<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Uncertainty and Resource Constraints</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mahmoud Shoush</string-name>
          <email>mahmoud.shoush@ut.ee</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Prescriptive Process Monitoring, Machine Learning, Causal Inference</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Tartu</institution>
          ,
          <addr-line>Narva mnt 18, 51009 Tartu</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <fpage>12</fpage>
      <lpage>16</lpage>
      <abstract>
        <p>Prescriptive process monitoring is a set of techniques that optimize business processes' performance by constructing intervention policies. Such policy monitors processes to identify undesired outcomes (e.g., customer dissatisfaction) and prescribe actions or interventions (e.g., proposing a customer discount) to prevent their costly occurrence. However, existing techniques predominantly rely on pure predictive models to predict undesired outcomes without considering the level of uncertainty associated with these predictions. Consequently, interventions are triggered based on uncertain predictions, assuming they are efective and can be immediately executed for all cases. The underpinning assumption is that a process worker always exists to execute the intervention, e.g., calling a customer to propose a discount. If executed, it reduces the cost of undesired outcomes. However, in practice, the resources available to organizations, such as personnel, may be limited, and we cannot observe the efectiveness of utilizing the intervention beforehand. To address the mentioned gaps, in this doctoral project, we aim to design and develop an intervention policy that optimally learns with confidence, during the execution time of the process, how to select and prioritize business cases to allocate resources to execute interventions and thus improve a given process objective, e.g., gain. To achieve this, we integrate machine learning methodologies. Initially, we use a predictive model with a confidence estimation method to identify cases with a higher likelihood of undesired outcomes. Then, we use a causal inference model to estimate the expected impact of an intervention on a case's outcome. Finally, we develop a resource allocator that monitors and assigns resources to selected cases when necessary.</p>
      </abstract>
      <kwd-group>
        <kwd>Constraints</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Prescriptive process monitoring(PrPM) is a process mining subfield that uses business process
execution records (aka event logs) and machine learning techniques to monitor and improve
business processes during runtime. Hence, it is precious for businesses seeking to improve
operational eficiency, reduce costs, and enhance the quality of their products or services. By
monitoring and analyzing process data during runtime, PrPM can identify areas for improvement
and provide actionable recommendations for optimizing the process. For example, a customer
churn process where customers stop doing business with a company can lead to lost revenue
CAiSE ’23: Doctoral Consortium co-located with the 35th International Conference on Advanced Information Systems
https://github.com/mshoush (M. Shoush)
and reduced profitability. PrPM can identify churn customers (or cases) and provide prescriptive
recommendations for reducing churn, such as ofering targeted promotions.</p>
      <p>
        Recently, several PrPM techniques have been proposed [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ]. These techniques consist of
two components. The first is a predictive model that estimates the probability that a given case
will end up with an undesired outcome. The second is an intervention policy, which determines
if an intervention should be triggered for a given case to optimize a gain function. However,
these techniques lack two main things. Firstly, they trigger interventions when cases are likely
to end undesirably, assuming that predictions will be continuously generated, even when wholly
uncertain and regardless of the consequences of lower-quality predictions. Secondly, these
techniques assume that triggered interventions are efective and that it is possible to trigger
any number of interventions at any time. However, business processes are dynamic in reality,
and uncertainty levels may remain high. Furthermore, interventions may come with costs and
require resources, such as an employee’s time, which are limited and expensive.
      </p>
      <p>In this Ph.D. project, we aim to address the abovementioned gap. We consider a problem
that includes monitoring business cases to provide timely intervention during runtime to avoid
the costly occurrence of undesired outcomes when cases unfold. We assume that resources
are bounded, and process interventions with associated costs are predefined based on domain
expertise. Specifically, we seek to answer the following research question:</p>
      <p>Whom? When? Which?
How can we confidently identify and prioritize business cases (whom?) and provide timely (when?)
interventions (which?) considering resources are bounded to optimize a business value, e.g., gain?</p>
      <p>In order to address the research question, this study utilizes a comprehensive approach
involving integrating three distinct machine learning algorithms: predictive, conformal, and
causal. The predictive algorithm estimates the likelihood of future outcomes for individual cases,
while also providing a measure of uncertainty associated with these predictions. By doing so, it
quantifies how certain the predictive model is with its predictions. In comparison, the conformal
algorithm is applied to convert the predictive model’s output into predictions with a guaranteed
confidence level. The causal model is then implemented to estimate the potential efectiveness
of interventions in mitigating negative outcomes for cases identified as requiring intervention
based on the preceding predictive and conformal analyses. Moreover, a resources allocator is
developed and utilized to monitor the availability of resources, allocate, and release them. The
resources allocator is used to learn which cases should be treated during runtime and when
given the available resources.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        A number of PrPM techniques have been proposed in the past decade. These techniques can
be organized into three groups based on how the intervention policy prescribes interventions
to improve a business value [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The first focuses on control flow to recommend the next best
action or activity to improve a pre-defined KPI [
        <xref ref-type="bibr" rid="ref3 ref6 ref7">6, 7, 3</xref>
        ]. The second focuses on a resource view to
guide resource allocation decisions [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. Finally, the third focuses on triggering interventions
to avoid or mitigate the efect of undesired outcomes and considers both control flow and
resources perspectives [
        <xref ref-type="bibr" rid="ref1 ref2 ref4">1, 4, 2</xref>
        ]. Our proposal fits in the latter; It seeks to learn policies for
triggering interventions to avoid undesired outcomes under uncertainty and finite resources.
      </p>
      <p>
        The works in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] utilize an outcome-oriented predictive model that focuses solely
on generating predictions related to the outcome. However, these models do not consider the
quality of the predictions or provide any measure of confidence in the predictions. In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], they
trigger an intervention when the probability of an undesired outcome exceeds a threshold
determined manually or empirically. While in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a reinforcement learning agent learns when
to trigger an intervention according to parameters such as prediction scores and reliability
estimates. The work in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] introduces a causal inference model to estimate the expected efect
of triggering an intervention to reduce the cycle time of a process, which is another problem
compared to us. However, the works in [
        <xref ref-type="bibr" rid="ref1 ref2 ref4">1, 4, 2</xref>
        ] assume that interventions with a positive
impact occur immediately even when the level of uncertainty is high and do not examine the
ifnite capacity of resources.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Solutions</title>
      <p>To address the research problems outlined, we introduce a prescriptive process monitoring
approach, illustrated in Fig. 1. Our proposed method breaks down the research problems into
three key questions, which we will answer in the subsequent sections.</p>
      <p>• Whom to intervene? Exploring how to identify and prioritize candidate cases for
interventions with confidence.
• When to intervene? Discussing the tradeof between triggering an intervention now
versus later.</p>
      <p>• Which intervention? Studying which intervention is suitable for which case.</p>
      <sec id="sec-3-1">
        <title>3.1. Whom to intervene?</title>
        <p>
          The present study aims to develop a method for identifying cases that require intervention
by utilizing predictive, conformal, and causal models, as outlined in previous studies [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ].
During the training phase, the aforementioned models are trained to filter ongoing cases and
identify suitable candidates for intervention. Subsequently, the predictive model is utilized
during the testing phase to calculate the probability of an undesirable outcome for a given
ongoing case. To provide a level of confidence in the predicted outcome, a conformal algorithm
is employed to transform the predictive model outputs into a prediction set. This algorithm
returns a prediction set containing a single outcome with a confidence of 1 −  , based on a
user-defined significance level (  ) and a predictive model. If the predicted outcome is uncertain,
the algorithm will return a prediction set containing both desired and undesired outcomes
or an empty set. Finally, the causal model is utilized to estimate the potential impact of an
intervention on an ongoing case, by assessing the increase in the probability of a positive
outcome, commonly known as the Conditional Average Treatment Efect (   ).
        </p>
        <p>Testing phase
Incomplete
trace
process
events
prefix collator
event
prefixes
Complete
trace</p>
        <p>Event log
enriching
Training phase
predictive
model
Causal
model</p>
        <p>Conformal
prediction
Calibration phase</p>
        <p>Filtering
Candidate
cases</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. When to intervene?</title>
        <p>The current study involves prioritizing candidate cases from a preceding step and constructing
a resource allocator to manage and allocate resources to the most profitable cases, thereby
determining the appropriate time to trigger interventions.</p>
        <p>
          We propose utilizing two measures, namely gain [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] and adjusted gain [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], to prioritize
candidate cases and determine the appropriate timing of interventions. The gain represents
the benefits acquired at the current state of an ongoing case, while the adjusted gain considers
the current and future states of ongoing cases. Both measures incorporate the costs of the
intervention and the possibility of undesired outcomes. To operationalize these measures, we
developed a resource allocator [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], which assesses the availability of resources and assigns
them to the most profitable cases. Upon selecting the most profitable case, and once a free
resource is available, we assign it to the selected case and block it for a specific duration, i.e.,
the treatment duration. The number of available resources and the time required to perform the
intervention can be determined based on domain knowledge.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Which intervention?</title>
        <p>Our previous proposal assumed that each ongoing case would require a single intervention.
However, in reality, cases may require one or more interventions, each with their own costs and
benefits. Furthermore, a case may need to be intervened upon multiple times at various points
during its execution. This process of allocating resources to ongoing cases multiple times with
diferent interventions can be costly, making the study challenging. Additionally, identifying a
set of interventions that would positively impact outcomes in advance presents yet another
challenge. To address these challenges, we plan to extend the definition of gain and adjusted
gain from our previous works to account for multiple interventions.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
      <p>
        The research methodology employed for this Ph.D. project will be the Design Science approach,
as outlined in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. This approach ensures accuracy through the use of extensive literature
review and the creation of a complete evaluation benchmark with clear selection and assessment
measures. To verify the relevance of the proposed solutions, the developed techniques will
undergo a comprehensive evaluation using both real-life and simulated logs. Furthermore,
where possible, the project will include case studies with relevant organizations to ensure the
practicality and efectiveness of the proposed solutions.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Challenges and Future Work</title>
      <p>Prescriptive process monitoring approaches are often confronted with dificulties in identifying
interventions that could lead to improved outcomes. Discovering or defining interventions from
execution data can be challenging, as it necessitates the identification of a causal relationship
between a specific variable and the outcome. For example, identifying a correlation between
loan approval and monthly interest rates.</p>
      <p>Moreover, our previous proposal encounters the challenge of optimizing intervention triggers.
