Metrics are measurements used to quantify performance
aspects and can be calculated from data for a point in time or time spans. In
the context of resources and processes, examples are the number of activities a
resource is working on, or how many activities are assigned to a resource but
have not yet been started.
The framework will include, but not be
limited to, a collection of resource-related
metrics from the literature. To guide
the selection of metrics for analysis, we
will furthermore classify them into
environmental metrics (influencing behaviour)
and behavioural metrics (expressing
behaviour), which should support more
targeted and meaningful analyses. Additionally,
the framework will not be limited to directly
Fig. 1. Framework Steps resource-related metrics, since case-related
or event-related information, such as the
case duration or the time of day, may also
have an efect on the behaviour or decisions of resources and will therefore be
available for analysis as well.</p>
      <p>Each metric comes with its own extraction logic and imposes, often
implicitly, certain requirements on the data set, such as certain attributes or
metainformation needed for computation. However, requirements for the process log
are often not mentioned in literature. Besides these demands, metrics can also
have diferent calculation techniques that difer in their requirements and quality
based on assumptions. The processing time, for example, could be extracted
by taking the timestamps of start and end events into account, or the required
time is specified directly in the log as an attribute. Some logs may even lack this
information, but an estimation of processing times could still be made, e.g. by
considering the subsequent event and assuming waiting times. The framework
for computing such metrics should therefore be aware of these variations and
prerequisites and be extendable with new metrics and calculation techniques.
This allows for a flexible and general application on a wide range of event log
variants.</p>
      <p>Correlation Analyses After the metric-computation, correlation analysis can be
used to determine if there is a relationship between them. By automatically
executing the analyses for selected metrics, the framework is able to reveal
interesting insights for further manual investigation. For this, the separation
into environmental metrics and behavioural metrics might help to detect more
relevant results, as it indicates the direction of possible causalities.</p>
      <p>To enable future research based on resource behaviour, the data and time
series calculated by the framework should be exportable, e.g. by enriching the
process log with new data and attributes, such as the workload or the current
work prioritisation pattern. This would facilitate further processing of the data
series, e.g. with techniques from the field of machine learning. The resulting
models could be used not only to anticipate the resources’ reactions to impending
environmental changes but also to achieve a more powerful and realistic process
simulation regarding resources.
Visualisation The visualisation component plays an important role as it is used
to communicate the outcome of the analysis. On the one hand, it should include
the resulting numbers and graphs for a comprehensive evaluation by experts; on
the other hand, the visualisation should quickly point out interesting findings
and provide assistance in interpreting the results.</p>
      <p>The concept for a new framework for analysing resource behaviour based on event
logs as presented in this paper suggests and encourages further research on this
topic. There are several points for future work, including a comprehensive and
practical overview of resource-related metrics or new possibilities to combine and
analyse metrics, also with regard to other research areas, such as psychology.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bidar</surname>
          </string-name>
          , R., ter
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sindhgatta</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ouyang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Preference-based resource and task allocation in business process automation</article-title>
          . In: Panetto,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Debruyne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Hepp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Ardagna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            ,
            <surname>Meersman</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.) On the Move to Meaningful
          <source>Internet Systems: OTM 2019 Conferences, Lecture Notes in Computer Science</source>
          , vol.
          <volume>11877</volume>
          , pp.
          <fpage>404</fpage>
          -
          <lpage>421</lpage>
          . Springer, Cham (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cabanillas</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Process- and resource-aware information systems</article-title>
          . In: Matthes,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          , Rinderle-Ma, S. (eds.)
          <source>2016 IEEE 20th International Enterprise Distributed Object Computing Conference (EDOC)</source>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . IEEE, Piscataway, NJ (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swennen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Depaire</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jans</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caris</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanhoof</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Retrieving batch organisation of work insights from event logs</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>100</volume>
          ,
          <fpage>119</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Nakatumba</surname>
            , J., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Analyzing resource behavior using process mining</article-title>
          . In: Rinderle-Ma,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Leymann</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.)
          <source>Business Process Management Workshops, Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>43</volume>
          , pp.
          <fpage>69</fpage>
          -
          <lpage>80</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Pika</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leyer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          , ter
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Mining resource profiles from event logs</article-title>
          .
          <source>ACM Transactions on Management Information Systems (TMIS) 8</source>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Pika</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          , ter
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leyer</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.:</given-names>
          </string-name>
          <article-title>An extensible framework for analysing resource behaviour using event logs</article-title>
          . In: Jarke,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Quix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Rolland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Manolopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Mouratidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Horkof</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Advanced Information Systems Engineering. Lecture Notes in Computer Science</source>
          , vol.
          <volume>8484</volume>
          , pp.
          <fpage>564</fpage>
          -
          <lpage>579</lpage>
          . Springer, Cham (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Suriadi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
          </string-name>
          , M.T.,
          <string-name>
            <surname>Xu</surname>
            , J., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A.H.M.:</given-names>
          </string-name>
          <article-title>Discovering work prioritisation patterns from event logs</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>100</volume>
          ,
          <fpage>77</fpage>
          -
          <lpage>92</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Swennen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Janssenswillen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jans</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Depaire</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caris</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanhoof</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Capturing resource behaviour from event logs</article-title>
          . In: Ceravolo,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Guetl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Rinderle-Ma</surname>
          </string-name>
          , S. (eds.)
          <source>Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA</source>
          <year>2016</year>
          ). pp.
          <fpage>130</fpage>
          -
          <lpage>134</lpage>
          . CEUR Workshop Proceedings, RWTH Aachen, Aachen, Germany (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakatumba</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rozinat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russell</surname>
          </string-name>
          , N.:
          <article-title>Business process simulation</article-title>
          . In: vom Brocke, J.,
          <string-name>
            <surname>Rosemann</surname>
          </string-name>
          , M. (eds.)
          <source>Handbook on Business Process Management 1</source>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>338</lpage>
          .
          <source>International Handbooks on Information Systems</source>
          , Springer, Berlin, Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Wickens</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hollands</surname>
            ,
            <given-names>J.G.</given-names>
          </string-name>
          :
          <article-title>Engineering psychology and human performance. Prentice-Hall, Upper Saddle River</article-title>
          , NJ,
          <volume>3</volume>
          <fpage>edn</fpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>