About
158
Publications
107,884
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
374
Citations
Introduction
Ella Roubtsova currently works at the Open Universiteit Nederland doing research in Computer Architecture, Human-computer Interaction and Information Systems (Business Informatics).
Springer book
https://link.springer.com/book/10.1007%2F978-3-319-21912-7
Springer book
https://www.springer.com/gp/book/9783319151014
ACM
https://dl.acm.org/profile/81100404515
Skills and Expertise
Additional affiliations
October 2005 - January 2019
October 2005 - November 2018
Position
- Researcher
Education
September 1986 - December 1989
National University of Science and Technology MISIS https://en.misis.ru
Field of study
- Informatics
Publications
Publications (158)
We define a type of concern called a decision module.
Decision modules can be seen as a specific subset of often changeable business rules, identified in requirements. We present decision modules as protocol machines in protocol models.
The proven property of such protocol machines is their unidirectional dependency from other protocol machines. Th...
Web services are goal-oriented software systems and often need to influence or motivate particular behaviour of their communication parties: humans and other services. This paper investigates modeling of motivation for human-service interaction. It shows why motivation needs a separate model different from the service process model, how to specify...
The aim of this paper is to explore the modeling of crosscutting behavioral abstractions. We argue that behavioral aspects can be seen as a particular kind of more general behavioral abstraction called a “mixin”. Mixins support a compositional style of modeling, whereby a complete class definition is constructed by composing one or more mixins each...
This book constitutes revised selected papers from the six International Workshops on Behavior Modelling - Foundations and Applications, BM-FA, which took place annually between 2009 and 2014. https://link.springer.com/book/10.1007%2F978-3-319-21912-7
The 9 papers presented in this volume were carefully reviewed and selected from a total of 58 pap...
This presentation is about a new process of enterprise modelling with conventions .
This paper investigates the use of modeling conventions for enterprise models. With the help of Archi, a tool supporting the ArchiMate standard, we have enhanced the enterprise modeling process with semantic modeling conventions that support assessment of enterprise models during their design. For enterprise architects who want more from ArchiMate...
Presentation of the Paper at BMSD 2022.
Enterprise modeling is a set of tools, methods and practices
for an aligned development of business, functional, organizational
and technical aspects of an enterprise. Therefore, an enterprise model is
always a set of sub-models of different semantics. In order to form a consistent
enterprise model, its sub-m...
Constraint Formalization for Automated Assessment of Enterprise Models
https://www.youtube.com/watch?v=c-4zooDS_Bo
There are two sorts of performance business rules: 1 .effectiveness can be seen as reachability of desired events in the process; 2. efficiency can be seen as desired sub-sequences of events or orders of events; Our result is a set of interview questions directing to answers that can be reformulated as performance business rules. The result has bee...
Process Mining and Performance Business Rules
https://www.youtube.com/watch?v=zTKQKEWRo04
Process mining uses event logs to build a business process model, which potentially can be used to better understand the business process performance. However, the understanding of performance almost always demands definitions in form of performance business rules within the business process. This means that process mining should be accompanied wit...
Enterprises always do their business within some restrictions. In a team of enterprise architects, the restrictions are transformed into the modelling conventions and the corresponding modelling constraints that should be consistently applied across all enterprise models. This paper presents an approach for refining and formalizing modeling convent...
Enterprise modeling is a set of tools, methods and practices
for an aligned development of business, functional, organizational
and technical aspects of an enterprise. Therefore, an enterprise model is
always a set of sub-models of different semantics. In order to form a consistent
enterprise model, its sub-models should be aligned to each other.
T...
The motivation of this work is the notion of transparency in the usage of personal data stated by the General Data Protection Regulation (the GDPR applied in the European Union from May 2018).
The notion of transparency is differently understood by companies and individuals.
For companies is sufficient to get the consent about the use of data.
An...
The General Data Protection Regulation (GDPR) requires transparency about the use of personal data. However, what does the transparency mean for an individual? This transparency is an ability of an individual to uniformly fulfill actions stated in the GDPR from checking his/her data usage to erasing data. An individual assumes that these actions ar...
Data applied for illustration aprocess mining method for analysing performance-based business rules of the application process at an employment agency.
