Robotic Process Automation
Robotic Process Automation
)
Robotic Process Automation
Also of Interest
Machine Learning and Visual Perception
Baochang Zhang, 2020
ISBN 978-3-11-059553-6, e-ISBN (PDF) 978-3-11-059556-7
e-ISBN (EPUB) 978-3-11-059322-8
Soft Computing
Techniques in Engineering Sciences
Edited by: Mangey Ram, Suraj B. Singh, 2020
ISBN 978-3-11-062560-8, e-ISBN (PDF) 978-3-11-062861-6
e-ISBN (EPUB) 978-3-11-062571-4
Computational Intelligence
Theoretical Advances and Advanced Applications
Edited by: Dinesh C.S. Bisht, Mangey Ram, 2020
ISBN 978-3-11-065524-7, e-ISBN (PDF) 978-3-11-067135-3
e-ISBN (EPUB) 978-3-11-066833-9
Robotic Process
Automation
|
Management, Technology, Applications
Edited by
Christian Czarnecki and Peter Fettke
Editors
Prof. Dr.-Ing. Christian Czarnecki Prof. Dr. Peter Fettke
Hamm-Lippstadt University of Saarland University
Applied Sciences German Research Center
Marker Allee 76-78 for Artificial Intelligence (DFKI)
59063 Hamm Campus D3 2
Germany 66123 Saarbrücken
christian.czarnecki@hshl.de Germany
peter.fettke@dfki.de
ISBN 978-3-11-067668-6
e-ISBN (PDF) 978-3-11-067669-3
e-ISBN (EPUB) 978-3-11-067677-8
www.degruyter.com
Preface
For decades, business processes have been understood as a necessary but complex
conglomeration of boxes and arrows. Their design, optimization, and management
were and are undoubtedly an interesting field of activity for researchers and prac-
titioners. We both have a long passion for processes. Christian traveled the Middle
East for more than 10 years helping companies in managing their processes before he
started teaching this topic. Peter firmly believes that processes must be understood as
first-class citizens when designing computer-integrated systems. However, the valid
but unpleasant question of whether processes are just paper work with – at best – only
limited impact on reality was somehow the metaphoric Sword of Damocles hanging
over our processes.
Therefore, the imagination of tiny robots running through these processes was
fascinating from the first moment. It closes the gap between the conceptual work and
its implementation. Additionally, it gives a flavor of innovation to a topic that already
became a little outmoded in times of digitalization, artificial intelligence, and Industry
4.0. In the end, it comes as no surprise that robotic process automation (RPA) is today
a widely discussed and recognized topic in practice and academia.
The idea to combine the results and insights of researchers and practitioners in
one book was born at the end of 2019. We both believe that RPA is a broad topic with
interesting and promising opportunities as well as developments in various content
areas. Our aim with this book is to bring these different viewpoints together and to
offer an understanding of RPA that goes beyond a simple automation of routine tasks.
In addition, the publication of application-oriented results as well as the knowledge
transfer between research and practice were our major goal. Now, we are happy to
present 19 chapters written by 51 authors coming from 7 countries. The topics range
from management over technology to applications.
When we launched the call for chapters in January 2020, at that point we did not
expect that writing this book would coincide with one of the worst pandemic situa-
tions of this century. We sincerely appreciate the commitment of all authors in these
difficult times. They all did a great job! Each chapter offers interesting insights, new
developments, and/or inspiring viewpoints. All chapters have been subject to various
reviews, and all authors have worked hard to make this book a reality.
Looking back, we both have enjoyed editing this book. We have met new and old
friends, were in contact with widely recognized experts in their field, have visited – at
least virtually – relevant conferences, and learned new perspectives on RPA. We hope
that our readers feel our passion for their topics. Enjoy reading!
https://doi.org/10.1515/9783110676693-201
Contents
Preface | V
Editors | IX
Authors | XI
Part I: Introduction
Adrian Hofmann, Tobias Prätori, Franz Seubert, Jonas Wanner, Marcus Fischer, and
Axel Winkelmann
4 Process selection for RPA projects
A holistic approach | 77
Mario Richard Smeets, Ralf Jürgen Ostendorf, and Peter Gordon Rötzel
14 RPA for the financial industry
Particular challenges and outstanding suitability combined | 263
Eldar Sultanow, Alina Chircu, René Plath, Daniel Friedmann, Tim Merscheid, and
Kalpesh Sharma
17 AI evolves IA
A practitioner view on artificial intelligence information architecture | 349
Index | 403
Editors
Prof. Dr. Christian Czarnecki
Professor of Information Systems, Hamm-Lippstadt University of Applied Sciences, Germany
Dr. Peter Fettke is a professor of business informatics at Saarland University and principal re-
searcher, research fellow and group leader at the German Research Center for Artificial Intelligence
(DFKI), Saarbrücken. Peter, with his group of about 30 people, is interested in concepts, methods,
and techniques at the intersection between business informatics and artificial intelligence, namely
the modeling of computer-integrated systems, automated planning, and deep learning. Peter is the
author of more than 150 peer-reviewed publications. His work is among the most cited articles in
leading international journals on business informatics and he is one of the top 5 most cited scien-
tists at DFKI. He is also a sought-after reviewer for renowned conferences, journals, and research
organizations.
https://doi.org/10.1515/9783110676693-202
Authors
Dr. Simone Agostinelli
PhD Student in Engineering in Computer Science, Sapienza Università di Roma, Italy
Dr. Simone Agostinelli received the B. S. and M. S. degrees in engineering in computer science from
Sapienza Università di Roma. He is currently pursuing the Ph. D. degree in engineering in computer
Science with the Sapienza Università di Roma. His research interests include synthesizing strategies
for robotic process automation via process mining and automated planning techniques. In 2019, he
received the Forum Award at the 31st International Conference on Advanced Information Systems
Engineering (CAiSE).
Dr. Gunnar Auth is professor of information systems and e-government at Meissen University of Ap-
plied Sciences (HSF), Germany. He completed his diploma degree in business information systems
at the University of Bamberg, Germany, and received a PhD degree in economics from the Univer-
sity of St Gallen (HSG), Switzerland. He started his professional career as an internal consultant at
DaimlerChrysler where he later worked in several management positions in logistics, operations and
quality management. Before he became a professor in 2012, he acted as IT director and representa-
tive of the CIO board at Leipzig University. His research focuses on IT project management, IT service
management and information management.
Frank Bensberg is Professor of Information Systems at the Faculty of Economic and Social Sciences
at Osnabrück University of Applied Sciences. After receiving the doctoral degree and the qualifica-
tion to lecture in Information Systems from the University of Münster, he worked at the Hochschule
für Telekommunikation Leipzig, Germany. Focal research areas are digitization, big data, data min-
ing, job mining and text analytics.
Dr. Tathagata Chakraborti is with IBM Research. His research focuses on human-AI interaction and
explainable AI. He received his Ph. D. from Arizona State University in 2018 with a CIDSE Graduate
Student of the Year Award and an honorable mention for the Best Dissertation Award from ICAPS,
the premier conference on automated planning and scheduling. He became one of IEEE’s AI’s 10 to
Watch in 2020.
Dr. Alina Chircu is a Professor and Senior Associate Dean at Bentley University, USA. She holds a
Ph. D. degree in Management Information Systems and bachelor’s and master’s degrees in Com-
https://doi.org/10.1515/9783110676693-203
XIV | Authors
puter Science. Her research interests include the business value, design, adoption and implemen-
tation of digital transformation initiatives and business process management. Her work has been
published in many academic journals, at international conferences and in various books. Dr. Chircu
has served as senior editor for the Electronic Commerce Research and Applications journal, asso-
ciate editor for journals and conferences, and chair, moderator and presenter in academic and prac-
titioner panels and workshops.
Philipp Croon
Lawyer, Kanzlei am Burgberg, Heinsberg, Germany
Philipp Croon is a lawyer in a small sized law firm in Germany and specializes in intellectual property
law and commercial and corporate law. Besides his main practice, he lectures students of cultural
education at the University of Applied Sciences Niederrhein.
Dr. Jens Dibbern is professor of information systems at the University of Bern, Department of Busi-
ness Administration in Switzerland. His research focuses on IT sourcing, platform ecosystems, sys-
tem implementation/use, and distributed collaboration. His publications appeared in Information
Systems Research (ISR), Management Information Systems Quarterly (MISQ), Journal of Manage-
ment Information Systems (JMIS), Journal of the Association of Information Systems (JAIS), and oth-
ers. He currently serves as department editor of Business & Information Systems Engineering (BISE).
José González Enríquez received the PhD degree in computer science, in 2017. He is currently a Lec-
turer with the Department of Computing Languages and Systems, University of Seville. He has been
a part of the organizing committee of different international conferences. He has collaborated with
many universities in several countries such as Southampton, Berkeley, or Poland, among others. In
2015, he received the Innovation Award for its innovative activity by Fujitsu Laboratories of Europe.
His research interests focus on robotic process automation, early testing, model-driven engineering
and systematic reviews methods.
Marcus Fischer holds a Ph. D. in Business Information System as well as a Bachelor’s and Master’s
degree in Business & Administration from the Julius-Maximilians-Universität Würzburg. He focuses
his research on business process management and business software. His work has been published
in Information & Management and Electronic Markets and has been presented at multiple inter-
national conferences, including the International Conference on Information Systems (ICIS), the
European Conference on Information Systems (ECIS), the Human Computer Interaction International
(HCII), and the Americas Conference on Information Systems (AMCIS).
Authors | XV
Daniel Friedmann
Capgemini, Nuremberg, Germany
Daniel Friedmann completed his B. Sc. in Computer Science and Media at the Nuremberg Institute of
Technology in 2019. He is currently studying for a master’s degree in Computer Science and working
at Capgemini as part of his master’s thesis. His areas of interest are cloud and container technology
as well as microservices and machine learning.
Oliver Gutermuth
Institute for Information Systems (IWi) at the German Research Center for Artificial Intelligence (DFKI)
and Saarland University, Germany
Oliver Gutermuth started researching at the Institute for Information Systems (IWi) at the German
Research Center for Artificial Intelligence (DFKI) in 2018. In the course of his doctoral studies, he is
working on intelligent technologies for the digital transformation of administrations. Strategies to
support and automate business processes in this domain are an important focus. His main tasks
include the management and execution of industrial and research projects as well as consulting for
the public sector. In these projects, he investigates, among other things, the potential of Robotic
Process Automation, mobile technologies as well as Process Mining. Furthermore, he develops ap-
plication concepts using artificial intelligence.
Adrian Hofmann
Research Assistant, Chair of Business Administration and Business Informatics, University of
Würzburg, Germany
Dr. Constantin Houy works at the Institute for Information Systems (IWi) at the German Research
Center for Artificial Intelligence (DFKI) as Chief Engineer. His research interests comprise business
XVI | Authors
Dr. Vatche Isahagian’s research spans a broad set of disciplines across distributed systems, AI, and
business processes. As a research staff member at IBM Research, he worked on several projects
including business process insight and service composition, OpenWhisk large scale Serverless
Computing framework, and the IBM Deep Learning as a Service. He currently co-leads a team of
researchers focused on improving business processes using AI capabilities such as planning and
conversational interfaces. Vatche has published in top-tier conferences such as CACM, BPM, AAAI,
KDD, VLDB, SDM, and INFOCOM. His first-authored work at the Middleware 2012 Conference received
the Best Paper award. He co-organized several workshops, and served as a program committee
member, demo co-chair, and publicity chair on several conferences.
Dr. Yasaman Khazaeni is a Research Staff Member and manager at IBM Research where she focuses
on application of conversational multi-agent systems in various applications like business process
automation and customer care. She holds an undergraduate degree in both electrical engineering
and petroleum engineering from Sharif University of Technology in Iran. In 2009, she continued her
graduate studies in petroleum engineering at West Virginia University where she earned her mas-
ter’s degree in reservoir engineering. She received her PhD in Systems Engineering from Boston Uni-
versity where she focused on multi-agent systems control and optimization with a specific interest
in event-driven systems. Her research interests are in the area of multi-agent systems, mathematical
modeling, optimization, operations research, machine learning and statistics.
Authors | XVII
Dr. Julia Kokina is an Associate Professor of Accounting at Babson College. She teaches accounting
analytics and undergraduate and graduate managerial accounting courses. Dr. Kokina’s research
has been published in various highly-ranked academic accounting journals. She has presented her
work at national and international conferences. Notably, in 2018, she was invited to speak at the
PCAOB International Audit Institute and in 2017 she was invited by the American Accounting Asso-
ciation to give a TED-like presentation on cognitive technologies in accounting at the Accounting is
Big Data Conference. Her current research work focuses on the implementation of Robotic Process
Automation in accounting and finance tasks and her teaching innovation centers around the incor-
poration of Alteryx and Tableau in accounting curriculum.
Dr. Andreas Kronz is Head of Process and Management Consulting at Scheer GmbH. His focus is on
consulting around the topic of business process management from strategic introduction and orga-
nization to benefit-oriented implementation of BPM solutions. He has led many projects in different
industries such as telecommunications, manufacturing, financial services, automotive or utilities
and published numerous articles and scientific papers. In the course of these activities, he deals
with current trends such as digitalization, S/4HANA, process mining and robotic process automa-
tion. Andreas earned his PhD in business informatics under the professorship of Prof. Dr. Dr. h.c.
mult. August-Wilhelm Scheer and can now look back on almost 30 years of professional experience.
Dr. Christian Langmann is Professor of Accounting at the Munich University of Applied Sciences. He
teaches a variety of managerial accounting courses (including the digital transformation of manage-
rial accounting) in undergraduate, graduate and advanced education. His research focus is the ap-
plication of modern digitalization technologies and statistical methods in the (managerial) account-
ing. He published a variety of articles and books in this field of research. He also advises companies
how to digitally transform their (managerial) accounting. Before becoming Professor, he served as
Chief Financial Officer (CFO) and finance director for software and telecommunication companies.
His career started as a project manager at the international management consultancy Horváth &
Partners.
Dr. Henrik Leopold is associate professor for data science and business intelligence at the Kühne Lo-
gistics University (KLU) and adjunct professor at the Hasso Plattner Institute (HPI), University of Pots-
dam. He obtained his PhD degree in information systems from the Humboldt-Universität zu Berlin,
Germany. Before joining KLU and HPI, he held positions at the Vrije Universiteit Amsterdam as well
as WU Vienna. His research is mainly concerned with leveraging artificial intelligence to analyze and
improve business processes. He has published over 80 scientific contributions, among others, in
XVIII | Authors
IEEE Transactions on Software Engineering, IEEE Transactions on Knowledge and Data Engineering,
Decision Support Systems, and Information Systems.
Prof. Andrea Marrella is currently an assistant Professor with the Sapienza Università di Roma. His
research interest includes how to integrate artificial intelligence with business process management
solutions, to untangle complex challenges from the fields of process mining and robotic process
automation. He has coauthored more than 70 peer-reviewed publications in renowned international
conferences and top journals. Since 2017, he has been the Information Director of the ACM Journal of
Data and Information Quality.
Prof. Massimo Mecella is a full Professor at Sapienza Università di Roma. His research focuses on
service oriented computing, business process management, cyber-physical systems and Internet-of-
Things, advanced interfaces and human-computer interaction. He published more than 150 research
papers and chaired different conferences in the above areas. In 2021 he acts as General Chair of
BPM 2021 and as Program Chair of IE 2021 and ICSOC 2021.
Tim Merscheid
Cybersecurity Management Consultant, Capgemini, Cologne, Germany
Tim Merscheid completed his B. Sc. in Business Information Systems at the University of Cologne in
July 2016 and his M. Sc., also in Business Information Systems, at the University of Duisburg-Essen
in May 2019. In 2018, he specialized in cybersecurity at California State University, San Marcos,
USA. After his M. Sc. graduation, he joined Capgemini as a Cybersecurity Management Consultant
in the Cologne office. His focus is to provide strategic advice on the use of cybersecurity that is
consistent with the long-term business goals of his clients. The use of machine learning and arti-
ficial intelligence will play a significant role in this field in the future and is his current area of re-
search.
Stefan Oppl is a professor of technology-enhanced learning and heads the department for contin-
uing education research and educational technology at Danube University Krems, Austria. He has
graduated in computer science and applied knowledge management at the Kepler University of Linz
and has earned his PhD in computer science from the Technical University of Vienna in 2010. His
research in the field of business informatics focuses on collaborative learning support systems,
formative learning analytics and articulation of work knowledge. Stefan has coordinated several na-
tional and EU-founded research projects on these topics and has published over 80 papers on both,
design-oriented and empirical research in these fields.
Authors | XIX
Dr. Ralf Jürgen Ostendorf is a professor of finance, accounting, controlling and cost analysis at the
Niederrhein University of Applied Sciences. After studying Controlling at the University of Duisburg,
he worked for the University of Witten. He received his doctorate in strategic management from the
University of Duisburg in 2000. More than eight years Ralf Jürgen was responsible Controller in sev-
eral Banks. In 2010 he became Professor in Düsseldorf and in 2012 in Krefeld. His main research
interests are Banking and Finance, developments on the Stock Exchange and competitive strategies.
His work has been published in around 100 books and articles.
Peter Pfeiffer
German Research Center for Artificial Intelligence (DFIKI) and Saarland University, Germany
Peter Pfeiffer is a researcher at the Institute for Information Systems (IWi) at the German Research
Center for Artificial Intelligence (DFKI) since 2019. In 2020 he pursued his master’s in business in-
formatics as a participant of the Software Campus where he was working on a project to retrieve
CAD models from 2D images. He is currently working on the application of Artificial Intelligence in
Business Processes, e. g. in manufacturing or health care. His research interest also cover Machine
Learning methods on Business Process Data and Cognitive Robotic Process Automation.
René Plath
Mobility Services Consultant, MHP – A Porsche Company, Berlin, Germany
René Plath is an IT- and Management Consultant at MHP – A Porsche Company and holds a master’s
degree in Business Informatics. With 6+ years of experience, he continually expands his range of
perspectives on product development covering business and technology aspects. His profession
includes identifying and creating digital services for branch leading companies along with scout-
ing cooperating startups and technologies to optimize and extend the service offerings of multina-
tional corporates. Driven by the overall question of how to shape mobility more sustainable with
new technologies, he is working in digital units of Germany’s premium car manufacturers in the
role of a System Architect and Product Owner Support as defined in the Scaled Agile Framework
SAFe.
Tobias Prätori
Research Assistant, Chair of Business Administration and Business Informatics, University of
Würzburg, Germany
Tobias Prätori is a research assistant at the Chair of Business Administration and Information at the
Julias-Maximilians-Universität Würzburg. He holds a master’s degree in Business Information Sys-
tems. He is fascinated by the groundbreaking opportunities that data science and machine learning
offer to society. Furthermore, he is interested in the circular economy. His current research is about
how information systems can support product designers to improve plastic products’ recyclabil-
ity.
XX | Authors
Andrés Jiménez Ramírez is a lecturer and researcher at the University of Seville, Spain. He started his
career as a software engineer in the R&D department of a Spanish consultancy firm. In 2014, Andrés
obtained his PhD degree in Computer Science at the University of Sevilla where he is member of the
Web Engineering and Early Testing (IWT2) group. His research focuses on intelligent techniques for
BPM, flexible business processes and process automation, hereby combining different disciplines
like constraint programming and declarative business process modelling. Andres has published his
research at international journals and conferences like Data and Knowledge Engineering, Informa-
tion and Software Technology, Knowledge and Information Systems or CAiSE.
Stefan Rechberger is an RPA developer at Raiffeisen Software GmbH in Linz and implements RPA
processes with Blue Prism. He has been working in the financial services sector for over 10 years and
has supervised a large number of projects in the areas of Treasury, Settlements, Accounting, Bank
Harmonization and Robotic Process Automation at the Raiffeisenlandesbank Oberösterreich AG. In
addition to his practical experience, he completed his bachelor’s degree in business informatics at
the Johannes Kepler University in Linz with distinction and is currently writing his master’s thesis
“Forecasting of sales quantities – A comparison of methods for increasing the forecast quality with
volatile and limited data”.
Hajo Reijers is a full professor in the Department of Information and Computing Sciences of Utrecht
University, where he leads the Business Process (BPM) Management & Analytics group. He is also
a part-time, full professor in the Department of Mathematics and Computer Science of Eindhoven
University of Technology. Previously, he worked for various management consultancy companies and
led the BPM research group at Lexmark. Hajo’s research and teaching focus on BPM, data analytics,
and information systems engineering. On these and other topics, he published over 200 scientific
papers, chapters in edited books, as well as articles in professional journals.
Konstantin Ritschel
Management Consultant, Detecon International GmbH, Cologne, Germany
Konstantin Ritschel is a consultant for Robotic Process Automation and Process Management with
focus on the telecommunication industry at the technology management consultancy Detecon In-
ternational GmbH in Cologne, Germany. After working in the telecommunication industry during
his dual studies in Business Information Technology at the Hochschule für Telekommunikation in
Leipzig, he joined Detecon full time. He successfully implemented RPA in different projects within
Germany, working as a project lead, solution designer and developer. He aims to achieve opti-
Authors | XXI
mization of business processes and to drive a sustainable optimization of business process for his
clients.
Dr. Yara Rizk is a researcher at IBM Research. She received her doctorate in Electrical and Computer
Engineering from the American University of Beirut (AUB) in 2018. Prior, she obtained a Bachelor of
Engineering in Computer and Communication Engineering from AUB, Lebanon, in 2012. Her research
interests span, artificial intelligence, machine learning, multi-agent systems, business automation,
and robotic process automation. Her work has led to multiple peer-reviewed publications in leading
academic journals and international conferences.
Dr. Peter Gordon Roetzel is professor for accounting and information systems at University of Ap-
plied Sciences Aschaffenburg and University of Stuttgart. He is head of the Behavioral Accounting &
Finance Lab. His research focus is on how information overload affects managerial decision making
and how new instruments of management and leadership (e. g., enterprise social media, AI-based
decision aid, explainable AI) affects manager’s behavior. He is interested in mixed-method interdis-
ciplinary information systems research and published his work in leading academic journals and at
international conferences.
Corinna Rutschi
PhD Candidate of Information Systems, University of Bern, Switzerland
Corinna Rutschi is a Ph. D. candidate of information systems at the Institute of Information Systems
at the University of Bern, Switzerland. Prior to starting her doctorate, she completed her master’s
degree in information systems at the University of Bern and gained practical experience in IT con-
sulting in the pharma and life sciences sector. Her research focuses on technologies that help auto-
mate processes previously performed by humans. Here, she is looking at technologies that perform
processes human-like and are intelligent in some way, with the aim of better understanding their
development and implementation. She has published in The DATA BASE for Advances in Information
Systems and in conference proceedings of the Hawaii International Conference on System Science.
Franz Seubert
Research Assistant, Chair of Business Administration and Business Informatics, University of
Würzburg, Germany
Kalpesh Sharma
Director, Principal Enterprise Architect, Capgemini, USA
Kalpesh Sharma is a Director and Account Chief Architect at Capgemini. He holds bachelor’s de-
gree in Electrical Engineering and has 19+ years of IT experience. He is a successful and recognized
thought leader with experience in architecting and implementing enterprise-level business solu-
tions covering strategy definition, blueprint creation and laying out roadmap to implement short-
term, medium-term and long-term goals. His research area includes artificial intelligence, machine
learning and its implementation for the benefits of solving critical business challenges. Kalpesh has
authored several technical articles, served as a speaker in technology conferences, and is a certified
IT Architecture trainer.
Mario Richard Smeets is a management consultant for banks, insurance companies and financial
service providers and co-founder and managing director of a process automation and software man-
ufactory. One of his consulting focuses lies in process management and automation. After studying
business administration and economics in Hagen, Bonn and Cambridge, MA, Mario is now research-
ing on Artificial Intelligence in managerial decision making at TH Aschaffenburg. He published differ-
ent books and articles, mainly on the topic of process automation.
Theresa Steinbach received her bachelor’s degree in 2018 and is now doing her master’s degree at
the Julius-Maximilians-Universität Würzburg. Her research interests are robotic process automation
and explainable artificial intelligence. Since 2019, she is working as student assistant at the chair of
Prof. Janiesch.
Adina Stenzel
Management Consultant, Detecon International GmbH, Berlin, Germany
Adina Stenzel is an expert for Robotic Process Automation and Artificial Intelligence at the technol-
ogy management consultancy Detecon International GmbH in Berlin, Germany. After studying Cogni-
tive Science & Artificial Intelligence at Tilburg University in the Netherlands and living and working
internationally, she gained years of practical experience in various digitalization and automation
projects across Germany. She is particularly interested in new technologies and its impact on an in-
dividual and social level. She helps enterprises to optimize and automate business processes and
support their employees, with a passionate focus on ethical technology.
Christoph Stummer
Management Consultant, Detecon International GmbH, Cologne, Germany
GmbH. After studying business management in Stuttgart, he gained more than 20 years of profes-
sional experience in various industries, in particular the telecommunications industry. He supported
companies in convert and optimize their processes into leading edge processes with a holistic end-
to-end view. The focus of his work lies on the customer perspective, thus on customer satisfaction
and value streams. He applied agile IT requirement management and implemented RPA to realize
automation in a short time. He published his expertise and recommendations in various papers.
Eldar Sultanow is an Enterprise Architect at Capgemini. In 2015, he completed his doctoral studies at
the Chair of Business Information Systems and Electronic Government at the University of Potsdam.
His areas of interest are AI, modern software architecture and Computer Science. After complet-
ing his Studies at Hasso Plattner Institute, University of Potsdam, Eldar worked for many years in
the area of E-Commerce as a JEE developer and architect at Europe’s leading consumer information
portal. Afterwards he was CIO in a medium-sized pharmaceutical wholesale for 5 years. Eldar is an
author of books, a series of conference papers and numerous journal articles.
During the implementation of the project addressed in the case study co-authored by him, Thomas
Thiel was Head of Competence Center RPA at Scheer GmbH. He earned his MBA from Frankfurt
School of Finance and Management. Fascinated by the trade-off between business and IT, it is his
passion to provide consulting services in the field of intelligent business process automation. Be-
sides Robotic Process Automation, which is Thomas’ main field of expertise, his technological focus
lies on the usage of Optical Character Recognition technologies for the sake of Smart Data Extrac-
tion as well as on Workflow Management Systems. Thomas has led numerous digitization projects in
various industries, including Logistics, Banking, Automotive and Electronics.
Dr. Han van der Aa is a junior professor in the Data and Web Science Group at the University of
Mannheim. Before that, he was an Alexander von Humboldt Fellow at the Humboldt-Universität zu
Berlin. In 2018, he obtained a PhD from the Department of Computer Science of the Vrije Universiteit
Amsterdam, the Netherlands. His research targets the development of automated methods for pro-
cess analysis, with a particular focus on the consideration of natural language and data uncertainty
in this regard. His work has been published in leading academic journals, such as IEEE Transactions
on Knowledge and Data Engineering, Decision Support Systems, and Information Systems.
Wil van der Aalst is a full professor at RWTH Aachen University leading the Process and Data Science
group. He is also part-time affiliated with the Fraunhofer-Institut für Angewandte Informationstech-
XXIV | Authors
nik (FIT) and is a member of the Board of Governors of Tilburg University. Van der Aalst is an IFIP Fel-
low, IEEE Fellow, ACM Fellow, and received honorary degrees from the Moscow Higher School of Eco-
nomics (Prof. h. c.), Tsinghua University, and Hasselt University (Dr. h. c.). He is also an elected mem-
ber of the Royal Netherlands Academy of Arts and Sciences, the Royal Holland Society of Sciences
and Humanities, the Academy of Europe, and the North Rhine-Westphalian Academy of Sciences,
Humanities and the Arts. In 2018, he was awarded an Alexander-von-Humboldt Professorship.
Jonas Wanner
Research Assistant, Assisstant Professor for Information Management, University of Würzburg,
Germany
Jonas Wanner is a research associate and lecturer at Julius Maximilian University in Würzburg, Ger-
many. He holds a Bachelor’s degree in Business Information Systems from DHBW Stuttgart and a
Master’s degree in Business Management from the University of Würzburg, Germany. His research
focuses on explainable artificial intelligence and real-time analysis of processes. His work has ap-
peared in several international journals and conferences, including Business Research, EMISJ, ICIS,
and ECIS.
Prof. Dr. Axel Winkelmann holds the Chair of Business Administration and Information Systems at
the University of Würzburg and has the largest laboratory for enterprise software in Germany. His
research and teaching focus on integrating enterprise software and the potential applications of
modern technologies such as AI, blockchain or BPM.
Daniel Wüllner received his bachelor’s degree and is now doing his master’s degree in information
systems at Julius-Maximilians-Universität Würzburg. His research interest is focusing on the field of
robotic process automation, as well as Business Process Management. Since 2017, he is working at
SYSTHEMIS AG in the field of RPA, BPM and Software development.
|
Part I: Introduction
Christian Czarnecki and Peter Fettke
1 Robotic process automation
Positioning, structuring, and framing the work
Abstract: Robotic process automation (RPA) has attracted increasing attention in re-
search and practice. This chapter positions, structures, and frames the topic as an
introduction to this book. RPA is understood as a broad concept that comprises a va-
riety of concrete solutions. From a management perspective RPA offers an innovative
approach for realizing automation potentials, whereas from a technical perspective
the implementation based on software products and the impact of artificial intelli-
gence (AI) and machine learning (ML) are relevant. RPA is industry-independent and
can be used, for example, in finance, telecommunications, and the public sector. With
respect to RPA this chapter discusses definitions, related approaches, a structuring
framework, a research framework, and an inside as well as outside architectural view.
Furthermore, it provides an overview of the book combined with short summaries of
each chapter.
1.1 Introduction
In practice, a broad variety of robotic process automation (RPA) cases have been doc-
umented, such as the automation of core processes at Telefonica O2 (Lacity et al.,
2015), the RPA usage at the University Hospitals Birmingham as well as at Gazprom
Energy (Willcocks et al., 2015), the virtual assistance in financial processes at Opus-
Capita (Asatiani and Penttinen, 2016), automated data extraction and processing at a
public administration (Houy et al., 2019), and the automation of field service as well
as problem solving processes at Deutsche Telekom (Schmitz et al., 2018). In fact, RPA
has attracted increasing attention in research and practice, and the term is used for
a broad variety of automation techniques (e. g., Agostinelli et al., 2019; Chakraborti
et al., 2020; Enriquez et al., 2020; Herm et al., 2020; van der Aalst et al., 2018).
RPA is an innovative approach to transform the process execution without chang-
ing the underlying application systems (e. g., Houy et al., 2019; Smeets et al., 2019;
Langmann and Turi, 2020). The initial idea of RPA is that software robots perform for-
merly human work (e. g., Willcocks et al., 2015). In contrast to robotics in production
processes (e. g., Groover, 2008), RPA does not use tangible robots but autonomous
acting software systems – so-called software robots. They learn and adopt human ac-
https://doi.org/10.1515/9783110676693-001
4 | C. Czarnecki and P. Fettke
tivities, and handle application systems through user interfaces. The software robots
use the existing input forms of the underlying application systems. Hence, changes of
the existing application landscape are not required, which is one of the major benefits
of RPA in practice (Willcocks et al., 2017).
This book follows a broad understanding of RPA, as an umbrella term for differ-
ent automation approaches (e. g., Asatiani et al., 2020; Leopold et al., 2018; Rutschi
and Dibbern, 2020). This chapter positions, structures, and frames the general topic.
We start in Section 1.2 with an explanation of the automatic duck, illustrated on the
front cover, and discuss how it might be related to modern software robots. Section 1.3
provides an application example that serves as a starting point for the topic. The po-
sitioning is discussed based on related approaches (cf. Section 1.4) and on an under-
standing of the basic terms (cf. Section 1.5). An overall structure for RPA is proposed
in Section 1.6. From an architectural perspective, Section 1.7 frames the topic from an
outside and inside view. Current research is discussed in Section 1.8, and the structure
of this book is explained in Section 1.9.
What are the necessary prerequisites that this statement – impossible to distinguish
the automatic duck from a real, living one – is true?
1 Robotic process automation | 5
Imagine an automatic duck in our time. What would be required to confirm the above
statement? At least, the following assumptions have to be made:
1. Sensors: Our automatic duck needs to have some mechanical or digital sensors
to realize the world around it. With respect to today’s state-of-the-art technology,
this might be, for example, a digital camera, to search for and identify seeds. Pre-
sumably, our automatic duck is equipped with further sensors like radar sensors,
some GPS antenna or light detection, and ranging sensor (lidar).
2. Actuators: Our automatic duck has to have some mechanical beak, legs, and
wings, which enable the duck to pick, to move, and to fly around. Those actuators
are required to interact with the real world.
3. Functions: Our automatic duck must be able to perform some typical actions,
which a real duck can perform, for instance, waddling, quaking, and splashing
in the water.
To be sure, these are at least some minimal requirements to make this imagination of
an automatic duck true. If this illusion will be perfect, then it is clear that the automatic
duck is still a thing, a piece of human engineering art, but not a real, living duck.
However, by definition, an ideal, automatic duck cannot be distinguished from a real
duck. Therefore, we can call such an automatic duck functionally equivalent to a real
duck.
6 | C. Czarnecki and P. Fettke
What can we learn from these thoughts about RPA? The initial idea of RPA is develop-
ing an automation that is functionally equivalent to a human, acting in a specific busi-
ness process. Learning and emulating human behavior, for example, entering data in
an input mask, is seen as a key aspect of an RPA system. Even though it is obvious
that a full functional equivalent with respect to all human aspects is not intended,
defining the functionality of an RPA system is not trivial. The following analogies to
our automatic duck can be stated:
1. By selecting and describing the processes to be automated, the functional scope
of an RPA system is defined, which might range from simple emulation of routine
tasks to autonomously reaching complex decisions.
2. A proper automation of a manual process does not necessarily mean that all tasks
are performed in an equivalent manner, which makes it difficult to understand
and manage the transformation from manual to automated processes.
3. It might be useful to extend RPA by further functionalities that could help improv-
ing existing processes or even develop completely new processes.
