<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Grohs)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Leveraging the Full Potential of Conformance Checking in Practice</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Michael Grohs</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Mannheim</institution>
          ,
          <addr-line>L15 1-6, 68161 Mannheim</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>As one of the main applications of process mining, conformance checking algorithms have been developed and extended in past research. Conventional techniques for conformance checking require a to-be model and an event log as input and determine whether a completed or running process instance deviates or not. However, these techniques only provide a solution to compare intended and actual behavior, thus not focusing on whether input requirements can be fulfilled and outputs can be used in practice. In this PhD thesis, we aim to help practitioners to leverage the full potential of conformance checking. We intend to develop approaches that tackle problems with respect to input requirements in the practical application and equip managers with detailed information on the output of conformance checking, i.e., process deviations, including their causes, and efective prevention strategies.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Process Mining</kwd>
        <kwd>Conformance Checking</kwd>
        <kwd>Practical Application</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The conformance of business processes is crucial for the success of organizations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. To ensure
it, process mining research proposed techniques for conformance checking, which compare
process behavior in an event log to the intended behavior in form of a to-be model [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. For that,
three main technical solutions have been developed: rule-checking, token-based replay, and
alignments [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. They can be used to check whether process instances deviated at run-time and
quantify how good the recorded behavior fits the intended behavior. Alignments are considered
the most sophisticated approach as they provide the most fine-granular information (i.e., where
exactly process instances deviated) and symmetrically view to-be model and event log [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Although the aforementioned techniques provide solutions for the comparison of model and
event log, they might not always be applicable in practice because their input requirements are
not fulfilled [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. For example, the to-be model cannot be provided [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] or existing techniques
cannot check process conformance to constraints with multiple objects based on event
logstandards like XES [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. However, to leverage the full potential of conformance checking, process
managers should actually apply conformance checking and use its results to improve the process,
which is rarely happening in practice [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. To address this problem, we want to answer the
research question:
RQ1: How can we enhance conformance checking such that its input requirements are easier
to fulfill in practice?
      </p>
      <p>
        Furthermore, the output of conformance checking, i.e., the mere information whether a
process instance deviated in the past, might not help practitioners directly to improve their
processes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Rather, they need additional information about how and why the process
deviated to take measures that increase process conformance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Currently, managers have to
manually conduct analyses about the deviations and how to prevent them in the future [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
although automated analyses would significantly speed up and secure the efectiveness of
process improvement. To address this problem, we want to answer a second research question:
RQ2: How can we provide practitioners with automated analyses of conformance checking
output?
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Agenda</title>
      <p>In order to answer both research questions, we planned diferent topics of research targeted
either at fulfilling input requirements or using outputs of conformance checking techniques.
Some are ongoing and others are planned in the future. They are summarized in Fig. 1.</p>
      <sec id="sec-2-1">
        <title>2.1. RQ1: How to fulfill input requirements?</title>
        <p>
          Previous research has found that the input requirements of conformance checking (i.e., to-be
model and event log) are dificult to fulfill in practice because either the required data is not
available or it does not capture the process in the necessary level of detail [
          <xref ref-type="bibr" rid="ref2 ref6">2, 6</xref>
          ]. We aim
to develop approaches that allow more process managers to perform conformance checking
despite these problems. Concretely, we focus on the potential absence of to-be process models
and on the presence of multiple conformance-relevant objects in one process.
Absence of to-be process models. Organizations may not have defined to-be models for their
processes because it is a time-consuming and error-prone task to define these models [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Thus,
a mandatory input requirement for conformance checking might not be fulfilled. However,
it is very likely that process managers can define few deviating process instances. Therefore,
we want to investigate the possibility to train a machine learning model based on few-shot
learning that is able to perform a conformance check without a to-be model as input. To do so,
we want to apply a triplet loss function [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] or few shot learning techniques like weakly supervised
learning or transfer learning [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and validate whether we find the same process instances to be
deviating as conventional techniques. This includes a verification that mining a process model
with known discovery techniques followed by conformance checking is not equally efective.
Multiple conformance-relevant objects in one process. Most existing conformance
checking techniques assume that a process can be defined by a single case notion, i.e., all actions
are related to exactly one object define a process instance. However, a process might only
be conforming if multiple objects fulfill desired criteria [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. For example, consider a delivery
process where multiple customers are supplied in multiple shipments with multiple items and
the process is only conforming if all customers receive the prescribed quantity of all items. To
account for multiple objects in a process instead of using only one case identifier, object-centric
conformance checking has been proposed [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. However, it has not been applied in practice.
We want to develop an object-centric conformance checking approach in an existing industry
cooperation, which will provide practical requirements and evaluation data. This includes an
assessment which event log format is applicable in practice as a object-centric standard has yet
to be determined [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. RQ2: How to use output in practice?</title>
        <p>To quickly provide process managers with the right information about deviations so they can
improve their process conformance, several automatic analyses can be of help. We decided to
predict, explain, and discover patterns in deviations as well as assess their desirability. We aim
to validate these approaches with real-life data that is publicly available or shared with us by a
company partner and illustrate generated insights.</p>
        <p>
          Predict deviations. Process managers can proactively manage process conformance if they
know which deviations will happen in ongoing process instances. This prediction task faces
several challenges as multiple deviations can occur and they often occur infrequently, leading
to data imbalance. Existing approaches for deviation prediction either lack the ability to
predict which activity will deviate and to do this suficiently early [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] or cannot deal with the
imbalanced nature of this task [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Thus, we trained a neural network that can cope with the
challenges of this task and predict deviations suficiently early, allowing process managers to
prevent them [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          Explain deviations. Conformance checking techniques only identify deviations and cannot
provide any reasons for their occurrence [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. To explain these occurrences, we aim to apply
causal discovery techniques and discover true reasons for non-conforming behavior, thus
extending our previous work [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. We want to illustrate its practical value in a real-life application.