Presentation of A conceptual model for a KPI design simulation project and Testing of the conceptual model with executable protocol models for KPI design simulation projects
Design of key performance indicators (KPIs) is a repeated and challenging problem for organizations. KPIs are measured at the operational level, but are used to manage organizations at the strategic level. Strategic goals often change, and professionals with different backgrounds must understand and implement new KPIs that correspond to them. Nowad...
Information sharing between government organizations is regulated by Service Level Agreements (SLA’s).
Design and implementation of an SLA demands involvement representatives of several organizations.
They need to communicate with the same concepts and validate the requirements for the service and
quality indicators. In order to support the design...
Information sharing between government organizations is regulated by Service Level Agreements (SLA’s). Design and implementation of an SLA demands involvement representatives of several organizations. They need to communicate with the same concepts and validate the requirements for the service and quality indicators. In order to support the design...
Information sharing between government organizations is re\-gulated by Service Level Agreements (SLA's). Design and implementation of an SLA demands involvement representatives of several organizations. They need to communicate with the same concepts and validate the requirements for the service and quality indicators.
In order to support the desig...
Presentation at BMSD2020
The cognitive basis of any decision making process is a comparison. This paper presents evidence from two distinct cases showing that decision making is facilitated by selecting specific sets of business concepts for comparison. The first case illustrates modelling of a new business process that does not exist yet. In this case, the concept for com...
Acceptance of novel formal methods-based approaches by
businesses depends on involvement of the existing (not imaginary) business
roles in the process of their application. This paper presents an AQ1
extension of frameworks for auditing with process mining with a series of
participatory workshops involving three business roles: Business Expert,
Aud...
This is a short introduction on how to model using the 4EM method.
Other enterprise modelling notations use similar principles, so by studying one method, you will grasp the ideas of enterprise modelling in general.
Poster for presentation of the article "Categories of Research Methods and Types of Research Results
Illustrated with a Continuous Project"
Change analysis of enterprise architectures is usually done by observing differences between two enterprise
architectures, As-Is and To-Be. If the As-Is and To-Be have a lot of differences, it is problematic to manually
create a correct view on changes. This paper proposes a revision of a definition of the Gap of Changes and
defines it as a languag...
Research projects are often continuous, they are initiated by one researcher and continued by another. Each
researcher needs to understand the continuous project and his part in it. This part we call a mini project.
Explanation of research methods and projects results in literature does not help in understanding continuous
research projects. Descri...
Change analysis of enterprise architectures is usually done by observing differences between two enterprise architectures, As-Is and To-Be. If the As-Is and To-Be have a lot of differences, it is problematic to manually create a correct view on changes. This paper proposes a revision of a definition of the Gap of Changes and defines it as a languag...
Grant Application Process Data set dataset contains:
1) The anonimised file of the process log:
Grants Export ISA4all 2010-2015 anonimysed.csv
2) The Protocol of experiment. 4 files in folder Protocol.
3) Selections, 9 files made for metrics in folder Grant 2014.
LICENCE AGREEMENT:
The dataset is freely available under the following terms and cond...
Business applications often use such data structures as Presence Patterns for presentation of numbers of customers in service-oriented businesses including education, retailing and media. Presence Patterns contain open data derived from internal data of organizations. In this paper, we investigate different ways of defining Presence Patterns and po...
Business applications often use such data structures as Presence Patterns for presentation of numbers of customers in service-oriented businesses including education, retailing and media. Presence Patterns contain open data derived from internal data of organizations.
In this paper, we investigate different ways of defining Presence Patterns and po...
Audit of processes to verify legal compliance is a necessary activity in banks, municipalities and many other sectors. In theory, by using log-files and process mining tools, auditors can automate the auditing process instead of data gathering and taking samples. However, audits are rarely supported by process mining tools in practice.
This paper i...
An innovation that is substantial enough to change the enterprise architecture poses a problem for a system architect. Enterprise architecture modeling methods and tools do not support the distinction between the As-Is architecture and the To-Be architecture in one view model. Recognizing the changes becomes similar to a game of “finding changes in...
An innovation that is substantial enough to change the enterprise architecture poses a problem for a system architect. Enterprise architecture modeling methods and tools do not support the distinction between the As-Is architecture and the To-Be architecture in one view model. Recognizing the changes becomes similar to a game of “finding changes in...
It is a good practice to start the description of any modeling and simulation approach with an outline of the class of systems for which it is best suited. Business systems are the focus of modeling and simulation approach presented in this book. The approach is based on two notions of interaction. The first notion is an interaction as a pair of a...