Building machines that copy their behavior from reality is not new, and as a sole idea not a guar-
antee for success. The idea of RPA goes beyond a simple automation and emulation of human ac-
tivities. Selection and improving the relevant processes, extending RPA by further technologies,
and managing the transformation from manual to automated are important topics to gain the full
potential of RPA.
equivalent (FTE). These savings could as well be realized through optimizing the ex-
isting ERP systems. In contrast, the RPA approach keeps the ERP system unchanged
and automates the existing process through new RPA software systems. In the exam-
ple, both manual activities are then performed by software robots. The scanning and
uploading of invoices are routine activities that can easily be performed by a simple
RPA system, whereas extracting consumption values from unstructured data requires
further cognitive capabilities. For both functionalities standard RPA software systems
are available on the market.
This example illustrates typical aspects of the RPA usage in practice:
1. RPA systems are often used as a workaround to fix deficiencies of existing appli-
cation landscapes. In the above example, the same result could have been real-
ized by an integration of the ERP systems between the enterprise and its suppliers
combined with an electronic exchange of invoices.
2. The expected benefits are often related to time savings. The monetary potential
can be easily estimated using well-known methods, for example, the Time Sav-
ings Time Salary (TSTS) method (Sassone, 1987). The monetary benefit potential
is usually in a range that would not allow a substantial reengineering project. As
in the above example, savings of 1 FTE would not be sufficient for a complex ERP
project.
3. The realization is related to concrete and detailed knowledge of the specific pro-
cess, and hence is in most cases initiated by business units. The essential step in
the RPA implementation is “teaching” the specific process to the software robot.
1 Robotic process automation | 9
In summary, RPA implementations have some specifics that differ from common information
systems projects. This book discusses management, technical, and application aspects of RPA
projects. Furthermore, it provides insights to real-life implementation cases.
management (BPM), comprehensive models of the actual situation and target con-
cepts are created in this context (Becker, 2011; vom Brocke et al., 2014; Dumas
et al., 2018), which are then implemented both technically and organizationally.
– Automation through business process management systems (BPMS) proposes a
dedicated system to automatically orchestrate the process execution. A distinc-
tion is made between ad hoc workflow systems, production workflow systems,
and case handling systems (Dumas et al., 2018). The process models are executed
step by step, whereby the integration of additional business logic is possible
through interfaces to other application systems (Dumas et al., 2018). The basis is
usually a process model, and related application systems (such as ERP, CRM) are
integrated by the BPMS.
RPA can be linked to related approaches in BPM, BPMS, process automation, and application sys-
tems implementation. However, in contrast to traditional process automation, RPA does not require
changes of existing applications, which might result in a faster and easier implementation. In ad-
dition, today’s RPA concepts include approaches of AI, in particular ML, to enable an automatic
adaption to process changes.
“Although the term ‘Robotic Process Automation’ suggests physical Willcocks et al. (2015)
robots wandering around offices performing human tasks, RPA is a
software-based solution. In RPA parlance, a ‘robot’ is equivalent to one
software license. [. . . ] That’s what Robotic Process Automation (RPA)
does—interacts with other computers systems just like a human would.”
“Robotic Process Automation (RPA) emerges as software-based solution Aguirre and Rodriguez
to automate rules-based business processes that involve routine tasks, (2017)
structured data and deterministic outcomes.”
RPA is a “preconfigured software instance that uses business rules and IEEE (2017)
predefined activity choreography to complete the autonomous
execution of a combination of processes, activities, transactions, and
tasks in one or more unrelated software systems to deliver a result or
service with human exception management.”
In RPA “manual activities are learned and automated by so-called Czarnecki (2018)
software robots. Thereby, the inputs are emulated on the existing
presentation layer, so that no changes to existing application systems
are necessary.”1
“RPA is mostly associated with the task level. The application areas Mendling et al. (2018)
include finance and accounting, IT infrastructure maintenance, and
front-office processing. The so-called robots are software programs that
interact with systems, such as enterprise resource planning and
customer relationship management systems.”
“RPA is an umbrella term for tools that operate on the user interface of van der Aalst et al.
other computer systems in the way a human would do. RPA aims to (2018)
replace people by automation done in an ‘outside-in’ manner.”
“For business processes, the term RPA means the technological Enriquez et al. (2020)
extrapolation of a human worker, whose objective is to tackle structured
and repetitive tasks (very common in ERP systems or productivity tools),
quickly and profitably.”
1
Translated.
so, the inputs are emulated on the existing presentation layer, so that no changes to
existing application systems are necessary. This idea has interrelations with prior ap-
proaches, such as desktop automation, screen scraping, and macros, and can be seen
as a combination and further development of those approaches. In this context, Will-
cocks et al. (2015) have used the term “swivel chair processes” to illustrate the initial
concept of a software robot that replaces simple human activities of handling different
application systems. Hence, the term RPA goes back to the metaphoric idea of a robot
using a computer for administrative tasks, such as filling input masks, extracting and
combining data, creating reports, executing transactions in ERP systems, or opening
and processing e-mails (Scheer, 2017; Czarnecki, 2018).
12 | C. Czarnecki and P. Fettke
Defining the term RPA is not that easy, as it is more an idea inspired by practice,
instead of a carefully developed concept. Fettke and Loos (2019) have summarized the
goal of RPA as follows: “Similar to the substitution of physical work in manufacturing
processes with physical robots (blue-collar automation), RPA tries to substitute intel-
lectual work in office and administration processes with software robots (white-collar
automation).”
The simplicity of this idea – software robots just do what humans have done
before – combined with existing standard software products, promising easy im-
plementation – ideally no or minimal programming efforts – and significant benefit
potentials, especially for routine tasks with many repetitions (e. g., Lacity et al., 2015;
Schmitz et al., 2018), has attracted much attention in practice. Once could say that RPA
was more a marketing term, used by software vendors to sell their automation solu-
tions. Hence, RPA stands for a variety of different concepts that are refined constantly.
Since then, various researchers have analyzed the term RPA and proposed definitions.
For example, Hofmann et al. (2020) have performed a systematic literature review and
found that software robots automate processes by following a choreography and using
established applications. Table 1 shows further exemplary definitions of RPA.
This book follows a broad understanding of RPA, as a range of approaches and
technical concepts that support the automation of processes in organizations by using
software robots that perform tasks.
Robotic process automation (RPA) is an umbrella term for a broad range of concepts that enable
processes to be executed automatically using software robots that handle existing application
systems.
The core of an RPA system consists of input sensors, an intelligence center, and output actuators.
It can be realized by one or more RPA software systems. This core part is supported by management
functionalities, such as administration and monitoring, which are either realized by each software
system or in an overall RPA management system.
A software robot – also called bot – is a single instance of the RPA system that automates a concrete
process instance. A software robot is the equivalent to a single employee. Each software robot
requires a separate login on existing application systems.
1 Robotic process automation | 13
The RPA capabilities vary according to the used software systems and are subject to
a continuous progress. The typical interaction of today’s RPA standard software sys-
tems are existing applications and structured data, while – based on cognitive func-
tionalities – also unstructured data can be handled. Further possibilities are inter-
Table 2: Structuring the concept of RPA.
14 | C. Czarnecki and P. Fettke
1 Robotic process automation | 15
faces to human users, for example, by combining RPA with chatbots, or the real word,
for example, by using advanced sensor technologies. Also, the interaction with other
robots might become relevant if the diffusion of RPA further increases. The decision
and learning capabilities vary from simple systems with no decision functionalities
to advanced systems with intelligent decision and learning capabilities. Whereas the
former can be used for the automation of simple routine tasks, the latter are required
for complex unstructured tasks. Assuming that an RPA implementation might con-
sist of a multitude of independent acting software robots, the governance structure
goes from no governance to a centralized governance structure for all software robots,
which could be referred to as an RPA management system.
The realization aspects of RPA are comparable to other information systems.
They might vary from standard software products to own developments, and from
single systems to fully integrated sub-systems, which could be operated on-premise,
in a cloud, or with a hybrid approach. However, as the ease of implementation is
a major aspect of RPA usage in practice, so far, RPA implementations are typically
realized by standard software systems.
The usage of RPA is related to the process selection and its automated execution.
The selection can be centralized or decentralized, and manual or automated. In an
automated process selection RPA would be related to process mining concepts. A cen-
tralized selection would speak for a standardized RPA implementation method and
governance. Also, the process execution varies in the level of centralization as well as
the involvement of the IT department. A major difference of RPA to traditional infor-
mation systems’ projects is the possibility of an autonomous realization by business
units. However, it can be expected that more complex RPA implementations would
require an involvement of IT departments.
Following a broad understanding of RPA, the topic is related to various different aspects. A first
structuring of those aspects is proposed in Table 2. Most of these topics are covered and discussed
in greater detail in this book.
Figure 4: RPA architecture (according to Czarnecki, 2018; Fettke and Loos, 2019).
Enriquez et al., 2020). Whereas the initial idea of RPA was the automation of so-called
swivel chair processes (Willcocks et al., 2015), today’s RPA usage in practice devel-
ops towards more complex processes. In this context, broadening the initial scope
of RPA towards cognitive RPA has been proposed in literature (e. g., Hofmann et al.,
2020; Houy et al., 2019). Cognitive RPA uses AI, in particular ML, capabilities in the
intelligence center in order to automate complex processes that require cognitive
abilities.
In addition, RPA systems require management functionalities that become more
important according to the complexity of the overall RPA implementation. The man-
agement part might include (1) administration and monitoring of the RPA system,
(2) authentication and security that also covers the login data for each software robot
and application system, (3) functionalities for learning processes or defining business
rules dependent on the intelligence center, and (4) interactions and interfaces to, for
example, other RPA systems or the real world.
– From an outside view, RPA systems are lightweight implementations beside existing EAs that
deal with as-is processes by creating multiple software robots working in the execution of
process instances.
– From an inside view, RPA systems can be structured in a core and management part. The core
part consists of input sensors, an intelligence center, and output actuators.
18 | C. Czarnecki and P. Fettke
In addition, RPA has interrelations with other research communities, for example:
– Business informatics: Business informatics focus on the development of RPA appli-
cations. Particularly from that perspective, RPA applications in different business
processes have to be designed, the system development perspective is of major
importance.
– Management science: Which managerial implications do the application and use
of RPA have on management practice and organization development?
– Social/behavioral sciences: Which social implications does the use of robots have?
– Information systems: When are RPA systems accepted? What are organizational
implications of using RPA?
– Computer science: Several subfields of computer science, for instance, software
engineering, ML, process mining, and workflow management have relevant ques-
tions on this topic.
– Application fields: Various application fields started to study the use of RPA in their
research practice, for instance, finance, accounting, and health.
– Law: Legal aspects, for instance, liability and contractual agreements, are of in-
terest. Actual discussions are mainly in the broader context of robotics or AI.
Against this background, it is difficult to draw some sharp boundaries around the field
of RPA. It is unclear how the field will develop in the next years. As a first proposal
to structure the most important research questions which have to be addressed, we
propose to distinguish this emergent field from the following perspectives:
1. RPA management: Substituting manual work practice with machines is not new.
However, currently there are various particular questions, such as how to start
an RPA project, how to select appropriate application cases and processes, how
1 Robotic process automation | 19
to structure a center of excellence for RPA, and many others. These are mainly
managerial questions regarding the application of RPA.
2. RPA technology: The field of RPA research is strongly fueled by the availability of
RPA systems which offer particular functions for the automation of tasks. The tech-
nology behind these systems has to be developed and new ideas for developing the
technology are needed. For instance, how will techniques from the field of AI, in
particular ML and natural language processing (NLP), be fruitfully integrated in
RPA systems? These are mainly technical questions on developing RPA systems.
3. RPA applications: Last, but not least, RPA applications are of major importance.
Some industries, for instance, banking, insurance, and the public sectors, are
more impacted by RPA than other sectors, for instance, manufacturing or the
creativity/art sector. Furthermore, not all actions of a business system are homo-
geneously automated, for instance, accounting is a good candidate for further
automation, while strategic planning still requires manual tasks. To get a better
understanding which practice is changed by RPA, a deeper understanding of the
application of RPA in these particular fields is needed.
Figure 5 overviews our proposal for understanding RPA research. Since we strongly
believe that RPA research as many other fields of informatics and engineering disci-
plines is strongly related to RPA practice, we explicitly state that the starting point of
RPA research is RPA practice, namely, the RPA problems which are faced in practice.
These problems can be researched from three perspectives:
1. RPA management;
2. RPA technology, and
3. RPA applications.
RPA is an emerging and interdisciplinary research field. Motivated by practical problems future
research questions can be structured in RPA practice, management, technology, and applica-
tions.
20 | C. Czarnecki and P. Fettke
16. “Application of RPA in industrial manufacturing” by Peter Pfeiffer and Peter Fet-
tke: Industrial manufacturing is not a typical application domain for RPA. How-
ever, this chapter demonstrates that this application field has some interesting
potentials for RPA.
Part V concludes the book with three chapters presenting practical insights from the
application of RPA.
17. “AI evolves IA – A practitioner view on artificial intelligence information architec-
ture” by Eldar Sultanow, Alina Chircu, René Plath, Daniel Friedmann, Tim Mer-
scheid, and Kalpesh Sharma: This chapters overviews several application cases in
different industries and business functions based on practical experiences made
by a consulting company. Particularly the use of AI is stressed in different RPA
scenarios.
18. “The broad use of RPA based on three practical cases” by Adina Stenzel, Kon-
stantin Ritschel, and Christoph Stummer: This chapter presents experiences from
implementing RPA in three different cases within different industries. These ex-
periences are consolidated from the view of a consulting company offering RPA
services.
19. “Digitization applied to automate freight paper processing” by Andreas Kronz and
Thomas Thiel: This project description describes the experiences made by imple-
menting RPA for freight paper processing. Again, the experiences are reported
from a consulting firm that was in charge of this project.
In summary, 19 chapters written by 51 authors provide new insights, results, and viewpoints on
RPA.
Bibliography
Agostinelli S, Marrella A, Mecella M (2019) Research challenges for intelligent robotic process
automation. In: Di Francescomarino C, Dijkman R, Zdun U (eds) Business process management
workshops. Springer, Cham, pp 12–18
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(RPA): a case study. In: Figueroa-García JC, López-Santana ER, Villa-Ramírez JL, Ferro-Escobar R
(eds) Applied computer sciences in engineering. Springer, Cham, pp 65–71
Alpar P, Alt R, Bensberg F, Weimann P (2019) Anwendungsorientierte Wirtschaftsinformatik:
strategische Planung, Entwicklung und Nutzung von Informationssystemen, 9., überarbeitete
Auflage. Springer, Wiesbaden
Asatiani A, García JM, Helander N et al (2020) Business process management. In: Proceedings,
blockchain and robotic process automation forum: BPM 2020 blockchain and RPA forum,
Seville, Spain, September 13–18, 2020
Asatiani A, Penttinen E (2016) Turning robotic process automation into commercial success – case
OpusCapita. J Inf Technol Teaching Cases 6:67–74. https://doi.org/10.1057/jittc.2016.5
1 Robotic process automation | 23
Laudon KC, Laudon JP (2012) Management information systems: managing the digital firm, 12th edn.
Prentice Hall, Boston
Leopold H, van der Aa H, Reijers HA (2018) Identifying candidate tasks for robotic process
automation in textual process descriptions. In: Gulden J, Reinhartz-Berger I, Schmidt R et
al (eds) Enterprise, business-process and information systems modeling. Springer, Cham,
pp 67–81
Mendling J, Decker G, Hull R et al (2018) How do machine learning, robotic process automation, and
blockchains affect the human factor in business process management? In: CAIS, pp 297–320.
https://doi.org/10.17705/1CAIS.04319
Porter ME (2004) Competitive advantage. Free, New York, London
Rutschi C, Dibbern J (2020) Towards a framework of implementing software robots:
transforming human-executed routines into machines. SIGMIS Database 51:104–128.
https://doi.org/10.1145/3380799.3380808
Sassone PG (1987) Cost-benefit methodology for office systems. ACM Trans Inf Syst 5:273–289.
https://doi.org/10.1145/27641.28059
Scheer A-W (2017) Performancesteigerung durch Automatisierung von Geschäftsprozessen.
AWS-Institut für digitale Produkte und Prozesse, Saarbrücken
Schmitz M, Dietze C, Czarnecki C (2018) Enabling digital transformation through robotic process
automation at Deutsche Telekom. In: Urbach N, Röglinger M (eds) Digitalization cases.
Springer, Berlin
Scientific American (1899) Some curious automata. Scientific American 80:43
Smeets M, Erhard R, Kaußler T (2019) Robotic Process Automation (RPA). In: der Finanzwirtschaft:
Technologie – Implementierung – Erfolgsfaktoren für Entscheider und Anwender. Springer
Wiesbaden, Wiesbaden
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60:269–272. https://doi.org/10.1007/s12599-018-0542-4
vom Brocke J, Schmiedel T, Recker J et al (2014) Ten principles of good business process
management. Bus Process Manag J 20:530–548. https://doi.org/10.1108/BPMJ-06-2013-0074
Willcocks L, Lacity M, Craig A (2015) The IT function and robotic process automation. The London
School of Economics and Political Science
Willcocks L, Lacity M, Craig A (2017) Robotic process automation: strategic transformation
lever for global business services? J Inf Technol Teaching Cases 7:17–28.
https://doi.org/10.1057/s41266-016-0016-9
Winter R, Fischer R (2007) Essential layers, artifacts, and dependencies of enterprise architecture. J
Enterp Archit 2:7–18
Zhang D, Freitas A, Tao D, Song D (2020) In: Proceedings of the AAAI-20 workshop on intelligent
process automation (IPA-20)
|
Part II: RPA management
Lukas-Valentin Herm, Christian Janiesch, Theresa Steinbach, and
Daniel Wüllner
2 Managing RPA implementation projects
A framework applied at SYSTHEMIS AG
Abstract: While much of our daily working life has been digitized, it is by no means
fully automated. Several issues such as programming cost, lack of skill, or project com-
plexity hinder the implementation of fully automated integrated solutions using en-
terprise software or business process management systems. Hence, many tasks, sub-
processes, or even whole processes are still performed manually despite obvious au-
tomation potential. Robotic process automation (RPA) is a fairly new technology to
automate these digital yet manual tasks by only accessing the presentation layer of
IT systems and imitating human behavior. Due to the novelty of this approach and
the associated lack of knowledge about the execution of RPA projects, up to 50 % of
RPA projects fail. In response, we present and illustrate a framework for the initiation
of RPA projects based on published RPA case studies and expert interviews. The con-
solidated framework comprises variable stages that offer guidelines applicable under
complex and heterogeneous business environments. We illustrate the framework us-
ing a settlement process of SYSTHEMIS AG, a software development and IT consulting
company.
2.1 Introduction
Due to the transformative capabilities of the digital age, the nature of business and the
way companies work change sustainably (Matt et al., 2015). Being competitive and ag-
ile in international markets is getting increasingly important (Syed et al., 2020). A key
driver for creating new advantages in this highly volatile environment is to work effi-
ciently and change flexibly. Since many processes within companies are already per-
formed in a digital manner, this offers many potentials for further optimization (Im-
grund et al., 2018). In order to benefit from these potentials, a process-oriented orga-
nization is required that focuses on the values of agility and collaboration as well as
promotes activities that are knowledge-intense and value creating for the company
(Fischer et al., 2020).
A discipline that deals with the management of business processes in a holistic
manner is business process management (BPM). It encompasses several methods and
techniques to adapt and improve processes in a continuous plan-do-check-act cycle
(Dumas et al., 2018). Contrary to the widespread use of technological innovations that
https://doi.org/10.1515/9783110676693-002
28 | L.-V. Herm et al.
Expert interviews
In a second iteration semi-structured expert interviews were conducted to verify and
evaluate the findings of the literature analysis. Therefore eight experts, contacted via
an RPA practitioner network on XING, have been interviewed about the identified
stages. The practitioners work primarily as internal or external consultants in small-
to medium-sized companies. One of the eight practitioners works as an RPA provider.
Overall, the audio recordings of the telephone interviews have a total length of 583
minutes, which is equivalent to 150 pages of transcriptions. The analysis of the inter-
views was based on the grounded theory research and led to the final framework. More
details on the research process and framework development can be obtained in Helm
et al. (2020) and Herm et al. (2020).
Application at SYSTHEMIS
Since the daily business of SYSTHEMIS is almost exclusively project-based, a regu-
lar task is the generation of invoices including performance records for their projects.
Data from the enterprise system SAP Business ByDesign (ByD) as well as from other
heterogeneous preceding systems serve as a basis for this task. The timestamps are
currently exported manually from these preceding systems and are imported into ByD.
Further, performance records have to be converted into a suitable format. This situa-
tion gives rise to various problems. Execution is digital yet manual and very repetitive
involving multiple systems. The process must be executed regularly, on schedule, and
without mistakes to meet customer demands and ensure seamless invoice processing.
Therefore, SYSTHEMIS recognizes the opportunity to automate this process to make
their project management more efficient. However, SYSTHEMIS finds that a full-blown
integration project is too costly and instead, they decided to trial RPA software. Thus,
they constitute a suitable demonstration use case for our framework.
Figure 3: Consolidated framework for RPA project implementation (cf. Herm et al. 2020).
the beginning of a project if no prior RPA knowledge exists and cannot be established
internally.
In Table 1, we describe the framework’s stages as well as their primary outputs
to provide an initial overview. These outputs are typically a key input for the next
stage, which requires further information provided for example by system analysis,
interviews, workshops, or document analysis, to name a few.
In the following section, we provide a more detailed description linked to the use
case at SYSTHEMIS. For a detailed description of the framework only, please refer to
Herm et al. (2020).
our RPA framework to their company processes. We explain the steps taken below.
All implementation was performed internally at SYSTHEMIS, the Julius-Maximilians-
Universität Würzburg only provided supervision and analysis.
ious direct and indirect observation techniques like workshops, surveys, or document
analysis as well as through the usage of information technology or even process min-
ing in more digitalized companies (Asatiani and Penttinen, 2016; Geyer-Klingeberg
et al., 2018). Also, informal discussions with responsible departments and daily busi-
ness units can reveal a need for automation (Lacity et al., 2016).
The daily business at SYSTHEMIS is almost exclusively conducted in projects.
Thus, invoices are created regularly including a detailed proof of performance for the
rendered services. The basis for this is data stemming from ByD as well as from het-
erogeneous further systems. Examples are ActiveCollab for project management, com-
mon Microsoft Office applications, or ZEP for time recording. To this point, there is
no automated data connection between the systems in part because this software re-
sides in secure networks with user interface access only. This implied for instance that
working hours first had to be exported manually from these systems and secondly be
reimported into ByD. Additionally, the adjustment of data formats is often mandatory
for further processing in ByD.
As exposed in conversations with employees from the business department as
well as the business manager, the traditional invoice creation was a very time con-
suming and resource-intense task. Furthermore, processes with manual transforma-
tion of data between different interfaces in general are highly vulnerable to errors. The
accurate and timely generation of project invoices is however critical for SYSTHEMIS.
Consequently, there was a high need for automation regarding this daily business task.
success factors are aspects to increase the process quality, reducing the manual failure
rate and using human resources for higher-value tasks through supporting as well as
establishing data processing standards and control mechanisms.
data for generating a proof of performance (e. g., service number, task number, task
description, date, duration) is extracted from the external systems ZEP and ActiveCol-
lab. In a second step, the employees edit the data extract in Microsoft Excel for further
processing. Afterwards, they import the Excel file into ByD. As soon as the import is
successful and the times have been approved, the invoice can be created from a CSV
export. One artifact of this is the “proof of performance” document. To bring this doc-
ument into an easily readable format, again a processing step in Microsoft Excel takes
place before the sending to the customer. See Figure 4 for a simplified overview in
BPMN. It is not intended to contain exceptions or loops, which explicate fine-grained
behavior, but to visualize the order of the necessary tasks.
Indicators to select this process as ideal candidate for the RPA project have been the
execution frequency, the variance within the process, and therefore the susceptibility
to errors, as well as the relevance of the process.
sub-processes are the formatting of the data, the import of the data into the SAP sys-
tem, the workflow for the time approval that leads to the invoice creation, the for-
matting of the invoice, and ultimately the sending of the invoice to the customer. An
overview of the high-level process is presented below (see Figure 5).
ducts the ByD logon. As the browser saves the specific user login data directly, they
do not have to be provided to or be processed by the software robot itself. Following,
again a browser record navigates to the respective sites and automatically clicks on
the approval button. As soon as all times are approved, the system creates the invoice
and the proof of performance documents. However, this requires the selection of the
project, the selection of the accounting period, and the assignment to invoice posi-
tions, which as well conducts a browser record. Variable steps of the last activities
(e. g., the import of project numbers) are implemented using a writing activity. ByD
returns the proof of performance document as a CSV file.
Performance measurement
SYSTHEMIS evaluated the business case based on the execution time of the software
robot compared to the time an experienced user needed to conduct the process. Ac-
cording to the six distinct sub-sequences defined in the PoC, the execution time of
each sub-sequence was measured separately. Therefore, the evaluation started with
data extraction from the external system and finished with sending the e-mail. The sys-
tem clock measured the execution time of the human user, whereas the output data
of UiPath indicated the time of the software robot. To compensate inaccuracies within
the measurements, SYSTHEMIS executed three separate runs on a test environment
as shown in Table 2.
mance measurement showed that using a software robot in this data-driven process
can lower its time consumption significantly.
Organizational benefit
To assess the organizational benefit of the RPA project, the impact was compared to
the business requirements defined earlier in the “business alignment” stage. Beyond
the reduction of the process execution time, the implementation of RPA also released
employees to higher-value tasks and, thus, improved the quality of work. It led to an in-
crease in the overall productivity and enhanced the organizational development. Due
to the robot always performing the process consistently, a high process quality could
be ensured. Also, the automation avoids execution errors and consequently prevents
follow-up costs due to corrections and rework.
Economic efficiency
The business case was also evaluated in terms of its economic efficiency. Therefore,
the costs of an employee conducting the process were compared to the costs that arise
when the robot is implemented, which is a simplified measure common for assessing
RPA projects. The internal hourly rate of the employee was the base for the employee
costs. The costs of the robot were set as the hourly rate of the developer that developed
the robot. As UiPath Studio is a free version, there were no further costs for the devel-
opment of the prototype. All other costs are contemplated equally for both execution
types. Thus, SYSTHEMIS did not consider them in the following.
Taking an average value of 13 minutes and 29 seconds (0.22 hours) for the exe-
cution time and the internal rate of 62.50 € per hour, the costs of a human process
execution per year are 167.43 €. The development of the prototype on the other hand
would require a unique investment of 750 €, as the development of the prototype takes
around 12 hours and the internal rate is 62.50 € per hour. As shown in Figure 6, the
comparison of both values reveals that the investment in the robot development amor-
tizes within four and a half years.
While the results indicate that the RPA implementation takes a long time to amortize
and one may question its value, it rather becomes clear that the common measure
that we used for this use case does not tell the whole story. In this calculation, the
benefit obtained from the automation as well as the (negligible) costs for running and
maintaining these bots is not included. Neither is the search and rectification time
for human errors in the invoices. Further, this calculation does not incorporate skill
acquisition cost. Hence, we assume the amortization time to be significantly shorter as
is the satisfaction with the process. Even more so, scaling from one robot to many will
provide further benefits that are not reflected in this calculation model. Research has
yet to provide a more comprehensive schema to monetize the benefits of RPA robots
in contrast to human labor.
adapting RPA projects along with getting certified in the field of RPA is a promising
extension of the corporate purpose in the future.
Another benefit was the ensuring of a constantly high process quality. Economic effi-
ciency of the automation was shown by a cost comparison with the traditional execu-
tion costs. The results of this comparison were only indicative to some respect due to
the simplified measurement.
Lastly, the framework as well as its application in the case study face some limi-
tations. SYSTHEMIS has not yet applied a continuous RPA cycle as mandated by the
framework. So far, the presented use case is unique within the company. Thus, the
long-term success and the company-wide adoption of the technology remain open to
further inquiry. However, the implementation of a continuous cycle as well as further
RPA projects are a pursued objective of the company. Besides, there are still several
possibilities to improve the effectiveness of the process as such. Extending the pro-
cess with intelligent process automation could for example facilitate execution efforts.
Consequently, process improvement does not end with the implementation of RPA and
complementary technologies may need to be considered.
As stated in the work of Herm et al. (2020), numerous promising concepts for the
implementation of RPA have already been developed in theory but have not yet been
addressed by companies in practice. Given the fact that 30 % to 50 % of all implemen-
tation projects fail today because of an RPA misapplication there is a large need for
a structured approach (Asatiani and Penttinen, 2016). The presented framework pro-
vides this structure and thus can narrow the gap between theory and practice.
Overall, the evaluation of the framework in practice showed that the framework
proved to be beneficial for conducting a structured RPA project. It successfully guided
the implementation of a software robot within a company. To verify its general useful-
ness, we must apply it in further scenarios and in different organizational settings. Fur-
thermore, as additional learning, more focus should be placed on the stage of process
selection to achieve a faster and/or higher return on investment. Likewise, through the
use case, the need for guidance within our framework for small- and medium-sized
companies manifested. Addressing this should enable those companies with more re-
strictions on budget and time to use our framework.
Bibliography
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(RPA): a case study. In: Proceedings of the 4th workshop on engineering applications (WEA).
Springer, Berlin, pp 65–71
Anagnoste S (2018) Setting up a robotic process automation center of excellence. Manag Dyn Knowl
Econ 6(2):307–332
Asatiani A, Penttinen E (2016) Get ready for robots: why planning makes the difference between
success and disappointment. J Inf Technol Teaching Cases 6(2):67–74
Asatiani A, Penttinen E (2016) Turning robotic process automation into commercial success–case
OpusCapita. J Inf Technol Teaching Cases 6(2):67–74
DeBrusk C (2017) Five robotic process automation risks to avoid. MIT Sloan Manag Rev Oct.(1)
44 | L.-V. Herm et al.
Dumas M, Rosa ML, Mendling J, Reijers HA (2018) Fundamentals of business process management.
Springer, Berlin
Fischer M, Imgrund F, Janiesch C, Winkelmann A (2020) Strategy archetypes for digital
transformation: defining meta objectives using business process management. Inf Manag,
online first
Geyer-Klingeberg J, Nakladal J, Baldauf F, Veit F (2018) Process mining and robotic process
automation: a perfect match. In: Proceedings of the 16th international conference on business
process management (BPM). CEUR workshop proceedings, Sydney, vol 2196, pp 124–131
Hallikainen P, Bekkhus R, Pan SL (2018) How opuscapita used internal rpa capabilities to offer
services to clients. MIS Q Exec 17(1):41–52
Helm A, Herm L-V, Imgrund F, Janiesch C (2020) Interview guideline, transcriptions, and coding for
“A Consolidated Framework for Implementing Robotic Process Automation Project. EUDAT
B2SHARE.” https://doi.org/10.23728/b2share.402d2d1544124d24902182652d1bc77a.
Accessed: 2020-06-15
Herm L-V, Janiesch C, Helm A, Imgrund F, Fuchs K, Hofmann A, Winkelmann A (2020) A consolidated
framework for implementing robotic process automation projects. In: Proceedings of the
18th international conference on business process management. Lecture Notes in Computer
Science, vol 12168. Springer, Sevilla, pp 471–488
Imgrund F, Fischer M, Janiesch C, Winkelmann A (2017) Managing the long tail of business
processes. In: Proceedings of the 25th European conference on information systems (ECIS),
Guimarães, pp 595–610
Imgrund F, Fischer M, Janiesch C, Winkelmann A (2018) Conceptualizing a framework to manage
the short head and long tail of business processes. In: 16th international conference business
process management (BPM), Sydney. Lecture Notes in Computer Science, vol 11080. Springer,
pp 392–408
Kenneth B, Jim H, Svetlana S (2019) Hype cycle for artificial intelligence. https://www.gartner.com/
en/documents/3953603/hype-cycle-for-artificial-intelligence-2019. Accessed: 2020-05-30
Lacity M, Willcocks L, Craig A (2016) Robotizing global financial shared services at Royal DSM. Paper
Series in Financial Service, vol 46(1), pp 62–76
Le Clair C, UiPath AA, Prism B (2018) The forrester wave®: robotic process automation, q2 2018.
Forrester Res
Matt C, Hess T, Benlian A (2015) Digital transformation strategies. Bus Inf Syst Eng 57(5):339–343
Mendling J, Decker G, Hull R, Reijers HA, Weber I (2018) How do machine learning, robotic process
automation, and blockchains affect the human factor in business process management?
Commun Assoc Inf Syst 43(1):297–320
Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S (2007) A design science research
methodology for information systems research. J Manag Inf Syst 24(3):45–77
Ravn R, Halberg P, Gustafsson J, Groes J (2016) Get ready for robots: why planning makes the
difference between success and disappointment. http://eyfinancialservicesthoughtgallery.
ie/wp-content/uploads/2016/11/ey-get-ready-for-robots.pdf. Accessed: 2020-08-20
Schmitz M, Dietze C, Czarnecki C (2019) Enabling digital transformation through robotic process
automation at Deutsche Telekom. In: Digitalization cases. Springer, Berlin, pp 15–33
Strauss A, Corbin J (1994) Grounded theory methodology. In: Handbook of qualitative research,
vol 17, pp 273–285
Syed R, Suriadi S, Adams M, Bandara W, Leemans SJ, Ouyang C, ter Hofstede AH, van de Weerd I,
Wynn MT, Reijers HA (2020) Robotic process automation: contemporary themes and challenges.
Comput Ind 115:1–15
van der Aalst WM, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60(4):269–272
2 Managing RPA implementation projects | 45
Abstract: The benefits of robotic process automation (RPA) are highly related to the
usage of commercial off-the-shelf (COTS) software products that can be easily im-
plemented and customized by business units. But, how to find the best fitting RPA
product for a specific situation that creates the expected benefits? This question is re-
lated to the general area of software evaluation and selection. In the face of more than
75 RPA products currently on the market, guidance considering those specifics is re-
quired. Therefore, this chapter proposes a criteria-based selection method specifically
for RPA. The method includes a quantitative evaluation of costs and benefits as well
as a qualitative utility analysis based on functional criteria. By using the visualization
of financial implications (VOFI) method, an application-oriented structure is pro-
vided that opposes the total cost of ownership to the time savings times salary (TSTS).
