Skip to main content

Mining Staff Assignment Rules from Event-Based Data

  • Conference paper
Business Process Management Workshops (BPM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3812))

Included in the following conference series:

Abstract

Process mining offers methods and techniques for capturing process behaviour from log data of past process executions. Although many promising approaches on mining the control flow have been published, no attempt has been made to mine the staff assignment situation of business processes. In this paper, we introduce the problem of mining staff assignment rules using history data and organisational information (e.g., an organisational model) as input. We show that this task can be considered an inductive learning problem and adapt a decision tree learning approach to derive staff assignment rules. In contrast to rules acquired by traditional techniques (e.g., questionnaires) the thus derived rules are objective and show the staff assignment situation at hand. Therefore, they can help to better understand the process. Moreover, the rules can be used as input for further analysis, e.g., workload balance analysis or delta analysis. This paper presents the current state of our work and points out some challenges for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zur Mühlen, M.: Organizational Management in Workflow Applications. Information Technology and Management 5(3-4), 271–291 (2004)

    Article  Google Scholar 

  2. van der Aalst, W., Weijters, A.: Process Mining: A Research Agenda. Computers in Industry 53(3), 231–244 (2004)

    Article  Google Scholar 

  3. van der Aalst, W., van Dongen, B., Herbst, J., Maruster, L., Schimm, G., Weijters, A.: Workflow mining: A survey of issues and approaches. Data and Knowledge Engineering 47(2), 237–267 (2003)

    Article  Google Scholar 

  4. van der Aalst, W., Song, M.: Mining Social Networks: Uncovering Interaction Patterns in Business Processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 244–260. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. van der Aalst, W., Song, M.: Discovering Social Networks from Event Logs. BETA Working Paper Series, WP 116, Eindhoven University of Technology, The Netherlands (2004)

    Google Scholar 

  6. van der Aalst, W., Weijters, A., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)

    Article  Google Scholar 

  7. van der Aalst, W.M.P., de Medeiros, A.K.A., Weijters, A.J.M.M.: Genetic Process Mining. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 48–69. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. van Dongen, B.F., de Medeiros, A.K.A., Verbeek, H.M.W., Weijters, A.J.M.M., van der Aalst, W.M.P.: The ProM framework: A new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 444–454. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Breslow, L., Aha, D.: Simplifying decision trees: a survey. Knowledge Engineering Review 12(1), 1–40 (1997)

    Article  Google Scholar 

  10. Greco, G., Guzzo, A., Pontieri, L., Sacca, D.: Mining Expressive Process Models by Clustering Workflow Traces. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 52–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Cook, J., Wolf, L.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology 7(3), 215–249 (1998)

    Article  Google Scholar 

  12. Golani, M., Pinter, S.: Generating a Process Model from a Process Audit Log. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 136–151. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Hand, D., Mannila, H., Smyth, P.: Priciples of Data Mining. MIT Press, Cambridge (2001)

    Google Scholar 

  14. Herbst, J.: A Machine Learning Approach to Workflow Management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol. 1810, pp. 183–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Mitchell, T.: Machine Learning. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  16. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)

    Google Scholar 

  17. Quinlan, J.R.: Learning Decision Tree Classifiers. ACM Computing Surveys 28(1), 71–72 (1996)

    Article  Google Scholar 

  18. Reichert, M., Wiedemuth–Catrinescu, U., Rinderle, S.: Evolution of Access Control in Information Systems. In: Proc. Conf. EGP 2004, Klagenfurt, pp. 100–114 (2004) (in German)

    Google Scholar 

  19. Rinderle, S., Reichert, M.: On the Controlled Evolution of Access Rules in Information Systems. In: Proc. 13th Int’l Conf. on Cooperative Information Systems (CoopIS 2005), Agia Napa, Cyprus (2005) (to appear)

    Google Scholar 

  20. Schimm, G.: Mining Exact Models of Concurrent Workflows. Process/Workflow Mining, Computers in Industry 53(3), 265–281 (2004)

    Article  Google Scholar 

  21. Lavrac, N., Dzeroski, S.: Inductive Logic Programming: Techniques and Applications, p. 53. Ellis Horwood, New York (1994)

    MATH  Google Scholar 

  22. Weber, B., Reichert, M., Wild, W., Rinderle, S.: Balancing Flexibility and Security in Adaptive Process Management Systems. In: Proc. 13th Int’l Conf. on Cooperative Information Systems (CoopIS 2005), Agia Napa, Cyprus (2005) (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ly, L.T., Rinderle, S., Dadam, P., Reichert, M. (2006). Mining Staff Assignment Rules from Event-Based Data. In: Bussler, C.J., Haller, A. (eds) Business Process Management Workshops. BPM 2005. Lecture Notes in Computer Science, vol 3812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11678564_16

Download citation

  • DOI: https://doi.org/10.1007/11678564_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-32595-6

  • Online ISBN: 978-3-540-32596-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics