=Paper=
{{Paper
|id=Vol-3299/Paper10
|storemode=property
|title=Ex-Post Identification of Task Models With Causally Ordered User Interface Logs (Extended Abstract)
|pdfUrl=https://ceur-ws.org/Vol-3299/Paper10.pdf
|volume=Vol-3299
|authors=Dominic A. Neu
|dblpUrl=https://dblp.org/rec/conf/icpm/Neu22
}}
==Ex-Post Identification of Task Models With Causally Ordered User Interface Logs (Extended Abstract)==
Ex-Post Identification of Task Models With Causally Ordered User Interface Logs (Extended Abstract) Dominic A. Neu1 1 Institute for Information Systems, Saarland University, Germany Abstract Identifying adequate back-office tasks to automate is a significant problem in adopting robotic process automation. Task mining on user interface logs enables departments to detect the underlying task model, but creating these logs is time and resource-consuming. Furthermore, contrary to process mining logs that can be extracted in an ex-post fashion from ERP systems, user interface logs require definitions prior to the recording: abstract activities and mapping to lower-level user interface interactions need to be specified beforehand. To this end, the presented research project proposes a new framework for desktop activity mining that enables interaction recording prior to defining tasks and activities to be mined. Keywords task mining, causal logs, object-centric UI log 1. Introduction and Motivation Through the advent of Robotic Process Automation, the boundaries of automation- capable business processes have shifted [1]. Robotic Process Automation operates on the user interface of enterprise software. Therefore, integrating systems through the existing user interface eliminates the need for separate integration APIs. Furthermore, the visual modelling environment provided by RPA providers enabled departments to start their automation projects without the involvement of the IT department or professional programmers. Moreover, recent advances in artificial intelligence expanded the scope of tasks a computer can take over. While visual modelling tools enable departments to build custom RPA bots, the technical feasibility assessment poses a significant challenge. The difficulty arises from a lack of experience and technical background compared to dedicated automation experts in IT departments. On the other hand, automation experts do not know the department’s daily tasks and, therefore, can not propose feasible tasks by themselves. Ultimately, tasks to automate can only be found through intensive exchange between both departments, which requires time and resources. ICPM 2022 Doctoral Consortium and Tool Demonstration Track email: dominic.neu@uni-saarland.de (D. A. Neu) orcid: 0000-0002-9806-6520 (D. A. Neu) © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) 46 2. Problem statement and state-of-the-art The research field around Robotic Process Automation recognises this problem of iden- tifying adequate tasks for automation. From the managerial perspective, researchers propose quantified measurements to compare potential candidates in terms of automation- capability and profitability [2, 3]. Whereas the works of [4, 5, 6, 7, 8] leverage insights from process mining to discover potential task models from user interface logs. Unfortunately, much information about the task executions (or cases) is not directly available in real live scenarios [6]. However, this information is necessary to calculate the previously proposed measurements and apply the process mining algorithms. One way to get around this limitation is to have employees estimate the values of essential criteria, such as the number of exceptional cases or the execution time. Another possibility is recording user interface interactions and manually enriching the log. For example, in [4] and [8], the log is segmented implicitly into traces by the user when he starts and stops the recording. Additionally, the user abstracts events to activities with tool support. The approach in [5] solves the segmentation task by building a dominator tree from the directly-follows-graph (DFG). An integral part of the DFG approach is the automated mapping of events to more abstract activities through additional UI information, such as the button name or application-specific parameters. For this, the solution requires application-specific add-ons and the log to contain only events from one task. In conclusion, the automatic identification and segmentation of task executions from real-life logs remain one of the leading research challenges [6, 9]. 3. Proposed approach and methodology Therefore, this research project proposes a new approach to recording user interaction events in advance without the knowledge of any potential task candidate. This way, an employee can record all interactions of his/her daily tasks into one log. This log can then be used afterwards to mine models of tasks contained within the log. This is different to current works, where each log is recorded explicitly to mine one specific task model. This project builds upon the work of [5] to leverage additional UI element properties for automatically mapping events to activities. However, instead of recording events within the applications through add-ons, the author proposes using the application- generic Microsoft User Interface Automation API (MS-UIA), which offers many insightful properties. Furthermore, to tackle the problem of a proper case distinction, the author proposes to transfer the object-centric approach from process mining to UI logs [10] as user interaction events may be related to UI elements and data objects. The first part of this project will include recognising different instantiations of UI elements and data objects. Next, these objects are mapped to more abstract classes of objects by utilising properties provided by the MS-UIA, like the UI element name or the unique AutomationID. As an extension to the reference model for UI logs presented in [11], this work provides 47 semantically enriched relations between interaction events and UI objects, such as creates, requires, changes, destroys. The semantics will create precedence order relations between events independent of the user’s fixed but arbitrary chronological order, thereby revealing the half order prescribed by the application. This half-order over events simplifies the detection of recurrent patterns in the log since the relations can be interpreted as causal connections. The next part is concerned with good algorithms for log clipping. log clipping is