For the utility analysis a detailed list of functional criteria for RPA is offered. The
whole method is based on a multi-vocal review of scientific and non-scholarly lit-
erature including publications by business practitioners, consultants, and vendors.
The application of the method is illustrated by a concrete RPA example. The illus-
trated structures, templates, and criteria can be directly utilized by practitioners in
their real-life RPA implementations. In addition, a normative decision process for
selecting RPA alternatives is proposed before the chapter closes with a discussion and
outlook.
3.1 Introduction
Over recent years, robotic process automation (RPA) has emerged as a new software-
based approach for automating business processes across application systems and
data collections that lack comprehensive integration on the process, function, and/or
data level (van der Aalst et al., 2018; Ivančić et al., 2019; Hofmann et al., 2020; Schep-
pler and Weber, 2020). An organization that plans the implementation of RPA for au-
tomating its business processes faces a broad supply of RPA software products includ-
ing commercial off-the-shelf (COTS) solutions as well as several open source (OS) pack-
ages. A popular online software catalog lists 76 products under the category RPA (both
COTS and OS) at present (Capterra, 2020). In this situation, the process of finding the
https://doi.org/10.1515/9783110676693-003
48 | F. Bensberg et al.
best-fit RPA solution can be difficult and time consuming, and bears the risk of sunk
costs due to investments for an inapplicable software product. As for other business
software categories, market analysts like Gartner and Forrester offer guidance, such as
Magic Quadrant and Wave reports (Miers et al., 2019; Le Clair, 2019). Although these
reports can provide a rough market overview, they are not meant to offer a system-
atic selection method. Most of those reports are targeted at the executive level, and
therefore use only few aggregated comparison criteria.
Since software product evaluation and selection is a well-known problem in in-
formation systems research, there is a sound theoretical foundation for constructing
selection methods as well as a rich choice of literature on applied selection methods
for several business software categories, e. g., enterprise resource planning (ERP) soft-
ware. Nevertheless, to our best knowledge there is no published criteria-based selec-
tion method for RPA software yet. To close this gap, we formulated our research ques-
tion as follows: How can organizations find the most appropriate RPA software product
for automating its business processes with a selection method built on criteria-based
evaluation?
The structure of the chapter reflects our constructive research approach. In the
related work section the basic concept of RPA and its current role for business pro-
cess automation are briefly described. The dominance of COTS-type solutions for RPA
is illustrated with examples for both COTS and OS solutions, followed by a review of
approaches for software evaluation and selection in the RPA context. In the third sec-
tion we present our design of a criteria-based selection method for RPA based on a
reference framework with respect to both efficiency and effectivity. As guidance for
conducting an RPA selection project in a real-world scenario we reference a norma-
tive management process consisting of six steps. The chapter closes with a discussion
of the presented method and a short outlook on future developments of RPA solu-
tions.
without changing the underlying application systems (Willcocks et al., 2015) might be
one of the major success factors of RPA. A fast implementation, based on standard
software products (also referred to as “solutions”) that only requires little or even no
programming capabilities is seen as an important aspect (Willcocks et al., 2015; All-
weyer, 2016; Czarnecki et al., 2019). Some RPA solutions can be implemented by end
users with no or only minor support of IT units, e. g., (Schmitz et al., 2019). Therefore,
the usage of standard software products can be seen as an integral part of RPA.
In this context, the RPA implementation has two important selection aspects
(cf. Figure 1): (1) selecting the right process to be implemented by the RPA solution
(e. g., Wanner et al., 2019) and (2) selecting the right RPA solution (e. g., Enriquez et al.,
2020). The first aspect, selecting the right process, is discussed by various researchers
(e. g., Wanner et al., 2019; Beetz and Riedl, 2019; Bosco et al., 2019). In this chapter,
we focus on the second aspect in order to propose a grounded and practicable method
for selecting an RPA solution in a business context.
selection process for professional use (e. g., Robocode, Telligro Opal). Others are de-
signed to be used primarily by software developers and require decent programming
skills (e. g., TagUI, RPA for Python, Robot Framework). The short list of OS RPA so-
lutions presented in Table 2 only includes products that are also targeted to business
users and therefore offer functionality like task recording and/or graphical process
modeling.
In the RPA literature, the open source option is barely considered. Taulli (2020)
covers the topic in a small chapter, explaining the basic OS concept, discussing pro
and con arguments, and briefly describing selected OS solutions. The arguments are
in line with the general arguments and criteria for deciding between CS and OS (e. g.,
Benlian and Hess, 2011). Hence, we do not further distinguish between OS and CS solu-
tions for RPA in this article. Nevertheless, our criteria-based selection method allows
for adding OS-related criteria, when required (e. g., to implement a strict OS strategy).
3 Finding the perfect RPA match | 51
is in line with prior approaches to evaluate the economic impacts of workflow man-
agement systems (WfMSs), which – different from RPA – try to plan, control, and
execute operational procedures (business processes) enforcing the collaboration of
people and information systems (Gruber and Huemer, 2009). With regard to the core
components of the CBA framework, current research faces challenges to give a clear
guidance on how to calculate costs and quantify monetary benefits of RPA software,
which are both required to provide an adequate basis for rational investment deci-
sions. Despite this, current research provides conceptualizations of RPA that focus on
purpose, structure, characteristics, and capabilities of RPA. For instance, Hofmann
et al. (2020) describe a conceptual framework, meant to characterize RPA in a holistic
and structured way. While the authors recommend the framework for evaluating the
corporate relevance of implementing RPA, it lacks appropriate elements to evaluate
efficiency and effectivity of RPA solutions. Enriquez et al., 2020 perform a systematic
mapping study to identify a set of 57 criteria for RPA software evaluation, which are
structured by an RPA lifecycle model. While the extensive set of features and func-
tions can be used as input for multi-criteria decision making techniques, the focus
is rather on characterizing RPA for implementation than on evaluating and selecting
RPA software products. Taulli (2020) also stresses the RPA vendor as object of eval-
uation, which indicates that an RPA software decision is coined by specific invest-
ments and imposes severe switching costs. Issac et al. (2018) delineate nine criteria
for analyzing and comparing RPA products, but do not intend to deliver a selection
method.
Eventually, the character of RPA solutions as COTS software products provides
guidance for identifying appropriate evaluation criteria. COTS software, which is also
known as standard software or sometimes “ready to use software product” (RUSP, e. g.,
Kato and Ishikawa, 2016), is developed by its vendor as a commercial product for a
preferably large number of buyers. Therefore, the product functionality is designed
to fulfill common requirements of many users. Implementing specific requirements of
individual users would lead to higher development and support costs and thus is not
included in a standard product strategy. With a growing number of available alterna-
tives for a certain type of standard software, selecting the best-fitting one becomes a
relevant decision problem. Accordingly, the adoption of the aforementioned evalua-
tion methods on software products has been object to research for decades. Especially
for the case of ERP systems several research contributions are available (Salazar et al.,
2013; Ranjan et al., 2016). Besides, software product quality and evaluation are also
covered by the well-established international standards series ISO 25000 – Systems
and software Quality Requirements and Evaluation (SQuaRE).
In order to overcome the identified shortcomings of evaluation methodologies ap-
plied in the RPA domain, we propose a criteria-based selection method, which is in
line with the CBA framework and therefore follows a cumulative tradition.
3 Finding the perfect RPA match | 53
subsequent productive operation of the RPA solution, and which require human labor.
The total cost of ownership (TCO) approach, for example, is an established method-
ology for condensing the monetary consequences for the input factors (Ellram, 1993).
This approach records all costs incurred during the lifecycle of a procurement object
in a way that the long-term time horizon of an RPA solution as an investment object is
met.
With regard to the level model shown in Figure 2, the challenge of recording and
evaluating the effects of RPA solutions on the effectiveness and efficiency of work pro-
cesses arises in order to determine and assess the benefits (RPA output). With regard
to effectiveness, the objectives linked to the work process must be focused. The fo-
cus is usually on the work process result (output or outcome), which must meet cer-
tain requirements (e. g., in terms of quality of results, availability, correctness, or cus-
tomer satisfaction). The objectives of the use of an RPA solution must be recorded and
evaluated in a differentiated manner depending on the respective business process.
Thus, software robots can be used not only with the objective of automating human
actions, but also to achieve better and faster work results than human actors. Since
a monetary evaluation of such effects is often problematic in practice, the applica-
tion of non-monetary evaluation methods like utility analysis discussed in the domain
of multiple-criteria decision making (MCDM) (Ramesh and Zionts, 2013) is reason-
able.
From an efficiency perspective, the question must be answered to which extent
an RPA solution leads to a rationalization of the resource usage for the execution of a
business process. This is done primarily by automating individual actions or chains
of action of the work process, so that personnel costs and other complementary cost
elements can be saved. To quantify these savings, the time savings times salary (TSTS)
3 Finding the perfect RPA match | 55
methodology can be used, which is oriented towards different employee groups and
task classes. In addition, from an efficiency perspective the question may arise to what
degree employees extend their value adding activities by RPA, such that the whole job
profile has to be evaluated. This approach is covered by hedonic wage models, which
focus on the intrinsic value of working activities of white-collar employees (Sassone,
1987).
In view of the reference framework outlined above, it is clear that the economic
evaluation of RPA solutions requires the processing of monetary data that primarily
relate to the use of resources and the achievable hard benefits (hard savings). On the
other hand, the effects on the work result must also be taken into account, which are
often non-monetary, intangible benefits. As a result, a differentiated approach to eval-
uating the profitability of RPA solutions offers itself, which processes monetary and
non-monetary consequences separately. However, the aggregation of non-monetary
consequences for effectivity can be based on a multi-criteria, non-monetary evalua-
tion procedure, such as the utility value analysis (Zangemeister, 2000) or the analyti-
cal hierarchy process (AHP, Saaty, 2010).
Since the monetary consequences of RPA solutions must be made transparent in
the course of rational investment decisions, for example, for the purpose of cost com-
parison calculations for different system alternatives (see Table 2), the TCO approach
will be methodically deepened in the following subsection.
costs and operating costs for an IT investment and is popular in business practice,
since development and operating activities are frequently performed by different or-
ganizational units acting as cost centers. Other categorization schemes can also be
used for cost classification (Kütz, 2013), e. g., by referencing the established chart of
accounts of the company under consideration.
For the financing of the resulting payments, available own financial resources
from the internal funds (3) as well as a required standard loan (4) with the correspond-
ing monetary consequences such as redemption and debit interest are recorded. Al-
though a constant annual amount of internal funds is available in this case, it is not
sufficient to finance the RPA solution. The standard loan is therefore taken out to cover
the financing requirement, for which debit interest has to be paid in the following pe-
riods (5 % annual interest rate). In segment (5) of the VOFI the tax effect of the invest-
ment is recorded. Since only disbursements are listed in the model, tax refunds result
purely arithmetically and are determined using an income tax rate of 30 %. These have
a positive effect on the TCO. When attributing a tax refund, it is assumed that the at-
tributable loss can be compensated with surpluses from the rest of the company and
therefore has a tax debt reducing effect. In order to calculate the tax refunds, an auxil-
iary calculation also considers the depreciations for the investment costs covering an
operating life of three years.
The VOFI provides the essential information for determining the aggregated TCO,
which is summarized in Figure 4. The basis is first of all the lifecycle costs, to which the
external capital costs (interest) are added. This results in the pagatorial TCO, which is
extended by the internal capital costs, namely, the opportunity costs for the lost credit
3 Finding the perfect RPA match | 57
interest of the internal funds. The value shown in Figure 4 results from a secondary
calculation, assuming an opportunity cost rate of 5 %. The interim result, the TCO be-
fore taxes, is finally reduced by the tax refunds.
As the model calculation shows, a long-term TCO analysis opens up the possi-
bility of making the financial and tax consequences of investing in an RPA solution
transparent. It provides a methodically sound planning basis that allows a compari-
son with the monetary consequences of decision alternatives. By this, the monetary
implications of different RPA solutions (see Table 1) can also be determined by TCO cal-
culations, so that a contribution can be made to support a rational decision between
competing alternatives. In this case, the specific conditions attached to different RPA
vendors and platforms have to be considered. For instance, pricing models for RPA
may depend on the required number of attended or unattended bots. Attended bots
involve automation of processes that still require human collaboration, whereas unat-
tended bots completely automate a process or task. Additionally, the RPA usage by
other software systems (e. g., ERP systems) and their transactions may be a relevant
cost driver (Taulli, 2020).
In order to determine the monetary benefits of RPA solutions, the rationalization
of work activities has to be focused in a subsequent step by use of the TSTS method-
ology described in the following subsection.
strict cost displacement by job reductions. Rather, it assumes that an employee’s value
to the organization equals his cost to the organization (Sassone, 1987). Consequently,
the technically induced increase of time savings is considered as a means to lever the
productivity of the workforce.
In order to quantify the time savings-related efficiency impacts of RPA solutions, it
is necessary to use a long-term model which considers the potential monetary savings
achievable by RPA solutions and to integrate this with the TCO model presented in
the preceding subsection. In order to achieve this, we propose a method which starts
with a defined set of business processes and applies quantitative flow analysis (Du-
mas et al., 2018). Flow analysis assumes that the performance of a business process
can be made transparent if knowledge about the performance of its single activities is
given on a granular level. Typically, branching probabilities for the activities and tim-
ing or cost data on each activity are collected and aggregated. In order to evaluate the
achievable savings for a set of n business processes by adoption of an RPA solution,
it is necessary to derive the operational process models for the RPA process portfolio
and to enrich it for the following attributes explicated in Figure 5:
– The execution probabilities p for all work activities in all n business processes of
the portfolio have to be determined. These probabilities may be determined by in-
terviewing relevant stakeholders, observing the process during a period of time,
or collecting process-related logs from relevant information systems in the IT land-
scape (Dumas et al., 2018). Flow analysis typically uses local branching probabili-
ties, which denote the frequency with which a given branch of a decision gateway
is taken, to determine the overall execution probability of an activity within an
instance of a business process.
– In addition, it is necessary to estimate the rationalization factor s for each activity.
This rate specifies the expected proportional reduction in work by introduction of
an RPA solution. This approach is in general used for calculating the profitability
3 Finding the perfect RPA match | 59
In order to integrate the proposed model with the TCO model presented in the pre-
ceding subsection, the TSTS calculation has to be transformed into a dynamic model
which is compatible with the requirements of capital budgeting. In order to demon-
strate the basic approach, Figure 6 contains the TSTS calculation for a sample business
process consisting of five activities. For these activities, the relevant parameters of the
model are fixed. As the rationalization factor shows, activities may be fully automat-
able (activity A5) or remain unaffected by introduction of an RPA solution (activity A1).
By multiplication of the parameters, the savings on the activity and process level can
be determined (RPA Savings per Process Instance). Section C of Figure 6 uses these
data to develop a TSTS VOFI, which considers the process frequencies for all peri-
ods in the calculation horizon after introduction of the RPA solution in period 0. For
the sake of simplicity, this example assumes constant RPA savings over the complete
planning period, such that inflationary effects (e. g., salary increases) are neglected.
Within the VOFI, the cost reductions are modeled as inpayments, which – following a
strict cost displacement strategy – can be realized by job reductions. From a less rigid
point of view, the inpayments result from a reduction in the payout level for the com-
pany, such that new degrees of freedom for the investment policy are created. As can
be derived from Figure 6C, this reduction in the payout level on the one hand leads to
60 | F. Bensberg et al.
tation of new business activities, this approach is not applicable. Instead, a business
case based on the new business model is required which covers all monetary con-
sequences caused by the new business activities (inpayments) and the required RPA
technology base (payouts).
In order to ensure rationality of decision making, it is necessary to complement
the monetary benefits calculated by use of the TSTS methodology with a systematic
analysis of the non-monetary effects.
et al., 2019) following the recommendations of vom Brocke et al. (2015). Starting with
the keyword “robotic process automation,” we used Google Scholar, Springer Link,
IEEE Xplorer, and the ACM Digital Library, including forward and backward search.
According to our review objectives, we concentrated on studies analyzing RPA from a
conceptual, functional, and/or architectural view. Although aware of quality risks, we
decided for a multi-vocal review (Ogawa and Malen, 1991) and included non-scholarly
literature by business practitioners, consultants, and even vendors. Nevertheless, the
focus was on extracting common available functions in existing RPA products. There-
fore, functions described in product roadmaps or discussed in outlook sections were
excluded.
As expected, we found a broad set of functional descriptions on different detail
levels. Through generalization/specialization and composition/decomposition we
created a three-level hierarchy for structuring criteria for FS of RPA: level 1 – func-
tion group, level 2 – main function, and level 3 – function. Level 1 comprises three
function groups: (1) process development, (2) robot capabilities, and (3) enterprise
management. The function groups together with their main functions, functions, and
according references are listed and briefly described in Table 3. The references in the
table are encoded following the Lecture Notes in Informatics (LNI) citation style (GI,
2020) and can all be found in the references section of this chapter. For instance,
(Fettke and Loos, 2018) was encoded into [FL18]. It should be noted that the listed
criteria are selected to cover only RPA-specific functionality. There might be other
common evaluation criteria for COTS software that should be added for a comprehen-
sive evaluation, e. g., support of creating individual reports. For applying the criteria
model to an individual business context with specific use cases, it might be necessary
to add further specific functions or further increase the detail level of the described
RPA functions. Eventually, for a comprehensive software product evaluation, also the
remaining main characteristics of the ISO product quality model should be included.
For instance, several studies explicitly state security as an important criterion (Ever-
est Group, 2019; Miers et al., 2019; Schmitz et al., 2019; Tornbohm and Dunie, 2017)
which is also covered as main characteristic by ISO 25010.
Another evaluation method element for including individual preferences deter-
mined by the business context are criterion weights. Weights are determined by the rel-
ative importance of criteria in a particular evaluation situation (Heinrich et al., 2014).
A simple way to determine weights is to assign a relative value to each criterion in per-
cent where all weights sum up to 100 %. Alternatively, pairwise comparison of criteria
could be used for a more sophisticated weighting, as included in the AHP (Saaty, 2010;
Wei et al., 2005). A special type of weights can be used for defining decisive factors
(Heinrich et al., 2014). These factors represent indispensable requirements. An alter-
native which fails to fulfill the according criterion will be eliminated from the evalu-
ation. With decisive factors at the beginning of the evaluation process, a large choice
of available alternatives can be transformed into a short list. After this pre-selection,
3 Finding the perfect RPA match | 63
Table 3: (continued)
Table 3: (continued)
Table 3: (continued)
only the remaining alternatives on the short list go through the full evaluation pro-
cess. Pre-selection can help to reduce time and resource consumption for the overall
evaluation. Since there is a risk that with decisive factors alternatives are eliminated
too early, their definition and use should be well thought out.
The vendor of a standard software product controls the design and development of
the product. Therefore, his or her role for adapting the standard product to individual
requirements, fixing product errors, or adding new features is essential. The vendor’s
role for successfully implementing and using standard software has been recognized
for long, e. g., for ERP systems (Haines and Goodhue 2000). Accordingly, well-proven
evaluation criteria for vendor quality are available. For ERP systems, Wei et al. (2005)
proposed (1) reputation (including financial condition), (2) technical capability, and
(3) ongoing service, underpinned by another ten more detailed sub-criteria. Since the
term RPA is still relatively new in the IT solution market and draws a lot of attention
and expectations, several new vendors and solution providers have appeared recently
in the market (van der Aalst et al., 2018). Not all of these newcomers will turn out
to be competitive in the long term. In this respect, evaluating RPA vendor quality is
even more important to avoid the trouble of being forced to rapidly migrate to another
product/vendor because the old one has vanished from the market.
Figure 7: Normative decision process for RPA alternatives (Grob and Bensberg, 2009).
regard to internal factors, the need to introduce RPA technology may be driven by as-
is process costs relative to the competition, while on the external perspective lacking
supply in competent workforce due to demographic change may be a strategic driving
factor. These factors stimulate the first phase in the decision making process, which
identifies a deviation between an objective (e. g., targeted values for process costs or
68 | F. Bensberg et al.
fluctuation rates) and the actual or the predicted value of these indicators. In order
to achieve the desired target state, in a normative decision process it is necessary to
search for feasible alternatives. This is done in the second phase, which identifies dif-
ferent alternatives to solve the decision problem. This phase has to collect the neces-
sary information on RPA alternatives and should rely on available RPA market infor-
mation (e. g., see Table 1).
After the definition of the set of alternatives, it is necessary to evaluate all relevant
alternatives with regard to their monetary and non-monetary consequences. With re-
gard to the proposed evaluation methodology (Sections 3.3.2, 3.3.3), it is therefore nec-
essary to carry out the following calculations to make the monetary implications of
RPA transparent:
– The TCO calculation for all RPA alternatives is required, which implies that the
financial parameters (e. g., internal funds, capital rate, tax rate) are determined
and a calculation horizon for the RPA decision problem is fixed. Additionally, the
licensing models of the different RPA alternatives have to be surveyed, such that
the cost data can be completed.
– The TSTS calculation requires the initial definition of an RPA process portfolio
that contains operational process models as a structural database to derive the
time savings. In this evaluation activity, the correct estimation of the rational-
ization factor is crucial. In the case that no internal data are available, e. g., by
carrying out prototypical RPA implementations for representative process candi-
dates, external data can be gained by reference to the increasing amount of doc-
umented RPA use cases in the literature. Furthermore, the TSTS VOFI calculation
demands the specification of wages and work time data, such that data from mul-
tiple sources within the company (e. g., human resources, cost accounting) are
collected and aggregated.
As depicted in Figure 7, the derived monetary key figures for each decision alternative
have to be compared. If the TSTS dominate the TCO of an alternative the alternative
should be pre-selected, since from a pure monetary perspective it is rational to real-
ize positive net savings (NS). However, this decision is based on a differential calculus
ignoring uncertainty. Therefore, more sophisticated models may make use of a total
comparative calculation for the RPA investment decision, using established methods
like Monte Carlo simulation to anticipate uncertainty, for instance with regard to the
model’s core parameters like the rationalization factor, interest rates, and process fre-
quencies.
Pre-selected RPA alternatives should be subsequently evaluated according to their
non-monetary consequences by use of the criteria contained in the attribute hierarchy
introduced in Section 3.3.4. This results in evaluations for the three categories process
development (PD), robot capabilities (RC), and enterprise management (EM), which
are indicated in Figure 7. By using established methods like utility value analysis, the
3 Finding the perfect RPA match | 69
resulting evaluation data can be aggregated to rank the RPA alternatives according to
their overall utility value.
In the subsequent step of the normative decision process, the value maximizing
alternative has to be selected. This can be prepared by ranking the pre-selected alter-
natives according their net savings and their utility value. In this situation, the rank-
ing sequences of pre-selected alternatives according to both criteria may differ. In this
case, the decision maker has to weigh the monetary and non-monetary evaluations,
for instance by explicit formulation of a higher-level utility function which synthesizes
both kinds of evaluation (Grob and Bensberg, 2009).
The last two steps within the decision process deal with the implementation and
control of the selected RPA alternative. The realization requires the definition of the
implementation plan by using established instruments of IT project management and
the monitoring of the results. The monitoring of the results has to deliver the data re-
quired to calculate the realized effects of the RPA solution. Finally, the control activity
in Figure 7 has to compare the realized effects to the effects intended. In particular, the
TCO VOFI and TSTS VOFI have to be populated with the as-is data, such that devia-
tions from the planning calculations can be identified and traced back to the causing
parameters, e. g., process frequencies and rationalization factors. This creates a valu-
able database, which opens up the chance to learn for future implementation projects
dealing with process automation.
Altogether, the described decision process is based on normative decision theory
and imposes a high effort to create the required informational basis of decision mak-
ing. Consequently, for business practice it may be reasonable to tailor the proposed
decision process to practical requirements. This can be achieved with regard to the
monetary evaluation models (TCO VOFI, TSTS VOFI) by using estimation techniques
to derive the required parameters. In the context of the non-monetary evaluation by
use of the proposed attribute hierarchy, a reduction of the criteria set can be realized
with regard to the objectives attached to the introduction of an RPA software solu-
tion.
This chapter proposes a criteria-based selection method for RPA solutions that is
structured into (1) resource usage based on TCO, (2) efficiency potentials based on time
savings, and (3) functional suitability. The first two aspects are combined in a visu-
alization of financial implications (VOFI), which offers a transparent method to struc-
ture the quantitative aspects of the investment decision. From a qualitative perspective
the functional suitability is structured according to a set of specific functionalities for
RPA solutions. With this combination of qualitative and quantitative aspects, a com-
prehensive method for the selection of RPA solutions is provided. The application of
this method is illustrated based on concrete examples. Those examples are derived
from real-life implementation cases, which provide a first validation of the proposed
method.
In practice, the presented results can be used as guidance for companies and orga-
nizations during the planning and design of RPA implementations. Exemplary struc-
tures and templates are provided for the quantitative evaluation that can be easily
applied. The detailed list of specific functionalities can be used as a starting point to
define the concrete requirements, for example, as part of a request-for-proposal doc-
ument. Both the qualitative and quantitative aspects can be customized according to
a specific implementation scenario, and different existing tools (e. g., VOFI template,
WiBe calculator, SuperDecisions) are available for their operationalization. As a con-
tribution to research, the chapter provides a balanced structure of the different rele-
vant aspects of the RPA selection that can be easily extended by future research re-
sults, e. g., further functional details of RPA software. Furthermore, the results can be
used for an ex ante evaluation of new RPA capabilities as well as for an ex post evalu-
ation of existing RPA cases.
The presented results are based on extensive literature references and market
studies. The selection method is exemplified using real-life examples that can be
seen as a first verification. The method itself is based on well-recognized existing
approaches and standards in the field of software selection and investment evalua-
tion, such as VOFI and ISO 25010. However, experiences with the application of the
proposed RPA selection method should be used for further evaluations. So far, the
functional aspects are defined on a high level according to existing RPA software
products. Currently RPA is a fast-changing topic with a broad variety of innovative
developments in practice and research. Therefore, especially the defined functionali-
ties require further detailing as well as a continuous adaptation to future innovations
(e. g., cognitive functionalities).
A possible risk of RPA, although not yet addressed in scientific research, often is
technical debt. Technical debt is a metaphor used in software development to explain
the mostly invisible problems caused by decisions that value time and cost over qual-
ity. These problems can affect both code and architecture. In the long run, they lead to
significant reductions of maintainability and evolvability (Kruchten et al., 2012). Sim-
ilar to financial debt, which is growing over time through interest, technical debt is
piling up through more and more dependencies. According to (Kruchten et al., 2012),
3 Finding the perfect RPA match | 71
the main reasons for accumulating technical debt are carelessness, lack of education,
poor processes, non-systematic verification of quality, or basic incompetence. At first,
poor processes lead the way to causing technical debt through RPA. Since the use of
RPA often aims for quick wins that require little investment (van der Aalst et al., 2018),
there is a risk that implementing RPA does not include process improvement prior to
process automation (Scheppler and Weber, 2020). Thus, ineffective processes remain
ineffective after automation, although they may run more efficient now. If a process
also produces defects, RPA could produce defects even faster, leading to significant re-
work (Kirchmer, 2017). Another type of technical debt by RPA relates to architecture.
Since RPA solutions mainly use graphical user interfaces to automate applications,
they should be able to adapt to changes of the user interface design, e. g., a new po-
sition of a button. Furthermore, to avoid growing technical debt, solutions should be
able to predict the impact of such changes in advance (Miers et al., 2019). While gen-
eral approaches to measure technical debt and include it into decision making exist,
e. g., (Seaman et al., 2012), their applicability and adaptation to RPA selection requires
further research.
Regarding the future development of RPA solutions, it will be interesting how the
market will react to the maturing process of RPA technology. Besides the increase of
dedicated RPA vendors, it can be observed that also vendors of traditional enterprise
systems have realized the potential of RPA technology and start to integrate it into
their product portfolios. SAP, for instance, has acquired the French RPA vendor Con-
textor in 2018 (Wheatley, 2018) and has integrated its products into a solution now
called SAP Intelligent Robotic Process Automation. Even more relevant for the fur-
ther development of RPA might be the recent acquisition of the UK-based RPA vendor
Softomotive by Microsoft “to accelerate and expand its Robotic Process Automation
capabilities” (Softomotive, 2020). With its dominant market power, Microsoft might
be able to transform the RPA market into a near-monopoly, similar to the market for
office software.
Bibliography
Allweyer T (2016) Robotic Process Automation – Neue Perspektiven für die Prozessautomatisierung.
https://www.kurze-prozesse.de/blog/wp-content/uploads/2016/11/Neue-Perspektiven-
durch-Robotic-Process-Automation.pdf (accessed 06/07/2020)
Alpar P, Alt R, Bensberg F, Lothar Grob H, Weimann P, Winter R (2016)
Anwendungsorientierte Wirtschaftsinformatik Springer Fachmedien Wiesbaden, Wiesbaden.
https://doi.org/10.1007/978-3-658-14146-2
Alpar P, Alt R, Bensberg F, Weimann P (2019) Anwendungsorientierte Wirtschaftsinformatik:
Strategische Planung, Entwicklung und Nutzung von Informationssystemen. Springer
Fachmedien Wiesbaden, Wiesbaden. https://doi.org/10.1007/978-3-658-25581-7
Asatiani A, Penttinen E (2016) Turning robotic process automation into commercial success – case
OpusCapita. J Inf Technol Teaching Cases 6(2):67–74. https://doi.org/10.1057/jittc.2016.5
72 | F. Bensberg et al.
Grob HL, Bensberg F, Coners A (2004) Analytisches time-driven activity-based costing. Controlling
16(11):603–611
Gruber H, Huemer C (2009) Profitability analysis of workflow management systems. In: 2009
IEEE conference on commerce and enterprise computing. IEEE, Vienna, Austria, pp 233–238.
https://doi.org/10.1109/CEC.2009.34
Haines MN, Goodhue D (2000) ERP implementations: the role of implementation partners.
In: Challenges of Information Technology Management in the 21st Century, International
Conference, Anchorage, Alaska, USA, May 21–24, 2000, pp 34–38
Heinrich LJ, Riedl R, Stelzer D (2014) Informationsmanagement: Grundlagen, Aufgaben, Methoden
11, vollst überarb Aufl. De Gruyter Oldenbourg, Berlin [u. a.]
Hofmann P, Samp C, Urbach N (2020) Robotic process automation. EM 30(1):99–106.
https://doi.org/10.1007/s12525-019-00365-8
Houy C, Hamberg M, Fettke P (2019) Robotic Process Automation in Public Administrations.
Digitalisierung von Staat und Verwaltung Gesellschaft für Informatik e. V., Bonn, Germany,
pp 62–74
ISO (2011) ISO/IEC 25010:2011 – systems and software engineering – systems and software Quality
Requirements and Evaluation (SQuaRE) – system and software quality models
ISO (2014) ISO/IEC 25051:2014 – software engineering – systems and Software Quality
Requirements and Evaluation (SQuaRE) – requirements for quality of Ready to Use Software
Product (RUSP) and instructions for testing
ISO (2016) ISO/IEC 25023:2016 – systems and software engineering – systems and software Quality
Requirements and Evaluation (SQuaRE) – measurement of system and software product
quality
Issac R, Riya M, Desai K (2018) Delineated analysis of robotic process automation tools. In: 2018
second international conference on advances in electronics, computers and communications
(ICAECC). IEEE, Bangalore, pp 1–5. https://doi.org/10.1109/ICAECC.2018.8479511
Ivančić L, Suša Vugec D, Bosilj Vukšić V (2019) Robotic process automation: systematic literature
review. In: Di Ciccio C, Gabryelczyk R, García-Bañuelos L, Hernaus T, Hull R, Indihar Štemberger
M, Kő A, Staples M (eds) Business process management: blockchain and central and eastern
Europe forum (lecture notes in business information processing), vol 361. Springer, Cham,
Switzerland, pp 280–295. https://doi.org/10.1007/978-3-030-30429-4_19
Jadhav AS, Sonar RM (2009) Evaluating and selecting software packages: a review. Inf Softw Technol
51(3):555–563. https://doi.org/10.1016/j.infsof.2008.09.003
Kato D, Ishikawa H (2016) Develop quality characteristics based quality evaluation process
for ready to use software products. In: Computer Science & Information Technology
(CS & IT). Academy & Industry Research Collaboration Center (AIRCC), pp 09–21.
https://doi.org/10.5121/csit.2016.60302
Kirchmer M (2017) Robotic process automation – pragmatic solution or dangerous illusion? https:
//insights.btoes.com/risks-robotic-process-automation-pragmatic-solution-or-dangerous-
illusion (accessed 06/07/2020)
Kirchmer M, Franz P (2019) Value-driven robotic process automation (RPA): a process-led approach
to fast results at minimal risk. In: Shishkov B (ed) Business modeling and software design
(lecture notes in business information processing), vol 356. Springer, Cham, pp 31–46.
https://doi.org/10.1007/978-3-030-24854-3_3
Kontio J, Chen S-F, Limperos K, Tesoriero R, Caldiera G, Deutsch M (1995) A COTS selection method
and experiences of its use. 16. Maryland
Krcmar H (2015) Informationsmanagement. 6., überarbeitete Auflage. Springer Gabler, Berlin
Heidelberg
Kruchten P, Nord RL, Ozkaya I (2012) Technical debt: from metaphor to theory and practice. IEEE
Softw 29(6):18–21. https://doi.org/10.1109/MS.2012.167
74 | F. Bensberg et al.
Kütz M (2013) IT-Controlling für die Praxis: Konzeption und Methoden. 2., überarbeitete und
erweiterte Auflage. dpunkt.verlag, Heidelberg
Lacity M, Willcocks L, Craig A (2015) Robotic process automation at Telefónica O2. The Outsourcing
Unit Working Research Paper Series. Paper 15/02
Le Clair C (2019) The Forrester Wave™: robotic process automation, Q4 2019. https://www.forrester.
com/report/The+Forrester+Wave+Robotic+Process+Automation+Q4+2019/-/E-RES147757
(accessed 05/31/2020)
Makowsky MD, Wagner RE (2009) From scholarly idea to budgetary institution: the emergence of
cost-benefit analysis. Const Polit Econ 20(1):57–70.
https://doi.org/10.1007/s10602-008-9051-7
Miers D, Kerremans M, Ray S, Tornbohm C (2019) Magic quadrant for robotic process automation
software. https://www.gartner.com/en/documents/3947184/magic-quadrant-for-robotic-
process-automation-software (accessed 05/31/2020)
Mutschler BB, Zarvic N, Reichert MU (2007) A survey on economic-driven evaluations of information
technology. http://dbis.eprints.uni-ulm.de/416/1/TR-CTIT-07-21(Bela).pdf (accessed
05/23/2020)
Oesterreich TD, Teuteberg F (2018) Why one big picture is worth a thousand numbers: measuring
intangible benefits of investments in augmented reality based assistive technology
using utility effect chains and system dynamics. Inf Syst E-Bus Manag 16(2):407–441.
https://doi.org/10.1007/s10257-017-0367-6
Ogawa RT, Malen B (1991) Towards rigor in reviews of multivocal literatures: applying the exploratory
case study method. Rev Educ Res 61(3):265–286.
https://doi.org/10.3102/00346543061003265
Osman C-C (2019) Robotic process automation: lessons learned from case studies. Inf Econ
23(4/2019):66–71. https://doi.org/10.12948/issn14531305/23.4.2019.06
Ramesh R, Zionts S (2013) Multiple criteria decision making. In: Gass SI, Fu MC (eds) Encyclopedia
of operations research and management science. Springer, Boston, pp 1007–1013.
https://doi.org/10.1007/978-1-4419-1153-7_653
Ranjan S, Kumar Jha V, Pal P (2016) Literature review on ERP implementation challenges. Int J Bus Inf
Syst 21(3):388–402. https://doi.org/10.1504/IJBIS.2016.074766
Saaty TL (2010) Principia mathematica decernendi =: mathematical principles of decision making:
generalization of the analytic network process to neural firing and synthesis. RWS Publications,
Pittsburgh, Pa
Sassone PG (1987) Cost-benefit methodology for office systems. ACM Trans Inf Syst 5(3):273–289.
https://doi.org/10.1145/27641.28059
Sassone PG, Schaffer WA (1978) Cost-benefit analysis: a handbook. Operations Research and
Industrial Engineering Series. Academic Press, New York
Scheppler B, Weber C (2020) Robotic process automation. Inform-Spektrum 43(2):152–156.
https://doi.org/10.1007/s00287-020-01263-6
Schmitz M, Dietze C, Czarnecki C (2019) Enabling Digital Transformation Through Robotic
Process Automation at Deutsche Telekom. In: Urbach N, Röglinger M (eds) Digitalization
cases (management for professionals). Springer, Cham, Switzerland, pp 15–33.
https://doi.org/10.1007/978-3-319-95273-4_2
Schumann M (1992) Beurteilung der Wirtschaftlichkeit von IV-Investitionen. In: Betriebliche
Nutzeffekte und Strategiebeiträge der großintegrierten Informationsverarbeitung
(Betriebs- Und Wirtschaftsinformatik), vol 52. Springer, Berlin, pp 148–234.
https://doi.org/10.1007/978-3-642-77036-4_4
Seaman C, Guo Y, Zazworka N, Shull F, Izurieta C, Cai Y, Vetro A (2012) Using technical debt
data in decision making: potential decision approaches. In: 2012 third international
workshop on managing technical debt (MTD). IEEE, Zurich, Switzerland, pp 45–48.
https://doi.org/10.1109/MTD.2012.6225999
3 Finding the perfect RPA match | 75
Softomotive (2020) Microsoft acquires Softomotive to accelerate and expand its Robotic Process
Automation capabilities. Softomotive https://www.softomotive.com/microsoft-acquires-
softomotive/ (accessed 06/07/2020)
Sydow D (2014) Wirtschaftlichkeitsbetrachtungen zur Investitionsrechnung in der IT - Erfahrungen
und kritische Betrachtung im Kontext der öffentlichen Verwaltung. AV Akademikerverlag,
Saarbrücken
Taulli T (2020) The robotic process automation handbook: a guide to implementing RPA systems.
Apress, Berkeley
Tornbohm C, Dunie R (2017) Market guide for robotic process automation software. https://www.
gartner.com/en/documents/3835771/market-guide-for-robotic-process-automation-software
(accessed 05/31/2020)
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60(4):269–272. https://doi.org/10.1007/s12599-018-0542-4
vom Brocke J, Simons A, Riemer K, Niehaves B, Plattfaut R, Cleven A (2015) Standing on the
shoulders of giants: challenges and recommendations of literature search in information
systems research. Commun Assoc Inf Syst 37. https://doi.org/10.17705/1CAIS.03709
Walter SG, Spitta T (2004) Approaches to the ex-ante evaluation of investments into information
systems. WIRTSCHAFTSINFORMATIK 46(3):171–180. https://doi.org/10.1007/BF03250934
Wanner J, Hofmann A, Fischer M, Imgrund F, Janiesch C, Geyer-Klingeberg J (2019) Process selection
in RPA projects -towards a quantifiable method of decision making. In: International conference
on information systems 2019 (ICIS)
Wei C-C, Chien C-F, Wang M-JJ (2005) An AHP-based approach to ERP system selection. Int J Prod Econ
96(1):47–62. https://doi.org/10.1016/j.ijpe.2004.03.004
Wheatley M (2018) With Contextor acquisition, SAP jumps into hot robotic process automation
market. SiliconANGLE. https://siliconangle.com/2018/11/19/sap-jumps-robotic-process-
automation-contextor-acquisition/ (accessed 06/07/2020)
Willcocks L, Lacity M, Craig A (2015) The IT function and robotic process automation. The
outsourcing. Unit Working Research Paper Series. Paper 15/05
Zangemeister C (2000) Erweiterte Wirtschaftlichkeitsanalyse (EWA): Grundlagen, Leitfaden
und PC-gestützte Arbeitshilfen für ein “3-Stufen-Verfahren” zur Arbeitssystembewertung
(Schriftenreihe der Bundesanstalt für Arbeitsschutz und Arbeitsmedizin Forschung, Fb 879).
2. aktualisierte Überarb. Bremerhaven: Wirtschaftsverl. NW, Verl. für Neue Wiss
Adrian Hofmann, Tobias Prätori, Franz Seubert, Jonas Wanner,
Marcus Fischer, and Axel Winkelmann
4 Process selection for RPA projects
A holistic approach
Abstract: The identification and selection of suitable processes are an essential suc-
cess factor for robotic process automation (RPA) projects. Numerous studies show
that 80 % of RPA projects fail due to wrong decisions in this phase. Insufficient de-
cision quality often results from inaccurate qualitative analysis methods based on
interviews, observations, and estimates. Several research frameworks have recently
been developed to address this problem. They postulate to use process mining to col-
lect accurate and robust information that can be used for decision support. However,
process mining is based on analyzing event logs, which are only available in sufficient
quality and information width and depth in process-oriented information systems.
Activities performed in these systems are typically not suitable for RPA, as they can
be automated directly via system-specific workflows. To address this shortcoming,
we introduce a novel approach that combines desktop activity mining and process
mining techniques in the present chapter. We use desktop activity mining to record
and analyze all user interactions during the process execution, such as clicks and
keystrokes. To comply with privacy regulations, we limit recording to a short period
of time. Furthermore, we extract process execution data from ERP systems, merge
it with our data set, and extrapolate previous findings to obtain a more holistic un-
derstanding of a process’s suitability for RPA. We conceptualize our approach in a
five-step iterative framework and demonstrate its practical implications by applying
it to experimental data.
https://doi.org/10.1515/9783110676693-004
78 | A. Hofmann et al.
are recorded by using special tools that collect user interactions such as clicks and
keystrokes within an application or even on web sites (Dev and Liu, 2017). Therefore,
the tracking of user activities provides the data basis for an entire process analysis
(Suriadi et al., 2017). However, these recordings contain all processes that the user is
involved in, as well as other completely unrelated activities, and, therefore, contains
more noise than PM logs.
most RPA providers today draw upon customer surveys. This is highly subjective and
might lead to wrong conclusions. Further, most experts advocated the importance of
performing a cost–benefit analysis before starting an RPA project and agreed that a
process’s automation potential could change over time.
Figure 2: Process types by automation potential (van der Aalst et al., 2018).
large number of processes in the extensive middle section. However, it is precisely here
that automation can now also be realized economically thanks to the new possibilities
of RPA. Processes or activities in the third section, the right part, are not suitable for
automation due to their low frequency.
Thus, the processes should first be separated by the schema provided in Figure 2.
To do so, responsible persons in companies are interviewed.
By combining PM and DAM, we are not just able to capture the full process. We can
also easily extrapolate the DAM observation period based on the process logs over an
extended period.
4.4.2.1 Setup
To test our approach, we created a realistic test setup. Thus, we used Microsoft Busi-
ness Central 365 (MBC) as a PAIS ERP system and Microsoft Outlook as a peripheral
system to receive e-mails. For DAM, we used a customized task logger. The logger
records every user action like clicks and keystrokes. Every event is saved in a database
with a unique ID, program name, and timestamp. Furthermore, we log the machine
name and user name, as well as the absolute and relative X and Y positions of win-
dows and user clicks. We constructed a standard order to cash end-to-end processes
with three different employees involved.
As shown in Figure 4, the process involves ARP Ltd. and a customer. The customer
starts the process with an order request via e-mail. To simulate different possible pro-
cess flows, we created a total of 400 unique customer orders, each with one to five dif-
ferent order positions. Out of the 400 order requests, 300 came from already known
customers (including customer ID) and 100 from new customers.
The sales employee opens the incoming mail in Outlook. If the customer is already
in the database, she directly creates a sales quote in MBC. Otherwise, the customer is
84 | A. Hofmann et al.
first added to the database. In the next step, she sends the customer the sales quote
via MBC for approval. Possible change requests from the customer are made in MBC. If
the customer sends the final approval, the sales employee creates an order and sends
an order confirmation via e-mail.
In the next step, the process is handed over to the warehouse department, where
the shipping is created within MBC. After shipping is confirmed, the order and invoice
are posted. The final step is posting the incoming payment by another employee in the
finance department. A detailed analysis of the created log is provided in the following
section.
Process logs from PAIS can be recorded for an extended period. There are several rea-
sons why DAM logs can and should only be recorded for a limited time. On the one
hand, there are legal reasons and privacy concerns for the involved employees. On
the other hand, DAM logs tend to include more granular data and quickly become too
large to analyze with conventional software. Hence, we recommend limiting the DAM
logging to two weeks. The PAIS logs can be recorded as long as the underlying core
process does not change substantially. The data are then extracted from the PAIS and
transformed with a data model to a complete process log. This transformation pro-
cess differs for each process and is well documented in the process mining literature
(Andrews et al., 2020). Figure 5 shows how data from the PAIS log are transformed by
linking events with a case ID.
DAM logs require a different form of pre-processing. The logs contain a lot of data
unrelated to the process. The data are very noisy since they include unintentional ac-
4 Process selection for RPA projects | 85
tions of the users, such as misclicks and programs that pop up alerts and interrupt the
process. We recommend cleaning up the log by including only those programs into the
log that are involved in the process in some way. This can be done in an exploratory
manner by examining software that is used directly before and after software directly
involved in the process.
By merging the PM and DAM logs, the insights gained over the short period of DAM
recording can be extrapolated to a longer period. The events of both logs overlap in
the PAIS. Since both logs are timestamped, activities of the PM log and the DAM log
can be matched when the users interact with the PAIS. The two logs can, therefore,
be joined on the attributes user and timestamp (see Figure 6). The DAM logs enable
determining the exact execution time of each activity. Additionally, the complexity
of all activities can be assessed by examining the click structure and keyboard in-
puts.
The direction column indicates whether a higher value of an indicator increases or de-
creases the automation potential. Processes that are executed very often (EF) or take
a long time to be completed (ET) are particularly suitable for RPA. However, if pro-
cesses are highly automated (AR), their potential for automation by RPA decreases. In
addition to these PM-specific indicators, we have identified the number of different
applications used during the process (SH) as an additional RPA suitability indicator.
Frequent human interaction with multiple systems is particularly prone to errors and
inefficient performance (Fung, 2014). Hence, such processes are particularly suitable
for RPA. To ensure practical feasibility, we have ensured that all indicators are calcu-
lated from the properties of the data structures recorded by PM and DAM.
4 Process selection for RPA projects | 87
Fixed cost of human labor (FLC) Fixed cost rate for each process with
execution-independent costs such as rent or equipment
Variable cost of human labor (VLC) Variable cost rate for each process execution with a
certain degree of human interaction based on the relative
amount of salary payments
Fixed cost of RPA (FRC) Fixed of rate to configure and maintain robots, depending
on process’s stability and degree of standardization as
well as the cost of writing code
Variable cost of RPA (VRC) Variable cost rate for each process step execution based
on cost agreement(s) with RPA service(s)
Using these four cost variables, it is possible to calculate the time of amortization per
process task. To do so, the cost functions of both executing the task by manual work
(human) and completing the task automatically (bot) are compared. The RPA bot usu-
ally starts with a higher fixed cost rate, due to the high project and implementation
costs of RPA initiatives. However, it is usually characterized by lower variable costs
per task execution compared to manual work by a human. The intersection of the two
cost functions, if one exists, indicates the point in time where the investment becomes
profitable.
in other projects, RPA projects are restricted by budget constraints (BCs). This includes
financial resources for implementation, configuration, and maintenance of the bots.
On the other hand, the amortization time constraint (ATC) implies that the RPA project
should become profitable after a specific time period. In practice, this is usually be-
tween 6 and 36 months.
This leads to an optimization problem of maximizing the economic profitability of
the RPA initiative, under given constraints. These constraints are BCs, ATC, and com-
pleteness, as the need to decide whether to fully automate a single process task or not
to automate it. To calculate the optimization problem, the results of the cost–benefit
analysis per process task are used. This comparison allows for a list of prioritization re-
garding the task saving potentials. It indicates which process tasks an RPA bot should
automate and which it should not, on the basis of the constraints given.
have to capture sub-processes and tasks in the form of user interactions. Companies
rely on PM and thus must extract process execution data from relevant PAIS to under-
stand a process’s characteristics over time. Subsequently, they can merge both data
sets. Thereby, insight from DAM is extrapolated with those from PM.
Step 3: Process assessment. Based on the complete data set, companies can
assess relevant indicators and thus quantify their processes’ automation potential.
These metrics are execution frequency, execution time, standardization, stability, fail-
ure rate, automation rate, and systemic heterogeneity.
Step 4: Financial assessment. The fixed and variable costs imposed by human
labor and the use of software robots are compared. Besides, we incorporate a budget
as well as an amortization constraint into the financial assessment.
Step 5: Decision making. By combining all insights, companies can make a well-
informed decision. Because a process’s automation potential can vary over time, com-
panies should repeat steps 1 to 4 in reasonable time intervals.
In summary, this chapter proposed a data-driven framework that enables com-
panies to assess their processes’ automation potential objectively. Therefore, we com-
bined techniques from the fields of PM and DAM to build a holistic understanding
of a process’s structure and characteristics. Our approach significantly improves the
quality of decisions during process selection in RPA projects.
Bibliography
Accorsi R, Ullrich M, van der Aalst W (2012) Aktuelles schlagwort: process mining. Inform-Spektrum
35(5):354–359
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(rpa): a case study. In: Workshop on engineering applications. Springer, Berlin, pp 65–71
Andrews R, van Dun CG, Wynn MT, Kratsch W, Röglinger M, ter Hofstede AH (2020) Quality-informed
semi-automated event log generation for process mining. Decis Support Syst 113265
Antomarioni S, Bevilacqua M, Potena D, Diamantini C (2019) Defining a data-driven maintenance
policy: an application to an oil refinery plant. Int J Qual Reliab Manag
Asatiani A, Penttinen E (2016) Turning robotic process automation into commercial success–case
opuscapita. J Inf Technol Teaching Cases 6(2):67–74
Dev H, Liu Z (2017) Identifying frequent user tasks from application logs. In: Proceedings of the 22nd
international conference on intelligent user interfaces, pp 263–273
Fung HP (2014) Criteria, use cases and effects of information technology process automation (itpa).
In: Advances in robotics & automation, vol 3
Geyer-Klingeberg J, Nakladal J, Baldauf F, Veit F (2018) Process mining and robotic process
automation: a perfect match. In: 16th international conference on business process
management, Sydney, pp 124–131
Herm L-V, Fuchs K, Helm A, Hofmann A, Imgrund F, Janiesch C, Winkelmann A (2020) A consolidated
framework for implementing robotic process automation projects. In: Proceedings of the 18th
international conference on business process management. Springer, Sevilla. Accepted for
publication
90 | A. Hofmann et al.
Jimenez-Ramirez A, Reijers HA, Barba I, Del Valle C (2019) A method to improve the early stages of
the robotic process automation lifecycle. In: Giorgini P, Weber B (eds) Advanced information
systems engineering. Lecture Notes in Computer Science, vol 11483. Springer, Cham,
pp 446–461
Kenneth B, Svetlana S Hype cycle for artificial intelligence. https://www.gartner.com/en/
documents/3883863/hype-cycle-for-artificial-intelligence-2018. Accessed: 2020-03-03
Lacity M, Willcocks L (2015) Robotic process automation: Mature capabilities in the
energy sector (the outsourcing unit research paper series paper 15/06), Hentet fra,
https://irpaai.com/robotic-process-automation-mature-capabilities-in-the-energysector
Lamberton C, Gillard A, Kaczmarskyj G (2016) Get ready for robots-why planning makes the
difference between success and disappointment. EYGM Limited, United Kingdom
Leno V, Polyvyanyy A, Dumas M, La Rosa M, Maggi FM (2020) Robotic process mining: vision and
challenges. Bus Inf Syst Eng
Li C, Reichert M, Wombacher A (2008) Mining process variants: goals and issues. In: 2008 IEEE
international conference on services computing, vol 2. IEEE, pp 573–576
Park M, Song M, Baek TH, Son S, Ha SJ, Cho SW (2015) Workload and delay analysis in manufacturing
process using process mining. In: Asia-Pacific conference on business process management.
Springer, Berlin, pp 138–151
Schmitz M, Dietze C, Czarnecki C (2019) Enabling digital transformation through robotic process
automation at Deutsche Telekom. In: Digitalization cases. Springer, Berlin, pp 15–33
Suriadi S, Andrews R, ter Hofstede AH, Wynn MT (2017) Event log imperfection patterns for process
mining: towards a systematic approach to cleaning event logs. Inf Sci 64:132–150
van der Aalst WM (2009) Process-aware information systems: lessons to be learned from process
mining. In: Transactions on petri nets and other models of concurrency II. Springer, Berlin,
pp 1–26
van der Aalst W (2016) Data science in action. In: Process mining. Springer, Berlin, pp 3–23
van der Aalst W, Weijters T, Maruster L (2004) Workflow mining: discovering process models from
event logs. IEEE Trans Knowl Data Eng 16(9):1128–1142
van der Aalst W, Adriansyah A, De Medeiros AKA, Arcieri F, Baier T, Blickle T, Bose JC, Van Den Brand
P, Brandtjen R, Buijs J et al (2011) Process mining manifesto. In: International conference on
business process management. Springer, Berlin, pp 169–194
van der Aalst WM, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60(4):269–272
Wang Y, Caron F, Vanthienen J, Huang L, Guo Y (2014) Acquiring logistics process intelligence:
methodology and an application for a Chinese bulk port. Expert Syst Appl 41(1):195–209
Wanner J, Hofmann A, Fischer M, Imgrund F, Janiesch C, Geyer-Klingeberg J (2019) Process selection
in rpa projects: towards a quantifiable method of decision making. In: Proceedings of the 40th
international conference on information systems (ICIS), München. AIS, pp 1–17
Willcocks LP, Lacity M, Craig A (2015) The it function and robotic process automation
Stefan Rechberger and Stefan Oppl
5 Selecting processes for RPA
A study of relevant key process indicators in the finance industry
5.1 Introduction
In the context of business and information systems engineering (BISE), the question
repeatedly arises as to which processes in an organization are suitable for automation.
Robotic process automation (RPA) is a form of technology that enables the implemen-
tation of process automation in BISE (van der Aalst et al., 2018). The use of RPA is
nowadays increasingly important in process management and has become a core com-
ponent of process automation options (Kirchmer, 2017; Willcocks et al., 2015). A large
number of organizations active in service industries have already implemented pro-
Acknowledgement: The authors would like to thank the experts for their openness when participating
in the study and the anonymous reviewers for their constructive feedback on the initial version of this
chapter.
https://doi.org/10.1515/9783110676693-005
92 | S. Rechberger and S. Oppl
cess automation, in particular in the area of financial and accounting services (Fer-
nandez and Aman, 2018; Anagnoste, 2017). The importance of RPA is also backed by
a study showing that it could play an essential role in the financial services indus-
try in the future (Waidelich and Schmidt, 2018). The participating institutions see an
increased potential of RPA, primarily in the areas of settlement, back office, sales,
insurance business, and compliance areas (Waidelich and Schmidt, 2018). Fernan-
dez and Aman (2018) report on the potential of RPA in the services sector in general
and also stress its potential for tasks such as accounting and back office manage-
ment.
In order to gain a practical perspective of which typical tasks can be performed by
RPA, informal interviews were held in advance with the regional provider of financial
and banking services (Raiffeisenlandesbank Oberösterreich AG, RLB). RLB explained
its pilot process (see Section 5.2 for details), which has already been implemented pro-
totypically with RPA. In the context of the interviews with RLB, however, the oppor-
tunity of rolling out process automation using RPA is associated with the challenge of
process selection. According to RLB, after completion of the first pilot process, around
1000 processes were submitted for automation by various operative departments. The
company therefore faces the challenge of selecting and prioritizing suitable processes
for RPA development. This selection problem is not only evident in the individual case
of RLB, but can also be found in the respective literature. Van der Aalst et al. (2018)
recently referred to this issue as an open research area and asked the following ques-
tion: “What characteristics make processes suitable to be supported by RPA?” Orga-
nizations have countless business processes and it is almost impossible to automate
all processes through software development projects (van der Aalst et al., 2018). It is
therefore crucial to identify those processes which are most suitable for process au-
tomation. In an average organization there are a multitude of processes that occur
at different frequencies in relation to their case variations (Fleischmann et al., 2020).
The higher is the process frequency with a correspondingly low number of case vari-
ations, the higher can the potential cost savings through process automation be (van
der Aalst et al., 2018). Automation software development techniques, however, would
not pay off in many processes. Such processes are suitable candidates for RPA (van
der Aalst et al., 2018). It is, however, currently still unclear which concrete process
characteristics these candidates should have in order to be suitable for RPA (van der
Aalst et al., 2018). In addition, there is no corresponding transfer of the characteris-
tics into measurable process indicators (van der Aalst et al., 2018). This results in a
key question in connection with RPA, as to which characteristics and key figures a
process should have, in order to be suitable for an RPA implementation (van der Aalst
et al., 2018). The relevance of this question is also supported by Wanner et al. (2019),
who underpin that companies need decision support for the selection of processes.
The decision problem of selecting processes for automation is basically not a novelty.
There are many different methods and approaches for process selection for software
development processes in the relevant literature. For example, process mining could
5 Selecting processes for RPA | 93
be an approach to identify and evaluate processes (van der Aalst, 2011). Established
methods for process selection, however, do not take sufficient account of the special
features of RPA (van der Aalst et al., 2018).
The present chapter contributes to address this challenge and aims to develop
and provide a practically applicable method to systematically approach the decision
problem in RPA process selection in service industries. Methodologically, the study
described here follows a design science process (Peffers et al., 2007; Johannesson and
Perjons, 2014), which provides a framework for developing theoretically grounded
and empirically validated artifacts that support the resolution of practical problems.
The iterative nature of the process is particularly suitable for challenges that are not
yet fully examined or driven by rapidly changing technological developments, both
of which are the case for the problem at hand. In the present chapter, we present the
initial design iterations and thus provide a basis for future research in increasing both
depth and breath of the applicability of the proposed method.
5.1.1 Methodology
The research presented in this chapter is based on a design science approach as de-
scribed by Johannesson and Perjons (2014). Its output is an artifact that is developed
step by step in several phases. A design approach referred to as “development- and
evaluation-focused design science research” is applied (see Figure 1), which focuses
on the development and evaluation of the artifact (Johannesson and Perjons, 2014).
In Section 5.1, the problem of process selection for automation with RPA is derived
and explained, based on practical experience and backed by results from existing lit-
erature. The knowledge gained is illustrated using a running example of a simplified
scenario from RLB. The purpose of the problem definition is to achieve an assessment
of the requirements for the artifact. Based on the defined requirements for the artifact,
we adapt an existing selection method in Section 5.2, which enables existing business
processes to be evaluated on the basis of specific process criteria. The design of the
artifact is divided into two consecutive iterations. In the first iteration, an artifact is
developed based on a literature search to identify existing relevant process indica-
tors. In a second iteration, these identified indicators are refined and expanded by
practical experience in the form of expert interviews. After completion of the devel-
opment, the artifact is evaluated in Section 5.3 by experts from the financial industry
through structured interviews. A benefit analysis (BA) is applied to obtain a weighted
assessment. Finally, the “artifact knowledge” (Johannesson and Perjons, 2014), i. e.,
the resulting criteria which are embedded in an existing selection method, is commu-
nicated to practitioners and researchers in the form of a discussion (Section 5.4) and
a final conclusion (Section 5.5).
94 | S. Rechberger and S. Oppl
Friday at 8 am by an employee. This process is carried out repeatedly for each indi-
vidual customer. First, the customer appointments from the past week are exported
from the CRM system. Second, the relevant customer data are exported from the core
banking system, based on the customer appointments. After successful export from
the two applications, these data are linked with each other via the customer number
and combined to form a report. For the completion of the report, calculations on cus-
tomer limits and margin results and economic classification are carried out in parallel.
As soon as all calculations have been completed, the data in the report are checked
for completeness. The result of the decision can provide three states: ‘complete’: the
report is complete and ready for dispatch; ‘known incompleteness’: individual data
records are incomplete and can be corrected in a standardized manner; and ‘unde-
fined data structure’: the report contains irreparable error and the process must be
terminated. Depending on the state, either the process is terminated or the report is
prepared accordingly for dispatch. The final process step is to send the customer report
by e-mail. Here again, depending on the economic classification, it is decided whether
the report should be sent to the managers. If the report is to be sent, a decision is also
made as to which management level should receive the report.”
The outlined business process is also presented as a process model (cf. Figure 2)
using BPMN (White and Miers, 2008) for better understanding.
able to metrically represent the process characteristics found. First of all, an exist-
ing method is needed that is suitable for comparing business processes. To search for
a suitable basic method for the approach, the following search phrase was used in
the search engines Science Direct and Springer Link: (ALL(“method decision problem
business process criteria”) OR ALL(title=process+selection) OR ALL(“process selec-
tion method”)).
A total of 183 records (including duplicates) were observed. The records were
selected manually, based on the abstract. A contribution by Riedl (2006) was found,
which contrasts established methods for selecting decision problems. According to
Riedl (2006), BA and the analytical hierarchy process (AHP) are available as multi-
attributive selection procedures to evaluate criteria. Comparing the two methods,
Riedl (2006) explain that the traceability and comprehensibility of BA are higher than
those of the AHP. Due to the restriction-free possibility to add criteria later, a trans-
parent traceability, and no existing hierarchy of criteria, it was decided to use BA as
the basis for the RPA-specific method development. The procedures of applying BA
are not altered here; the contribution of this chapter is rooted in the identification and
validation of the RPA-specific selection criteria to be used when implementing the
method.
The Kühnapfel (2014) pair comparison method is used to create the RPA-specific
method variant. For this purpose, selected decision alternatives are evaluated on the
basis of decision criteria and then the individual evaluation results (scale [0; 5]) are
summed up and presented as benefit values (the higher the benefit value, the better
a decision alternative) (Kühnapfel, 2014). The collection of decision criteria is a pro-
cess of finding the essential criteria for solving the decision problem. When selecting
criteria, it is essential to define suitable criteria for problem solving. The catalog of
the selected criteria should fulfill the characteristics of reproducibility, accessibility,
relevance, and completeness (Kühnapfel, 2014). The decision alternatives in our case
are the business processes to be evaluated. The decision criteria will be derived from
a literature review in the context of RPA. The construction of a matrix supporting the
decision process is depicted in Figure 3. Each decision alternative is listed as a sep-
arate row in the table. All the decision criteria for determining the benefit value are
listed the columns on the table. As a basis for calculating the benefit value for each
business process, each process is evaluated on the basis of each individual criterion.
In Figure 3 a range of 0 to 5 points is defined for the evaluation. For example, Process
1 fulfills criterion 1 only very marginally and is therefore only rated with 1 point. Af-
ter the evaluation of all processes on the basis of all criteria, the evaluation results for
each decision alternative are summed up to a total benefit value. A total of five individ-
ual evaluations were carried out for Process 1 in Figure 3, which have a total benefit
value of 10 points (1 + 1 + 4 + 4 + 0). Finally, the calculated benefit values are com-
pared between the processes and a prioritization for the selection can be determined.
The higher the benefit value, the more appropriate a process is for RPA. In the example
5 Selecting processes for RPA | 97
in Figure 3, according to the definition, Process 2 is more suitable for automation than
Process 1.
As already mentioned, decision criteria are required for the method development.
Therefore, a literature review was carried out in order to gain insight into the state-of-
the-art on which process characteristics are decisive for assessing the suitability of
a business process for implementation with RPA. The search engines Science Direct
and Springer Link were scanned with the following entire query: (ALL(title=“robotic
process automation”) OR ALL(title=RPA)).
Overall 79 results could be achieved with this query. The results were inspected
manually based on the abstract for their relevance in the context of process charac-
teristics. Four of the 79 contributions provided insight into process characteristics and
were examined in more detail. Alexander et al. (2018) underpins the decision problem
in the context of process characteristics and points out that extensive analysis and
planning of tasks (which are too complex and cannot be standardized sufficiently) is
necessary in order to select suitable processes for RPA. In summary, the following cri-
teria could be found in the literature and are recommended for the process selection:
– tasks that make low cognitive demands and leave no room for an interpretation
of decisions, as well as tasks that do not require a subjective assessment (Aguirre
and Rodriguez, 2017; Allweyer, 2016; Smeets et al., 2019; Willcocks et al., 2017);
– processes with a high frequency (number of process instances in a certain period)
(Aguirre and Rodriguez, 2017; Allweyer, 2016);
– business processes that use a large number of software components or applica-
tions (Willcocks et al., 2017);
– processes that contain no, or a limited number of, exceptional cases (Aguirre and
Rodriguez, 2017; Smeets et al., 2019; Willcocks et al., 2017);
– activities that are very prone to error when carried out by a human (Aguirre and
Rodriguez, 2017; Allweyer, 2016; Smeets et al., 2019).
In addition to the process properties listed above, back office processes are partic-
ularly suitable for automation using RPA, since they are usually much more stan-
98 | S. Rechberger and S. Oppl
dardized and do not have as many exceptions as front office processes (Aguirre
and Rodriguez, 2017). Characteristics already exist that should be suitable for RPA-
compatible processes, but there is still no transition to measurable process charac-
teristics and process indicators. As a result, a key question remains open in the BISE
company in connection with RPA, as to which properties and key figures business
processes should have in order to be suitable for an RPA implementation (van der
Aalst et al., 2018). Since these process characteristics are often not tangible and can-
not be measured, we here attempt to transfer these characteristics into measurable
process indicators. For this purpose, a further literature search is carried out. The
aim of the literature search is to obtain an overview of potential key performance
indicators (KPIs) and measurable process indicators, in order to be able to map the
described process characteristics. The search term “(title=process key performance
indicators)” was queried in the search engine Springer Link. With this search strat-
egy, 95 academic papers were found. When reviewing the results, an ISO-Standard
22400-2:2014 (2014) for KPIs and several instructions to be able to design own process
key figures according to Van Looy and Shafagatova (2016), Keeble et al. (2003), and
Wetzstein et al. (2008) were found. In addition, a contribution by Cardoso (2005) was
found to calculate the complexity of a business process. In the following subsections
we assign relevant KPIs to the process characteristics and demonstrate the respective
calculation, using the running example. For process characteristics that cannot be
matched with KPIs mentioned in literature, separate key figures are suggested.
Process complexity: For RPA, processes that have low cognitive requirements
are suitable, together with those which have no room for interpretation when mak-
ing decisions and do not require a subjective evaluation of the process results and
interim process results (Aguirre and Rodriguez, 2017; Allweyer, 2016; Smeets et al.,
2019; Willcocks et al., 2017). The mapping of cognitive requirements as process met-
rics is fundamentally difficult, but an approach is made to at least partially measure
this requirement, based on the complexity of a process. Cardoso (2005) derived a met-
ric from the McCabe metric to convert process complexity into a measurable indicator,
using a business process model. To determine the metric, simply add the number of
outgoing control flows for each decision node. The key figure is calculated using the
following types of decision nodes:
– AND-split: All paths are executed in parallel (addition of the value 1 per AND-
split).
– XOR-split: Only one path of the possible selection options is chosen (addition of
the value n or the number of possible paths).
– OR-split: At least one path and a maximum of all selection options are executed
(addition of 2 to the maximum number minus 1 or addition of 2n − 1).
The total sum of the values of the individual decision nodes gives the measurable pro-
cess complexity. The process complexity (Table 1) of the running example (Figure 2)
5 Selecting processes for RPA | 99
can be calculated using the decision nodes. In the current example, a total of three dif-
ferent gateways are included, i. e., one gateway for an AND-split, one XOR-split, and
one OR-split. Table 1 demonstrates an example calculation of process complexity.
Process frequency: Business processes that have a high number of instances are
qualified for process automation using RPA (Aguirre and Rodriguez, 2017; Allweyer,
2016). The KPI process frequency of the ISO-Standard 22400-2:2014 (2014) is used to
compare process instances between processes. The process frequency indicates how
many process instances occur in a certain period of time (for example, instances per
month or per annum). As a result, the process frequency measure could be the number
of process instances per month. For the demonstration in our running example, RLB
OOE AG was asked how many customer reports are created approximately per month.
According to RLB’s records, around 860 customer reports are created each month.
