Skip to main content

Spotting the Weasel at Work: Mining Inappropriate Behavior Patterns in Event Logs

  • Conference paper
  • First Online:
Enterprise Design, Operations, and Computing. EDOC 2024 Workshops (EDOC 2024)

Abstract

Diverging interests in the workplace may lead to undesirable employee behavior such as taking undue credit, underperforming, shirking responsibilities, and undermining colleagues. This kind of conduct, also referred to as weasel behavior, can have significant negative implications for both individuals and the organization as a whole. Therefore, its identification is of crucial importance. Recent work in process science has defined thirteen weasel behavior patterns and proposed the use of process mining related techniques to uncover them from the traces recorded by information systems. However, these definitions have not yet been tested on any event log. This paper aims at closing this gap by providing the design specifications and algorithms necessary to extract weasel behavior from event logs. We evaluate our implementation on the real-world logs provided by the IEEE Task Force on Process Mining and report the extent of weasel behavior present in each dataset. Our results have relevant implications on the application and development of resource-centered process analysis techniques and contribute to better understanding the information present in the widely-used BPI logs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.tf-pm.org/resources/xes-standard/about-xes/event-logs.

References

  1. van der Aalst, W.M.P.: Process Mining - Data Science in Action, 2nd edn. Springer, Heidelberg (2016)

    Google Scholar 

  2. van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering social networks from event logs. Comput. Supported Coop. Work (CSCW) 14, 549–593 (2005)

    Article  MATH  Google Scholar 

  3. van der Aalst, W.M.: Process mining and simulation: a match made in heaven! In: SummerSim, pp. 4–1 (2018)

    Google Scholar 

  4. Bala, S.: Towards mining inappropriate behaviour at work (2024). https://doi.org/10.5281/zenodo.12656557

  5. del-Río-Ortega, A., Resinas, M., Cortés, A.R.: Defining process performance indicators: an ontological approach. In: OTM Conferences (1), pp. 555–572 (2010)

    Google Scholar 

  6. Ferreira, D.R., Alves, C.: Discovering user communities in large event logs. In: Business Process Management Workshops (1), pp. 123–134 (2011)

    Google Scholar 

  7. Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.M.: Design patterns: abstraction and reuse of object-oriented design (reprint). In: Software Pioneers, pp. 701–717. Springer, Heidelberg (2002)

    Google Scholar 

  8. Lashkevich, K., Milani, F., Chapela-Campa, D., Suvorau, I., Dumas, M.: Why am I waiting? Data-driven analysis of waiting times in business processes. In: CAiSE, pp. 174–190 (2023)

    Google Scholar 

  9. Leyer, M., ter Hofstede, A.H.M., Syed, R.: Detecting weasels at work: a theory-driven behavioural process mining approach. In: BPM (Forum). Lecture Notes in Business Information Processing, vol. 490, pp. 337–354. Springer, Cham (2023)

    Google Scholar 

  10. Martin, N., Depaire, B., Caris, A.: The use of process mining in business process simulation model construction - structuring the field. Bus. Inf. Syst. Eng. 58(1), 73–87 (2016)

    Article  MATH  Google Scholar 

  11. Meckling, W.H., Jensen, M.C.: Theory of the firm. Managerial Behavior, Agency Costs and Ownership Structure (1976)

    Google Scholar 

  12. Mustroph, H., Winter, K., Rinderle-Ma, S.: Social network mining from natural language text and event logs for compliance deviation detection. In: CoopIS, pp. 347–365 (2023)

    Google Scholar 

  13. Song, M., van der Aalst, W.M.P.: Towards comprehensive support for organizational mining. Decis. Support Syst. 46(1), 300–317 (2008)

    Article  MATH  Google Scholar 

  14. Song, M., van der Aalst, W.M.: Supporting process mining by showing events at a glance. In: Proceedings of the 17th Annual Workshop on Information Technologies and Systems (WITS), pp. 139–145 (2007)

    Google Scholar 

Download references

Acknowledgment

This research was supported by the Einstein Foundation Berlin under grant EPP-2019-524, by the German Federal Ministry of Education and Research under grant 16DII133, and by Deutsche Forschungsgemeinschaft under grants 496119880 (VisualMine) and 531115272 (ProImpact).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saimir Bala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bala, S., Jacobowitz, T., Mendling, J. (2025). Spotting the Weasel at Work: Mining Inappropriate Behavior Patterns in Event Logs. In: Kaczmarek-Heß, M., Rosenthal, K., Suchánek, M., Da Silva, M.M., Proper, H.A., Schnellmann, M. (eds) Enterprise Design, Operations, and Computing. EDOC 2024 Workshops . EDOC 2024. Lecture Notes in Business Information Processing, vol 537. Springer, Cham. https://doi.org/10.1007/978-3-031-79059-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-79059-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-79058-4

  • Online ISBN: 978-3-031-79059-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics