<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ex-Post Identification of Task Models With Causally Ordered User Interface Logs (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dominic A. Neu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Systems, Saarland University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>46</fpage>
      <lpage>50</lpage>
      <abstract>
        <p>Identifying adequate back-ofice tasks to automate is a significant problem in adopting robotic process automation. Task mining on user interface logs enables departments to detect the underlying task model, but creating these logs is time and resource-consuming. Furthermore, contrary to process mining logs that can be extracted in an ex-post fashion from ERP systems, user interface logs require definitions prior to the recording: abstract activities and mapping to lower-level user interface interactions need to be specified beforehand. To this end, the presented research project proposes a new framework for desktop activity mining that enables interaction recording prior to defining tasks and activities to be mined.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;task mining</kwd>
        <kwd>causal logs</kwd>
        <kwd>object-centric UI log</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and Motivation</title>
      <p>
        Through the advent of Robotic Process Automation, the boundaries of
automationcapable business processes have shifted [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Robotic Process Automation operates on
the user interface of enterprise software. Therefore, integrating systems through the
existing user interface eliminates the need for separate integration APIs. Furthermore, the
visual modelling environment provided by RPA providers enabled departments to start
their automation projects without the involvement of the IT department or professional
programmers. Moreover, recent advances in artificial intelligence expanded the scope of
tasks a computer can take over.
      </p>
      <p>While visual modelling tools enable departments to build custom RPA bots, the
technical feasibility assessment poses a significant challenge. The dificulty arises from a
lack of experience and technical background compared to dedicated automation experts
in IT departments. On the other hand, automation experts do not know the department’s
daily tasks and, therefore, can not propose feasible tasks by themselves. Ultimately, tasks
to automate can only be found through intensive exchange between both departments,
which requires time and resources.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement and state-of-the-art</title>
      <p>
        The research field around Robotic Process Automation recognises this problem of
identifying adequate tasks for automation. From the managerial perspective, researchers
propose quantified measurements to compare potential candidates in terms of
automationcapability and profitability [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Whereas the works of [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7 ref8">4, 5, 6, 7, 8</xref>
        ] leverage insights
from process mining to discover potential task models from user interface logs.
      </p>
      <p>
        Unfortunately, much information about the task executions (or cases) is not directly
available in real live scenarios [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. However, this information is necessary to calculate
the previously proposed measurements and apply the process mining algorithms. One
way to get around this limitation is to have employees estimate the values of essential
criteria, such as the number of exceptional cases or the execution time.
      </p>
      <p>
        Another possibility is recording user interface interactions and manually enriching
the log. For example, in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the log is segmented implicitly into traces by the
user when he starts and stops the recording. Additionally, the user abstracts events to
activities with tool support.
      </p>
      <p>
        The approach in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] solves the segmentation task by building a dominator tree from the
directly-follows-graph (DFG). An integral part of the DFG approach is the automated
mapping of events to more abstract activities through additional UI information, such
as the button name or application-specific parameters. For this, the solution requires
application-specific add-ons and the log to contain only events from one task.
      </p>
      <p>
        In conclusion, the automatic identification and segmentation of task executions from
real-life logs remain one of the leading research challenges [
        <xref ref-type="bibr" rid="ref6 ref9">6, 9</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed approach and methodology</title>
      <p>Therefore, this research project proposes a new approach to recording user interaction
events in advance without the knowledge of any potential task candidate. This way, an
employee can record all interactions of his/her daily tasks into one log. This log can then
be used afterwards to mine models of tasks contained within the log. This is diferent to
current works, where each log is recorded explicitly to mine one specific task model.</p>
      <p>
        This project builds upon the work of [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to leverage additional UI element properties
for automatically mapping events to activities. However, instead of recording events
within the applications through add-ons, the author proposes using the
applicationgeneric Microsoft User Interface Automation API (MS-UIA), which ofers many insightful
properties. Furthermore, to tackle the problem of a proper case distinction, the author
proposes to transfer the object-centric approach from process mining to UI logs [10] as
user interaction events may be related to UI elements and data objects.
