1 Introduction
Firstly proposed by Austin [2], the Speech Act Theory looks beyond the literal
meaning of utterances within a conversation and considers how context and
intention contribute to their meaning. One of the main focus of the theory is
the analysis of the intended communicative act of an utterance (i.e., what the
utterance was meant to achieve). According to this theory, speech acts may be
analyzed on three levels: a locutionary act (the utterance itself); an illocutionary
act (the social action of utterance, its intended significance: whether it contains
a request, an order, or a promise, etc.); and a perlocutionary act (the actual
effects of the speech act, for example the act of fulfilling the uttered request).
Searle [19] refined the theory, by defining an illocutionary act as an act that
one performs in producing an utterance, such as the act of asserting a proposi-
tion, asking someone a question, or directing someone to do something.
Searle and Vanderveken [20] further defined the illocutionary act as the min-
imal unit of human conversation, such as statements, questions or commands;
thus, whenever a speaker utters a sentence in an appropriate context, with cer-
tain intentions, he/she performs one or more illocutionary acts. An illocutionary
act is formally defined as having an illocutionary force F and a propositional
content P (in the form of “F(P)”), which respectively denotes the speaker’s in-
tention on making the utterance and the meaning of a clause or sentence that is
constant of the illocutionary act. According to the authors, an illocutionary act
may be decomposed into three different speech acts: an utterance act (simply
uttering an expression), a propositional act (the act of expressing a propositional
content) and, if the illocutionary act is successful, a possible perlocutionary act.
A taxonomy of Speech Acts was proposed by Searle and Vanderveken [20],
composed of five main classes:
Bach and Harnish [3] expand this initial classification, taking Austin’s idea of
a division of speech acts between constatives and performatives. Constatives are
speech acts that can be reduced to true/false statements and Performatives are
speech acts that do not conform to true/false statements, being more oriented
towards the performance of an action and the “felicity conditions” of the action
itself (i.e. the conditions for its successful performance). For our study, we adopt
Bach and Harnish classification of Constatives and Directives, together with
Searle’s taxonomy of Commissives, Expressives and Declaratives (Fig. 1).
4 Richetti, Gonçalves, Baião and Santoro
supported processes, it will be possible to apply process mining over their event
logs. Event logs are the history of events over time, with specific attributes.
Typical information stored in an event log is the case ID that groups all events
that occurred in the same process instance. There is a unique identifier for an
event occurred in a given timestamp, and the name of the executed activity
is also presented. In addition, the resource information points to the user (or
user role) who executed the activity, and additional information (e.g. ”costs”)
provides more details about the circumstances in which the event was executed.
3 Methodology
This Section describes the methodology applied for the automated discovery of
speech acts from business process message logs. We define concepts related to
the control flow of process executions, as well as to the communication between
process executors during the execution of process.
Our approach relies on some assumptions. First, messages related to a pro-
cess instance correspond to the communicative interaction between actors of the
process instance. Second, multiple speech acts may be discovered from each sin-
gle message within a conversation [4]. Finally, a speech act is typically expressed
as the complete sentence (although it may also occur in the form of an one-
word sentence), usually with an “illocutionary force indicating device” such as
a performative verb [19]. Based on these assumptions, concepts concerning the
interactions are mapped to the concepts of the Process Mining field.
4 Case Study
The methodology proposed for the case study is based on the concept of lag and
lead measures [15]. Lag measures are the measures of success, the results that
the company wants to achieve, often related to strategic goals of an organization.
Lag measures focus on results achieved, so they tend to be less actionable since
they look to the past. On the other hand, lead measures are predictive, meaning
that if the lead measure changes, it should be possible to predict that a related
lag measure will also change. Furthermore, a lead measure must be directly
influenced by the process participants.