a new step in task mining projects concerned with the proper outline of events relevant to the task of interest. The author proposes using minimal domain knowledge in an iterative procedure to dissociate events. The algorithm leverages that events of one task are likely to form a connected component with respect to the causal relations mentioned above. Accordingly, the domain knowledge needs only to specify one distinctive event of the task. Then, a traversal through the causal relationships provides the remaining relevant events. The final model discovery will apply state-of-the-art object-centric DFG algorithms to extract the underlying task model [12]. Developing a specialised mining algorithm for the new type of UI log is not part of this project. The solution approach mentioned above can be broken down into three main research questions: • How can the information provided by the user interface be leveraged to identify UI element objects and data objects • What information can be exploited to automatically map instantiations of UI element objects to more abstract object classes • How can user interactions be correlated to the objects they create, require, change or destroy An evaluation measures the UI log generation’s feasibility, effectiveness and robustness. This includes a quantitative assessment of precision and recall of interactions against hand-created task models. During prototyping, the author will generate logs, replaying commonly used automation tasks from the existing literature (like transferring data from a spreadsheet to a web form [8]). For robustness in real-life scenarios, a case study within a medium-sized company should confirm the results from the continuous evaluation on self-created logs. This final assessment could be enriched with a qualitative assessment of the usability, understand- ability and effectiveness of the models/logs from the employees through semi-structured interviews. 4. Preliminary Results & Future Work Preliminary prototype results reveal that the MS-UIA can be queried to extract relevant information about the UI elements. A temporal analysis of the UI state changes with the respective human interactions shows which of these are responsible for creating and deleting other UI elements. For a test data set, the approach has shown to be highly 48 resilient to noise from pop-ups, context changes or task changes since these relate to other objects. The next work package will target the detection of data objects via common input values or clipboard usage. These objects will connect events from different applications within the log. After this, the test data can be enlarged by replaying tasks used in current literature that is mostly comprised of two applications [13, 5]. The common tasks are then recorded in one log containing many more tasks and noisy activities. This log should reflect the more realistic setting when the task for mining is not known at recording time. At last, applying the two current state-of-the-art task mining tools on the realistic log should compare the strengths and weaknesses of these approaches to the presented approach. References [1] W. M. P. van der Aalst, Hybrid Intelligence: To automate or not to automate, that is the question, Ijispm-International Journal of Information Systems and Project Management 9 (2021) 5–20. doi:10.12821/ijispm090201. [2] J. Wanner, A. Hofmann, M. Fischer, F. Imgrund, C. Janiesch, J. Geyer-Klingeberg, Process selection in RPA projects-towards a quantifiable method of decision making, in: ICIS 2019 Proceeedings, volume 6, 2019. [3] S. Rechberger, S. Oppl, Selecting processes for RPA, in: C. Czarnecki, P. Fettke (Eds.), Robotic Process Automation: Management, Technology and Applications, De Gruyter, 2021, pp. 91–109. doi:10.1515/9783110676693-005. [4] C. Linn, P. Zimmermann, D. Werth, Desktop Activity Mining - A new level of detail in mining business processes, in: Workshop Der INFORMATIK 2018, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, 2018, pp. 245–258. [5] V. Leno, A. Augusto, M. Dumas, M. La Rosa, F. M. Maggi, A. Polyvyanyy, Identifying Candidate Routines for Robotic Process Automation from Unsegmented UI Logs, in: 2020 2nd International Conference on Process Mining (ICPM), 2020, pp. 153–160. doi:10.1109/ICPM49681.2020.00031. [6] D. Choi, H. R’bigui, C. Cho, Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation, Sustainability 13 (2021) 8980. [7] E. L. Klijn, F. Mannhardt, D. Fahland, Classifying and Detecting Task Executions and Routines in Processes Using Event Graphs, in: A. Polyvyanyy, M. T. Wynn, A. Van Looy, M. Reichert (Eds.), Business Process Management Forum, Lecture Notes in Business Information Processing, Springer International Publishing, Cham, 2021, pp. 212–229. doi:10.1007/978-3-030-85440-9_13. [8] S. Agostinelli, M. Lupia, A. Marrella, M. Mecella, Reactive synthesis of software robots in RPA from user interface logs, Computers in Industry 142 (2022) 103721. doi:10.1016/j.compind.2022.103721. [9] J. Gao, S. J. van Zelst, X. Lu, W. M. P. van der Aalst, Automated Robotic Process Automation: A Self-Learning Approach, in: On the Move to Mean- ingful Internet Systems: OTM 2019 Conferences, volume 11877 of Lecture 49 Notes in Computer Science, Springer International Publishing, 2019, pp. 95–112. doi:10.1007/978-3-030-33246-4_6. [10] A. F. Ghahfarokhi, G. Park, A. Berti, W. M. P. van der Aalst, OCEL: A Stan- dard for Object-Centric Event Logs, in: L. Bellatreche, M. Dumas, P. Karras, R. Matulevičius, A. Awad, M. Weidlich, M. Ivanović, O. Hartig (Eds.), New Trends in Database and Information Systems, Communications in Computer and Information Science, Springer International Publishing, Cham, 2021, pp. 169–175. doi:10.1007/978-3-030-85082-1_16. [11] L. Abb, J.-R. Rehse, A Reference Data Model for Process-Related User Interaction Logs, in: C. Di Ciccio, R. Dijkman, A. del Río Ortega, S. Rinderle-Ma (Eds.), Business Process Management, Lecture Notes in Computer Science, Springer Inter- national Publishing, Cham, 2022, pp. 57–74. doi:10.1007/978-3-031-16103-2_7. [12] W. M. P. van der Aalst, A. Berti, Discovering Object-centric Petri Nets, Fundamenta Informaticae 175 (2020) 1–40. doi:10.3233/FI-2020-1946. [13] S. Agostinelli, F. Leotta, A. Marrella, Interactive Segmentation of User Interface Logs, in: H. Hacid, O. Kao, M. Mecella, N. Moha, H.-y. Paik (Eds.), Service-Oriented Computing, Lecture Notes in Computer Science, Springer International Publishing, Cham, 2021, pp. 65–80. doi:10.1007/978-3-030-91431-8_5. 50