Ella Roubtsova

Ella Roubtsova
Open Universiteit Nederland | OU · http://ellaroubtsova.weebly.com/

PhD

About

154
Publications
100,042
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
338
Citations
Citations since 2017
36 Research Items
71 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
Introduction
Ella Roubtsova currently works at the Open Universiteit Nederland doing research in Computer Architecture, Human-computer Interaction and Information Systems (Business Informatics). Springer book https://link.springer.com/book/10.1007%2F978-3-319-21912-7 Springer book https://www.springer.com/gp/book/9783319151014 ACM https://dl.acm.org/profile/81100404515
Additional affiliations
March 2011 - July 2011
Munich University of Applied Sciences
Position
  • Invited Professor
October 2005 - present
Open Universiteit Nederland
Position
  • Professor (Assistant)
October 2005 - November 2018
Open Universiteit Nederland
Position
  • Professor (Assistant)
Education
September 1986 - December 1989
National University of Science and Technology MISIS https://en.misis.ru
Field of study
  • Informatics

Publications

Publications (154)
Conference Paper
Full-text available
We define a type of concern called a decision module. Decision modules can be seen as a specific subset of often changeable business rules, identified in requirements. We present decision modules as protocol machines in protocol models. The proven property of such protocol machines is their unidirectional dependency from other protocol machines. Th...
Data
Full-text available
Article
Full-text available
Web services are goal-oriented software systems and often need to influence or motivate particular behaviour of their communication parties: humans and other services. This paper investigates modeling of motivation for human-service interaction. It shows why motivation needs a separate model different from the service process model, how to specify...
Article
Full-text available
The aim of this paper is to explore the modeling of crosscutting behavioral abstractions. We argue that behavioral aspects can be seen as a particular kind of more general behavioral abstraction called a “mixin”. Mixins support a compositional style of modeling, whereby a complete class definition is constructed by composing one or more mixins each...
Book
Full-text available
This book constitutes revised selected papers from the six International Workshops on Behavior Modelling - Foundations and Applications, BM-FA, which took place annually between 2009 and 2014. https://link.springer.com/book/10.1007%2F978-3-319-21912-7 The 9 papers presented in this volume were carefully reviewed and selected from a total of 58 pap...
Presentation
Full-text available
Presentation of the Paper at BMSD 2022. Enterprise modeling is a set of tools, methods and practices for an aligned development of business, functional, organizational and technical aspects of an enterprise. Therefore, an enterprise model is always a set of sub-models of different semantics. In order to form a consistent enterprise model, its sub-m...
Presentation
Full-text available
Constraint Formalization for Automated Assessment of Enterprise Models https://www.youtube.com/watch?v=c-4zooDS_Bo
Poster
Full-text available
There are two sorts of performance business rules: 1 .effectiveness can be seen as reachability of desired events in the process; 2. efficiency can be seen as desired sub-sequences of events or orders of events; Our result is a set of interview questions directing to answers that can be reformulated as performance business rules. The result has bee...
Presentation
Full-text available
Process Mining and Performance Business Rules https://www.youtube.com/watch?v=zTKQKEWRo04
Conference Paper
Full-text available
Process mining uses event logs to build a business process model, which potentially can be used to better understand the business process performance. However, the understanding of performance almost always demands definitions in form of performance business rules within the business process. This means that process mining should be accompanied wit...
Conference Paper
Full-text available
Enterprises always do their business within some restrictions. In a team of enterprise architects, the restrictions are transformed into the modelling conventions and the corresponding modelling constraints that should be consistently applied across all enterprise models. This paper presents an approach for refining and formalizing modeling convent...
Chapter
Full-text available
Enterprise modeling is a set of tools, methods and practices for an aligned development of business, functional, organizational and technical aspects of an enterprise. Therefore, an enterprise model is always a set of sub-models of different semantics. In order to form a consistent enterprise model, its sub-models should be aligned to each other. T...
Presentation
Full-text available
The motivation of this work is the notion of transparency in the usage of personal data stated by the General Data Protection Regulation (the GDPR applied in the European Union from May 2018). The notion of transparency is differently understood by companies and individuals. For companies is sufficient to get the consent about the use of data. An...
Chapter
Full-text available
The General Data Protection Regulation (GDPR) requires transparency about the use of personal data. However, what does the transparency mean for an individual? This transparency is an ability of an individual to uniformly fulfill actions stated in the GDPR from checking his/her data usage to erasing data. An individual assumes that these actions ar...
Data
Data applied for illustration aprocess mining method for analysing performance-based business rules of the application process at an employment agency.