Since conversations mostly depend on process participants, process stake-
holders can benefit from the analysis of speech acts to discover insights from the
behavior of conversations, aiming to extract conversational patterns related to
process performance that are monitored by traditional lag measures. To run the
case study the following steps were planned and then employed: (1) Identification
of existing lag measures that might be potentially influenced by communication
aspects of the process; (2) Message log selection, preprocessing and cleansing;
(3) Discovery of speech acts from the message log; (4) Map the message log to
the XES [25] event log according to the definitions presented in Section 3; (5)
Enrich the event log with performance data; (6) Run Inductive Visual Miner [11]
and Multi-perspective Process Explorer [12] on ProM1 to discover a Petri net
of the flow of speech acts with data and performance perspectives; and, finally,
1
http://www.processmining.org
Analysis of KiPs Focused on the Communication Perspective 9
(7) Inspect the results for evidences of possible speech acts influence on process
performance.
The case study was performed in a real life scenario of an Information and Com-
munication Technology (ICT) outsourcing company, which has about a hundred
contracts with diverse clients. One of the main services provided by the company
is customer support, which intends to fulfill technical requests (e.g. e-mail config-
urations, backup and restore) or solve technical problems (e.g. system failures)
that are reported by clients to the company‘s service desk.
The incident troubleshooting process was the object of our case study. When
a client reports a new problem, this triggers the creation of an incident ticket in a
process-aware system called OTRS2 that supports company’s operations. Within
OTRS, incident tickets are registered, alternative solutions are considered, a
solution approach is defined, executed, validated and then deployed. During the
resolution of a ticket, messages are exchanged among process participants (both
technical teams and client) and associated to a ticket in OTRS. These messages
contain natural language texts in chronological order; from them, it is possible
to retrieve speech acts uttered from process participants.
Processes of this nature essentially involve the application of technical skills,
troubleshooting abilities, collaboration and information exchange between stake-
holders, and ad-hoc decisions are frequently discussed and made, since most of
the problems are situational. For all these reasons, this process is characterized
as a KiP and should be managed as so.
In Step 1, we interviewed two company managers directly involved with this pro-
cess, and asked them which were the most concerning performance issues they
have to face for this process. They affirmed that the two main measures they
report monthly to their clients were the volume of opened tickets and the total
duration time of the troubleshooting sessions. Since the volume of opened tickets
depends on the clients, this measure is not directly actionable by the technical
teams (despite company’s efforts to apply proactive monitoring of some ICT as-
sets). The total duration of troubleshooting sessions, on the other hand, mostly
depends on the complexity of the problems presented and on the solution strat-
egy applied by the technical teams, which also involves communication with the
clients and among different technical teams. Hence, we chose “total duration of
troubleshooting sessions” as the lag measure to be analyzed from a communica-
tion perspective and the “presence of speech act” and “interplay of speech acts”
as lead measures that might influence the lag measure.
In Step 2, the scope of analysis is the set of all tickets labeled as “incident”
reported in the second semester of 2015, stored in the OTRS repository. A total
2
https://www.otrs.com/
10 Richetti, Gonçalves, Baião and Santoro
In Step 4, each CSV file was enriched with complementary available in-
formation about incident tickets. At the case level, the following attributes
were added to each speech act: ticket duration in hours, number of messages
exchanged, ticket final priority (1 to 5, from lower to higher priority), cus-
tomer anonymous identification and service id; at the event level, the message
sender type (either ”agent” or ”customer”) was included. The enriched CSV
file was then imported to ProM and converted to a XES file using the plu-
gin called ”Convert CSV to XES”, following our definitions for mapping mes-
sage logs to event logs presented in Section 3. Due to the relevance of the
speakers during a conversation, we also concatenated the sender type to the
speech act type to name activities in the log (as in ”AssertiveSpeechAct|agent”,
Analysis of KiPs Focused on the Communication Perspective 11
In Step 6, the mainstream process (conversation) for each duration range was
discovered, representing how most of the conversations happened for the cases
solved within that duration range. To discover the mainstream conversation we
applied Inductive Visual Miner, with the following parameters: 50% activities
and 80% of paths. The resulting Petri Net represented the speech act behavior of
each duration range. Then we applied Multi-perspective Process Explorer to re-
play each subset event log over its associated Petri Net. With Multi-perspective
Process Explorer each of the four subset event logs were analyzed from the fre-
quency of events, average time between events and data discovery perspectives.