This chapter presents an overview of different variants of behavior modeling semantics and explains the choice of the Protocol Modeling semantics as one of the foundations of Interactive Modeling and Simulation.
This chapter describes one of the concerns differentiating business systems from other systems, the motivation concern. The chapter starts with the definition of motivation used in social sciences. The role of motivation as a production force is emphasized. Then, the business system perspective is taken. The aim is to build the motivation functiona...
This chapter discusses modeling of distributed business systems also called multiparty communication systems. The goals of such systems cannot be achieved without communication of parties. Communication is inherently nondeterministic as it depends on the communication infrastructure. Therefore, modeling of communication is supported with a specific...
Business simulation models often include performance indicators. This chapter focuses on design of performance indicators (PIs) and key performance indicators (KPIs) and on analysis of their properties. First, the existing approaches to design of KPIs are discussed and the methods of their definition are briefly described. The relation of KPIs to s...
This chapter presents four cases of interactive modeling and simulation: (1) a library; (2) a mobile phone with a phone book; (3) a service called Formal Accreditation of Prior Learning; (4) a system for preparation of a document by several participants. The cases may be seen as examples of course assignments for those students who follow a course...
Human–model interaction involves a repeated action of a human affecting the system and an interpretation of the model reactions and visible state. The model is produced using a behavior modeling semantics, and the interpretation is made in the semantics of goals. In order to make the human–model interaction possible, these two semantics should be c...
This chapter focuses on goal modeling as the second foundation of the Interactive Modeling and Simulation. A short review of goal modeling approaches is presented in order to select the semantic elements related to behavior models. Related semantics of behavior modeling and goal modeling is a necessary condition for interpretation of behavior model...
Enterprise architecture is periodically changed. The visualization of changes is demanded for communication
of the teams implementing changes. In this paper, we use the modern cases of transformation of ERP
(Enterprise Resource Planning) systems to the Best of Breed solutions and the popular modeling language
ArchiMate with its extensions to propos...
This classroom-texted textbook/reference presents a set of useful modeling techniques, describing how these can be combined into a powerful framework for the analysis and design of business systems. These techniques follow an interactive modeling and simulation (IMS) approach, enabling the modeling and simulation of separate parts of the system at...
presentatie voor master studenten
This chapter provides a survey of existing approaches to discrete events behavior modeling. The comparison is based on the selected set of semantic elements useful for the major system life cycle activities, such as requirements engineering, analysis, system understanding, system design and evolution. The semantic elements are identified in the obs...
Research is impossible without definitions
Nominal definition
What is a definition
Types of the definitions and the type of research
What cannot be named “ a definition”
Examples
Conclusions
Review of the book: Wil M.P. van der Aalst
Process mining
Discovery, Conformance and Enhancement of Business Processes
Open University of the Netherlands How can we transform modelling into an instrument of requirement engineers? How can we make models scalable and comprehensive at the same time? How can we achieve traceability of the domain requirements in models? The EXTREME (Executable Requirements Engineering, Management and Evolution) approach answers these qu...
We define a type of concern called a decision module. Decision modules can be seen as a specific subset of often changeable business rules, identified in requirements. We present decision modules as protocol machines in protocol models. The proven property of such protocol machines is their unidirectional dependency from other protocol machines. Th...
There is ongoing work on conceptual modelling of such business notions as Affordance and Capability. We have found that such business notions as Affordance and Capability can be constructively defined using elements and properties of executable behaviour models. In this paper, we clarify the definitions of Affordance and Capability using Coloured P...
Separation of concerns can have different forms. The well accepted concern is an object behavior usually specified as a life cycle module. In this paper, we define another type of concern, a decision module, and identify it in requirements and models. Separation of decision modules in programs may improve traceability of requirements and simplify c...
The idea of software testing by software itself drives the attempts of creation of model based testing approaches.
Model based testing relies on models, that encode the desired behaviour of a system, the relevant behaviour of its environment; however, both the static and the behaviour models are not directly applicable for model based testing. The...
Understanding how and why the capability of one set of business resources, its structural arrangements and mechanisms compared to another works can provide competitive advantage in terms of new business processes and product and service development. However, most business models of capability are descriptive and lack formal modelling language to qu...