      </p>
      <p>The first part of this project will include recognising diferent instantiations of UI
elements and data objects. Next, these objects are mapped to more abstract classes of
objects by utilising properties provided by the MS-UIA, like the UI element name or the
unique AutomationID.</p>
      <p>As an extension to the reference model for UI logs presented in [11], this work provides
semantically enriched relations between interaction events and UI objects, such as creates,
requires, changes, destroys. The semantics will create precedence order relations between
events independent of the user’s fixed but arbitrary chronological order, thereby revealing
the half order prescribed by the application. This half-order over events simplifies the
detection of recurrent patterns in the log since the relations can be interpreted as causal
connections.</p>
      <p>The next part is concerned with good algorithms for log clipping. log clipping is a new
step in task mining projects concerned with the proper outline of events relevant to the
task of interest. The author proposes using minimal domain knowledge in an iterative
procedure to dissociate events. The algorithm leverages that events of one task are likely
to form a connected component with respect to the causal relations mentioned above.
Accordingly, the domain knowledge needs only to specify one distinctive event of the task.
Then, a traversal through the causal relationships provides the remaining relevant events.</p>
      <p>The final model discovery will apply state-of-the-art object-centric DFG algorithms to
extract the underlying task model [12]. Developing a specialised mining algorithm for
the new type of UI log is not part of this project.</p>
      <p>The solution approach mentioned above can be broken down into three main research
questions:
• How can the information provided by the user interface be leveraged to identify UI
element objects and data objects
• What information can be exploited to automatically map instantiations of UI
element objects to more abstract object classes
• How can user interactions be correlated to the objects they create, require, change
or destroy</p>
      <p>
        An evaluation measures the UI log generation’s feasibility, efectiveness and robustness.
This includes a quantitative assessment of precision and recall of interactions against
hand-created task models. During prototyping, the author will generate logs, replaying
commonly used automation tasks from the existing literature (like transferring data from
a spreadsheet to a web form [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]).
      </p>
      <p>For robustness in real-life scenarios, a case study within a medium-sized company
should confirm the results from the continuous evaluation on self-created logs. This final
assessment could be enriched with a qualitative assessment of the usability,
understandability and efectiveness of the models/logs from the employees through semi-structured
interviews.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Preliminary Results &amp; Future Work</title>
      <p>Preliminary prototype results reveal that the MS-UIA can be queried to extract relevant
information about the UI elements. A temporal analysis of the UI state changes with
the respective human interactions shows which of these are responsible for creating and
deleting other UI elements. For a test data set, the approach has shown to be highly
resilient to noise from pop-ups, context changes or task changes since these relate to
other objects.</p>
      <p>
        The next work package will target the detection of data objects via common input
values or clipboard usage. These objects will connect events from diferent applications
within the log. After this, the test data can be enlarged by replaying tasks used in current
literature that is mostly comprised of two applications [
        <xref ref-type="bibr" rid="ref5">13, 5</xref>
        ]. The common tasks are
then recorded in one log containing many more tasks and noisy activities. This log should
reflect the more realistic setting when the task for mining is not known at recording
time. At last, applying the two current state-of-the-art task mining tools on the realistic
log should compare the strengths and weaknesses of these approaches to the presented
approach.
Notes in Computer Science, Springer International Publishing, 2019, pp. 95–112.
doi:10.1007/978-3-030-33246-4_6.
[10] A. F. Ghahfarokhi, G. Park, A. Berti, W. M. P. van der Aalst, OCEL: A
Standard for Object-Centric Event Logs, in: L. Bellatreche, M. Dumas, P. Karras,
R. Matulevičius, A. Awad, M. Weidlich, M. Ivanović, O. Hartig (Eds.), New
Trends in Database and Information Systems, Communications in Computer and
Information Science, Springer International Publishing, Cham, 2021, pp. 169–175.
doi:10.1007/978-3-030-85082-1_16.
[11] L. Abb, J.-R. Rehse, A Reference Data Model for Process-Related User Interaction
Logs, in: C. Di Ciccio, R. Dijkman, A. del Río Ortega, S. Rinderle-Ma (Eds.),
Business Process Management, Lecture Notes in Computer Science, Springer
International Publishing, Cham, 2022, pp. 57–74. doi:10.1007/978-3-031-16103-2_7.
[12] W. M. P. van der Aalst, A. Berti, Discovering Object-centric Petri Nets, Fundamenta
      </p>
      <p>Informaticae 175 (2020) 1–40. doi:10.3233/FI-2020-1946.
[13] S. Agostinelli, F. Leotta, A. Marrella, Interactive Segmentation of User Interface
Logs, in: H. Hacid, O. Kao, M. Mecella, N. Moha, H.-y. Paik (Eds.), Service-Oriented
Computing, Lecture Notes in Computer Science, Springer International Publishing,
Cham, 2021, pp. 65–80. doi:10.1007/978-3-030-91431-8_5.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , Hybrid Intelligence:
          <article-title>To automate or not to automate, that is the question</article-title>
          ,
          <source>Ijispm-International Journal of Information Systems and Project Management</source>
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>5</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .12821/ijispm090201.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wanner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hofmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fischer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Imgrund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Janiesch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Geyer-Klingeberg</surname>
          </string-name>
          ,
          <article-title>Process selection in RPA projects-towards a quantifiable method of decision making, in: ICIS 2019 Proceeedings</article-title>
          , volume
          <volume>6</volume>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rechberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Oppl</surname>
          </string-name>
          ,
          <article-title>Selecting processes for RPA</article-title>
          , in: C. Czarnecki, P. Fettke (Eds.),
          <source>Robotic Process Automation: Management, Technology and Applications</source>
          , De Gruyter,
          <year>2021</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>109</lpage>
          . doi:
          <volume>10</volume>
          .1515/
          <fpage>9783110676693</fpage>
          -
          <lpage>005</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Linn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Werth</surname>
          </string-name>
          ,
          <article-title>Desktop Activity Mining - A new level of detail in mining business processes</article-title>
          ,
          <source>in: Workshop Der INFORMATIK 2018, Lecture Notes in Informatics (LNI)</source>
          ,
          <source>Gesellschaft für Informatik</source>
          , Bonn,
          <year>2018</year>
          , pp.
          <fpage>245</fpage>
          -
          <lpage>258</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Leno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          ,
          <article-title>Identifying Candidate Routines for Robotic Process Automation from Unsegmented UI Logs</article-title>
          ,
          <source>in: 2020 2nd International Conference on Process Mining (ICPM)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>160</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICPM49681.
          <year>2020</year>
          .
          <volume>00031</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>R'bigui, C. Cho, Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation</article-title>
          ,
          <source>Sustainability</source>
          <volume>13</volume>
          (
          <year>2021</year>
          )
          <fpage>8980</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E. L.</given-names>
            <surname>Klijn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <article-title>Classifying and Detecting Task Executions and Routines in Processes Using Event Graphs</article-title>
          , in: A.
          <string-name>
            <surname>Polyvyanyy</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>A. Van Looy</given-names>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          Reichert (Eds.),
          <source>Business Process Management Forum, Lecture Notes in Business Information Processing</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>212</fpage>
          -
          <lpage>229</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -85440-9_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Agostinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lupia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mecella</surname>
          </string-name>
          ,
          <article-title>Reactive synthesis of software robots in RPA from user interface logs</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>142</volume>
          (
          <year>2022</year>
          )
          <article-title>103721</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.compind.
          <year>2022</year>
          .
          <volume>103721</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , Automated Robotic Process Automation:
          <article-title>A Self-Learning Approach</article-title>
          , in: On the Move to Meaningful
          <source>Internet Systems: OTM 2019 Conferences</source>
          , volume
          <volume>11877</volume>
          of Lecture
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>