Multiple software components: In the field of RPA software, processes that use
a higher number of software components have proven to be suitable (Willcocks et al.,
2017). No KPI for mapping dependencies to applications could be found in the litera-
ture. Therefore, an own indicator is defined according to Van Looy and Shafagatova
(2016). The indicator only measures the number of applications involved in the pro-
cess. In the running example, the CRM system and the core banking system are used
as the source system, and the mail service for sending the entire customer reports to
the managers. Accordingly, the key figure of the applications involved in the process
is 3 (see Figure 2).
Exception handling: According to Aguirre and Rodriguez (2017), Smeets et al.
(2019), and Willcocks et al. (2017), processes that only contain a small number or no
exceptional cases are particularly recommended for an RPA implementation. No KPI
for mapping dependencies to applications could be found in the literature. Therefore,
an own indicator is defined according to Van Looy and Shafagatova (2016). The num-
ber of exceptional cases within a business process is defined as the process indicator.
In the running example, a path with an exception is shown for the XOR-gateway. Ac-
cordingly, the number of exceptional cases is 1 (see Figure 2).
Error rate: Business processes that are prone to human error are predestined for
automation through RPA (Aguirre and Rodriguez, 2017; Allweyer, 2016; Smeets et al.,
2019). The KPI error rate of the ISO-Standard 22400-2:2014 (2014) is used. It is calcu-
lated as a ratio of the process instances with occurred errors and the total process in-
100 | S. Rechberger and S. Oppl
stances (ISO-Standard 22400-2:2014, 2014). For our running example, RLB asked how
many customer reports were incorrectly created on average during manual process-
ing. According to RLB, around 40 reports per month are incorrect. This corresponds
to an error rate of 5 % (40/860).
The literature review enabled process characteristics to be found that are essential
prerequisites for the implementation of RPA. For this purpose, an attempt was made
to assign the process characteristics to measurable key figures, or own indicators were
defined for missing key figures. Based on these results, an initial matrix for selecting
business processes that are suitable for RPA using BA was developed (see Figure 4 for
a better understanding of the matrix).
experts were asked which additional process measurements and indicators are used
in practice. The process indicators mentioned by the experts were discussed more in-
tensively during the interviews. In the course of this, they also elaborated on the re-
spective calculation methods for the individual criteria. These are now described and
exemplified in more detail in the following subsections.
Process stability: Experts A, B, and D cited the level of maturity of a business
process as an indicator. According to Expert A, the degree of maturity can be read from
the process stability. The process stability could be defined as the number of potential
adaptations to a business process. In other words, the more often a business process
changes in a certain period of time, the more unstable the process is. The number of
process adaptations per annum is defined as a measure. For our running example,
RLB was asked how often the customer report process was adjusted in the last year.
Two process adaptations were specified last year.
Application stability: All the experts listed the application stability. In summary,
the experts emphasized that the applications involved play an important role in the
context. Existing applications are integrated in the course of an RPA implementation.
Depending on the availability and stability of the applications integrated in the pro-
cess, a business process is to a greater or lesser extent suitable for RPA. The number of
application failures per annum is used to calculate the application stability and serves
as a measurable indicator. As part of the running example, one of the three applica-
tions (CRM system, core banking system, mail service) is according to RLB usually not
available to the user twice a month. Converted on an annual basis, this corresponds
to a number of 12 application failures per year.
Running process costs: Experts A and C explained that the automation of a pro-
cess is usually related to an economic benefit. Expert A defined the indicator for taking
economic advantage into account as running process costs and explained it as follows:
“The indicator of whether a process is suitable for RPA or not is the amount of running
process costs such as personnel costs, license costs, performance peaks, etc., or the
amount of costs that can be saved by process automation.” The running process costs,
in the example used, amount to around 500 euros per month (according to RLB). Con-
verted on an annual basis, the total costs amount to 6000 euros.
Processing time: Expert B explained that the processing time (or throughput
time) of a process instance can determine whether the business process is suitable
for RPA. If, for example, an instance needs several days for one run, this can be criti-
cal with regard to the availability of applications or also trigger problems in rollback
scenarios. Expert B defined the average throughput time per process instance as an
indicator. According to RLB, processing a customer report in our running example,
i. e., a process instance, takes around 5 minutes.
In summary, four additional measurable process indicators could be identified
by interviewing the experts. The initial selection matrix can therefore be expanded
to include these decision criteria. The resulting selection matrix is depicted in Fig-
ure 5. A total of nine relevant process indicators were identified in the course of the
102 | S. Rechberger and S. Oppl
approach, which together form an extended method. This extended selection matrix
will be evaluated in Section 5.3.
5.3 Evaluation
The same experts as interviewed during the development of the extended method were
consulted for validation again. Focus was put on assessing the relevance of the iden-
tified process indicators for process selection in RPA. This step should ensure that the
developed artifact comprises practically relevant indicators and also allows to assess
their relative importance with respect to RPA suitability of the process.
5.3.1 Methodology
The process indicators are compared with each other to evaluate the individual de-
cision criteria. For this purpose, as described in Section 5.2.1 for the initial method
development, a BA is used for the evaluation. Due to the larger number of criteria, the
pair comparison method according to Kühnapfel (2014) is applied as an auxiliary in-
strument for the evaluation of the criteria. First, all criteria to be evaluated are shown
in a cross table (cf. Figure 6). Each expert evaluates the individual criteria in pairs,
independently of the other participants (e. g., criterion C1 with criterion C2). A total of
10 points are awarded for each comparison of two criteria. By assigning 10 points, the
distances can be represented better in terms of relevance. For example, criterion C1
is more important than criterion C2, so 6 points are entered in row C1 and column C2
and only 4 points in row C2 and column C1. If two criteria are equally insignificant, the
point system would assign 5 points to be entered in both crossing points. In order to
subsequently nullify criteria that have no significance regarding the decision problem,
an exception is defined when comparing two insignificant criteria. If both criteria are
5 Selecting processes for RPA | 103
not significant, 0 points may be entered in both crossing points. Finally, the individual
evaluations of the pair comparisons can be used to calculate point totals that represent
a weighting of the criteria or a prioritization. The weighting of the individual criteria
results from the total points of the criterion divided by the total sum of all criteria.
5.3.2 Results
The following criteria were defined in the previous section for the evaluation by the
experts: process complexity, number of process instances per month, number of ap-
plications involved in the process, number of exceptions, error rate, number of process
adaptations per annum, number of application failures per annum, running process
costs per annum, and processing time. The experts were interviewed individually and
independently of one another. A separate cross table was created for each expert and
filled in separately by the experts. The individual evaluations of the experts were eval-
uated and are summarized, summed up, and weighted in the following table (cf. Fig-
ure 7). Generally, each expert awarded points for all the decision criteria, meaning
that according to the experts, none of the evaluated criteria is fundamentally irrele-
vant with regard to the identification of suitable business processes.
If one looks at the average number of points (cf. Figure 8) awarded per expert and per
key figure, it can be said that three out of four experts rank the number of application
failures and the number of process adaptations as most informative. The number of
exceptional cases, on the other hand, is classified by three out of four experts as a
key figure with little informative value. All other process indicators are quite homo-
geneously considered to play an important role in the identification of the RPA suit-
ability. The only criterion with significantly diverging opinions is the processing time,
which one expert rated as a key figure with high informative value, whereas two others
considered it of limited value.
5.4 Discussion
The aim of this study was to develop a method that should make it easier for orga-
nizations to select suitable processes for RPA implementations. However, the weight-
ing numbers and the average evaluation points underline the difficulty in identifying
business processes that are suitable for RPA, meaning that it is difficult to determine
the suitability based on a single key figure. Consequently, the result of the expert in-
terviews confirms the need for identification to apply a number of decision criteria
or process indicators. The experts particularly emphasize the number of application
failures and the number of process adaptations as very significant with regard to their
suitability for RPA. The stability of the application, integrated in the process, is re-
peatedly mentioned in the discussions with the experts as a decisive factor in order
5 Selecting processes for RPA | 105
problems in the context of RPA. However, the developed artifact is based on some as-
sumptions that can only be temporarily confirmed by the rapid development of RPA
technology. Other procedures, such as process mining, may take superior process se-
lection decisions based on data-based objective calculations (van der Aalst, 2011). The
conducted evaluation is based on the practical experience of the experts and, in con-
trast to process mining, is based on a subjective awareness. If one looks at the results of
the evaluation in comparison to the related work, there are some additions regarding
the process criteria, which can be determined and are not covered by the developed
artifact. In the research literature, the characteristics rule-based structure, degree of
standardization, digitality, and structure of the data are mentioned as essential basic
requirements for the application of RPA (Aguirre and Rodriguez, 2017; Allweyer, 2016;
Willcocks et al., 2017). The most important criterion Smeets et al. (2019) mention is
the digitizability of the data, since RPA cannot provide support for process automa-
tion, due to the lack of digitization. In addition, related work mentions that the data
types used in the process can be taken into account as a criterion (Allweyer, 2016). As
an example of differentiation of data types, it is stated that text and numbers can be
automated better by RPA than pictures and handwritten data (Allweyer, 2016). Smeets
et al. (2019) explain that several process selection criteria can be used and that indi-
vidual criteria can also be weighted. When selecting a process, it should be noted that
priority should not only be given according to the defined criteria, since in practice it
often turns out that at least parts of the process under consideration can be easily au-
tomated, despite failure to meet the criteria considered (Smeets et al., 2019). Further-
more, practice shows that organizations that already have more experience with RPA
tend to automate more complex business processes using RPA (Smeets et al., 2019).
The more experience an organization has with RPA implementation, the lower the im-
portance of process complexity becomes (Smeets et al., 2019).
5.5 Conclusion
In summary, the potential of RPA looks promising, especially in processes with a high
number of monotonous and repetitive tasks. The basic requirement for RPA is that the
data to be processed must be structured. In addition, RPA offers a suitable option for
process automation for business processes. As a result of the descriptive characteris-
tics, measurable process indicators were derived, which can be used in a method for
the selection of RPA-suitable business processes. This study is motivated by a decision
problem at RLB, which is faced with the challenge of selecting suitable processes for
RPA implementation. A real business process from RLB was used for illustration in
this study. In the course of the design phase, process indicators for the development
of the method variant were identified in two iterations. In the first iteration, a litera-
ture search was used to find a suitable method and relevant selection criteria for the
5 Selecting processes for RPA | 107
decision problem. Due to the possibility to add new criteria during the procedure and
a realistic representation of the decision problem, BA was chosen as a suitable basic
method for the development of the method. After selecting the method, process char-
acteristics were derived using the existing literature and assigned to common KPIs.
The initial literature-based method variant was extended in a second iteration by ad-
ditional process indicators from experts through semi-structured interviews. Four ex-
perts from Austrian organizations in the finance industry, who already have experi-
ence with RPA, were consulted for the development of the extended selection matrix
to be used in the method. In order to ensure the significance of the respective individ-
ually defined process indicators with regard to the RPA suitability, the indicators were
evaluated and weighted by the four RPA specialists, applying structured interviews,
using a BA. In summary, all criteria that have been defined have a certain degree of in-
formative value regarding the RPA suitability of a business process. The results of the
expert interviews show that two key figures (the number of application failures and
the number of process adaptations) are particularly significant with regard to their
suitability for RPA. The key figures processing time, error rate, running process costs,
number of process instances, process complexity, and number of process-related ap-
plications play an important role in the process selection. According to experts, only
the number of exceptional cases is of little significance regarding the suitability for
RPA.
The result of this research study is addressed to practitioners and scientific re-
searchers, providing a method for the selection of business processes that are suit-
able for RPA, but so far it remains unclear to what extent the process key figures are
available in the respective organization, when comparing specific business processes.
In order to be able to check the applicability of the developed method, it would be
necessary to carry out further studies that validate specific processes for their RPA
suitability, based on the process indicators developed. This study is subject to some
limitations and challenges and thus opens up potential research areas for future work,
to consolidate the knowledge gained. The derived process indicators and the process
metrics, supplemented by the experts, do not represent the absolute entirety or com-
pleteness of all conceivable criteria. In the process of BA, the collection of decision
criteria is provided as a creative method and therefore does not impose any restriction
with regard to the selection of the criteria. In order to obtain a more extensive assess-
ment of potential criteria, an alternative procedure could be chosen, other industries
examined, or a larger number of experts involved. It would also be interesting to see
how the identification of RPA-compatible processes in other industries takes place,
on the one hand, the extent to which further process indicators have to be added in
other industries and, on the other hand, how the weighting of the evaluated process
indicators in other industries compare to the finance industry. However, the devel-
oped artifact is generic and offers an easily understandable RPA-specific alternative
to existing process selection methods for practice.
108 | S. Rechberger and S. Oppl
Bibliography
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(RPA): a case study. In: Figueroa-García JC, López-Santana ER, Villa-Ramírez JL, Ferro-Escobar R
(eds) Applied computer sciences in engineering. Communications in Computer and Information
Science. Springer, Berlin, pp 65–71
Alexander S, Haisermann A, Schabicki T, Frank S (2018) Robotic Process Automation (RPA) im
Rechnungswesen und Controlling – welche Chancen ergeben sich? Controlling 30(3):11–19
Allweyer T (2016) Robotic Process Automation – Neue Perspektiven für die Prozessautomatisierung.
Fachbereich Informatik und Mikrosystemtechnik Hochschule Kaiserslautern
Anagnoste S (2017) Robotic automation process – the next major revolution in terms of back office
operations improvement. Proc Int Conf Bus Exc 11(1):676–686
Cardoso J (2005) How to measure the control-flow complexity of web processes and workflows. In:
Workflow handbook, vol 2005, pp 199–212
Fernandez D, Aman A (2018) Impacts of robotic process automation on global accounting services.
Asian J Account Govern 9(0)
Fleischmann A, Oppl S, Schmidt W, Stary C (2020) Contextual process digitalization: changing
perspectives – design thinking – value-led design. Springer International Publishing
ISO-Standard 22400-2:2014 (2014) Automation systems and integration — key performance
indicators (kpis) for manufacturing operations management — part 2: Definitions and
descriptions. Library Catalog: www.iso.org
Johannesson P, Perjons E (2014) An introduction to design science. Springer, Berlin
Keeble JJ, Topiol S, Berkeley S (2003) Using indicators to measure sustainability performance at a
corporate and project level. J Bus Ethics 44(2):149–158
Kirchmer M (2017) Robotic process automation-pragmatic solution or dangerous illusion. BTOES
Insights, June
Kühnapfel J (2014) Nutzwertanalysen in Marketing und Vertrieb. Essentials, Management & HR.
Gabler Verlag.
Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S (2007) A design science research
methodology for information systems research. J Manag Inf Syst 24(3):45–77
Riedl R (2006) Analytischer Hierarchieprozess vs. Nutzwertanalyse: Eine vergleichende
Gegenüberstellung zweier multiattributiver Auswahlverfahren am Beispiel Application Service
Providing. In: Wirtschaftsinformatik als Schlüssel zum Unternehmenserfolg. DUV, Wiesbaden,
pp 99–127
Smeets M, Erhard R, Kaußler T (2019) Anwendungsbereiche von RPA. In: Smeets M, Erhard R,
Kaußler T (eds) Robotic Process Automation (RPA) in der Finanzwirtschaft: Technologie –
Implementierung – Erfolgsfaktoren für Entscheider und Anwender. Springer, Wiesbaden,
pp 37–46
van der Aalst WMP (2011) Process discovery: an introduction. In: van der Aalst WMP (ed) Process
mining: discovery, conformance and enhancement of business processes. Springer, Berlin,
pp 125–156
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng 1–4
Van Looy A, Shafagatova A (2016) Business process performance measurement: a structured
literature review of indicators, measures and metrics. SpringerPlus 5(1):1797
Waidelich M, Schmidt D (2018) Zukünftige Entwicklungen im Bankenwesen. In: Dimler N, Peter
J, Karcher B (eds) Unternehmensfinanzierung im Mittelstand: Lösungsansätze für eine
maßgeschneiderte Finanzierung. Springer Fachmedien Wiesbaden, Wiesbaden, pp 57–74
Wanner J, Hofmann FM, Imgrund F, Janiesch C, Geyer-Klingeberg J (2019) Process selection in RPA
projects – towards a quantifiable method of decision making. In: ICIS 2019 proceedings
5 Selecting processes for RPA | 109
6.1 Introduction
Companies are increasingly introducing software robots to automate some of their
business processes. They often start with implementing software robots in a specific
area or department, such as customer support (Willcocks and Lacity, 2016). Based
on such initial experiences, they may identify additional departments or contexts in
which they could implement additional robots. However, if they start from scratch
for each new robot to be programmed this results in high costs and time expenditure.
Accordingly, companies may ask themselves how they could speed up the robot im-
plementation process. Ideally, robots are implemented with the intention of extending
their scope and reach, which simultaneously poses the challenge of scaling their im-
plementation. While the initial development and programming of robots often mirrors
an innovative process, which requires exploration and experimentation, their further
development can be made more efficient by drawing from scaling mechanisms. Such
https://doi.org/10.1515/9783110676693-006
112 | C. Rutschi and J. Dibbern
scaling should allow for a more efficient implementation of software robots since it
allows for extending functionality of current robots or developing additional robots
in novel contexts, without significant additional costs. As a result, the conditions for
scaling the implementation of software robots are an important area of inquiry.
Prior research on software robot implementations has mainly focused on the
above-mentioned one-time implementation process. Thereby, drawing on routine
theory, the implementation of software robots has been viewed as the transfer of rou-
tines from humans to robots (D’Adderio, 2011; Rutschi and Dibbern, 2019, 2020). This
has led to initial insights into the steps to be taken and the underlying conditions
for automating particular (business) processes (Rutschi and Dibbern, 2019, 2020). It
was shown that the basis of automation requires an understanding of the structure
of both, existing business processes to be automated and the operating principle of a
robot, i. e., one needs to think like a robot.
In this study, we seek to develop a better understanding of the robot implemen-
tation process to consider how it changes when companies already implemented soft-
ware robots that can be taken as a basis to develop additional robots. Thereby, we seek
to close the gap in understanding the dynamic evolution of software robots by devel-
oping some foundational knowledge on the scaling of the implementation of software
robots. The notion of scaling has recently been gaining increased interest in the IS lit-
erature, when it comes to understanding the exponential growth of digital startups
and entrepreneurs. Such digital growth often rests on the creation and recombination
of digital resources, which has also been referred to as the scaling of digital infras-
tructures (Henfridsson and Bygstad, 2013). In a like vein, an existing software robot
may also be viewed as a digital resource that serves as the basis for scaling the process
of software robot implementations. However, little is known about what this process
of scaling actually looks like in the context of software robots. Accordingly, we aim
at investigating how the implementation of software robots can be accelerated. In or-
der to gain insights into how such acceleration or scaling can be achieved, we need
to understand what can be scaled (i. e., scaling resources), how it can be scaled (i. e.,
scaling mechanisms), and to what extent it can be scaled (conditions for contextual
growth). In line with existing research on software robot implementations (Rutschi
and Dibbern, 2019, 2020), we draw on routine theory (D’Adderio, 2011; Leonardi, 2011)
as a basis for understanding how human-executed business processes can be trans-
formed into robot-automated processes. Specifically, we draw on recent advances in
routine theory that explain how the performance of routines to achieve particular ends
leads to the generation of means that can be reused to achieve new ends (Dittrich and
Seidl, 2018; Howard-Grenville, 2005). By reusing generated means, the overall pace
of achieving a specific end can be accelerated. A similar dynamic can be observed in
the implementation of software robots, where certain components can be created that
can subsequently be reused, which may result in scaling the implementation process.
Such digital scaling may be described as a dynamic reinforcing process by which the
reach of a software robot is extended either through expanding its functionalities or
6 Transforming and recombining routines to scale | 113
by transferring its functionalities to additional software robots that may reuse part of
its components (Henfridsson and Bygstad, 2013). In order to better understand digital
scaling in the context of software robot implementations, we formulate the following
research question: How can the implementation of software robots be accelerated and
thus the transfer of routines to software robots be scaled?
We seek to address this research question by taking a dynamic perspective and by
exploring the generative mechanisms that help in scaling the transfer of routines to
robots, i. e., the robot implementation process. Our overarching objective is to explain
what digital scaling means in relation to transferring routines to robots. Routine the-
oretical concepts help us better understand the extent to which processes previously
carried out by humans can be transformed and transferred to robots not only once,
but concurrently. We build on literature on routine dynamics as well as digital scal-
ing to understand the conditions for scaling the implementation of software robots.
Therefore, based on an empirically illustrated theoretical conceptualization of scaling
the software robot implementation, we elaborate how routines evolve and dynami-
cally influence each other in order to explain how scaling can be approached when
implementing software robots. In doing so, we rely on data from two case studies that
we use for an illustrative purpose in this chapter. In one case study a chatbot was
implemented. In the second case study RPA robots were implemented.
procedures that can be described as the “guidelines” of how to perform the routine.
The performative aspect refers to the actual performance of these rules and proce-
dures. Both the performative and ostensive aspects of a routine influence each other
if the routine is performed by a human (D’Adderio, 2011; Feldman et al., 2016; Pent-
land and Feldman, 2005). To illustrate this using an example, consider an employee
A who must prepare a monthly report. Since employee A must prepare the report in the
same way every month following certain guidelines, we can characterize this process
as a routine. The guidelines describe the ostensive aspect of the routine. The actual
preparation of the report describes the performative aspect of the routine. Each time
employee A prepares the report, he or she could potentially identify means to prepare
the report in a better way or more efficiently next time. This would cause the performa-
tive aspect of the routine (i. e., the way of preparing the report) to change. Over time,
employee A could thus deviate from the original guidelines. This would also cause
the ostensive aspect to change. Thus, employee A has an influence on both the os-
tensive and the performative aspects of the routine of preparing the monthly report.
Suppose employee A hands over the task of preparing the report to another employee
B. Employee A would have to explain to employee B how to prepare the report (i. e.,
ostensive aspect) before employee B could actually prepare the report (i. e., performa-
tive aspect). Eventually, employee B will bring in his or her own way of doing things
and thus change the performative aspect of the routine, which may lead to a change
in the ostensive aspect as well.
Humans do not always perform routines in the same way. They can change rou-
tines due to changing contexts or circumstances (Dittrich and Seidl, 2018; Howard-
Grenville, 2005). Thus, humans can influence and change the performative as well
as the ostensive aspect of a routine. Routine theory helps to unlock the black box of
how humans perform routines (Leonardi, 2011). Before routines can be transferred to
robots at all, an understanding of how the routine is composed and the extent to which
it has previously been performed by humans must first be gained. An understanding
must be gained of both the ostensive and performative aspects of the routine as it is
performed by a human.
Once such an understanding has been established, one must comprehend the
dynamics of software robots and the extent to which robots are capable of perform-
ing routines. One must think like a robot to understand how a routine previously
performed by a human can be adequately translated so that the robot can later under-
stand and perform it (D’Adderio, 2011; Rutschi and Dibbern, 2019, 2020). Our focus
here lays on software robots that execute rule-based processes and are not able to
learn autonomously. Such robots are developed by humans (for example the devel-
opers) by means of programming within a given software environment. The software
robot then determines how a certain routine must look for the robot to perform it.
Thus, the robot can initially influence the ostensive aspect of the routine. Once imple-
mented, however, the robot cannot influence the routine itself anymore but executes
6 Transforming and recombining routines to scale | 115
it according to the implemented guidelines (i. e., the ostensive aspect). Unlike hu-
mans, software robots execute routines by strictly following the given guidelines.
Consequently, when a robot executes a routine, no reciprocity between the ostensive
and the performative aspect can be observed, rather the ostensive aspect corresponds
with the performative aspect.
Rutschi and Dibbern (2020) explain the phenomenon of automating processes by
means of software robots and introduce an iterative framework of routine automation,
which they use to explain to what extent routines can be transferred from humans
to robots. They explored the extent to which an individual process or routine can be
transferred from a human to a robot (Rutschi and Dibbern, 2020). In case a company
wants to automate numerous processes and thus transfer them to robots, it can lead to
enormous costs and time expenditures if the company must approach the automation
of each process or the programming of each robot individually. This could be made
more efficient if one could draw on prior automation approaches and thus accelerate
the whole automation process. In order to ensure a successful evolution of software
robots, it is essential to understand what scaling means in this context. This requires
an understanding of what is scalable, i. e., of what can be scaled, how it can be scaled,
and to what extent it can be scaled (Sahay and Walsham, 2006).
certain tasks and processes (Fung, 2014; Guzman and Pathania, 2016; Sengupta and
Lakshman, 2017; Sharma et al., 2016; Slaby, 2012). Scaling in the sense of implement-
ing robots might be described as engineering robots “capable of performing a large
variety of tasks” (Pfeifer et al., 2007, p. 1091). However, scaling does not refer to the
extent to which a system can be configured, customized, parameterized (Sahay and
Walsham, 2006), or adapted. Adaptation may be necessary in the case of environmen-
tal changes so that a system can perform processes exactly as it did before the change.
However, this does not mean that its functionalities are extended and therefore can-
not be called scaling. What can be described as scaling is the step-by-step process in
which technology changes into a more complex form (Henfridsson and Bygstad, 2013).
Routine theory describes the dynamic evolution of routines through the perfor-
mance of preceding routines. As outlined above, humans do not always perform rou-
tines in the same way, which implies that routines change over time or new routines
emerge. Humans play a central role in changing existing and generating new routines
(Feldman, 2000; Howard-Grenville, 2005). Performing routines thus causes routines
to change or new routines to emerge (Pentland et al., 2012). Dittrich and Seidl (2018) ar-
gue that means can be created while performing routines. These means can be reused
to define and achieve current and new ends. Reusing means in any subsequent perfor-
mance of a routine results in the routine to change over time (Dittrich and Seidl, 2018).
To draw the analogy to the implementation of software robots, one could argue that in
the course of programming software robots means are generated that can subsequen-
tially be reused in the further programming of software robots. Such means could be
described as components that can be used to build and implement a software robot.
Today, standard robotic implementation solutions are available that provide a
kind of toolbox, whereby the robot can be built with the help of the elements contained
therein. An example of this is Blue Prism,1 which allows one to build RPA robots by
modeling business processes in processes and objects. A process describes the logic of
how an RPA robot should perform a specific task. An object describes the RPA robot’s
interaction with specific systems on their user interface.
Another example is IBM Watson Conversation Services,2 which make it possible
to create a chatbot by modeling conversations in decision trees and introducing vari-
ations and synonyms. A decision tree refers to the structure of a specific dialogue.
Variations refer to different semantic structures of questions and answers within the
decision tree. Synonyms refer to different terms for the same elements within specific
questions and answers.
With regard to RPA robots, means or components that can be reused could be pro-
cess structures and objects. With regard to chatbots, means or components that can
1 https://www.blueprism.com/
2 https://www.ibm.com/watson/ph-en/conversational-ai/
6 Transforming and recombining routines to scale | 117
be reused could be decision trees, variations, and synonyms. Reusing components al-
lows the transfer of routines from humans to robots to be performed more efficiently.
In other words, the robot implementation process can be scaled. This essentially im-
plies that the process of transferring routines from humans to robots may have been
very complex in the past but certain components have been created that can now be
reused. By reusing these same components, the further transfer of routines to robots
can be made more efficient and thus scaled.
Thus, scaling can be described as a generative process, which requires actions
taken by actors such as the developer. Such actions can be associated with reuse.
Reuse enables the development and implementation of IT systems in a more efficient
way. Thus, scaling requires that certain components can be reused. Hence, what to
scale refers to the components that can be reused in the further implementation of
software robots.
that means can be directly reused regardless of contextual factors. Recreation indi-
cates that means must be adapted depending on contextual factors in order to be
reused (Dittrich and Seidl, 2018).
Hence, to what extent to scale refers to whether components need to be adapted
or not in order to be reused within a certain context and, if so, how components need
to be adapted.
The model is composed of multiple elements (see Table 1). Here, scaling the imple-
mentation of software robots is described as a circular process in the context of which
scaling resources are created that can be reused in the further course of scaling. Thus,
scaling resources refer to components that can be created in the course of implement-
ing or programming software robots. Once created, scaling resources can be reused to
accelerate or scale the implementation of software robots.
The whole scaling process can be divided into different stages of scaling, which
can take place sequentially or in parallel. Scaling can be initiated once a basic stage
6 Transforming and recombining routines to scale | 119
Description
Basic stage The basic stage describes a first phase of the development of a software
robot, based on which the robot implementation can be scaled subsequently
Scaling resource(s) Scaling resources describe components that were created in the course of the
previous development of a software robot and can be reused in further
development. They can result as output from a scaling stage and they can be
used as input to continue in a current scaling stage or to initiate a new scaling
stage
Scaling stage A scaling stage describes a phase of scaling in the implementation of software
robots
has been completed. The basic stage refers to a first phase of the development of a
software robot. Thus, the initial development or programming of the software robot
can not yet be scaled but a software robot must already have been developed to a cer-
tain degree so that its further development can be scaled. Scaling resources can result
from the basic stage and from each subsequent scaling stage. They can be considered
as necessary input to enable scaling in each scaling stage and as potential output that
can result from the basic stage and each subsequent scaling stage. As a resulting out-
put, scaling resources can be reused in any past, current, or subsequent scaling stage.
Thus, scaling resources can be reused not only prospectively but also retroactively ei-
ther in the scaling stage from which they resulted or in any preceding scaling stage.
tober and November 2017, in a second round in September 2018, and in a third round
in March and April 2020. For case 2, we conducted three semi-structured interviews in
October and November 2017. This helped us to obtain a holistic picture of both cases
(Miles and Huberman, 1994; Yin, 2003). In addition, we also analyzed other data such
as robot software suit manuals. Given that our key objective is to build theory, the
research thrust is exploratory in nature (Benbasat et al., 1987). Qualitative research
methods are suitable for “generating novel theory” (Eisenhardt, 1989, p. 546) – in par-
ticular theory that aims at answering “how” and “why” questions (Yin, 2003). This is
true for our study as the key objective is to understand how to scale the robot imple-
mentation process.
represent an evolutionary path that the chatbot went through during its implementa-
tion. These are the scaling from the German to the French chatbot, the scaling to the
e-banking chatbot, and the scaling to the voicebot. In each of the three scaling stages
certain components could be reused and thus functionalities could be transferred. It
was, however, only possible to digitally scale after the chatbot had been developed
and implemented to a certain extent, i. e., the German bot had been created.
The basic prerequisite for scaling the implementation of the bank’s chatbot was there-
fore the previous development and implementation process of the basic stage of the
chatbot, i. e., the German version of the chatbot. The development of the basic stage
basically meant to model German conversational processes within decision trees and
to implement variations and synonyms. Decision trees were modeled around one main
question, which constituted the root, while possible direct answers and follow-up
questions formed the branches of each decision tree. One main question then required
about 100 variations, so that the chatbot was able to answer accurately. “Still, if there
is a 101st question and the syntax is wrong, we are pretty sure the chatbot is going to
map the question to the right main question” (external partner). Decision trees refer
to a dialogue’s structure, while the main questions refer to dialogue topics.
Initially, the chatbot could answer simple questions in German that contained
general information; occurred in high volumes; contained self-service components or
aspects that the end user could handle him or herself; and referred to a non-value
adding process. Thus, in this basic stage the chatbot was able to conduct simple con-
versations in German, which did not require any kind of system integration. Users
could access the chatbot through the bank’s website without being logged in.
As long as decision trees were extended and new variations and synonyms were
added that allowed the chatbot to run processes more accurately in the same domain,
i. e., around the same topic, no scaling was performed. Thus, the initial development
and implementation phase of the chatbot cannot be referred to as scaling. The German
version of the chatbot was officially released in November 2017.
After completion of the basic stage, in which the German chatbot was developed, the
first scaling stage of the development of the French chatbot could be initiated. Based
on the basic stage the project team could further develop the chatbot so that it could
conduct conversations not merely in German but also in French. This can be referred to
as the first scaling stage. The basic idea of this stage was to build on the conversations
or dialogue topics that had previously been built up in German. These conversations
122 | C. Rutschi and J. Dibbern
should be translated into French. As the decision trees of the German dialogues al-
ready contained a considerable amount of questions and corresponding answers, the
project team assumed that this stage could be completed relatively quickly. In princi-
ple, the project team assumed that the dialogues previously set up in German could
now be translated directly into French. However, the complete reuse of dialogue top-
ics and dialogue structures was not possible as only some components could indeed
be reused. Reuse was prevented by the users who were supposed to use the chatbot in
French. The reason for this was that the French speaking users expressed themselves
and structured dialogues differently than the German speaking users.
During the development of the German version of the chatbot, the project team
acquired considerable knowledge about the extent to which a chatbot needs to be de-
veloped at all, and which topics the users want to address via the chatbot. The project
team could build on this knowledge to develop the French version of the chatbot faster.
In addition, however, they had to analyze and better understand their French speaking
users as well as their behaviors in order to set up and structure the French dialogues
accordingly. To accomplish this, the content team has been expanded to include a na-
tive French speaker.
Thus, in the first scaling stage, some components could be directly reused, while
for the reuse of other components, these first had to be made compatible with the cor-
responding context. Concretely, this meant that the knowledge acquired for the devel-
opment of the chatbot and the dialogue topics previously established for the German
bot could be directly reused for the French bot. The reuse of the knowledge enabled
the project team to design the dialogs for the French bot more efficiently and faster.
The German dialogue structures, on the other hand, could not be directly reused, al-
though their structure had to be revised to suit the French speaking users. The French
chatbot was released in October 2018.
The second scaling stage then describes the evolution from the development of the
German and French dialogues to the integration of the chatbot into the e-banking sys-
tem. This should allow the users of the chatbot not only to have general conversations
but also to ask user-specific questions while being logged into the bank’s e-banking
system. Until then, the chatbot was dependent on the information the user provided
in a chat. With the integration into the e-banking system, the chatbot could now di-
rectly retrieve information about a specific user from the system. However, this not
only meant that the conversations needed to be tailored to a specific user but it also
meant that sensitive user-specific data should become part of the dialogues.
The chatbot software used by the bank was based on cloud servers located abroad.
However, the Swiss data protection law stipulated that sensitive user data may only
be processed on cloud servers located in Switzerland. Consequently, for the bank
6 Transforming and recombining routines to scale | 123
this meant that the dialogues processed on the cloud servers of the chatbot software
provider could not contain any sensitive data. The project team was confronted with
the problem that with the integration into the e-banking system, sensitive data would
become part of the conversations but that these sensitive data cannot be sent via the
chat, because otherwise it would be stored in the chatlog on the cloud abroad.
