Abstract
Diverging interests in the workplace may lead to undesirable employee behavior such as taking undue credit, underperforming, shirking responsibilities, and undermining colleagues. This kind of conduct, also referred to as weasel behavior, can have significant negative implications for both individuals and the organization as a whole. Therefore, its identification is of crucial importance. Recent work in process science has defined thirteen weasel behavior patterns and proposed the use of process mining related techniques to uncover them from the traces recorded by information systems. However, these definitions have not yet been tested on any event log. This paper aims at closing this gap by providing the design specifications and algorithms necessary to extract weasel behavior from event logs. We evaluate our implementation on the real-world logs provided by the IEEE Task Force on Process Mining and report the extent of weasel behavior present in each dataset. Our results have relevant implications on the application and development of resource-centered process analysis techniques and contribute to better understanding the information present in the widely-used BPI logs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
van der Aalst, W.M.P.: Process Mining - Data Science in Action, 2nd edn. Springer, Heidelberg (2016)
van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering social networks from event logs. Comput. Supported Coop. Work (CSCW) 14, 549–593 (2005)
van der Aalst, W.M.: Process mining and simulation: a match made in heaven! In: SummerSim, pp. 4–1 (2018)
Bala, S.: Towards mining inappropriate behaviour at work (2024). https://doi.org/10.5281/zenodo.12656557
del-Río-Ortega, A., Resinas, M., Cortés, A.R.: Defining process performance indicators: an ontological approach. In: OTM Conferences (1), pp. 555–572 (2010)
Ferreira, D.R., Alves, C.: Discovering user communities in large event logs. In: Business Process Management Workshops (1), pp. 123–134 (2011)
Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.M.: Design patterns: abstraction and reuse of object-oriented design (reprint). In: Software Pioneers, pp. 701–717. Springer, Heidelberg (2002)
Lashkevich, K., Milani, F., Chapela-Campa, D., Suvorau, I., Dumas, M.: Why am I waiting? Data-driven analysis of waiting times in business processes. In: CAiSE, pp. 174–190 (2023)
Leyer, M., ter Hofstede, A.H.M., Syed, R.: Detecting weasels at work: a theory-driven behavioural process mining approach. In: BPM (Forum). Lecture Notes in Business Information Processing, vol. 490, pp. 337–354. Springer, Cham (2023)
Martin, N., Depaire, B., Caris, A.: The use of process mining in business process simulation model construction - structuring the field. Bus. Inf. Syst. Eng. 58(1), 73–87 (2016)
Meckling, W.H., Jensen, M.C.: Theory of the firm. Managerial Behavior, Agency Costs and Ownership Structure (1976)
Mustroph, H., Winter, K., Rinderle-Ma, S.: Social network mining from natural language text and event logs for compliance deviation detection. In: CoopIS, pp. 347–365 (2023)
Song, M., van der Aalst, W.M.P.: Towards comprehensive support for organizational mining. Decis. Support Syst. 46(1), 300–317 (2008)
Song, M., van der Aalst, W.M.: Supporting process mining by showing events at a glance. In: Proceedings of the 17th Annual Workshop on Information Technologies and Systems (WITS), pp. 139–145 (2007)
Acknowledgment
This research was supported by the Einstein Foundation Berlin under grant EPP-2019-524, by the German Federal Ministry of Education and Research under grant 16DII133, and by Deutsche Forschungsgemeinschaft under grants 496119880 (VisualMine) and 531115272 (ProImpact).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bala, S., Jacobowitz, T., Mendling, J. (2025). Spotting the Weasel at Work: Mining Inappropriate Behavior Patterns in Event Logs. In: Kaczmarek-Heß, M., Rosenthal, K., Suchánek, M., Da Silva, M.M., Proper, H.A., Schnellmann, M. (eds) Enterprise Design, Operations, and Computing. EDOC 2024 Workshops . EDOC 2024. Lecture Notes in Business Information Processing, vol 537. Springer, Cham. https://doi.org/10.1007/978-3-031-79059-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-79059-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-79058-4
Online ISBN: 978-3-031-79059-1
eBook Packages: Computer ScienceComputer Science (R0)