The main idea behind this book is to put Enterprise Modeling as a top for understanding capturing and communication organizational knowledge. The authors indicate that Enterprise Modeling should not be seen as another word for process modeling. EM addresses multiple perspectives depending on the modeled situation. It is related to business process...
We introduce time semantics into UML class and statechart diagrams. This extends the expressiveness of UML for specification of real-time systems and allows to specify verification properties of real-time systems by means of Timed Computation Tree Logic. We furthermore propose a way to collect stereotypes for specification of real-time systems. The...
Key Performance Indicators (KPIs) are the main instruments of Business Performance Management. KPIs are the measures that are translated to both the strategy and the business process. These measures are often designed for an industry sector with the assumptions about business processes in organizations. However, the assumptions can be too incomplet...
Competition for funding between organizations attracts attention to their Key Performance Indicators (KPIs).
KPIs are usually designed with a top-down approach as families of measures for a group of business units
and often do not take into account the difference in goals and business processes of organizations at the
strategic, tactical and operat...
Requirements engineering is a process of constantly changing worlds of intentions, goals, and system models. Conventional semantics for goal specifications is synchronous. Semantics of conventional system modeling techniques is asynchronous. This semantic mismatch complicates requirements engineering. In this chapter, we propose a new method EXTREM...
Key performance indicators (KPIs) play an important role in making decisions for correct and timely investments. Validation of desired properties of KPIs demands the execution of business processes. However, KPIs are often designed for a business sector assuming fragmental knowledge about business processes. The validation of properties of KPIs is...
This paper presents an approach to designing interactive workflow to achieve guaranteed completion. The approach is based on the idea of modeling motivation, representing how the workflow solicits actions from its environment. The concept of motivation is used to differentiate between actions that are solicited by the workflow and actions that are...
Presentation at BM-FA 2012 (Behaviour Modelling Foundations and Applications) at ECMDA 2012
The Object Management Group predicts that the Business Process Modelling Notation will be eventually merged with the Business Motivation Model to be implemented in integrated tool suites. However, conventional modelling semantics have asynchronous semantics and therefore have difficulties to accommodate motivation of objectives specified on the bas...
An Enterprise JavaBeans (EJB) interceptor is a software mechanism that provides for introducing behavior implemented as separate code into the execution of a Java application. In this way EJB interceptors provide a clear separation of the core functionality of the bean and other concerns, such as logging or performance analysis. Despite the beauty...
Modelling techniques are instruments for reality reflection. Precision of reality reflection demands coexistence of different abstraction types like objects and aspects in one model. Experiments with extension of modelling techniques aimed to accommodate combinations of objects and aspects in one specification have resulted in aspect-oriented exten...
Recent trends in software system development point to the growing importance of behaviour modelling.
These trends are:
The growing role of business process management and workflow;
The growing importance of Service-Orientation as an architectural principle, with consequent emphasis on well defined interaction between software components;
The import...
The last decade has seen the development of diverse aspect-oriented modeling (AOM) approaches. This paper presents eight different AOM approaches that produce models at different level of abstraction. The approaches are different with respect to the phases
of the development lifecycle they target, and the support they provide for model composition...
We present an executable and changeable reference model for Health Insurance Applications. The model is based on the published descriptions of Health Insurance Products and exploits properties of the compositional Protocol Modelling technique. We analyze the changes of Health Insurance Products made in the last six years. All changes found in offic...
Protocol Model of the Base Health Insurance in
2006.
Analysis of changes introduced from 2006 till
2011.
Types of Model Modification.
Behavioural Modelling –
Foundations and Applications
BM-FA2011
http://www.ou.nl/bm-fa
In collaboration with the Seventh European
Conference on Modelling Foundations and
Applications ECMFA 2011
Understand the possibilities and limitations of modelling semantics in keeping intellectual control over evolving models
Understand possibilities and limitations in keeping intellectual control over evolving models using different type of modeling semantics via
localization of concerns,
verification and
localization of reasoning on parts about behaviour of the whole.
Software architecture is the discipline concerned with model-based description and analysis of software systems with a view to satisfying the (often contradictory) concerns of stakeholders. The software architecture of a system is a high-level description of its components and their interactions.
The central theme of this course book is balancing...
Model-driven software engineering community faces the problems related to the growing complexity of system models and their rapid evolution. These problems are similar to the problems of programming. Driven by the ideas of Aspect-Oriented Programming many modelling techniques were revised in attempts to find their ways to deal with model complexity...