Presentation
Full-text available
Presentation of A conceptual model for a KPI design simulation project and Testing of the conceptual model with executable protocol models for KPI design simulation projects
Conference Paper
Full-text available
Design of key performance indicators (KPIs) is a repeated and challenging problem for organizations. KPIs are measured at the operational level, but are used to manage organizations at the strategic level. Strategic goals often change, and professionals with different backgrounds must understand and implement new KPIs that correspond to them. Nowad...
Presentation
Full-text available
Information sharing between government organizations is regulated by Service Level Agreements (SLA’s). Design and implementation of an SLA demands involvement representatives of several organizations. They need to communicate with the same concepts and validate the requirements for the service and quality indicators. In order to support the design...
Chapter
Full-text available
Information sharing between government organizations is regulated by Service Level Agreements (SLA’s). Design and implementation of an SLA demands involvement representatives of several organizations. They need to communicate with the same concepts and validate the requirements for the service and quality indicators. In order to support the design...
Conference Paper
Full-text available
Information sharing between government organizations is re\-gulated by Service Level Agreements (SLA's). Design and implementation of an SLA demands involvement representatives of several organizations. They need to communicate with the same concepts and validate the requirements for the service and quality indicators. In order to support the desig...
Presentation
Full-text available
Presentation at BMSD2020
Conference Paper
Full-text available
The cognitive basis of any decision making process is a comparison. This paper presents evidence from two distinct cases showing that decision making is facilitated by selecting specific sets of business concepts for comparison. The first case illustrates modelling of a new business process that does not exist yet. In this case, the concept for com...
Article
Full-text available
Acceptance of novel formal methods-based approaches by businesses depends on involvement of the existing (not imaginary) business roles in the process of their application. This paper presents an AQ1 extension of frameworks for auditing with process mining with a series of participatory workshops involving three business roles: Business Expert, Aud...
Presentation
Full-text available
This is a short introduction on how to model using the 4EM method. Other enterprise modelling notations use similar principles, so by studying one method, you will grasp the ideas of enterprise modelling in general.
Poster
Full-text available
Poster for presentation of the article "Categories of Research Methods and Types of Research Results Illustrated with a Continuous Project"
Poster
Full-text available
Change analysis of enterprise architectures is usually done by observing differences between two enterprise architectures, As-Is and To-Be. If the As-Is and To-Be have a lot of differences, it is problematic to manually create a correct view on changes. This paper proposes a revision of a definition of the Gap of Changes and defines it as a languag...
Conference Paper
Full-text available
Research projects are often continuous, they are initiated by one researcher and continued by another. Each researcher needs to understand the continuous project and his part in it. This part we call a mini project. Explanation of research methods and projects results in literature does not help in understanding continuous research projects. Descri...
Conference Paper
Full-text available
Change analysis of enterprise architectures is usually done by observing differences between two enterprise architectures, As-Is and To-Be. If the As-Is and To-Be have a lot of differences, it is problematic to manually create a correct view on changes. This paper proposes a revision of a definition of the Gap of Changes and defines it as a languag...
Data
Grant Application Process Data set dataset contains: 1) The anonimised file of the process log: Grants Export ISA4all 2010-2015 anonimysed.csv 2) The Protocol of experiment. 4 files in folder Protocol. 3) Selections, 9 files made for metrics in folder Grant 2014. LICENCE AGREEMENT: The dataset is freely available under the following terms and cond...
Chapter
Full-text available
Business applications often use such data structures as Presence Patterns for presentation of numbers of customers in service-oriented businesses including education, retailing and media. Presence Patterns contain open data derived from internal data of organizations. In this paper, we investigate different ways of defining Presence Patterns and po...
Conference Paper
Full-text available
Business applications often use such data structures as Presence Patterns for presentation of numbers of customers in service-oriented businesses including education, retailing and media. Presence Patterns contain open data derived from internal data of organizations. In this paper, we investigate different ways of defining Presence Patterns and po...
Conference Paper
Full-text available
Audit of processes to verify legal compliance is a necessary activity in banks, municipalities and many other sectors. In theory, by using log-files and process mining tools, auditors can automate the auditing process instead of data gathering and taking samples. However, audits are rarely supported by process mining tools in practice. This paper i...
Conference Paper
Full-text available
An innovation that is substantial enough to change the enterprise architecture poses a problem for a system architect. Enterprise architecture modeling methods and tools do not support the distinction between the As-Is architecture and the To-Be architecture in one view model. Recognizing the changes becomes similar to a game of “finding changes in...
Article
Full-text available
An innovation that is substantial enough to change the enterprise architecture poses a problem for a system architect. Enterprise architecture modeling methods and tools do not support the distinction between the As-Is architecture and the To-Be architecture in one view model. Recognizing the changes becomes similar to a game of “finding changes in...
Chapter
It is a good practice to start the description of any modeling and simulation approach with an outline of the class of systems for which it is best suited. Business systems are the focus of modeling and simulation approach presented in this book. The approach is based on two notions of interaction. The first notion is an interaction as a pair of a...
Chapter
This chapter presents an overview of different variants of behavior modeling semantics and explains the choice of the Protocol Modeling semantics as one of the foundations of Interactive Modeling and Simulation.
Chapter
This chapter describes one of the concerns differentiating business systems from other systems, the motivation concern. The chapter starts with the definition of motivation used in social sciences. The role of motivation as a production force is emphasized. Then, the business system perspective is taken. The aim is to build the motivation functiona...
Chapter
This chapter discusses modeling of distributed business systems also called multiparty communication systems. The goals of such systems cannot be achieved without communication of parties. Communication is inherently nondeterministic as it depends on the communication infrastructure. Therefore, modeling of communication is supported with a specific...
Chapter
Business simulation models often include performance indicators. This chapter focuses on design of performance indicators (PIs) and key performance indicators (KPIs) and on analysis of their properties. First, the existing approaches to design of KPIs are discussed and the methods of their definition are briefly described. The relation of KPIs to s...
Chapter
This chapter presents four cases of interactive modeling and simulation: (1) a library; (2) a mobile phone with a phone book; (3) a service called Formal Accreditation of Prior Learning; (4) a system for preparation of a document by several participants. The cases may be seen as examples of course assignments for those students who follow a course...
Chapter
Human–model interaction involves a repeated action of a human affecting the system and an interpretation of the model reactions and visible state. The model is produced using a behavior modeling semantics, and the interpretation is made in the semantics of goals. In order to make the human–model interaction possible, these two semantics should be c...
Chapter
Full-text available
This chapter focuses on goal modeling as the second foundation of the Interactive Modeling and Simulation. A short review of goal modeling approaches is presented in order to select the semantic elements related to behavior models. Related semantics of behavior modeling and goal modeling is a necessary condition for interpretation of behavior model...
Conference Paper
Full-text available
Enterprise architecture is periodically changed. The visualization of changes is demanded for communication of the teams implementing changes. In this paper, we use the modern cases of transformation of ERP (Enterprise Resource Planning) systems to the Best of Breed solutions and the popular modeling language ArchiMate with its extensions to propos...
Book
This classroom-texted textbook/reference presents a set of useful modeling techniques, describing how these can be combined into a powerful framework for the analysis and design of business systems. These techniques follow an interactive modeling and simulation (IMS) approach, enabling the modeling and simulation of separate parts of the system at...
Research
Full-text available
presentatie voor master studenten
Article
Full-text available
This chapter provides a survey of existing approaches to discrete events behavior modeling. The comparison is based on the selected set of semantic elements useful for the major system life cycle activities, such as requirements engineering, analysis, system understanding, system design and evolution. The semantic elements are identified in the obs...
Research
Full-text available
Research is impossible without definitions Nominal definition What is a definition Types of the definitions and the type of research What cannot be named “ a definition” Examples Conclusions
Research
Full-text available
Presentation for master students
Research
Full-text available
Review of the book: Wil M.P. van der Aalst Process mining Discovery, Conformance and Enhancement of Business Processes
Conference Paper
Full-text available
Open University of the Netherlands How can we transform modelling into an instrument of requirement engineers? How can we make models scalable and comprehensive at the same time? How can we achieve traceability of the domain requirements in models? The EXTREME (Executable Requirements Engineering, Management and Evolution) approach answers these qu...
Conference Paper
Full-text available
We define a type of concern called a decision module. Decision modules can be seen as a specific subset of often changeable business rules, identified in requirements. We present decision modules as protocol machines in protocol models. The proven property of such protocol machines is their unidirectional dependency from other protocol machines. Th...
Conference Paper
Full-text available
There is ongoing work on conceptual modelling of such business notions as Affordance and Capability. We have found that such business notions as Affordance and Capability can be constructively defined using elements and properties of executable behaviour models. In this paper, we clarify the definitions of Affordance and Capability using Coloured P...
Conference Paper
Full-text available
Separation of concerns can have different forms. The well accepted concern is an object behavior usually specified as a life cycle module. In this paper, we define another type of concern, a decision module, and identify it in requirements and models. Separation of decision modules in programs may improve traceability of requirements and simplify c...
Conference Paper
Full-text available
The idea of software testing by software itself drives the attempts of creation of model based testing approaches. Model based testing relies on models, that encode the desired behaviour of a system, the relevant behaviour of its environment; however, both the static and the behaviour models are not directly applicable for model based testing. The...