While our rule-based model assigns resources to ongoing cases, these resources may only be
well-utilized if the potential gain is high. Therefore, to make informed decisions on when to
allocate and when not to, we plan to develop a more intelligent resource allocator based on the
anticipated gain at each point.</p>
      <p>To advance our approach, we aim to move away from the rule-based model and adopt a
learning-based approach in the future. To accomplish this, we plan to leverage reinforcement
learning to learn an optimal policy at runtime for deciding when to trigger interventions and
how to eficiently allocate resources.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgement</title>
      <p>This project is supported by the European Research Council (PIX Project). The project is under
the supervision of Prof. Marlon Dumas, who is afiliated with the University of Tartu in Estonia.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Metzger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Palm</surname>
          </string-name>
          ,
          <article-title>Triggering proactive business process adaptations via online reinforcement learning</article-title>
          ,
          <source>in: BPM</source>
          , volume
          <volume>12168</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>290</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z. D.</given-names>
            <surname>Bozorgi</surname>
          </string-name>
          , I. Teinemaa,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <article-title>Prescriptive process monitoring for cost-aware cycle time reduction</article-title>
          ,
          <source>ICPM</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>M. de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dees</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Reulink</surname>
          </string-name>
          ,
          <article-title>Design and evaluation of a process-aware recommender system based on prescriptive analytics</article-title>
          , in: ICPM, IEEE,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tax</surname>
          </string-name>
          , I. Teinemaa,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. de Leoni</surname>
            ,
            <given-names>F. M.</given-names>
          </string-name>
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Weidlich</surname>
          </string-name>
          ,
          <article-title>Fire now, fire later: alarm-based systems for prescriptive process monitoring</article-title>
          ,
          <source>Knowl. Inf. Syst</source>
          .
          <volume>64</volume>
          (
          <year>2022</year>
          )
          <fpage>559</fpage>
          -
          <lpage>587</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Milani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nolte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          , Prescriptive process monitoring: Quo vadis?,
          <source>PeerJ Comput. Sci. 8</source>
          (
          <year>2022</year>
          )
          <article-title>e1097</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Weinzierl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dunzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zilker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matzner</surname>
          </string-name>
          ,
          <article-title>Prescriptive business process monitoring for recommending next best actions</article-title>
          ,
          <source>in: BPM (Forum)</source>
          ,
          <source>volume 392 of Lecture Notes in Business Information Processing</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sindhgatta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dechu</surname>
          </string-name>
          ,
          <article-title>Goal-oriented next best activity recommendation using reinforcement learning</article-title>
          ,
          <source>CoRR abs/2205</source>
          .03219 (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sindhgatta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Ghose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Dam</surname>
          </string-name>
          ,
          <article-title>Context-aware analysis of past process executions to aid resource allocation decisions</article-title>
          ,
          <source>in: CAiSE</source>
          , volume
          <volume>9694</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2016</year>
          , pp.
          <fpage>575</fpage>
          -
          <lpage>589</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <article-title>Prediction-based resource allocation using LSTM and minimum cost and maximum flow algorithm</article-title>
          , in: ICPM, IEEE,
          <year>2019</year>
          , pp.
          <fpage>121</fpage>
          -
          <lpage>128</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shoush</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>Prescriptive process monitoring under resource constraints: A causal inference approach</article-title>
          ,
          <source>in: ICPM Workshops</source>
          , volume
          <volume>433</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>180</fpage>
          -
          <lpage>193</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shoush</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>Intervening with confidence: Conformal prescriptive monitoring of business processes</article-title>
          ,
          <source>CoRR abs/2212</source>
          .03710 (
          <year>2022</year>
          ). URL: https://doi.org/10.48550/arXiv. 2212.03710.
          <article-title>doi:1 0 . 4 8 5 5 0 / a r X i v . 2 2 1 2 . 0 3 7 1 0 . a r X i v : 2 2 1 2 . 0 3 7 1 0</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shoush</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>When to intervene? prescriptive process monitoring under uncertainty and resource constraints</article-title>
          ,
          <source>in: BPM (Forum)</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Hevner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>March</surname>
          </string-name>
          , J. Park, S. Ram,
          <article-title>Design science in information systems research</article-title>
          , MIS Q.
          <volume>28</volume>
          (
          <year>2004</year>
          )
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          . URL: http://misq.org
          <article-title>/ design-science-in-information-systems-research</article-title>
          .html.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>