The project team solved this problem with so-called deep links. In doing so, the
user could for example ask, “What is my account balance?” Rather than the chatbot
answering the user’s account balance in the chat field, the chatbot would reply “You
can find your account balance in the red marked field on your screen.” If it was sen-
sitive data that the chatbot was supposed to give out, it was not displayed in the chat
field but highlighted directly on the bank’s website. The sensitive data entered by users
were encrypted in order to ensure compliance with data protection laws.
For the integration of the chatbot into the e-banking system, the project team was
once again able to draw on the knowledge they had already gained in developing the
German and French bots. In addition, the previously modeled dialogue topics in Ger-
man and French could be reused. These dialogue topics were previously modeled in
a very general and not user-specific manner. The integration into the e-banking sys-
tem, however, should now focus on the chatbot being able to conduct user-specific
dialogues. The previous dialogue topics could thus be used as a basis, which now had
to be tailored specifically to the user.
In addition to the already existing dialogue topics, new topics had to be covered by
new dialogues. When modeling these new dialogue topics, certain dialogue structures
of the previous dialogues could be reused.
In the second scaling stage, most components could be directly reused. The
reuse of these components enabled the project team to design the dialogues for the
e-banking bot more efficiently and faster. The integration into the e-banking system
was initiated in summer 2018 and a first version got released in early 2019.
Finally, the third scaling stage describes the evolution from the integration into the
e-banking system to the extension of the chatbot to a voicebot. This third stage was
initiated shortly after the start of the second stage of the integration into the e-banking
system. The voicebot should allow users to interact with the bot not merely by text
input but also by voice input. The users were to reach the voicebot by phone, just as
they had reached CC employees before. In a first phase, no integration of the voicebot
into the web site or the mobile application was planned. The project team still left this
possibility open.
The project team again assumed that a considerable part of the dialogue topics
and structures already created for the chatbot could be reused for the development
of the voicebot. This was again not as easy as one had hoped for. The project team
124 | C. Rutschi and J. Dibbern
had to realize that not only the German and French speaking users expressed them-
selves differently, but all users spoke differently than they wrote. “For example, the
syntax is completely different when the customer asks, ‘Can I check my account bal-
ance, please?’ Then he writes on the text channel: ‘Account balance please’. Maybe
two words. [. . . ] But when he enters it in the voice channel, it’s more of a dialogue and
he says, ‘Yes, I think I got my paycheck yesterday and I need to know what my balance
is and check if I can pay my bills.’ [. . . ] And you just can’t compare how the customers
write and how they talk to the assistant [voicebot]” (product owner).
Thus, it turned out to be much more difficult to reuse already modeled dialogues
for the voicebot. The project team therefore had to rethink its approach. They did this
by adopting a voice-first approach and trained all team members accordingly. Voice-
first meant that the project team would create all newly generated dialogues for the
voice channel first, in a form in which they could potentially be used for the text chan-
nel in a second step.
The project team also reworked some of the existing dialogue topics and structures
so that they were compatible for the voice channel. “We will not be able to make 100 %
of the content we have modeled suitable for voice. That would lead to too much effort
at the moment” (product owner).
As with the integration into the e-banking system, the transition to voice posed the
challenge of sensitive data. However, this time it was not possible to use deep links and
show the sensitive aspects of a conversation to the respective user on the visual user
interface. Once conversations are conducted via voice channel, there is no visible user
interface. As mentioned above, the bank was not allowed to process sensitive data on
a foreign cloud due to applicable regulations. The provider of the chatbot software
used until then was neither willing to install a cloud in Switzerland, nor to offer the
software on-premise. The bank was thus forced to look for another solution.
They found what they were looking for in another provider who delivered their
chatbot software on-premise. The text-based chatbots should run on the old chatbot
software for the time being. The voicebot should be based on the new chatbot software.
However, the long-term goal was to completely replace the old chatbot software with
the new one.
For the development of the voicebot the project team was not able to directly reuse
the dialogue topics and structures that have been created in previous stages. Instead,
the dialogue structures had to be made compatible with the voice channel. Accord-
ingly, the project team translated some of the text dialogues into voice dialogues. How-
ever, some of the text dialogues hardly seemed suitable for the voice channel. Here the
project team had to reverse the approach and henceforth model voice-first dialogues,
which could then be reused for the text channel and thus the further extension of the
text-based bots.
In the third scaling stage, most components could not be directly reused but they
had to be revised to suit the voicebot. Reuse was reversed here in that the dialogue
structures created for the voicebot were to be reused retroactively for the text-based
6 Transforming and recombining routines to scale | 125
bots. The transition from the text to the voicebot is still in progress. A first version of
the voicebot was released in June 2020.
The basic prerequisite for scaling the implementation of the bank’s RPA robots was
an initial phase where the project team had to understand the RPA robot design. This
was critical, because it determined how business processes could be introduced to the
RPA software so that an RPA robot could execute them.
The RPA software used allowed the programming of RPA robots that could perform
a sequence of process steps and mimicking what the human user normally does. The
automation of business processes through the development of RPA robots was thereby
done in the software’s Studio, which was divided into Process Studio and Object Stu-
dio. Process Studio enabled the configuration of the process logic and the business
rules (i. e., the process structure). Object Studio enabled the creation of reusable ob-
jects. A process described the logic of how a specific RPA robot executed tasks. An
object described the RPA robot’s interaction with specific systems on their user inter-
face.
The developers did not actually have to program the automation of business pro-
cesses but could graphically model them with the help of various flowchart elements.
In Process Studio, one could either entirely model business processes or split them
into multiple process steps. Each process step could be modeled in a separate page.
Throughout all the pages, the main process could be kept slim on the main process
page; frequently used process steps within a particular process could be reused.
In Object Studio objects could be created, which allowed integrating external sys-
tems into the RPA software framework. With the “spying mode” of Object Studio, ev-
126 | C. Rutschi and J. Dibbern
ery system button could be tracked and added to the corresponding object. Once a
system and its entire corresponding buttons had been integrated, actions linked to
the usage of a specific system could be modeled. Unlike in Process Studio, pages were
hereby used to model individual actions related to a specific object. For example, in
one of the business processes to be automated, the RPA robot had to send a confirma-
tion letter to a customer who had opened a new account. For this purpose, the RPA
robot had to know the respective system button “print” and execute the action “print
confirmation letter.” To then add an action to a process in Process Studio, one could
access the corresponding action from Object Studio. To do this, the flowchart element
“action” had to be inserted into the main process or a process step page in Process
Studio.
In summary, Object Studio enabled the integration of specific systems needed so
that the RPA robots could execute the business processes modeled in Process Studio.
Once the project team had gained an understanding of the design of the RPA software,
the actual process automation could be initiated.
Business processes suitable for automation had to be executed in high volume and
on a computer; they had to be rule-based and should entail limited exceptions; they
should implicate structured data, and each business process to be automated should
replace 0.3 full-time equivalents (FTE) in order to achieve the break-even point after
one year. It was only worthwhile to develop a robot in case it could undertake the
work of 0.3 FTE. Based on these criteria and a list of all processes executed in the CC,
the project team identified four business processes with automation potential. Those
four processes should be automated first while potential additional processes should
follow later.
The development of the first four RPA robots was initiated with the modeling of
the respective business processes. This was done within Process Studio and Object
Studio. Each RPA robot was hereby set up through one process containing various
objects that described the actions an RPA robot had to take in various process steps.
However, some of the developers initially created RPA robots within objects instead
of forming processes by using objects. “The object is something that you can reuse.
The process is something you are only using for the current robotic process. So. . . you
should not create a process inside an object. But many times, they did it” (supplier
chief developer). If done so, objects could only be used for one specific process, while
reuse was not possible. However, the idea of using objects to build processes was to
be able to reuse the objects for several processes involving the same systems and thus
to scale the RPA robot implementation process. Even though this approach required
more effort in the beginning, it allowed a more efficient and faster implementation of
subsequent RPA robots accessing the same systems. “Because the first robots are al-
ways the hardest. How so? Because. . . you develop that in objects. These are objects
that can be reused in other robots. This automatically means that subsequent robots
can be developed faster” (supplier project manager 2). Once the chief developer dis-
covered that the other developers defined processes within objects instead of using
6 Transforming and recombining routines to scale | 127
various objects to define one process, he drew their attention to it, and they changed
their approach from object-based to process-based development.
The initial development and implementation phase of the RPA robots cannot be
referred to as scaling but allowed the creation of objects that could be reused later on.
After completion of the basic stage, in which initial objects were created, scaling could
be initiated. The automation of the four processes originally identified took place in
parallel. The basic stage was not completed with the completion of the implementa-
tion of the four corresponding RPA robots. Rather, it was possible to move from the ba-
sic stage to scaling stage 1 after some initial objects were created that could be reused
continuously and thus contributed to implement RPA robots more efficient. Thus, the
previously created objects could be reused in the further implementation of the RPA
robots. This helped to speed up the overall implementation process of the robots.
In the course of the development of multiple RPA robots some components, i. e.,
objects and process structures, could be reused. This enabled a more efficient imple-
mentation of the RPA robots and thus scaling. However, not only were existing objects
and process structures reused but also new ones were created even after the comple-
tion of the basic stage. Scaling was thus achieved through the creation of objects and
process structures. After a period of five months, the first out of the initial four RPA
robots was released in November 2017.
6.5 Discussion
Implementing software robots essentially describes an approach of automating busi-
ness processes. In this chapter we associate such business processes with routines.
The performance of routines often implies that certain means are used to achieve cer-
tain ends. It has been argued in previous literature that the ends determine which
means should be used in achieving ends (Feldman et al., 2016). Dittrich and Seidl
(2018) add to this that certain means originate in the performance of routines and
can be used to define and achieve new ends. A similar dynamic can be observed in
the implementation of software robots.
One could describe the implementation of software robots as automating pro-
cesses by means of programming software robots (Rutschi and Dibbern, 2019, 2020).
While implementing software robots, components or resources can be created that can
be reused for the further programming of past, current, or new robots. This allows for
a more efficient and faster programming of software robots and thus to accelerate or
scale the software robot implementation process (Dittrich and Seidl, 2018).
128 | C. Rutschi and J. Dibbern
each process individually, starting from scratch each time. Alternatively, the company
can combine the automation of several processes and build on already created re-
sources or means. In fact, these resources can be referred to as the ostensive aspect
of the routine or a part of it, which is implemented as a robot.
For each automation of a process Pn+1, which is preceded by another automation
of a similar process Pn, it must be examined to what extent the ostensive aspect On of
process Pn corresponds to the ostensive aspect On+1 of process Pn+1. The difference
or delta between On and On+1 must be evaluated (see Figure 2). The more the two
overlap and the larger the delta, the more resources can be reused. Therefore, the delta
describes what can be reused or scaled. If the delta is positive, scaling resources can
be reused in any current or subsequent scaling stage. If the delta is negative, scaling
resources can be reused retroactively.
In case 1, the implementation of the German, French, and e-banking bots and the
voicebot led to the generation of scaling resources (i. e., means) such as dialogue top-
ics (in German and French) and dialogue structures (in German and French, and of
general as well as of user-specifically tailored text- and voice-based nature). Reusing
these scaling resources resulted in an acceleration of the implementation of the chat-
bot (see Table 2).
In case 2, the implementation of the first RPA robots led to the generation of scal-
ing resources (i. e., means) such as process structures and objects. Reusing these scal-
ing resources resulted in an acceleration of the implementation of the RPA robots.
However, the project team did not initially create scaling resources but some of the
developers created RPA robots within objects instead of forming processes by using
objects. As a result, every new development of an RPA robot had to be started from
scratch and could not be based on already existing components or scaling resources.
When they realized this, they adapted their implementation approach and created
components (i. e., scaling resources) that could be reused (see Table 3).
130 | C. Rutschi and J. Dibbern
implementing the voicebot) were reused to accelerate the further development of the
voicebot (fourth context) as well as the further development of the German (first con-
text), French (second context), and e-banking bots (third context).
In case 2, scaling resources were reused in order to extend functionality of current
RPA robots as well as to transfer functionality to other RPA robots.
For this to be done more efficiently, the human must understand the delta and
thus the degree of scaling. In other words, the developer must understand the extent
to which the ostensive aspect of two similar processes or routines to be automated
overlap. Depending on whether the delta between two ostensive aspects is positive
or negative, scaling resources can be reused for current and subsequent robot imple-
mentations or retroactively for preceding robot implementations.
We contribute to routine theory and literature on digital scaling by examining how
the implementation of software robots can be scaled. Specifically, we found that (1) for
scaling the implementation of software robots, one can build on what already exists
(scaling resources), (2) scaling resources can be reused for functionality extension or
transfer (mutation vs. inheritance), and (3) scaling resources can be reused in different
contexts, in which they can be reused directly or through adaptations (reproduction
vs. recreation).
In this regard, we have conceptualized a model for scaling the implementation of
software robots based on existing constructs from routine theory and digital scaling
literature. Some aspects of the model have also been derived from the data.
Besides the implications of our research, we also must acknowledge its limita-
tions. The model developed in this chapter describes an initial model and needs to be
further refined and substantiated with additional data.
We have shown exemplarily how scaling was approached in two cases. It was
shown that digital scaling can be divided into different scaling stages, within which
scaling resources (i. e., means) are created and can be reused. The reuse of scaling re-
sources can be considered as a mechanism that triggers scaling by enabling the exten-
sion (i. e., mutation) or transfer (i. e., inheritance) of functionality (Banker and Kauff-
man, 1992; Basili et al., 1996). The implementation of software robots is associated
with high costs and time expenditure. These can be reduced by scaling and therefore
the implementation of software robots can be made more efficient. However, in order
to be able to scale at all, it must be understood what can be scaled (i. e., what scaling
resources or means), how it can be scaled (i. e., in what contexts), and to what extent
it can be scaled (i. e., through reproduction or recreation).
An understanding of how to scale the software robot implementation process is
of great interest to both research and practice. We make first steps in conceptualizing
and theorizing the three aspects (i. e., what, how, and to what extent) of scaling the
implementation of software robots. Future research could seek to better understand
which contextual factors could impede direct reuse of scaling resources and why reuse
is performed this or that way.
6 Transforming and recombining routines to scale | 133
Bibliography
Adler PS, Goldoftas B, Levine DI (1999) Flexibility versus efficiency? A case study of model
changeovers in the toyota production system. Organ Sci 10(1):43–68
Asatiani A, Penttinen E (2016) Turning robotic process automation into commercial success – case
OpusCapita. J Inf Technol Teaching Cases 6(2):67–74
Banker RD, Kauffman RJ (1992) Reuse and productivity in integrated computer-aided software
engineering: an empirical study. MIS Q 14(3):374–401
Basili VR, Briand LC, Melo WL (1996) How reuse influences productivity in object-oriented systems.
Commun ACM 39(10):104–116
Benbasat I, Goldstein DK, Mead M (1987) The case research strategy in studies of information
systems. MIS Q 11(3):369–386
Chandler AD (1990) Strategy and structure: chapters in the history of the industrial enterprise,
vol 461. MIT press
D’Adderio L (2011) Artifacts at the centre of routines: performing the material turn in routines theory.
J Inst Econ 7(2):197–230
Dittrich K, Seidl D (2018) Emerging intentionality in routine dynamics: a pragmatist view. Acad
Manag J 61(1):111–138
Eisenhardt KM (1989) Building theories from case study research. Acad Manag Rev 14(4):532–550
Feldman MS (2000) Organizational routines as a source of continuous change. Organ Sci
11(6):611–629
Feldman MS, Pentland BT (2003) Reconceptualizing organizational routines as a source of flexibility
and change. Adm Sci Q 48(1):94–118
Feldman MS, Pentland BT, D’Adderio L, Lazaric N (2016) Beyond routines as things: introduction to
the special issue on routine dynamics. Organ Sci 27(3):505–513
Fung HP (2014) Criteria, use cases and effects of information technology process automation (ITPA).
In: Advances in robotics & automation, vol 3
Guzman I, Pathania A (2016). Chatbots in customer service. Retrieved 25 Oct, 2017, from https:
//www.accenture.com/t00010101T000000__w__/br-pt/_acnmedia/PDF45/Accenture-
Chatbots-Customer-Service.pdf
Heller B, Proctor M, Mah D, Jewell L, Cheung B (2005) Freudbot: an investigation of chatbot
technology in distance education. Paper presented at the EdMedia: World Conference on
Educational Media and Technology
Henfridsson O, Bygstad B (2013) The generative mechanisms of digital infrastructure evolution. MIS
Q 907–931
Howard-Grenville JA (2005) The persistence of flexible organizational routines: the role of agency
and organizational context. Organ Sci 16(6):618–636
Huang J, Henfridsson O, Liu MJ, Newell S (2017) Growing on steroids: rapidly scaling the user base of
digital ventures through digital innovation. MIS Q 41(1)
Leonardi PM (2011) When flexible routines meet flexible technologies: affordance, constraint, and
the imbrication of human and material agencies. MIS Q 35(1):147–167
Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage
Publications, Thousand Oaks, CA, USA
Patil A, Marimuthu K, Niranchana R (2017) Comparative study of cloud platforms to develop a
chatbot. Int J Eng Technol 6(3):57–61
Pentland BT, Feldman MS (2005) Organizational routines as a unit of analysis. Ind Corp Change
14(5):793–815
134 | C. Rutschi and J. Dibbern
Pentland BT, Feldman MS, Becker MC, Liu P (2012) Dynamics of organizational routines: a generative
model. J Manag Stud 49(8):1484–1508
Pfeifer R, Lungarella M, Iida F (2007) Self-organization, embodiment, and biologically inspired
robotics. Science 318(5853):1088–1093
Rutschi C, Dibbern J (2019) Mastering software robot development projects: understanding
the association between system attributes & design practices. In: Paper presented at the
proceedings of the 52nd Hawaii international conference on system sciences, Hawaii, USA
Rutschi C, Dibbern J (2020) Towards a framework of implementing software robots: transforming
human-executed routines into machines. ACM SIGMIS Database 51(1):104–128
Sahay S, Walsham G (2006) Scaling of health information systems in India: challenges and
approaches. Inf Technol Dev 12(3):185–200
Sengupta R, Lakshman S (2017) Conversational chatbots – let’s chat. Retrieved 25 Oct, 2017 from
https://www2.deloitte.com/content/dam/Deloitte/in/Documents/strategy/instrategy-
innovation-conversational-chatbots-lets-chat-final-report-noexp.pdf
Sharma P, Southern R, Dalton D (2016) The discruptive chat bots – sizing up real opportunities for
business. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/ie/Documents/ie-
dispruptivechat-bots.pdf
Shawar BA, Atwell E (2007) Different measurements metrics to evaluate a chatbot system. In: Paper
presented at the proceedings of the workshop on bridging the gap: academic and industrial
research in dialog technologies, Rochester, NY, USA
Slaby JR (2012) Robotic automation emerges as a threat to traditional low-cost outsourcing. HfS
Research Ltd.
Svahn F, Mathiassen L, Lindgren R (2017) Embracing digital innovation in incumbent firms: how
volvo cars managed competing concerns. MIS Q 41(1)
Tirgul CS, Naik MR (2016) Artificial intelligence and robotics. Int J Adv Res Comput Eng Technol
5(6):1787–1793
Willcocks L, Lacity MC (2016) Service automation: robots and the future of work. Steve Brookes
Publishing
Yin RK (2003) Case study research. In: Applied social research methods series, vol 5. Sage
Publications, Beverly Hills, CA, USA
Yoo Y, Boland RJ Jr, Lyytinen K, Majchrzak A (2012) Organizing for innovation in the digitized world.
Organ Sci 23(5):1398–1408
Philipp Croon and Christian Czarnecki
7 Liability for loss or damages caused by RPA
Abstract: Intelligent autonomous software robots replacing human activities and per-
forming administrative processes are reality in today’s corporate world. This includes,
for example, decisions about invoice payments, identification of customers for a mar-
keting campaign, and answering customer complaints. What happens if such a soft-
ware robot causes a damage? Due to the complete absence of human activities, the
question is not trivial. It could even happen that no one is liable for a damage towards
a third party, which could create an uncalculatable legal risk for business partners.
Furthermore, the implementation and operation of those software robots involves var-
ious stakeholders, which result in the unsolvable endeavor of identifying the origina-
tor of a damage. Overall it is advisable to all involved parties to carefully consider the
legal situation. This chapter discusses the liability of software robots from an inter-
disciplinary perspective. Based on different technical scenarios the legal aspects of
liability are discussed.
7.1 Introduction
Can Alexa – the virtual assistant offered by Amazon – be liable for damages? The ques-
tion is not as absurd as it sounds. Since Amazon’s product was introduced in 2017, the
German police reported several cases of rogue Alexas, partying loud at night, causing
annoyed neighbors to call the police. One case, in Pinneberg (a small town in Ger-
many), had Alexa blasting music at night after being remotely activated by a music
streaming service that also turned the volume to the maximum. It seems that no di-
rect human action led to this nightly disturbance. The police mission tallied at about
3,000 €, which – in the end – was paid by Amazon out of goodwill. The question re-
mains though: Who is really liable when an autonomously acting software system
causes a damage?
Also in a corporate environment an increasing number of processes is automated
by software programs, so-called software robots (e. g., Schmitz et al., 2018; Willcocks
et al., 2017). In this chapter the term robotic process automation (RPA) is used for a
range of approaches and technical concepts that support the automation of business
processes by using software robots. Those systems can be structured into input sen-
sors, an intelligence center, and output actuators (Fettke and Loos, 2019). The intelli-
gence center can vary from simple rule-based decisions to cognitive robots using ad-
vanced concepts, such as artificial intelligence (AI) (Enriquez et al., 2020; Houy et al.,
2019). In this context, a typical, exemplary use case is the automation of the invoice
https://doi.org/10.1515/9783110676693-007
136 | P. Croon and C. Czarnecki
verification, which is an administrative process that can be found in almost every orga-
nization. This process requires different checks (e. g., consistency of ordered amount,
delivered amount, and invoiced amount), and due to possible exceptions (e. g., hand-
written correction), it often contains manual activities. Therefore, the automation by
RPA requires a cognitive intelligence center that transfers the unstructured paper in-
voice into structured data. These structured data are then verified, and – if correct –
automatically paid. Based on this typical use case the following two errors of the RPA
system are possible: (1) a correct invoice is not paid, or (2) an unjustified invoice is
paid. The first error might incur a financial damage to a third party caused by default.
The second error could cause a financial damage for the company itself, for example,
if the unjustified invoice is a fraud case. In both cases the question arises if someone
can be held liable for the incurred damage.
Even though the question of liability is one of the oldest well-discussed questions
of legal practice, judging the liability in the above described scenario is a complex
issue. First, the legal treatment of robots offers from a juridical perspective open sci-
entific questions, such as the self-responsibility of robots and the sufficiency of ex-
isting laws (e. g., Bertolini, 2013; Gless et al., 2016; Hubbard, 2015). Second, from an
application-oriented perspective the current development of RPA systems requires le-
gal guidance which is an interdisciplinary topic composed of computer science and
law. This second perspective is the focus of this chapter. In Section 7.2 basic concepts
of liability in robotics are explained. Then, in Section 7.3 concrete liability scenarios of
RPA are proposed, and their legal impact is discussed based on their technical realiza-
tion. While, in general, liability can be differentiated in the civil and criminal liability
side, this chapter focuses on the civil liability. As legislation and jurisdiction varies in
different countries, an application-oriented discussion can only be exemplary based
on concrete laws. This chapter mainly focuses on European legal traditions, most of
the time stemming from German legal traditions, so the concepts discussed can be
transferred to European legal systems and similar legal traditions. The basic thought
process behind liability for RPA systems also can be applied to different legal systems,
for example, the Anglo-American common law. The transfer to other legal systems is
discussed as part of the outlook in Section 7.4. As this chapter is not an exhausting le-
gal examination, a comparative discussion of different legal systems and their liability
solutions for RPA is not discussed in depth here.
liability of RPA can, from a legal perspective, be traced back to the broader context of
robotics. The possible types of the loss or damage depend on the concrete technical
realization, for example, a physical robot with a strong arm could create a physical
damage, which is obviously impossible for a software robot that only uses applica-
tion systems. The general types of liability – independent from involved machines –
are discussed in Section 7.2.1. Related work about the general question of liability in
robotics is explained in Section 7.2.2. Its transfer to RPA is discussed in Section 7.2.3.
technologies such as AI and robots. Palmerini et al. (2016) argue that many legislative
domains are affected by robotics, and some of them might require new rules; however,
for many fields existing laws are sufficient.
With respect to liability, the level of autonomy is important (Bertolini, 2013). If
a robot would act and decide completely autonomously, which would require self-
awareness or self-consciousness, this robot must be liable for its actions as a legal
person (Čerka et al., 2015). However, in all – or at least almost all – practical cases to-
day’s and in the near future expected robots, such as driverless vehicles and intelligent
personal assistants, are weak autonomous systems producing functional states still
under a human supervision (Bertolini, 2013). Hence, as long as robots do not achieve
self-consciousness there is no legal foundation to consider them as independent le-
gal subjects, but they are artifacts designed by humans for an intended purpose, also
known as products (Bertolini, 2013). As a consequence, most liability cases of robots
can be solved by existing liability laws for product safety (Hubbard, 2015; Palmerini
et al., 2016). In this context, the concrete implementation scenario as well as the agree-
ments of the involved parties is important.
with the humans that have developed or are operating the system, and not with the
software robot itself. Hence, with respect to legal practice the liability of an RPA system
can be traced back to known questions of product liability. However, in a real-life case
the liability would be highly dependent on the technical realization. Those concrete
liability scenarios are explained and discussed in the next section.
In a real-life realization scenario, not necessarily all roles are involved. At the end, the
specific arrangement of those roles, their mapping to legal entities, and the contrac-
tual arrangements between those legal entities are essential for the legal assessment
of a concrete liability situation. It can be assumed that in all scenarios the business
owner is an independent legal entity. The simplest – and also most unlikely – sce-
nario would be that the business owner programs his own RPA system from scratch,
implements and operates this system on his own technical infrastructure, and trains
the software robots by his own. In the most sophisticated scenario all roles are linked
to different legal entities that interact in an ecosystem based on a complex structure of
bilateral agreements. For example, company A is a vendor of RPA standard software
products that were programmed by company B. The RPA software was bought by com-
pany C, which is a cloud service operator and now operates the RPA software as part
of a service offering. Implementation and training were realized by further companies
(D and E). The business owner, company F, buys this RPA service from company C.
140 | P. Croon and C. Czarnecki
In practice, typical implementation scenarios are between those two extrema. For
the further legal assessment, the following exemplary technical scenarios are defined
(cf. Figure 1):
– Technical scenario 1 – “basic scenario”: The business owner buys RPA standard
software from a software vendor who is also the developer. The software vendor
helps the business owner in the initial implementation and training of the system,
which is afterwards handed over to the business owner. The system is operated by
the business owner on his own infrastructure.
– Technical scenario 2 – “system integrator scenario”: Same as scenario 1, but
the business owner is supported by a system integrator who implements and
trains the RPA system that is still operated on the business owner’s own infras-
tructure.
– Technical scenario 3 – “cloud operations scenario”: The RPA application is
operated in a cloud by a service provider who has programmed the RPA software.
The agreement between business owner and service provider covers the operation
7 Liability for loss or damages caused by RPA | 141
of the RPA application. The business owner is responsible for the training of the
software robots.
– Technical scenario 4 – “cloud full service scenario”: This scenario is the same
as scenario 3, but the business owner has a full-service agreement with the service
provider. This agreement includes the training of the software robots.
All four scenarios are theoretical concepts and might vary in a real-life implementa-
tion. At present, the technical scenarios 1 and 2 are more likely. However, first offers of
RPA as a cloud solution are available at the market which could lead to the technical
scenarios 3 and 4. The role of the RPA consultant could be included in all scenarios
either as an in-house consultant belonging to the business owner, or a consulting
service offered by the system vendor, or an independent consultant as an additional
legal entity.
Assuming the RPA system has caused a damage that can be traced back to a defect
in the broader context of the RPA system, identifying the originator of the defect is not
easy. Possible reasons for a defect could be (1) a programming error caused by the RPA
software developer, (2) a wrong customization of the intelligence center caused by the
software robot trainer, (3) an inadequate technical infrastructure caused by the RPA
system integrator, or (4) an incomplete conceptual design caused by the RPA consul-
tant. In computer sciences, proving the total correctness of a software is a difficult en-
deavor that is in most cases irresolvable. In practice, different standards (e. g., ISO/IEC
9126) are used to define software quality based on functional and non-functional as-
pects. From a contractual perspective, the inspection and approval of a software pro-
gram is typically based on a defined set of requirements and test cases. With respect
to the initial example of invoice verification, different errors causing the non-payment
of an invoice are possible. A wrong memory management, i. e., a programming error,
could lead to lost invoice data sets. Non-considering invoices in a foreign language,
i. e., a training error, could cause a wrong invoice rejection. An inadequate network
bandwidth, i. e., an architectural error, could be the reason for lost connections caus-
ing data inconsistency. Non-considering a concept for a proper controlling and mon-
itoring of the software robots, i. e., a conceptual design error, could be the root cause
for not detecting the wrongdoing of the software robot. In a real-life case a defect of a
software could possibly be linked to a mixture of different reasons. Hence, finding the
originator of a defect is a critical question that is not easy to answer.
– Legal scenario 1 – the business owner is damaged: This would usually mean
that the business owner using the RPA system is damaged by his own system.
Possible damage could be an automatic fulfilment of a fraudulent invoice, leading
to a financial loss as the money cannot be recuperated.
– Legal scenario 2 – a third person is damaged: Under this scenario, a third party
is damaged by the RPA system. For example, a valid invoice is rejected, leading to
interest and legal costs to a third party.
specifications and even in the basic scenario evidence has to be produced that a con-
tractional duty was really breached. Going over to technical scenario 2 this problem
becomes even more evident – with two possible liable entities it has to be proven ex-
actly to whose contractional duty the faulty RPA system can be linked. There is also
the possibility that the causality for the problem with the RPA system is shared by the
vendor of the system and the system integrator. It could even be assumed that the fault
is cumulative between vendor and system integrator (e. g., the faulty RPA software in
itself is not a problem, but in combination with the wrong training of the software
robots, the fault becomes damaging).
The third criterion is actual damage. A faulty RPA system in itself is certainly sub-
ject to warranty – but a liability for damages require actual damage, so no claim can
be made if nothing gets damaged. In all described scenarios a damage – either to the
business owner or a third person – was caused. It can be assumed that evidence for
this damage can be produced undoubtedly.
The fourth and last criterion is the culpability. Culpability is the subjective, per-
sonal fault of the culprit. In legal scenario 1, the culpability is not problematic, as the
culpability is usually given if a vendor sells faulty software or a system integrator does
something wrong, for example, while training software robots.
If those criteria are all met, the business owner has a damage claim against his
contractual partner – at least in theory. In practice, the question of breach of con-
tractual duty and culpability will have to be established very carefully. The problem
for the business owner will be, in most cases, to actually find out what exactly went
wrong with the RPA system, as he has to prove every criterion in a court case. This will
most often lead to high obstacles to actually assert a claim, especially in cases where
the business owner knows that something went wrong, but not exactly what. There
is also the possibility that the business owner ordered – with respect to his actual re-
quirements – an insufficient RPA system, for example, due to a lack of knowledge or
an incomplete requirements engineering. It could be established that his contractual
partners have an obligation to inform him in case they would realize that their cus-
tomer (i. e., the business owner) is doing something wrong while ordering. However,
widening the scope of contractual duties like that should only be done sparingly, as
usually additional liability will lead to a higher compensation (e. g., the RPA system
will be more expensive) – therefore, widening the scope of contractual duties after
the fact will lead to an unfair advantage to the business owner. The business owner
will have to decide if he wishes to take the risk of ordering something without appro-
priate prior consultation. In this context, the business owner should think about the
option to hire someone, for example an RPA consultant, to provide him with the ex-
pert knowledge needed to order the RPA system tailored to his requirements, a wise
move as he gets an additional contractual party to push a claim against if a damage
claim against other parties seems hard to realize.
144 | P. Croon and C. Czarnecki
is the acting party, without any necessary involvement by the business owner him- or
herself. It is however possible to find an act by the business owner, prior to the act of
the RPA system, which directly causes a loss to the third party.
First, this act could be the acquiring and training of the RPA system. In the sim-
plest scenario the business owner has at least programmed and trained the RPA him-
self. It would be possible to ascertain, if he made any mistakes while programming
and training out of negligence (or even intentional), which would be enough to estab-
lish culpability. But, as discussed previously, this simplest scenario is highly fictional.
In technical scenarios 1 to 4, the business owner has acquired the RPA system from a
third party, and only in scenario 3 he or she has trained the system by himself. Only in
extreme cases it could be assumed that the business owner acquires a faulty working
RPA system intentionally or even out of negligence. The business owner would have
to have any inclination that his RPA is not working right. This may, certainly, be only
established after the first fault of the RPA system and even then, the fault that led to
the damage in this case has to be the same fault that led to a damage beforehand.
If the business owner has an indication that his or her RPA system is acting faulty
in any way, the follow-up question would be: Did he or she have any reason to suspect
a fault with his RPA system? A general suspicion regarding RPA would go too far and
certainly be not valid from a technical standpoint. So, in practice, the business owner
would basically only have to state that he has bought an RPA software that he had no
suspicions about (assuming a bare minimum of the business owner’s diligence).
The other question is: Did the business owner perform enough to control the RPA
system while it was working? From a technical perspective, controlling an RPA sys-
tem is possible, and should be part of a professional systems design. Beside techni-
cal monitoring capabilities (e. g., lost connections, error logs), also the process itself
should consider the handling of exceptions. With respect to the above invoice verifica-
tion case, for example, an insufficient scanned invoice should not lead to an automatic
refusion of the payment, but to a manual check and correction.
In practice, quite a serious problem will be to prove to the business owner that
he did not control his RPA system properly, and – more importantly – that he could
have been able to prevent the damage caused by the RPA system. If the damage would
have occurred even while the business owner was supervising the RPA system, a lack
of supervision will not lead to liability. That means in essence that the business owner
only has to claim that his RPA system was chosen carefully and supervised correctly
to escape any culpability for the RPA system.