This extends approaches that try to explain non-conformance through mere correlations [14]
as well as approaches that apply causal discovery to other process elements [15].
Discover deviation patterns. The results of trace alignments are fine-granular (i.e., whether
an activity is inserted or missing). However, two deviations might form a pattern like swapped
activities or replaced activities. These patterns are more meaningful for practitioners as they
aggregate problems on a managerial level. Some works have conceptualized which patterns can
potentially occur [16] whereas other have included these patterns in the conformance check
by formally modeling them in the to-be model [17]. Nevertheless, there is no approach that
can discover patterns and thus synthesize deviations in trace alignments. We aim to develop a
rule-based approach that derives all patterns in trace alignments.
        </p>
        <p>Assess desirability of deviations. Some deviations from the to-be model might be desirable
because they might be necessary in emergency situations [17]. Practitioners would profit from
approaches that classify whether a deviation is desirable or not. To develop an approach that
automatically classifies this desirability, we plan to extract their semantic meaning [18] and
either use rule-based or machine learning classifications (possibly including Large Language
Models).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgments</title>
      <p>This PhD thesis is supervised by Jana-Rebecca Rehse.
[14] M. de Leoni, W. M. P. van der Aalst, M. Dees, A general process mining framework for
correlating, predicting and clustering dynamic behavior based on event logs, Inf Syst 56
(2015).
[15] M. Qafari, W. van der Aalst, Case level counterfactual reasoning in process mining, in:</p>
      <p>Intel Inf Syst, Springer, 2021, pp. 55–63.
[16] M. Hosseinpour, M. Jans, Process deviation categories in an auditing context, SSRN (2020).
[17] A. Adriansyah, B. F. v. Dongen, N. Zannone, Controlling break-the-glass through alignment,
in: SCSM, 2013, pp. 606–611.
[18] A. Rebmann, H. van der Aa, Enabling semantics-aware process mining through the
automatic annotation of event logs, Inf Syst 110 (2022) 102111.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          , Conformance Checking - Relating
          <source>Processes and Models</source>
          , Springer,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dunzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stierle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matzner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Baier</surname>
          </string-name>
          ,
          <article-title>Conformance checking: A state-of-the-art literature review, in: S-</article-title>
          <string-name>
            <surname>BPM</surname>
            <given-names>ONE</given-names>
          </string-name>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          --
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Friedrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Puhlmann</surname>
          </string-name>
          ,
          <article-title>Process Model Generation from Natural Language Text</article-title>
          , in: CAiSE, Springer,
          <year>2011</year>
          , pp.
          <fpage>482</fpage>
          -
          <lpage>496</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Liss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. N.</given-names>
            <surname>Adams</surname>
          </string-name>
          , W. van der Aalst, Object-centric alignments,
          <year>2023</year>
          . arXiv:
          <volume>2305</volume>
          .
          <fpage>05113</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Reinkemeyer</surname>
          </string-name>
          , Process mining in action, Process Mining in Action Principles,
          <article-title>Use Cases and Outloook (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Borrego</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Barba</surname>
          </string-name>
          ,
          <article-title>Conformance checking and diagnosis for declarative business process models in data-aware scenarios</article-title>
          ,
          <source>Expert Syst Appl</source>
          <volume>41</volume>
          (
          <year>2014</year>
          )
          <fpage>5340</fpage>
          -
          <lpage>5352</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hermans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Beyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Leibe</surname>
          </string-name>
          ,
          <article-title>In defense of the triplet loss for person re-identification</article-title>
          ,
          <source>arXiv preprint arXiv:1703.07737</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Kwok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <article-title>Generalizing from a few examples: A survey on few-shot learning</article-title>
          ,
          <source>ACM Comput Surv</source>
          <volume>53</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Object-centric process mining: Unraveling the fabric of real processes</article-title>
          ,
          <source>Mathematics</source>
          <volume>11</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Weinzierl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dunzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tenschert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zilker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matzner</surname>
          </string-name>
          ,
          <article-title>Predictive business process deviation monitoring</article-title>
          ,
          <source>in: ECIS</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          --
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Genga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Di Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zannone</surname>
          </string-name>
          ,
          <article-title>Predicting critical behaviors in business process executions: When evidence counts</article-title>
          ,
          <source>in: BPM Forum</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Grohs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pfeifer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-R.</given-names>
            <surname>Rehse</surname>
          </string-name>
          ,
          <article-title>Business process deviation prediction: Predicting nonconforming process behavior</article-title>
          ,
          <source>in: ICPM</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Grohs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-R.</given-names>
            <surname>Rehse</surname>
          </string-name>
          ,
          <article-title>Attribute-based conformance diagnosis: Correlating trace attributes with process conformance</article-title>
          ,
          <source>in: ICPM Workshops</source>
          , Springer,
          <year>2023</year>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>