Figure 2 present the discovered models for each duration range with information
about the frequency of events occurrence, and Table 2 shows the main charac-
teristics of the discovered process models for each duration range. For the sake
of space, discovered models images in high resolution and with complementary
information are available in the following repository3 .
In Step 7, we focus on the summary presented in Table 2, it is possible to
note that the number of events grows as the duration ranges do the same; this
is rather intuitive, meaning that with more time spent to solve a problem, more
conversations events happened. Although the average precision of all models is
low, fitness is very high, ranging from 78.40% (regular) to 97.10% (short). This
points to a high variability scenario, where each mainstream model has enough
flexibility to accept unobserved behavior. For each duration range, the following
behavior was worth noting:
– Very short duration: incidents which take less than 1.5 hours to be solved
have few possible start events initiated by the customers, and some more
events related to acts of communication among agents. This reflects a typical
behavior when a customer directly calls the agent, the agent proactively
starts the troubleshooting and solves the problem right after the first contact.
This was made explicit by a multi-perspective rule in the bottom part of the
3
https://bitbucket.org/pedrohr/speechactsprocessdiscovery/downloads/
12 Richetti, Gonçalves, Baião and Santoro
Fig. 2. Petri Nets representing the most frequent conversational behavior within (a)
0.0 to 1.5h (very short duration tickets), (b) 1.5 to 16h (short duration tickets), (c) 16
to 72h (regular duration tickets) and (d) more than 72h (long duration tickets).
Analysis of KiPs Focused on the Communication Perspective 13
Table 2. Main characteristics of discovered process models for each duration range.
model, indicating that tickets with only one interaction follow directly to the
end of the process, without entering in the loop at the end of the process.
– Short duration: this subset presented the most frequent starting path,
going directly to a XOR split-join where the agent plays all communication
using 12 different speech acts, probably in the same conditions as in the very
short duration range. However, the remaining paths before this XOR split-
join present utterances from the customer, indicating what they mostly say
when asking for technical support. The initial speech act types uttered by the
customer are (in descending order of frequency): requestives, informatives,
declaratives, descriptives and questions.
– Regular duration: in comparison to the previous shorter ranges, tickets
solved in regular duration presented a higher number of initial participation
from the customer, clearly identifiable by a XOR split-join in the middle
portion of the process. Note the loop at the end of this join, maybe implying
on more time spent on the customer asking questions to an agent. Also, the
final actions applied by the agent to close the ticket are remarked by another
XOR split-join with 9 different speech act types at the end of the process.
– Long duration: the conversational behavior during these cases resulted in a
Flower-like model with a XOR split to 21 different speech act types, showing
the high variability of this range. Another remark on variability is the loop
at the end of the process, where 80.2% of the cases return to another loop
interaction, instead of moving to the end of the process. In practice, this
model represents a set of undesired conversational patterns that could be
further analyzed for improvement opportunities.
dimension points out two important facts: First, that the main indicator that the
incident will take more time than the usual is the ”knowledge intensity” shown
by the increase of speech acts exchanged in the form of a loop. Second, it shows
that the incidents that are more ”straightforward” to be solved (in the sense of
less discussions between clients and agents occurring) typically last between 1.5
and 16 hours. On the other hand, the high knowledge intensity present in the
long duration model clearly raises the importance of monitoring conversational
patterns during real-time ticket troubleshooting, so as to detect when a case is
instantiating a number of interaction loops and will eventually violate the service
level agreement. An improvement practice to be adopted in this case could be to
raise the urgency of an intervention from an agent with more expertise, trying to
shorten the time to close the incident ticket. The knowledge intensity (viewed as
interaction loops) can act as a lead measure, and depending on the speech acts
involved, they can proactively point to possible long duration incident cases.
The results also evidence frequent speech acts inside the conversational loops.
We find two predominant patterns across all 4 datasets: (i) Suggestives + Ad-
visories acts, and (ii) Declarative + Informative speech acts. The first pattern
indicates an extended interaction at the end of the ticket, composed of final re-
marks from the agent (such as an advice or a suggestion to prevent the incident
to happen again in the future). This suggests that human communication during
incident troubleshooting not only comprises the resolution of problems, but also
preventive advice from agents, which was previously unknown and may indicate
a missing activity of the process that was made possible by analyzing the process
from a communication perspective. The second pattern describes the interaction
between the customer and the agent about the request status and action being
taken to solve the incident; it also represent events such as increasing of priority
of a ticket or informing that a system (or a peripheral) is back on-line.
5 Conclusions
References
1. van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and En-
hancement of Business Processes. Springer (2011), http://dx.doi.org/10.1007/
978-3-642-19345-3
2. Austin, J.L.: How to do things with words. Oxford university press (1975)
3. Bach, K., Harnish, R.: Linguistic communication and speech acts (1979)
4. de Carvalho, V.R., Cohen, W.W.: On the collective classification of email ”speech
acts”. In: SIGIR 2005: Proceedings of the 28th Annual International ACM SI-
GIR Conference on Research and Development in Information Retrieval, Salvador,
Brazil, August 15-19, 2005. pp. 345–352 (2005), http://doi.acm.org/10.1145/
1076034.1076094
5. Cohen, W.W., Carvalho, V.R., Mitchell, T.M.: Learning to classify email into
speech acts. In: Proceedings of the 2004 Conference on Empirical Methods in Nat-
ural Language Processing , EMNLP 2004, Barcelona, Spain. pp. 309–316 (2004)
6. Cunningham, H., Maynard, D., Bontcheva, K.: Text processing with gate. Gateway
Press CA (2011)
7. del-Rı́o-Ortega, A., Resinas, M., Cortés, A.R.: Defining process performance in-
dicators: An ontological approach. In: On the Move to Meaningful Internet Sys-
tems: OTM 2010 - Confederated International Conferences: CoopIS, IS, DOA and
ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I.
pp. 555–572 (2010)
8. Di Ciccio, C., Marrella, A., Russo, A.: Knowledge-intensive processes: An overview
of contemporary approaches. In: Proceedings of the 1st International Workshop on
Knowledge-intensive Business Processes, KiBP@KR 2012, Rome, Italy, June 15,
2012. pp. 33–47 (2012)
9. Greenwood, M.A., Tablan, V., Maynard, D.: Gate mımir: Answering questions
google can’t. In: Proceedings of the 10th International Semantic Web Conference
(ISWC2011). pp. 466–471 (2011)
10. Isik, Ö., Mertens, W., den Bergh, J.V.: Practices of knowledge intensive process
management: quantitative insights. Business Proc. Manag. Journal 19(3), 515–534
(2013), http://dx.doi.org/10.1108/14637151311319932
11. Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Process and deviation ex-
ploration with inductive visual miner. In: Proceedings of the BPM Demo Sessions
2014 Co-located with the 12th International Conference on Business Process Man-
agement (BPM 2014), The Netherlands, September 10, 2014. p. 46 (2014)
12. Mannhardt, F., de Leoni, M., Reijers, H.A.: The multi-perspective process explorer.
In: Proceedings of the BPM Demo Session 2015 Co-located with the 13th Inter-
national Conference on Business Process Management (BPM 2015), Innsbruck,
Austria, September 2, 2015. pp. 130–134 (2015)
16 Richetti, Gonçalves, Baião and Santoro
13. Mavaddat, M.: Business process discovery through conversation log analysis in
pluralist and coercive problem contexts. Ph.D. thesis, University of the West of
England (2013)
14. Mavaddat, M., Beeson, I., Green, S., Sa, J.: Facilitating business process discovery
using email analysis. In: The First International Conference on Business Intelli-
gence and Technology. Citeseer (2011)
15. McChesney, C., Covey, S., Huling, J.: The 4 disciplines of execution: Achieving
your wildly important goals. Simon and Schuster (2012)
16. Morales-Ramirez, I., Perini, A.: Discovering speech acts in online discussions: A
tool-supported method. In: Joint Proceedings of the CAiSE 2014 Forum and CAiSE
2014 Doctoral Consortium co-located , Thessaloniki, Greece, June 18-20, 2014. pp.
137–144 (2014)
17. Rus, V., Graesser, A.C., Moldovan, C., Niraula, N.B.: Automatic discovery of
speech act categories in educational games. In: Proceedings of the 5th Interna-
tional Conference on Educational Data Mining, Chania, Greece, June 19-21, 2012.
pp. 25–32 (2012)
18. dos Santos França, J.B., Netto, J.M., do E. Santo Carvalho, J., Santoro, F.M.,
Baião, F.A., Pimentel, M.G.: KIPO: the knowledge-intensive process ontology.
Software and System Modeling 14(3), 1127–1157 (2015), http://dx.doi.org/10.
1007/s10270-014-0397-1
19. Searle, J.R.: A taxonomy of illocutionary acts. Linguistic Agency University of
Trier (1976)
20. Searle, J.R., Vanderveken, D.: Foundations of illocutionary logic. CUP Archive
(1985)
21. Stolcke, A., Ries, K., Coccaro, N., Shriberg, E., Bates, R.A., Jurafsky, D., Taylor,
P., Martin, R., Ess-Dykema, C.V., Meteer, M.: Dialogue act modeling for automatic
tagging and recognition of conversational speech. CoRR cs.CL/0006023 (2000)
22. Tenschert, J., Lenz, R.: Towards speech-act-based adaptive case management. In:
20th IEEE International Enterprise Distributed Object Computing Workshop,
EDOC Workshops 2016, Vienna, Austria, September 5-9, 2016. pp. 1–8 (2016),
http://dx.doi.org/10.1109/EDOCW.2016.7584393
23. Van Der Aalst, W., Adriansyah, A., De Medeiros, A.K.A., Arcieri, F., Baier, T.,
Blickle, T., Bose, J.C., van den Brand, P., Brandtjen, R., Buijs, J., et al.: Process
mining manifesto. In: International Conference on Business Process Management.
pp. 169–194. Springer (2011)
24. Vanderveeken, D.: Meaning and speech acts: Principles of language use. Cambridge:
Cambridge (1990)
25. Verbeek, H.M.W., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: Xes,
xesame, and prom 6. In: Information Systems Evolution - CAiSE Forum 2010,
Hammamet, Tunisia, June 7-9, 2010, Selected Extended Papers. pp. 60–75 (2010),
http://dx.doi.org/10.1007/978-3-642-17722-4_5
26. Vosoughi, S., Roy, D.: Tweet acts: A speech act classifier for twitter. In: Proceed-
ings of the Tenth International Conference on Web and Social Media, Cologne,
Germany, May 17-20, 2016. pp. 711–715 (2016)
27. Wang, G.A., Wang, H.J., Li, J., Abrahams, A.S., Fan, W.: An analytical framework
for understanding knowledge-sharing processes in online q&a communities. ACM
Trans. Management Inf. Syst. 5(4), 18:1–18:31 (2015), http://doi.acm.org/10.
1145/2629445
28. Zhang, R., Li, W., Gao, D., You, O.: Automatic twitter topic summarization with
speech acts. IEEE Trans. Audio, Speech & Language Processing 21(3), 649–658
(2013), http://dx.doi.org/10.1109/TASL.2012.2229984