<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>MLA: A Tool for Multi-Perspective Conformance Checking of Business Processes (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>1st Azadeh Sadat Mozafari Mehr</string-name>
          <email>a.s.mozafarimehr@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>2nd Renata M. de Carvalho</string-name>
          <email>r.carvalho@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>3rd Boudewijn van Dongen</string-name>
          <email>b.f.v.dongen@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Mathematics and Computer Science, Eindhoven University of Technology</institution>
          ,
          <addr-line>Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <abstract>
        <p>-Existing conformance checking techniques focus more on the control-flow perspective rather than other aspects in a business process. This may induce misleading diagnostics. In this paper, we introduce MLA tool for multi-perspective conformance checking. In addition to control-flow, MLA brings data and privacy perspectives' impact into conformance analysis to identify all intra- and inter-layer violations. Moreover, the tool can visualize the context in which data is processed and identify where data have been processed for unclear or secondary purposes by an authorised role. The tool has been implemented in the ProM framework. The provided user interface and graphical outputs make interpreting the conformance result simple. Index Terms-Process Mining, Multi-layer Alignment, Data privacy, Conformance Checking, Multi-perspective Analysis</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Process mining supports the analysis of business processes
by extracting knowledge from event logs that are available
in today’s information systems. Process mining techniques
and algorithms are categorized as three main types including
discovery, conformance checking, and enhancement. The work
presented in this paper belongs to the conformance checking
domain as it computes to what extent the executed
behavior conforms to the expected/modeled one. All conformance
checking techniques currently available in the literature [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]–
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] are control-flow based approaches which give the priority
to this aspect while ignoring (or giving less priority to)
other important perspectives of the process like data and
privacy policies. Consequently, some important deviations may
remain undetected or diagnosed incorrectly [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Therefore,
efficient and fully integrated multi-perspective conformance
checking techniques are still missing. Recently, this lack was
highlighted when data privacy regulations like GDPR1 and
HIPAA2 were introduced. According to these regulations,
organizations are required to take the data and privacy
perspectives into account while analysing their processes.
      </p>
      <p>
        The tool presented in this paper is developed in order
to fill the aforementioned gap by applying the novel
multiperspective conformance checking technique discussed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Such technique brings data and privacy policy aspects into
conformance analysis as well as the control-flow point of view
without giving priority to one perspective.
      </p>
      <p>1https://gdpr-info.eu/
2https://www.hhs.gov/hipaa/</p>
      <p>The main functionalities of the tool will be discussed in
Section 2. Section 3 outlines the maturity and availability of
the tool, and Section 4 concludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>II. DESCRIPTION OF MAIN FUNCTIONALITIES</title>
      <p>
        The MLA tool is the result of our novel approach for
multiperspective conformance checking [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It takes as inputs: a
process model with role information, a data model, an
organisational model, a process log, and a data log. Then, it computes
multi-layer alignments between the process, data, and privacy
policy aspects and provides operational insights by reporting
the deviations of each layer as well as hidden violations
between these three aspects.Figures 1 and 2 illustrate the user
interface of MLA tool applied to an example process and data
event logs extracted from a healthcare treatment process.
      </p>
      <sec id="sec-2-1">
        <title>A. Multi-perspective conformance checking</title>
        <p>The multi-perspective conformance checking results is
presented by “Projection to Process Log” visualization depicted in
Fig.1. It facilitates observing the violations of each perspective
in an overall view per trace as well as providing detailed
information on each trace event. As shown in Fig.1, by linking
the privacy, data and process layers, it allows analysts to
detect missing behaviors (highlighted red/white shapes) and
unexpected behaviors (red shapes) related to each perspective
in addition to fully conformed activities and data operations
executed by legitimate roles (green shapes) during the process.
Moreover, the tool provides high-level behavioral patterns of
hidden deviations where non-conformity relates to either a
combination of two or all three aspects of a business process.
For instance, in the health care treatment process, during each
visit, doctors are expected to add a prescription or treatment
plan to the patient’s medical history. A doctor may negligently
forget to update it. This missing data operation may cause
other doctors to prescribe an incompatible drug to the patient.