Conference Paper
Full-text available
Understanding how and why the capability of one set of business resources, its structural arrangements and mechanisms compared to another works can provide competitive advantage in terms of new business processes and product and service development. However, most business models of capability are descriptive and lack formal modelling language to qu...
Research
Full-text available
The main idea behind this book is to put Enterprise Modeling as a top for understanding capturing and communication organizational knowledge. The authors indicate that Enterprise Modeling should not be seen as another word for process modeling. EM addresses multiple perspectives depending on the modeled situation. It is related to business process...
Article
Full-text available
We introduce time semantics into UML class and statechart diagrams. This extends the expressiveness of UML for specification of real-time systems and allows to specify verification properties of real-time systems by means of Timed Computation Tree Logic. We furthermore propose a way to collect stereotypes for specification of real-time systems. The...
Conference Paper
Full-text available
Key Performance Indicators (KPIs) are the main instruments of Business Performance Management. KPIs are the measures that are translated to both the strategy and the business process. These measures are often designed for an industry sector with the assumptions about business processes in organizations. However, the assumptions can be too incomplet...
Article
Full-text available
Competition for funding between organizations attracts attention to their Key Performance Indicators (KPIs). KPIs are usually designed with a top-down approach as families of measures for a group of business units and often do not take into account the difference in goals and business processes of organizations at the strategic, tactical and operat...
Article
Full-text available
Requirements engineering is a process of constantly changing worlds of intentions, goals, and system models. Conventional semantics for goal specifications is synchronous. Semantics of conventional system modeling techniques is asynchronous. This semantic mismatch complicates requirements engineering. In this chapter, we propose a new method EXTREM...
Article
Full-text available
Key performance indicators (KPIs) play an important role in making decisions for correct and timely investments. Validation of desired properties of KPIs demands the execution of business processes. However, KPIs are often designed for a business sector assuming fragmental knowledge about business processes. The validation of properties of KPIs is...
Presentation
Full-text available
Why do we need KPIs?
Conference Paper
Full-text available
This paper presents an approach to designing interactive workflow to achieve guaranteed completion. The approach is based on the idea of modeling motivation, representing how the workflow solicits actions from its environment. The concept of motivation is used to differentiate between actions that are solicited by the workflow and actions that are...
Presentation
Full-text available
Presentation at BM-FA 2012 (Behaviour Modelling Foundations and Applications) at ECMDA 2012
Article
Full-text available
The Object Management Group predicts that the Business Process Modelling Notation will be eventually merged with the Business Motivation Model to be implemented in integrated tool suites. However, conventional modelling semantics have asynchronous semantics and therefore have difficulties to accommodate motivation of objectives specified on the bas...
Article
Full-text available
An Enterprise JavaBeans (EJB) interceptor is a software mechanism that provides for introducing behavior implemented as separate code into the execution of a Java application. In this way EJB interceptors provide a clear separation of the core functionality of the bean and other concerns, such as logging or performance analysis. Despite the beauty...
Conference Paper
Full-text available
Modelling techniques are instruments for reality reflection. Precision of reality reflection demands coexistence of different abstraction types like objects and aspects in one model. Experiments with extension of modelling techniques aimed to accommodate combinations of objects and aspects in one specification have resulted in aspect-oriented exten...
Conference Paper
Full-text available
Recent trends in software system development point to the growing importance of behaviour modelling. These trends are: The growing role of business process management and workflow; The growing importance of Service-Orientation as an architectural principle, with consequent emphasis on well defined interaction between software components; The import...
Conference Paper
Full-text available
The last decade has seen the development of diverse aspect-oriented modeling (AOM) approaches. This paper presents eight different AOM approaches that produce models at different level of abstraction. The approaches are different with respect to the phases of the development lifecycle they target, and the support they provide for model composition...
Presentation
Full-text available
Protocol Model of the Base Health Insurance in 2006. Analysis of changes introduced from 2006 till 2011. Types of Model Modification.
Book
Full-text available
Behavioural Modelling – Foundations and Applications BM-FA2011 http://www.ou.nl/bm-fa In collaboration with the Seventh European Conference on Modelling Foundations and Applications ECMFA 2011
Presentation
Full-text available
Understand the possibilities and limitations of modelling semantics in keeping intellectual control over evolving models
Presentation
Full-text available
Understand possibilities and limitations in keeping intellectual control over evolving models using different type of modeling semantics via localization of concerns, verification and localization of reasoning on parts about behaviour of the whole.
Conference Paper
Full-text available
We present an executable and changeable reference model for Health Insurance Applications. The model is based on the published descriptions of Health Insurance Products and exploits properties of the compositional Protocol Modelling technique. We analyze the changes of Health Insurance Products made in the last six years. All changes found in offic...