There is of course the question if a user of an RPA system is legally required to
read up on any technical developments regarding RPA systems, as the law requires of
certain professions, like lawyers and medical experts. That question is undecided as of
yet. A compelling argument can be made that requiring this of a business owner may
lead to a widening of liability that would lead to an unfair situation, giving a business
owner additional duties, in most cases outside the scope of his education; for example,
requiring a baker to read up on RPA technology just for using an RPA system would
146 | P. Croon and C. Czarnecki
make those systems probably highly unattractive to the baker. On the other hand, the
argument could be made that an RPA system is an inherently dangerous application,
as it takes away the element of human control, so requiring the user to stay on top
of the technical state of the art may be a sensible precaution – after all, we require a
driver’s license from someone wishing to drive a car as well.
and this lack of proper care leads to a damage with a business partner of the business
owner, the business owner will be liable to his or her business partner. The business
owner will, of course, be then able to redress his or her damage, as explained in the
legal scenario 1, with the full-service provider.
Culpable liability
The first variant of tortious liability is culpable liability. Necessary for a culpable lia-
bility is the damage to one of aforementioned legal values by an action while acting
intentionally or out of negligence. Insofar, much of the earlier established legal rea-
soning is valid here. The real difference is that there is no liability for a third party
under tortious liability, so any liability by the business owner will usually not be ap-
plicable at this point.
There is, however – quite special to the German legal tradition – §831 of the Ger-
man civil code, which stipulates a liability for a third party employed by someone.
It has been discussed to use these rules for automated processes (e. g., Riehm, 2014;
Hacker, 2018; Zech, 2019). Under these rules, the business owner would be liable for
the deeds of his or her employee (or, if applicable, his or her RPA system), but could
exculpate him- or herself by stating that he or she has selected the RPA system with
due diligence and supervised his or her system correctly.
Strict liability
The other possible liability could be strict liability, a liability without any need of
personal culpability. Strict liability is, as should be obvious, a legal tool that is only
used very restrictively, as the strict liability enforces a liability without any kind of real
wrongdoing. Strict liability is reserved for cases where someone uses something prone
to danger, and can therefore be held liable for that reason alone. Strict liability is enu-
merative in European legal tradition and similar other legal codes. Certain objects,
like cars, airplanes, trains, and animals, are subject to strict liability. An analogue is
only permitted in extreme circumstances.
An argument can certainly be that an RPA system should be subject to a strict
liability, but so far only RPA systems used in any kind of equipment are subject to strict
148 | P. Croon and C. Czarnecki
liability (e. g., a car with an integrated RPA system). Foerster (2019) certainly makes
the claim that any automation whose behavior cannot be predicted exactly cannot be
controlled completely, and therefore should be subject to strict liability. His argument
is compelling, especially as under the current set of legal rules, an injured party will
in certain cases have severe problems of pushing a claim, while the business owner
can claim a correct due diligence, and is therefore out of any obligations.
Product liability
A possible liability for a faulty RPA system could be the product liability rules, for ex-
ample, harmonized in the European Union. The product liability lies with the producer
or importer of certain goods which would also include software like the RPA system.
Necessary for product liability is first of all an injury of life, body, or health, or the
possessions of someone.
Product liability does not require any culpability, just the offering of a product on
the market as a producer or importer, while also falling on those entities who print
their trademark on a product – for example when selling OEM products. The prod-
uct liability is excluded if the product was not brought onto the market voluntarily (in
the case of an RPA system an illegal copy, for example), if the product was not already
faulty when it was brought into the market, if the product followed required legal stip-
ulations when it was brought into the markets, if the production or selling was not to
make a profit, or if the fault could not be identified under the state of science when
the product was brought into the market (i. e., a fault that no one could have found).
Also, the producer will escape product liability if a mistake by the injured party led to
the injury (for example, a wrong use of the product). Finally, the product liability has
a deductible of 500 € for the injured party.
These criteria will, in the discussed legal scenarios, usually preclude any claim by
the injured party. Only in very special cases will the RPA system damage something
different than the estate of the injured party. If that is truly the case, then the producer
will usually be able to state that the RPA system was not faulty when brought into the
market, or that the fault could not be identified under state of science.
different legal consequences and may, at times, even lead to a difficult situation to
press claims in court, such an obligation could be argued in court. With the distinct
lack of decisions regarding RPA systems, a final answer cannot be made, although an
obligation to inform would certainly compensate for several of the problems outlined
in this chapter.
invoice verification process can in most cases be easily traced back to the human em-
ployee. Hence, the stakeholders, such as, business consultants, software vendors, or
system integrators, are now confronted with a new legal situation, and it is most likely
that their existing contracts and processes are not sufficient any more. Also, the busi-
ness owner using an RPA system should carefully consider the legal implications. At
present, acting as a business partner with someone who uses RPA systems could lead
to a new and unpredictable legal risk. In most cases the business partner does not
know that he or she has a transaction with an entity using RPA which could end up
in an unpleasant surprise, when it comes to a liability case. Considering that some of
today’s organizations already use hundreds or even thousands of software robots in
their daily business, an evaluation of legal risks as well as contractual countermea-
sures is advisable to all involved parties.
This chapter only focuses on the question of liability inspired by the simple use
case of invoice verification. This question is exemplarily answered by applying Euro-
pean legal traditions. Therefore, the proposed argumentations and solutions can be
applied to the legal systems of countries in the European Union. The basic arguments
are also not fixed to a certain legal system – even though the common law, used, for
example, by the UK and the US, follows different concepts, the arguments for liability
and product safety remain similar. In an ever-widening legal world, legal ideas and
concepts will have to be solved internationally.
Transferring the results to other law systems or discussing cases in a combination
of parties from different countries could be a starting point for future research. The
results presented here are mainly based on a theoretical deduction with reference to
existing laws and research studies. Further evaluation of real-life cases, for example,
with respect to their contractual agreements, as well as the analysis of first concrete
judgments could lead to new insights. Beside the question of liability also further legal
questions could be assessed. For example, what happens if a software robot closes a
contract? What happens if a software robot has a business transaction with another
software robot? Also, RPA in combination with cognitive approaches is currently an
innovative and fast-changing topic. Hence, the interdisciplinary discussion of further
RPA uses cases with respect to their legal implications could generate new interesting
questions for future research.
Bibliography
Beck S (2009) Grundlegende Fragen zum rechtlichen Umgang mit der Robotik. Jurist Rundsch
2009(6). https://doi.org/10.1515/JURU.2009.225
Bertolini A (2013) Robots as products: the case for a realistic analysis of robotic applications and
liability rules. Law Innov Technol 5(2):214–247. https://doi.org/10.5235/17579961.5.2.214
Čerka P, Grigienė J, Sirbikytė G (2015) Liability for damages caused by artificial intelligence. Comput
Law Secur Rev 31(3):376–389. https://doi.org/10.1016/j.clsr.2015.03.008
7 Liability for loss or damages caused by RPA | 151
8.1 Introduction
In the digital transformation era, robotic process automation (RPA) has been one of its
main drivers (Hartley and Sawaya, 2019; Siderska, 2020). Targeting enterprises reluc-
tant to adopt automation due to the significant cost of upgrading ubiquitous legacy
software (Agrawal et al., 2019), RPA presented a low-cost approach that did not re-
quire any software overhauls (Lamberton et al., 2017). It automated the mouse click in
user interfaces of highly repetitive simple tasks by learning from user logs or natural
language descriptions of tasks (van der Aalst et al., 2018).
The success of RPAs fueled the digital transformation and motivated further re-
search to achieve low-cost, end-to-end business process automation (Chakraborti
et al., 2020b). The first step towards that goal was developing unassisted RPAs, also
called RPA 2.0 (Gupta et al., 2019), based on machine learning algorithms to reduce
the dependence on humans to train RPAs and to improve their generalization capa-
bilities. While not mature enough for widespread adoption, machine learning-based
RPA is a promising research direction (Syed et al., 2020; Chakraborti et al., 2020b).
Furthermore, most RPAs focused on automating tasks related to data entry and man-
agement; automating more complex tasks that involve decision making and execution
are another focus area for business process automation (Mohapatra, 2009). How can
RPAs contribute to these more complex tasks while maintaining their low deploy-
https://doi.org/10.1515/9783110676693-008
156 | Y. Rizk et al.
ment overhead? Composing RPAs into more powerful bots that can collaborate on
such tasks may be the solution.
Composition is a prevalent methodology in computer science that has allowed the
creation of complex constructs from simpler ones. It is the act of combining objects to
construct more complex entities that behave as one within an environment. From ob-
ject composition in object-oriented programming (creating complex object types from
simpler variable data types) to function composition (combining simpler functions
into more complex ones) and autonomous agent composition (creating a unified au-
tonomous agent from several agents), composition provided a modular approach that
simplified programming, debugging, and maintaining the composed entities through-
out their lifecycles. Extending this methodology to RPAs would allow us to address
some of RPAs limitations, namely, their generalization and collaboration difficulties.
In short, composition enforces modular RPA designs that are easier to debug, main-
tain, and reuse.
In this work, we consider three types of composition: the prevalent but cumber-
some rule-based composition, automated offline composition, and automated online
composition, which we also refer to as orchestration. Defined as the dynamic coordi-
nation of actions across multiple services under the supervision of a central entity in
the web services domain (Dragoni et al., 2017), this concept can be extended to RPAs
that collaborate on tasks as opposed to acting in silos. Automated composition and or-
chestration help us achieve numerous goals from better generalization capabilities for
RPAs to low coding overhead and successful complex task execution. However, many
challenges remain, including scalability, agent lifecycle, and others, before effective
automated composition (especially on-the-fly composition) realizes its full potential.
The main contribution of this work is surveying existing composition techniques,
especially planning-based and orchestration algorithms, while identifying their lim-
itations and possible future solutions. Next, Section 8.2 introduces key terminology,
concepts, and application domains that are relevant to our discussion. Section 8.3
briefly presents the state of the art in RPAs. Section 8.4 delves into the three composi-
tion techniques by defining their scope and presenting relevant works in the literature.
Finally, Section 8.5 discusses remaining challenges that face RPA composition and
presents some insights into research directions that could address these challenges,
and Section 8.6 concludes with final remarks.
8.2 Background
8.2.1 Business processes
A business process is a collection of tasks that are executed in a specific sequence
to achieve some business goal, such as producing a service or product for cus-
8 RPA composition and orchestration | 157
tomers (Weske, 2019). Tasks within a business process are generally assigned to
specific personas and can range in complexity from novice to expert. Processes are
generally expressed in a graphical notation called business process model notation
(BPMN) (Grosskopf et al., 2009). Events and activities are represented by circles and
rounded-corner rectangles, respectively, whereas gateways are represented by dia-
monds that allow paths to conditionally merge or diverge.
Business process management (BPM) is a multi-disciplinary field that facilities the
management of business processes, especially as they become larger and more com-
plex. Such tools involve modeling, execution, management, and performance mea-
surement of workflows (the flow among activities), in addition to the human work-
force and stakeholders. Implementing a process in BPM software facilitates the ex-
change of information among personas, minimizing the risk of failure due to lack of
communication. In workflow management, processes are modeled in a very rigid man-
ner that requires strict ordering of activities, control flows, and information tunneling
(Leymann and Roller, 1999). In case management, more flexible modeling is allowed
where cases consist of people, documents, and tasks that can be performed without
explicit ordering (Weske, 2019).
Seeking to leverage technological advancements in the field of computer program-
ming, business process automation looks to inject into processes autonomous bots
capable of performing specific tasks or sub-tasks. This allows businesses to improve
efficiency and reduce the cost and time of processes. Process automation looked to
artificial intelligence to automate business process tasks. RPA was one component of
business process automation that created bots to perform manual repetitive tasks such
as data entry.
A multi-agent system is a collection of agents that operate and interact in the same
environment (Ferber and Weiss, 1999). Agents’ interactions can be classified as posi-
tive or negative. In negative interaction, agents actively hinder each other from achiev-
ing their goals. Positive interaction implies that agents help each other achieve their
individual goals. In this work, we focus on positive interaction and specifically col-
laborative interaction. In such interactions, agents actively assist each other in ac-
complishing their shared goals, i. e., the agents’ goals cannot be accomplished unless
they collaborate. This type of interaction is especially relevant to RPAs performing
tasks within a business process: unless they collaborate, accomplishing the business
process’s goal would not be feasible.
8.2.3 Applications
Business processes have been adopted in many service enterprises from banking and
finance to retail and airline companies including in many of their departments (cus-
tomer care, human resources). We will rely on a simplified loan application use case
to illustrate the various composition techniques discussed hereafter.
Figure 1 (denoted in BPMN) depicts the tasks that are performed when a bank
customer applies for a loan which includes their requested loan amount and loan pe-
riod along with personal financial details such as their credit score, employment sta-
tus, yearly income, etc. This specific business process includes the tasks of verifying
the submitted information by accessing reliable information sources such as request-
ing a credit report. Once the application’s information is verified, the loan request
is reviewed, and a decision is made on whether to grant the loan or not. Additional
information can be returned along with the decision, such as the terms of the loan
(amount and duration) or reasons for rejection. Decision making in this process is not
constrained to information in the application under consideration but can also use
information from previous applications, the economic situation, government regula-
tions, etc. The process considers two main personas: the loan applicant and the loan
officer (or reviewer).
Figure 2: (a) Set of functions. (b) Sample function. (c) Composed tree (adapted from Chakraborti
et al., 2020a).
noise, and unpredictable. Tasks within a business process are automated individually
and independently. At run-time, depending on the outcomes of the tasks, the orches-
trator determines which task to run next. In a sense, it converts the embodiment of a
business process from a workflow model to a case model and the orchestrator rebuilds
the workflow model by sequencing the tasks.
Orchestration has been adopted for microservices (Kiss et al., 2019), web services
(Daniel and Pernici, 2006), containers (Casalicchio, 2019), and Internet of Things
(Wen et al., 2017), among others. The most common approach is formulating the
orchestration problem as a constrained optimization problem (de Sousa et al., 2019;
Upadhyay et al., 2019) solved using traditional optimization solvers like mixed-integer
programming solvers (Alvizu et al., 2018). More sophisticated machine learning al-
gorithms have been developed in certain domains as well, such as reinforcement
learning (Natalino et al., 2018; Upadhyay et al., 2019), regression prediction (Natalino
et al., 2018), genetic algorithm (Wen et al., 2017), and others.
Some work has investigated the orchestration of RPAs. Marco Mendes et al. (2010)
proposed an online workflow composition approach that relies on a service-oriented
architecture to allow the flow of information between multiple Petri Nets models. How-
ever, the success of this approach hinges on describing transitions between models
beforehand. Rizk et al. (2020a) relied on humans to determine the next task and in-
voke the appropriate RPA through natural language from a set of available RPAs using
posterior orchestration techniques, whereas Sreedharan et al. (2020) investigated an
online planning algorithm to solve the same problem and obtain an explainable or-
chestration.
To understand what an RPA orchestration solution looks like, let us dive deeper
into the approach from Rizk et al. (2020b). The authors proposed a multi-agent frame-
work that allowed RPA bots, viewed as agents within the system, to share context and
interact with business users through natural language. The orchestrator is triggered
by a natural language event (or non-natural language event from agents within the
system) and processes the event by broadcasting it to the agents within the system, as
shown in Figure 3. Based on the agents’ responses and other features, the orchestrator
scores the responses, selects the agent(s) with the best response (maximum score),
orders the execution of agents (if more than one is selected), and returns a human-
consumable response if needed. Throughout the conversation turns, multiple agents
can execute and share the context among themselves, which allows them to cooperate
on complex tasks.
In the loan business process, the framework invoked an RPA agent (called content an-
alyzer in Figure 3) to process a loan application submitted as a PDF and extract the
necessary information through natural language (a human typed in a chat interface
“process this loan application” with an attached PDF), as shown in Figure 4. Then,
the business rules RPA bot was invoked to analyze the information and determine
whether to approve or reject the loan request (again through natural language). RPAs
were wrapped with natural language understanding and generation layers to achieve
this type of RPA orchestration. While this approach still keeps a human in the loop
to reduce the risk of catastrophic failures, some RPA invocations may still fail. This
approach fits the orchestration of RPAs definition because it dynamically coordinates
the actions of agents.
Figure 4: Sample RPA orchestration using natural language (from Rizk et al., 2020b).
to understand and analyze the behavior of the composed agents. Building conversa-
tional interaction into the composed agents could make this technology accessible to
non-tech-savvy users, as in Rizk et al. (2020a,b). However, many RPAs have not been
designed to be conversational. How can we compose conversational agents with min-
imal additional coding overhead? Addressing this and many more research questions
to deploy interactive RPA, especially through natural language, could determine the
success of RPA composition technology.
8.5.3 Lifecycle
Like all software products, RPAs have a lifecycle (Jimenez-Ramirez et al., 2019). Newer
versions are released to improve performance, resolve bugs or vulnerabilities, and en-
sure compatibility with the evolving tasks. What will the lifecycle of composed RPAs
look like? With some of these RPAs relying on machine learning-based models, their
lifetime may be even shorter due to frequent retraining of these models. The lifecycle of
the composed agents would be some combination of the individual RPAs’ lifecycles.
Should the composition algorithm optimize for overall agent lifecycle in addition to
performance and compatibility? These questions and others should be addressed to
successfully operate in real-world scenarios.
slightly different terminology. Registering RPAs within a catalog and enforcing a uni-
fied vocabulary may be one approach to resolve this issue (Chakraborti et al., 2020a).
Another would be to leverage semantic knowledge from natural language understand-
ing domains to create data adaptors that resolve variable mappings, at least in a fuzzy
way, while requesting humans to verify or approve the mapping.
8.5.5 Explainability
An important aspect of encouraging adoption of RPA composition algorithms is mak-
ing them explainable. This allows business users to understand why certain RPAs
were composed into an agent and not others. Explainable compositions would pro-
vide some transparency into the inner workings of the algorithms that produce these
more complex RPA agents, as in Sreedharan et al. (2020). Hence, some trust would
be instilled in these agents by the business users and leads to more adoption of such
technology, especially in highly regulated industries where liability is an issue.
Another interpretation of explainability in this context is ensuring that the compo-
sition of individual explainable RPAs would result in an explainable composed RPA. In
other words, if individual RPAs can explain their actions, after composing them into
a unified agent, that agent should maintain the explainability property. While this
property may not be linear for many compositions, considering post hoc approaches
to generating explanations of the composed agent could be crucial to the successful
deployment of such agents.
8.6 Conclusion
RPAs have allowed enterprises to make progress in their digit transformation journey.
Even though they provide a lightweight approach to inject automation into prevalent
legacy software, they can only handle a certain class of tasks, namely, simple repeti-
tive tasks such as data entry. While the research community’s efforts to leverage ma-
chine learning will improve RPAs, we argued in this work that enabling collaborative
RPAs is also crucial for end-to-end process automation.
We discussed three types of composition: rule-based composition, automated of-
fline composition, and automated online composition. We focused on two approaches
that used planning-based offline composition that combined multiple RPA bots into
business workflows and a conversational multi-agent system that orchestrated multi-
ple RPAs when automating tasks. Both made significant assumptions that should be
relaxed before widespread adoption can be realized. The first required a unified vari-
able vocabulary to compose more complex agents which may not be realistic in real-
world applications, whereas the second assumed that RPA bots have conversational
capabilities (either intrinsic or added by developers).
166 | Y. Rizk et al.
Bibliography
Agostinelli S, Marrella A, Mecella M (2020) Towards intelligent robotic process automation for
bpmers. In: AAAI workshop on intelligent process automation
Agrawal P, Narain R, Ullah I (2019) Analysis of barriers in implementation of digital transformation of
supply chain using interpretive structural modelling approach. J Model Manag
Alvizu R, Troia S, Maier G, Pattavina A (2018) Machine-learning-based prediction and optimization
of mobile metro-core networks. In: IEEE photonics society summer topical meeting series,
pp 155–156
Araghi SS (2012) Customizing the composition of web services and beyond. PhD thesis, U Toronto
Bertoli P, Pistore M, Traverso P (2010) Automated composition of web services via planning in
asynchronous domains. Artif Intell 174(3–4):316–361
Casalicchio E (2019) Container orchestration: a survey. In: Systems modeling: methodologies and
tools. Springer, Berlin, pp 221–235
Chakraborti T, Khazaeni Y (2020) D3BA: a tool for optimizing business processes using
non-deterministic planning. In: AAAI workshop on intelligent process automation
Chakraborti T, Agarwal S, Isahagian V, Khazaeni Y, Rizk Y (2020a) An multi-agent composition
and orchestration framework for financial business process automation. In: International
conference on business process management workshop on AI4BPM
Chakraborti T, Isahagian V, Khalaf R, Khazaeni Y, Muthusamy V, Rizk Y, Unuvar M (2020b) From
robotic process automation to intelligent process automation: emerging trends. In: Business
process management: blockchain and robotic process automation forum: BPM 2020 blockchain
and RPA forum, proceedings 18, Seville, Spain, September 13–18, 2020, pp 215–225
Daniel F, Pernici B (2006) Insights into web service orchestration and choreography. Int J E-Bus Res
2(1):58–77
de Sousa NFS, Perez DAL, Rosa RV, Santos MAS, Rothenberg CE (2019) Network service
orchestration: A survey. Comput Commun
Dong X, Halevy A, Madhavan J, Nemes E, Zhang J (2004) Similarity search for web services. In: VLDB
Dragoni N, Giallorenzo S, Lafuente AL, Mazzara M, Montesi F, Mustafin R, Safina L (2017)
Microservices: yesterday, today, and tomorrow. In: Present and ulterior software engineering.
Springer, Berlin, pp 195–216
Ferber J, Weiss G (1999) Multi-agent systems: an introduction to distributed artificial intelligence,
vol 1. Addison-Wesley, Reading
Gao J, van Zelst SJ, Lu X, van der Aalst WMP (2019) Automated robotic process automation: a
self-learning approach. In: OTM confederated international conferences
Grosskopf A, Decker G, Weske M (2009) The process: business process modeling using BPMN.
Meghan Kiffer Press
8 RPA composition and orchestration | 167
Gupta S, Rani S, Dixit A (2019) Recent trends in automation: a study of rpa development tools. In:
3rd IEEE international conference on recent developments in control, automation & power
engineering, pp 159–163
Han X, Hu L, Dang Y, Agarwal S, Mei L, Li S, Zhou X (2020) Automatic business process structure
discovery using ordered neurons lstm: a preliminary study. In: AAAI IPA
Hartley JL, Sawaya WJ (2019) Tortoise, not the hare: digital transformation of supply chain business
processes. Bus Horiz 62(6):707–715
Heo M et al (2018) Chatbot as a new business communication tool: the case of naver talktalk. Bus
Commun Res Practice 1(1):41–45
Ivančić L, Vugec DS, Vukšić VB (2019) Robotic process automation: systematic literature review. In:
International conference on business process management. Springer, Berlin, pp 280–295
Jimenez-Ramirez A, Reijers HA, Barba I, Del Valle C (2019) A method to improve the early stages
of the robotic process automation lifecycle. In: Int conf advanced information systems
engineering, pp 446–461
Kiss T, Kacsuk P, Kovács J, Rakoczi B, Hajnal A, Farkas A, Gesmier G, Terstyanszky G (2019)
Micado—microservice-based cloud application-level dynamic orchestrator. Future Gener
Comput Syst 94:937–946
Lamberton C, Brigo D, Hoy D (2017) Impact of robotics, rpa and ai on the insurance industry:
challenges and opportunities. J Fin Perspect 4(1)
LaValle SM (2006) Planning algorithms. Cambridge University Press
Le V, Gulwani S (2014) Flashextract: a framework for data extraction by examples. In: Proceedings of
the 35th ACM SIGPLAN PLDI
Leopold H, van der Aa H, Reijers HA (2018) Identifying candidate tasks for robotic process
automation in textual process descriptions. In: Enterprise, business-process and information
systems modeling
Leymann F, Roller D (1999) Production workflow: concepts and techniques. Prentice Hall PTR, USA
Madakam S, Holmukhe RM, Kumar Jaiswal D (2019) The future digital work force: robotic process
automation (rpa). J Inf Syst Technol Manag 16
Marco Mendes J, Leitão P, Restivo F, Colombo AW (2010) Composition of petri nets models in
service-oriented industrial automation. In: 8th IEEE int conf industrial informatics, pp 578–583
Mendling J, Decker G, Hull R, Reijers HA, Weber I (2018) How do machine learning, robotic process
automation, and blockchains affect the human factor in business process management?
Commun Assoc Inf Syst 43(1):19
Miltner A, Gulwani S, Le V, Leung A, Radhakrishna A, Soares G, Tiwari A, Udupa A (2019) On the fly
synthesis of edit suggestions. In: OOPSLA
Mohapatra S (2009) Business process automation. PHI Learning Pvt Ltd.
Natalino C, Rehan Raza M, Rostami A, Öhlen P, Wosinska L, Monti P (2018) Machine learning aided
orchestration in multi-tenant networks. In: IEEE photonics society summer topical meeting
series, pp 125–126
Portchelvi V, Prasanna Venkatesan V, Shanmugasundaram G (2012) Achieving web services
composition—a survey. Softw Eng 2(5):195–202
Rao J, Su X (2004) A survey of automated web service composition methods. In: ICWS workshop on
semantic web services and web process composition
Rizk Y, Bhandwalder A, Boag S, Chakraborti T, Isahagian V, Khazaeni Y, Pollok F, Unuvar M (2020a)
A unified conversational assistant framework for business process automation. In: AAAI
workshop on intelligent process automation
Rizk Y, Isahagian V, Boag S, Khazaeni Y, Unuvar M, Muthusamy V, Khalaf R (2020b) A conversational
digital assistant for intelligent process automation. In: Business process management:
blockchain and robotic process automation forum, proceedings 18, Seville, Spain, September
13–18, 2020, pp 85–100
168 | Y. Rizk et al.
Abstract: In the last decade, industry has wholeheartedly embraced RPA. A large num-
ber of RPA projects have been conducted, which all involve the mimicking of human
behavior by software. Although vendor-specific frameworks exist to support all as-
pects of RPA solutions – from the analysis of the system until the enactment and con-
trol of the developed robots – most of them base their solution on workflow diagrams
(e. g., BluePrism or UIPath). This chapter explores the benefits of a conceptual RPA
framework that is based on log information related to the exact human–computer in-
teraction. While the observation of employees’ computers (i. e., clicks and keystrokes)
may lead to the desired data, it is by no means trivial to convert such events into a
meaningful log. Our approach shows how to create a so-called user interface (UI) log
based on image similarity techniques. This UI log can then be used to provide support
for all stages of the RPA lifecycle. Specifically, we will describe a use case in which the
UI log is used (1) to support the analysis of the underlying process and (2) to generate a
test platform which checks whether or not the developed robots behave in accordance
with the analyzed process. We will also discuss how other stages of the RPA lifecycle
can leverage the existence of such a UI log, which leads to the identification of new
research lines.
9.1 Introduction
Conducting an RPA project requires following a lifecycle similar to any other software
project. Variations of this lifecycle can be observed in the literature (Flechsig et al.,
2019; Enríquez et al., 2020) but, in general, they have the following activities: analysis,
design, development, deployment, control and operation, and evaluation.
Nowadays, industry has come up with RPA platforms, like UiPath, that are in-
tended to cover the complete lifecycle of RPA. However, these platforms provide pol-
ished solutions mainly for the development and later stages but neglect mature sup-
https://doi.org/10.1515/9783110676693-009
170 | A. Jiménez Ramírez et al.
port for the early stage of analysis and design (Enríquez et al., 2020). Therefore, RPA
projects still rely on analyzing process documentation – which may be of poor quality
– or manual inspections of the information systems (ISs) – which require substantial
effort – to create a basic understanding of the processes to robotize. That situation
potentially leads to an inaccurate analysis, which is fatal since robots are typically
deployed in production environments accessing real ISs.
To prevent this scenario from happening, a common practice in RPA adoption is
to keep both people and robots working in the same processes simultaneously. More
precisely, human workers are the first ones who deal with the ISs and the processes.
They will experience the exceptions, undocumented cases, etc., and learn how to solve
such situations, i. e., on-the-job training. The generated knowledge during these expe-
riences is key to increase the probability of success when conducting the RPA project.
Only later the digital workforce is created, which will carry out the most repetitive and
mundane tasks of the processes. Nonetheless, due to the lack of proper support within
commercial RPA platforms, this accumulated knowledge is typically transferred infor-
mally, e. g., through interviews or manually created reports.
Against this backdrop, approaches that formally analyze the human–computer
interaction (HCI) are now beginning to appear. Such approaches are referred to with
the brand new term of task mining (Reinkemeyer, 2020), an adaptation of the process
mining paradigm (van der Aalst, 2016). Characteristic for task mining is that the com-
puters of the human workers need to be monitored by recording the screen, mouse,
and keyboard events while the humans are interacting with the user interfaces (UIs)
of the related ISs. Next, these events are processed to obtain a meaningful log, the
so-called UI log. This log can then be used to discover the underlying process by us-
ing process discovery algorithms (Geyer-klingeberg and Nakladal, 2018; van der Aalst
et al., 2018; Leno et al., 2018; Jimenez-Ramirez et al., 2019; Leno et al., 2020). Although
the processing of the UI log is non-trivial, the benefits of using this automated discov-
ery over a manual approach have been clearly recognized in recent literature (Jimenez-
Ramirez et al., 2019).
Different steps in the RPA lifecycle may leverage the results of the task mining
methods. First, it becomes (1) straightforward to analyze the as-is processes and (2)
easier to detect the candidate processes to robotize being able to provide a to-be de-
sign for them. In addition, logged data consist of valuable information for developing
robots and testing them before deployment. Moreover, the continuous monitoring of
the deployed bots may generate useful metrics for controlling their performance. Also,
this may generate recommendations of operational actions in the case of failures or
unexpected behaviors, which supports the governance of the digital workforce. What
is more, process redesign actions can be recommended in the case of changes or opti-
mizations being detected within the processes.
The objective of this chapter is twofold. First of all, it aims to describe a conceptual
framework for HCI analysis and how it can be applied in an industrial environment in
9 Human–computer interaction analysis for RPA support | 171
the domain of business process outsourcing (BPO), i. e., a company that executes pro-
cesses which belong to a different company. Although not limited to the BPO context,
the back-office departments of BPO companies are identified as optimal candidates for
RPA projects (Geyer-klingeberg and Nakladal, 2018) and, besides, they provide partic-
ularly challenging settings when strict security policies are in force. Secondly, this
chapter goes through the phases of the RPA project lifecycle to discuss the application
horizon of this task mining paradigm. In doing so, research lines that still need to be
explored are identified.
The rest of the chapter is structured as follows. Section 9.2 shows an RPA con-
text where the HCI analysis is applicable. Section 9.3 describes the HCI approach. Sec-
tion 9.4 details an application of this approach in the test phase. Section 9.5 discusses
the applicability and limitations of the HCI approach in the other phases of the lifecy-
cle. Finally, Section 9.6 concludes the chapter.
On the one hand, the human workers are trained according to the documentation of
the prescribed process before the real ISs are faced. Since humans are expected to
perform flexibly, they can make decisions when some unexpected situation arises by
applying a cognitive effort – probably just by using common sense (i. e., on-the-job
172 | A. Jiménez Ramírez et al.
training). Effective improvisations might later on be shared among the rest of the team.
Nonetheless, although human workers generally perform well, as already identified
in the literature (Aguirre and Rodriguez, 2017), they behave poorly on repetitive, high-
volume, and simple tasks.
On the other hand, regarding the digital workers, constructing them requires con-
ducting the RPA lifecycle similarly for any other software product. Analyzing and de-
signing the desired robot implies a significant effort. The reason for this is that ambi-
guity and uncertainty of the prescribed process should be minimized and the selected
parts to robotized need to be formalized. Once constructed, multiple instances of the
same robots are deployed gradually while their behavior is controlled and tested. In
the case that something occurs that is not covered by the robot’s design, the robot gets
stuck and suffers the following maintenance process. First, a human operator takes
control of the robot and tries to repair it either by completing the running instance
or by bringing the robot to a controlled situation. Second, the robot behavior is ana-
lyzed to disclose the root cause of the error. Finally, a new RPA lifecycle starts either
to include or to explicitly exclude the new behavior in the robot design – leaving it for
the human workers. Whatever happens next, the new version of the robot will not get
stuck again in a similar situation. As the reader may understand, this process is con-
siderably more time consuming than the on-the-job training of human workers. Still,
the digital workforce provides more work flexibility and predictability since they can
work continuously and the size of the team can be altered on demand.
Interestingly, companies have acknowledged that there is an efficient way to ob-
tain their hybrid back-office: the so-called human-first context, i. e., the human back-
office works first and, when the knowledge of the process is more mature, the digital
back-office is created (cf. Figure 1c). In this context, three periods can be identified
regarding the workload shifting between humans and robots (cf. Figure 2). After the
“human-first period,” where the human workforce is in charge of the entire process,
the first versions of robots are deployed gradually to handle those first identified can-
didates. It is in the “first version of robots” period in which the largest and most robust
shift of workload occurs. The “maintenance and adjustments period” aims to achieve
the highest level of digitization. It must be acknowledged that there is an asymptotic
limit that the current state of technology cannot exceed. Eventually, only the most
unstable and judgment-based parts of the process remain handled by humans. The
sooner this eventual situation is reached, the more profitable the RPA project is. How-
ever, this is not an entirely stable situation since there might be changes in processes,
UIs, and systems. If these changes are produced but not notified to the robots man-
ager, they can potentially produce misbehavior of the robots, which implies that hu-
mans have to take care of the affected processes until the new version of the robots is
deployed. Therefore, the human workload increases temporally.
This human-first context still presents some inefficiencies regarding the duplica-
tion of duties. For example, the training of humans requires analyzing the same doc-
umentation that is required for the construction of the first version of the robots. In
9 Human–computer interaction analysis for RPA support | 173
addition, when humans do on-the-job training they perform a similar analysis as the
one which is needed when misbehavior is detected in a robot. Therefore, the identi-
fied challenge and the focus of this chapter is to leverage the knowledge of the human
team to be used by the different phases of the RPA lifecycle.
behavior that can be feasibly monitored is tightened to mouse clicks, keystrokes, and
screen captures, i. e., the one produced by the most common peripheral devices.