Such missing data operations could impact care quality or
cause serious health problems to the patient. This scenario
implies that it is important to check executed behavior in both
process and data layer. Since MLA considers both aspects
in the conformance analysis, in this case, from control-flow
perspective it reports no violation while in the data perspective
the tool is able to report missing data operation violations.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Monitoring the purpose of data processing</title>
        <p>Fig.2 shows another visualization which is available in the
MLA tool as “Projection to Data Log”. This visualization
was implemented to indicate the violations related to the
data layer specifically. MLA is able to detect four kinds of
important data layer deviations such as executed data operation
by an illegitimate role, unexpected, ignored and missing data
operations. Furthermore, this visualisation provides the answer
to the important privacy rule, “who performed which data
operation for which purpose?” by indicating the context of
each data operation executed during a business process. By
leveraging the reconciled view of the three data, process
and privacy perspectives, it can detect and mark which data
operations were executed with unclear or secondary purposes.
Moreover, MLA can detect violations of data privacy where
data was accessed by an authorised user in the system but
with an illegitimate role in the process. As an example, in the
treatment process several roles like doctors, nurses, and lab
experts are allowed to access sensitive data of the patients,
such as medical history and test results. A curious actor may
exploit his/her privilege in order to use the information of
patients for personal or financial gain. MLA can detect such
scenarios that violate individual’s data privacy.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>III. AVAILABILITY AND MATURITY</title>
      <p>MLA is developed in JAVA and implemented in the
open source ProM framework (available in ProM 6.11
release3). Sample of inputs, tool manual including
description of all functionalities and inputs, a screen cast, and
the source code are available in a GitHub repository:
https://github.com/AzadehMozafariMehr/MLATool.</p>
      <p>
        The MLA tool was developed to support the concepts
provided by the approach disscussed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for multi-perspective
conformance checking. The approach in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] was evaluated
through controlled experiments. Using CPN tools4, we
simulated a healthcare treatment process and generated process and
data logs with real-life complexity (e.g. loops and considerable
trace length). The approach was evaluated through 8
experiments as described in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Overall, the experiments show high
precision and recall. The results implied that the tool can deal
with the real-life complexity and is able to detect all deviations
that happened in one, two, or all three process perspectives
combined (control-flow, data and privacy policy). It has been
also applied for multi-perspective conformance analysis of a
real-life lead management process in the industry.
      </p>
    </sec>
    <sec id="sec-4">
      <title>IV. CONCLUSION</title>
      <p>In this paper, we introduced MLA tool to support
multiperspective conformance checking of business processes.
Using MLA, the user can investigate the process from three
aspects of process control-flow, data and privacy policy (role
allocation). The provided user interface and the graphical
outputs make it simple to interpret the conformance results.
MLA allows the user to identify the violations that cannot
be detected by taking into consideration only one or two
perspectives of a business process. Thus, it can provide more
accurate diagnostics of deviations than control-flow based
conformance checking tools. Moreover, by reconciling the
process, data and privacy aspects, MLA can detect spurious
data access and identify privacy infringements where data
have been processed for unclear or secondary purposes by an
authorised role. As a future plan, for improving the usability
of the tool, we are considering adding some features that allow
users to filter the process instances with specific deviations.</p>
    </sec>
    <sec id="sec-5">
      <title>ACKNOWLEDGMENT</title>
      <p>The author has received funding within the BPR4GDPR
project from the European Union’s Horizon 2020 research and
innovation programme under grant agreement No 787149.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Adriansyah</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          .,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Towards robust conformance checking</article-title>
          . In: zur Muehlen,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.) Business Process Management Workshops. pp.
          <fpage>122</fpage>
          -
          <lpage>133</lpage>
          . Springer Berlin Heidelberg, Berlin, Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Alizadeh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zannone</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Linking data and process perspectives for conformance analysis</article-title>
          .
          <source>Computers and Security</source>
          <volume>73</volume>
          ,
          <fpage>172</fpage>
          -
          <lpage>193</lpage>
          (
          <year>Mar 2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>de Leoni</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Aligning event logs and process models for multi-perspective conformance checking: An approach based on integer linear programming</article-title>
          .
          <source>In: Business Process Management</source>
          . pp.
          <fpage>113</fpage>
          -
          <lpage>129</lpage>
          . Springer Berlin Heidelberg, Berlin, Heidelberg (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Mannhardt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Leoni, de, M.,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Aalst, van der, W.:
          <article-title>Balanced multi-perspective checking of process conformance</article-title>
          .
          <source>BPMcenter</source>
          . org (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Mozafari</given-names>
            <surname>Mehr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.S.</given-names>
            , de Carvalho, R.M.,
            <surname>van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Detecting privacy, data and control-flow deviations in business processes</article-title>
          . In: Nurcan,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Korthaus</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Intelligent Information Systems</source>
          . pp.
          <fpage>82</fpage>
          -
          <lpage>91</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>