The event streams of these peripherals need to be recorded through non-intrusive
monitoring software (i. e., its existence is transparent for the user) on each back-office
computer and, thereafter, put all together in the same behavioral log.1 The basic in-
formation that each behavioral event may include is:
– computer: it identifies the physical machine where the event is registered;
– timestamp: when this event occurs;
– image: a screen capture taken in this computer at this timestamp;
– keystrokes: the sequence (possibly empty) of keystrokes which are pushed at this
timestamp;
– clicktype: the type of mouse click (i. e., left, right, middle, or none) which is done
at this timestamp;
– clickcoords: the coordinates of the mouse at this timestamp.
Every time the human performs a mouse click or a sequence of keystrokes, an event
is recorded. The resulting log consists of a single long trace which may be related to
more than one instance of the processes that the back-office has performed.
First, this low-level processing includes the identification of repeated UI events. Some
approaches like robotic process mining (Leno et al., 2020) or desktop activity mining
(Linn et al., 2018) accomplish this step relying on UI information like window names
or web page frames, which, in turn, disables its application in contexts where the hu-
mans interact with the ISs through secured connections. A more general approach
(Jimenez-Ramirez et al., 2019) is based on image similarity techniques. More precisely,
an efficient bit-wise comparison (Gusfield, 1999) between images fingerprints (i. e.,
1 Since the human workers have received similar training, they are expected to behave similarly and
so their individual logs.
9 Human–computer interaction analysis for RPA support | 175
short hashes which are obtained from each image in a deterministic way) (Wong et al.,
2002) is used to state that two screen captures (i. e., events) are related to the same ac-
tivity (i. e., UI event) according to some pre-fixed similarity threshold.
Second, the one-trace log is split in different traces. For this, one UI event is se-
lected as the starting event of each trace which uses to be the most repeated one
(Jimenez-Ramirez et al., 2019) or one which is manually selected (Leno et al., 2018).
Besides calculating these two new attributes, this low-level processing might be
used to wipe out some unnecessary events. Since not all the activities of the human
workers are relevant for the RPA development (e. g., social networking or some web
surfing), some of them can be detected at the image level. Techniques like optical char-
acter recognition – that looks for a text within an image – or template matching – that
detects if a small image is part of a bigger image – are useful candidates to clean the
behavioral log which may result in a cleaner UI log. In addition, the process mining
community recognizes that the presence of these unnecessary events – noise – leads
to the discovery of complex and inaccurate process models (Suriadi et al., 2017). To
remedy this, they provide numerous techniques (Cheng and Kumar, 2015; Măruşter
et al., 2006) to reduce such noise and enhance the quality of logs. Thus, they can be
adapted to be included in this low-level processing.
This evaluation was applied to two outsourced processes of a Spanish company, which
is active in the BPO domain. Different measures were used to compare the performance
of each analysis: (1) the number of process variants that were included in each model
(i. e., # Var conven, # Var auto, # Var super), (2) the percentage of new variants that
the supervised analysis detects where the conventional analysis missed (i. e., % New),
and (3) the percentage of variants that were included in the conventional analysis but
not in the supervised one (i. e., % Missed).
The following conclusions can be drawn after analyzing the results of the evalua-
tion (cf. Table 1):
– Regarding the columns # Var conven and # Var super, the supervised HCI analy-
sis discovers a greater variety of paths than the conventional way. As observed in
the column % New, this increment is above 38 % in both processes. This implies
that employees had to deal with variants which were not included in the conven-
tional analysis yet existed in the behavior of the IS.
– Regarding the % Missed variants, it is relevant to note that only one was missed in
the second process. This can be interpreted as follows: (1) the behavioral log was
too small and did not contain all the relevant paths or (2) the path was actually
not relevant for the analyst.
– Finally, regarding the # Var auto, it clearly shows that the cognitive labor of the
analyst is much required to tune the pipeline, since many variants were included.
Nonetheless, most of them were considered noise and irrelevant to the analysis,
e. g., interrupted cases or errors.
More precisely, the HCI analysis is leveraged to simulate the behavior of a real IS,
which may include its own databases and complex interactions with external ISs (cf.
Figure 6). The behavior which is stored in the UI log can then be reproduced on a “fake”
IS, i. e., the testing environment. This may seem identical to the real IS, but its behavior
is limited to the one contained in the UI log. Once the development phase is finished,
robots are tested against this test environment to ensure the proper execution of the
robots in a minimally intrusive way.
In addition to the UI log, the described approach requires that input data of each pro-
cess instance are recorded as well. Since the UI log might be rather lengthy for an
efficient test cycle, a minimum test suite is selected. That is, on the basis of HCI anal-
ysis, the input data and the UI log related to one process instance for each process
variant of the discovered process model are extracted. This results in two elements:
(1) the reduced input data and (2) the reduced UI log, which only contains the traces
of the selected process instances.
The test environment (i. e., the fake IS) consists of an IS that receives the reduced
UI log and offers two main functionalities: (1) to display views, i. e., full-screen im-
ages, in a sequential way, simulating the behavior of the real application; and (2) to
capture the interaction with the fake IS, i. e., it just waits for every interaction and then
it captures the event information: mouse, keystrokes, and screen. The purpose of the
test environment is to compare the events stored in the reduced UI log with the events
performed by the robot in the test condition, which, in its turn, has also received the
reduced input data. In the case that the events are similar, the test environment will
show the next screen capture of the UI log and then wait for an interaction. Else, a fail-
9 Human–computer interaction analysis for RPA support | 179
ure test report is generated including (1) the events performed by the robot being tested
and (2) the last event that was expected but was not similar to the received one.
In summary, this test environment is suitable for automatically designing and
running functional tests for developed robots before they are being deployed. This
approach guarantees that test data do not influence the system after the test has fin-
ished, which simplifies its incorporation into a continuous integration DevOps prac-
tice (Pinto et al., 2017). The test reports that are being generated identify errors at the
workflow level, which provide a reasonably good starting point for debugging.
Example 1. Figure 7 shows a test suite obtained from a complete UI log (Jiménez-
Ramírez et al., 2020). Here, img_12 is shown first in the automatic testing since it is
the image of the first event. In addition, the first expected event is a text action con-
taining “Tari Tavarez.” Assuming correct behavior of the robot, the test environment
will show the image of the subsequent event (i. e., img_13) and wait for an event of the
robot. In the case the robot does something different than clicking on a screen zone
close to “120,205” – the expected event – the test case will be completed by producing
the failure test report.
9.5.1 Analysis
The obtained analysis report represents a key element for the analysis phase since it
includes: (1) on-the-field information about the real process, which is generally more
accurate than the documentation of the process, (2) statistical estimates on the fre-
quency of the variants, which are needed to identify the candidate variants to robotize,
and (3) the human effort that is being used to execute the process, which is crucial to
180 | A. Jiménez Ramírez et al.
evaluate the return on investment and the potential performance of the RPA deploy-
ment.
In addition, as shown in Figure 8, the time required to acquire the process knowl-
edge is drastically reduced by following the proposed approach. This is due to the fact
that the HCI analysis can include the entire, unbiased interactions of several human
workers at the same time.
The semi-automatic HCI approach that is explained in this chapter will require an an-
alyst to make some decisions when fine-tuning the pipeline. State-of-the-art artificial
intelligence (AI) technology is likely to be capable to support such professionals by
learning from them, using appropriate parameters, to reduce the number of iterations
that are needed. The HCI analysis is also based on the behavioral events that are cap-
tured. It is not always trivial to distinguish between the behavior that is and is not
relevant to the process. Again, it can be expected that advanced algorithms can be de-
veloped that learn from the analysts to automate the first level of noise cleaning. This
will require further investigation.
9.5.2 Design
Designing the robot according to the approach that is described in this chapter is
greatly supported by the output of the HCI analysis. After all, the workflow of the
obtained process models is intended to be similar in the designed to-be process
model. In addition, each process activity can be traced back to its different behav-
ioral events which may disclose valuable information for the designers. Therefore, as
seen in Figure 8, the development cycles – starting with the design – can be greatly
reduced.
Despite these advantages, two different challenges remain open to include such
information into the design. The first one relates to design the events which move a
robot from one to the next activity, i. e., a click or keystrokes. For this, once all the
9 Human–computer interaction analysis for RPA support | 181
behavioral events which are logged for a given activity are grouped, it is possible to
obtain the abstract event which governs all of them. Two different situations might
be faced. The simplest one is that all the required information is within the logged
information of these events. For example, given a set of click events in different-but-
close screen positions, the abstract event would be clicking in the centroid of the point
cloud. The more complex one requires information from other parts of the log (Leno
et al., 2018). In this case, it would be required to, first, find the relation between the
event and some instance data in the log, e. g., given a set of different keystrokes, it
could be inferred from the log that these keystrokes correspond to the input data “stu-
dent name.” Thereafter, the abstract event will be parameterized with the found re-
lation. What is more, this information could be depicted in the screen, so computer
vision techniques would be needed to process all the screen captures to extract text
data from them to enable this relation analysis.
The second challenge relates to the decision logic that may exist in a variation
point to differentiate one process branch from the others. This logic may still need to
be generated. Decision trees or any other data mining technique based on the char-
acterization of the instances are good candidates to address this challenge. For this
to work, it is required to have as much information as possible to characterize each
branch at such a variation point. As before, this information may come from the be-
havioral log, the input information of the traces, or even information that is displayed
in the screen captures.
9.5.3 Development
In this phase, the construction of the robot is carried out based on the results obtained
from the execution of the analysis and design phases. Relying on the process design
obtained from the HCI analysis, robot development can be boosted by model-based
engineering methods (Staron, 2006). As proposed in (Leno et al., 2020) – where the
RPA script is the last point of the pipeline – the robot code can be generated, tailored
to a specific target platform, e. g., UiPath. To this end, the robot design must contain
extended attributes that enable the implementation of actions and decision rules, as
is being provided for in the approach described in this chapter.
However, the robot design may include advanced actions which are beyond the
basic workflow behavior (e. g., computer vision). Moreover, each RPA platform has
its custom set of components, which evolve in different ways. Considering that a
deep understanding of a platform is necessary for RPA development (ABBYY, 2020),
trying to cover all of them when generating the robot code results seems infeasi-
ble. Nonetheless, to address this issue, a platform-independent classification of RPA
components could be investigated to map between the components of different RPA
platforms.
182 | A. Jiménez Ramírez et al.
9.5.5 Evaluation
In a way that is similar to how the described approach supports the control and opera-
tion phase, continuous HCI monitoring can provide a basis to support the process eval-
uation. Since RPA projects may evolve over time, variants that were once highly repet-
itive may become marginal at some point, or vice versa. Because of this dynamism,
both the robots and the human workforce need to be continuously monitored. A set
9 Human–computer interaction analysis for RPA support | 183
9.6 Conclusion
In this chapter, the benefits of a conceptual RPA framework based on the information
retrieved from the HCI have been described. This conceptual framework is proposed
in a human-first context, where the key to boost the development of the RPA project
is to rely on the study of the behavior of humans carrying out a certain process. To
enable this approach, the basic pipeline for learning from HCI was presented.
From the perspective of the RPA project lifecycle, the HCI proposal may contribute
to bring benefits all its phases. Regarding the analysis phase, this proposal delivers an
enriched report that helps to understand the underlying process and offers crucial in-
formation for the correct design of the robot in the design phase. The development
phase could be systematized and partially automated by applying techniques based
on the model-based engineering paradigm. Moreover, a non-intrusive automatic test-
ing process has been thoroughly described to help to detect errors early in the devel-
opment. This would help to lower the cost of robot development and to prevent fatal
errors in the companies’ production environments. The proposal is useful too as a con-
tinuous monitoring of robots that would help in the fast detection of misbehavior in
the behavior in the control and operation phase. Finally, in the evaluation phase, it be-
comes easier to create indicators that enable observing the performance of the robots.
Many lines of future work can be considered for emerging technology such as RPA.
First, due to the amount of rich data that the HCI provides, the combination with AI in
this context can support a range of decision making activities. In addition, deciding on
the minimum number of robots that need to be spawned to fulfill a company’s service-
level agreement is also amenable to be automated by using AI techniques. Regarding
184 | A. Jiménez Ramírez et al.
the development of robots, it would be valuable to work on new solutions that help to
systematize and automate their development. Finally, scaling this HCI approach to a
big-company level requires great computing capabilities for executing artificial vision
algorithms and other image processing. Therefore, efficient techniques are in demand
to detect and reduce unnecessary computations.
Bibliography
ABBYY (2020) State of process mining and robotic process automation 2020. Available at:
www.abbyy.com/en-us/solutions/process-intelligence/research-report-2020. Last accessed:
May 2020
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(RPA): a case study. In: Proceedings – applied computer sciences in engineering: 4th
workshop on engineering applications, WEA 2017, pp 65–71. ISBN 978-3-319-66963-2.
https://doi.org/10.1007/978-3-319-66963-2_7
Biscotti F (2018) In: Gartner market share analysis: robotic process automation, Worldwide
Cewe C, Koch D, Mertens R (2017) Minimal effort requirements engineering for robotic process
automation with test driven development and screen recording. In: International conference
on business process management. Springer, Berlin, pp 642–648
Cheng H-J, Kumar A (2015) Process mining on noisy logs – can log sanitization help to improve
performance? Decis Support Syst 79:138–149
Criteria HPF (2014) Use cases and effects of information technology process automation (ITPA). Adv
Robot Autom 3(3):1–11. ISSN 21689695. 10.4172/2168-9695.1000124
Enríquez JG, Jiménez-Ramírez A, Domínguez-Mayo FJ, García-García JA (2020) Robotic process
automation: a scientific and industrial systematic mapping study. IEEE Access 8:39113–39129
eXtensible Event Stream (XES) for achieving interoperability in event logs and event streams (2016)
IEEE Std 1849-2016, pp 1–50
Flechsig C, Lohmer J, Lasch R (2019) Realizing the full potential of robotic process automation
through a combination with bpm. In: Logistics management. Springer, Berlin, pp 104–119
Geyer-klingeberg J, Nakladal J (2018) Process mining and robotic process automation: a perfect
match. In: 16th international conference on business process management, industry track
session, number July, pp 1–8
Gusfield D (1999) Algorithms on strings, trees, and sequences: computer science and computational
biology. Cambridge University Press, Cambridge
Hannonen A (2020) Automated testing for software process automation. Master’s thesis, School of
Technology and Innovations, University of Vaasa
Himel D, Liu Z (2017) Identifying frequent user tasks from application logs. In: Proceedings of the
22nd international conference on intelligent user interfaces, pp 263–273
Jimenez-Ramirez A, Reijers HA, Barba I, Del Valle C (2019) A method to improve the early stages of
the robotic process automation lifecycle. In: International conference on advanced information
systems engineering. Springer, Berlin, pp 446–461
Jiménez-Ramírez A, Chacón-Montero J, Wojdynsky T, González Enríquez J (2020) Automated
testing in robotic process automation projects. J Softw Evol Process e2259.
https://doi.org/10.1002/smr.2259
Leno V, Dumas M, Maggi FM, La Rosa M (2018) Multi-perspective process model discovery for robotic
process automation. In: CEUR workshop proceedings, vol 2114, pp 37–45
9 Human–computer interaction analysis for RPA support | 185
Leno V, Polyvyanyy A, Dumas M, La Rosa M, Maggi FM (2020) Robotic process mining: vision and
challenges. Bus Inf Syst Eng. ISSN 1867-0202. https://doi.org/10.1007/s12599-020-00641-4
Linn C, Zimmermann P, Werth D (2018) Desktop activity mining – a new level of detail in mining
business processes. In: Workshops der INFORMATIK 2018 – Architekturen, Prozesse, Sicherheit
und Nachhaltigkeit, pp 245–258
Măruşter L, Ton Weijters AJMM, van Der Aalst WMP, van Den Bosch A (2006) A rule-based approach
for process discovery: dealing with noise and imbalance in process logs. Data Min Knowl Discov
13(1):67–87
Pinto G, Reboucas M, Castor F (2017) Inadequate testing, time pressure, and (over) confidence: a tale
of continuous integration users. In: 2017 IEEE/ACM 10th international workshop on cooperative
and human aspects of software engineering (CHASE), pp 74–77
Reinkemeyer L (2020) Process mining in action. Principles, use cases and outlook. Springer, Berlin.
ISBN 978-3-030-40172-6
Sharma R, Pavlovic VI, Huang TS (1998) Toward multimodal human-computer interface. Proc IEEE
86(5):853–869
Staron M (2006) Adopting model driven software development in industry – a case study at two
companies. In: Nierstrasz O, Whittle J, Harel D, Reggio G (eds) Model driven engineering
languages and systems, Berlin, Heidelberg. Springer, Berlin, pp 57–72
Suriadi S, Andrews R, ter Hofstede AHM, Wynn MT (2017) Event log imperfection patterns for process
mining: towards a systematic approach to cleaning event logs. Inf Syst 64:132–150
van der Aalst WMP (2016) Process mining: data science in action. Springer, Heidelberg
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60(4):269–272. ISSN 1867-0202. 10.1007/s12599-018-0542-4
Wong C, Bern MW, Goldberg D (2002) An image signature for any kind of image. In: International
conference on image processing, pp 409–412
Han van der Aa and Henrik Leopold
10 Supporting RPA through natural language
processing
Abstract: Natural language processing (NLP) is a field concerned with the analysis
of natural language from a computational perspective. NLP techniques cover a wide
range of tasks, such as information extraction, classification, and semantic analysis.
As such, NLP has considerable potential to support robotic process automation (RPA)
efforts. In particular, we use this chapter to highlight selected opportunities where a
successful application of NLP techniques can support various stages of the RPA lifecy-
cle. Therefore, we consider the potential of NLP for the identification of RPA opportu-
nities and the design of RPA routines, as well as their actual execution. We discuss how
these opportunities can be supported through the application of existing techniques
and, furthermore, highlight open research challenges.
10.1 Introduction
Many organizations currently face the challenge of keeping up with increasing dig-
itization. Among others, it requires them to adapt existing business models and to
respectively improve the automation of their business processes (Leyh et al., 2016).
While the former is a rather strategic task, the latter calls for specific operational
solutions. One of the most recent developments to increase the level of automation
is referred to as robotic process automation (RPA). In essence, RPA emerges in the
form of software-based solutions that automatically execute repetitive and routine
tasks (Aguirre and Rodriguez, 2017). In this way, knowledge workers can dedicate
their time and effort to more complex and value adding tasks.
Natural language processing (NLP) is a field concerned with the analysis of natu-
ral language from a computational perspective (Dan, 2000). NLP techniques cover a
wide range of tasks, such as information extraction, classification, and semantic anal-
ysis. In the last decade, the maturity achieved by NLP technology, together with the
explosion of big data and deep learning techniques, have turned the spotlight to the
possibilities offered by NLP approaches for a variety of novel applications. Specifically,
the potential of NLP to synthesize information from unstructured and semi-structured
sources, such as textual documentation and free-text comments, makes it a prime can-
didate to support tedious, time consuming tasks in organizational settings (van der Aa
et al., 2018a).
As such, we believe that NLP has a lot to offer in the context of RPA. Therefore, we
use this chapter to outline various opportunities that NLP provides for different tasks
https://doi.org/10.1515/9783110676693-010
188 | H. van der Aa and H. Leopold
in an RPA lifecycle. In particular, we discuss the application of NLP for the following
purposes:
1. Identifying RPA opportunities: NLP techniques can be leveraged to identify poten-
tial automation candidates through, e. g., semantic analysis of process documen-
tation and the identification of reoccurring patterns.
2. Designing RPA routines: To implement RPA routines, tasks in an organizational
process need to be transformed into a formalized, automatically executable repre-
sentation format. NLP techniques can support this endeavor through, e. g., the au-
tomated extraction of formal specifications from textual resources, such as work
instructions.
3. Executing RPA routines: Finally, NLP techniques can be used during the actual exe-
cution of implemented RPA routines. In this manner, RPA can become smarter and
go beyond the automation of simple tasks (van der Aalst et al., 2018). For instance,
by automating process steps involving the actual interpretation of unstructured
input, such as e-mails from clients.
The remainder of this chapter is structured as follows. Section 10.2 discusses how NLP
techniques are already applied in the closely related area of business process man-
agement (BPM). Then, Section 10.3 shows how these and other NLP-based techniques
can be lifted to the context of RPA. Finally, Section 10.4 concludes the chapter and
highlights open research directions.
10.2 Background
In this section, we reflect on NLP-based approaches developed to target several use
cases in the context of BPM. BPM is a research area concerned with the analysis of how
work is performed in an organization. The overall aim is to ensure consistent process
outcomes and to take advantage of improvement opportunities (Dumas et al., 2013).
As such, there is a clear relation between the goals and methods of BPM and RPA (van
der Aalst et al., 2018).
In this section, we discuss various use cases of applying NLP to BPM, which can be
lifted to RPA settings as well. We divide this discussion into the analysis of text inside
of process models (Section 10.2.1) and the analysis of text outside of process models,
i. e., in supplementary resources (Section 10.2.2).
Process models
Process models are the de facto standard to capture organizational processes in a
structured manner. As such, they form the central artifact for the vast majority of pro-
cess analysis techniques, including those described in this chapter.
Various notations are used to define process models, of which Petri Nets represent
the most common formal model, whereas event-driven process chains (EPCs) (Scheer
et al., 2005) and business process model and notation (BPMN) (Chinosi and Bpmn,
2012) represent the most commonly adopted methods in practice. Figure 1 depicts an
exemplary BPMN model. The rounded rectangles denote the four activities in the pro-
cess, whereas the circles are used to, respectively, depict the start and end events of the
process. Finally, the diamond shapes with a plus sign indicate that the two activities
in between them can be executed concurrently.
Figure 1: BPMN model example with annotated activity labels (from Leopold et al., 2019a).
The gray nodes are semantic annotations of the activity labels in the model. They are
not part of BPMN models but result from the NLP-based analysis technique discussed
next.
Label parsing
The parsing of process model activity labels focuses on the recognition of several se-
mantic components in the labels. In particular, parsers generally aim to extract the
action, e. g., “obtain,” the business object to which this action relates, e. g., “process
data,” and some additional information fragment, e. g., “from the ERP system.” Such
semantic annotations are depicted for the activities in Figure 1. Automatically obtain-
ing these annotations is a challenging task, however. The two activities “process per-
formance analysis” and “sending performance report to inquirer” illustrate this vividly.
190 | H. van der Aa and H. Leopold
Both activity labels are short, do not represent proper sentences (they do not contain
a verb), and the underlying syntactical patterns differ. In the former case, the action is
provided as a noun at the end of the label (“analysis”); in the latter case, the action is
provided as a noun in the beginning (“sending”). Because of these factors, standard
NLP tools, such as the Stanford Parser, are not applicable (Leopold, 2013). However,
there are dedicated label annotation techniques available. Among others, there is a
heuristics-based technique exploiting the label context (Leopold et al., 2012) and a
technique building on hidden Markov models (Leopold et al., 2019a).
Label-based analysis
The availability of activity label annotations opens the door for several advanced anal-
yses. For example, the annotations allow to automatically check different quality crite-
ria of process models, such as naming conventions (Leopold et al., 2013) and linguis-
tic consistency (Pittke et al., 2013). They also provide the basis for the identification
of recurring patterns in process model collections (Leopold et al., 2015) and for the
detection of commonalities and differences between process models (Weidlich et al.,
2010).
proaches. Some approaches target specific kinds of documents, such as the genera-
tion of models from use cases (Sinha and Paradkar, 2010), group stories (de Gonçalves
et al., 2009), or methodological descriptions (Viorica Epure et al., 2015), while others
take general imperative (Ghose et al., 2007; Friedrich et al., 2011) and declarative (van
der Aa et al., 2019) process descriptions as input. These techniques combine extensive
use of general-purpose NLP tools with specifically tailored analysis techniques in or-
der to extract process-related information from natural language texts. Nevertheless,
due to the complexity of the overall challenge and the inherent ambiguity of natural
language (van der Aa et al., 2018b), the process models obtained in this manner typi-
cally require manual verification (Selway et al., 2015).
Figure 2: Process model and associated work instruction (from Leopold et al., 2019b).
thus be possible to recognize that this process step provides a promising candidate for
automation. This opportunity would be missed without employing natural language
analysis.
recognize that these fragments are closely related, for instance, by recognizing the se-
mantic similarity between terms such as “meeting” and “appointment” and “accept”
and “approval.” So-called process model matchers (Weidlich et al., 2010) address this
task by considering a variety of factors that may indicate similarity between parts
of processes, including syntactic similarity, synonyms, and hypernyms. In this man-
ner, NLP techniques make the detection of reoccurring patterns much more robust to
terminological differences that are commonly part of real-world process model collec-
tions. By employing label parsing techniques, as discussed in Section 10.2.1, pattern
detection may even be used to recognize reoccurring patterns involving different
business objects (Smirnov et al., 2012).
Overall, the two general use cases discussed in this section should be regarded as
complementary. The former use case targets the detection of specific process model
activities or fragments that are relatively easy to automate, whereas the latter use case
focuses on the detection of reoccurring patterns that make the investment required for
automation more worthwhile.
vide a chronological description of a process (or process step) can best be handled
by techniques that extract imperative process models from text, such as the state-of-
the-art technique by Friedrich et al. (2011). However, for documents that are closer to
a requirement or regulatory specification, techniques to extract declarative process
models (van der Aa et al., 2019) or business rules (Winter and Rinderle-Ma, 2018) may
be more suitable.
In any case, the process models extracted by these NLP-based techniques should
be regarded as a helpful starting point for the formal definition of automation routines.
On the one hand, manual analysis is required to ensure that the obtained models are
correct and to resolve any ambiguity (Selway et al., 2015; van der Aa et al., 2018b). On
the other hand, this step only covers the extraction of the as-is state of the process,
including the steps that are currently performed manually. How to automate the in-
teraction with an information system will most likely still require manual input or a
combination with other techniques.
1 https://www.lexalytics.com/
2 https://expertsystem.com/
3 https://roborana.be/en/
196 | H. van der Aa and H. Leopold
Invoice processing
A relevant use case relating to the analysis of semi-structured content is the auto-
mated processing of invoices. Based on semi-structured document parsers, a routine
could provide the possibility to automatically (1) extract relevant data (such as the
invoicing company, products, services, amounts, and dates), (2) store the extracted
data in a database or a file, and (3) trigger an automated payment. In the case an
invoice is not available as a document that can be parsed (e. g., consider PDFs cre-
ated from scans), optical character recognition (OCR) techniques can be used in the
pre-processing phase. It is interesting to point out that the technology required for ex-
tracting data from semi-structured text documents is not new. Many techniques and
patents date back to the early and mid 2000s (see e. g. Lemon et al., 2005; Chieu and
Ng, 2002). However, the combination with existing RPA capabilities provides a new
context for their use.
Ticket classification
A frequently discussed use case relating to the analysis of unstructured content is the
automated classification of tickets. Since many organizations face hundreds or even
thousands of support tickets every day, automated support can be expected to come
with considerable time savings. Such automated support may be as simple as using
document classification techniques to determine what a ticket is about and what prob-
lems the person is having. As a result, organizations can benefit from faster triage and
faster allocation to the right expert. While document classification techniques have
been around for some time, particularly the automated classification of tickets is a
rather recent and active area of research (Maksai et al., 2014; Altintas and Cuneyd Tan-
tug, 2014).
4 https://www.digitalgenius.com/
10 Supporting RPA through natural language processing | 197
customer inquires, leading to a significant reduction in both the human effort required
and response time for the client.
The three use cases described above illustrate that existing NLP techniques pro-
vide interesting opportunities to enhance traditional RPA capabilities. The key chal-
lenge for the successful application in practice is to properly address the problem of
accuracy: NLP-based techniques simply cannot be expected to always deliver perfect
results. This means that NLP-based RPA routines need to be able to decide when they
are unable to accurately process a certain task and need to include a human in the
loop.
10.4 Conclusion
In this chapter, we highlighted the potential of employing NLP techniques to support
various tasks in the RPA lifecycle. In particular, we first showed how NLP techniques
can help to identify suitable candidates for automation through the identification of
so-called user tasks and by identifying reoccurring process patterns. Second, we illus-
trated how text-to-model transformation approaches can be used as a first step in the
formalization of RPA routines by automatically extracting structured process informa-
tion from textual documentation. Finally, we considered how NLP can contribute to
the actual execution of RPA routines themselves. We discussed use cases that involve
the automation of routines dealing with both semi-structured and unstructured con-
tent. Here, we specifically illustrated how NLP techniques can enable the automation
of tasks related to invoice processing, ticket classification, and automated customer
service.
Maturity
The maturity of state-of-the-art approaches for all three tasks leaves considerable op-
portunities for further improvement:
1. The use of NLP for the identification of RPA opportunities is still relatively new.
Out of the various techniques developed to support the identification of RPA op-
portunities, only the few approaches discussed in Section 10.3.1 incorporate con-
siderations of natural language. As such, there are still substantial opportunities
for further work in this direction, e. g., through the development of new NLP-
driven identification approaches or by combining NLP-driven approaches with
approaches targeting other process perspectives, such as control flow and data
transformations.
2. The use of NLP to support routine design, as discussed in Section 10.3.2, is driven
by existing work on the transformation of textual descriptions into formal process
specifications. These current approaches are primarily heuristics-based, which
results in problems when dealing with highly flexible textual documents from
198 | H. van der Aa and H. Leopold
Outlook
Although the benefits of applying NLP in all three discussed tasks are apparent, we
believe that the main potential for future work lies in the application of NLP to rou-
tine execution itself. While the application of NLP for the first two tasks, opportunity
identification and routine formalization, reduces the manual effort required for these
tasks, the application of NLP for routine execution can truly expand the task’s poten-
tial and, thus, broaden the potential of RPA as a whole. By employing NLP techniques
for this purpose, RPA can thus be transformed from a rudimentary to an intelligent
automation tool.
Bibliography
Agostinelli S, Marrella A, Mecella M (2020) Towards intelligent robotic process automation for
bpmers. arXiv preprint arXiv:2001.00804
Aguirre S, Rodriguez A (2017) Automation of a business process using robotic process automation
(RPA): a case study. In: Workshop on engineering applications. Springer, Berlin, pp 65–71
Altintas M, Cuneyd Tantug A (2014) Machine learning based ticket classification in issue tracking
systems. In: Proceedings of international conference on artificial intelligence and computer
science (AICS 2014)
Baier T, Mendling J, Weske M (2014) Bridging abstraction layers in process mining. Inf Syst
46:123–139
Bosco A, Augusto A, Dumas M, La Rosa M, Fortino G (2019) Discovering automatable routines from
user interaction logs. In: International conference on business process management. Springer,
Berlin, pp 144–162
Chieu HL, Ng HT (2002) A maximum entropy approach to information extraction from semi-structured
and free text. In: AAAI 2002, pp 786–791
Chinosi M, Bpmn AT (2012) An introduction to the standard. Comput Stand Interfaces 34(1):124–134
Dan J (2000) Speech & language processing. Pearson Education India
de Gonçalves JC, Santoro FM, Baiao FA (2009) Business process mining from group stories. In: 13th
international conference on computer supported cooperative work in design, 2009. CSCWD
2009. IEEE, pp 161–166
Devlin J, Chang M-W, Lee K, Toutanova K (2018) BERT: pre-training of deep bidirectional transformers
for language understanding. arXiv preprint arXiv:1810.04805
10 Supporting RPA through natural language processing | 199
Smirnov S, Weidlich M, Mendling J, Weske M (2012) Action patterns in business process model
repositories. Comput Ind 63(2):98–111
van der Aa H, Leopold H, Reijers HA (2017a) Comparing textual descriptions to process models–the
automatic detection of inconsistencies. Inf Syst 64:447–460
van der Aa H, Leopold H, van de Weerd I, Reijers HA (2017b) Causes and consequences of
fragmented process information: Insights from a case study. In: AMCIS
van der Aa H, Carmona Vargas J, Leopold H, Mendling J, Padró L (2018a) Challenges and
opportunities of applying natural language processing in business process management. In:
COLING. Association for Computational Linguistics, pp 2791–2801
van der Aa H, Leopold H, Reijers HA (2018b) Checking process compliance against natural language
specifications using behavioral spaces. Inf Syst 78:83–95
van der Aa H, Di Ciccio C, Leopold H, Reijers HA (2019) Extracting declarative process models from
natural language. In: International conference on advanced information systems engineering.
Springer, Berlin, pp 365–382
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation
Viorica Epure E, Martín-Rodilla P, Hug C, Deneckère R, Salinesi C (2015) Automatic process model
discovery from textual methodologies. In: 9th international conference on research challenges
in information science (RCIS), 2015 IEEE. IEEE, pp 19–30
Weidlich M, Dijkman R, Mendling J (2010) The icop framework: identification of correspondences
between process models. In: International conference on advanced information systems
engineering. Springer, Berlin, pp 483–498
Winter K, Rinderle-Ma S (2018) Detecting constraints and their relations from regulatory documents
using nlp techniques. In: OTM confederated international conferences“on the move to
meaningful Internet systems”. Springer, Berlin, pp 261–278
Simone Agostinelli, Andrea Marrella, and Massimo Mecella
11 Automated segmentation of user interface
logs
Abstract: Robotic process automation (RPA) tools are able to capture in dedicated user
interface (UI) logs the execution of high-volume routines previously performed by a
human user on the interface of a computer system, and then emulate their enactment
in place of the user by means of a software robot. A UI log can record information about
several routines, whose actions and events are mixed in some order that reflects the
particular order of their execution by the user. In addition, the same user action may
belong to different routines, making its automated identification far from trivial. The
issue to automatically understand which user actions contribute to a specific routine
inside the UI log is also known as segmentation. In this contribution, after discussing
in detail the issue of segmentation and all its potential variants, we present a novel
segmentation technique that leverages trace alignment in process mining for automat-
ically deriving the boundaries of a routine by analyzing the UI logs that keep track of
its execution, in order to cluster all user actions associated with the routine itself in
well-bounded routine traces.
11.1 Introduction
Robotic process automation (RPA) uses software robots (or simply SW robots) to mimic
and replicate the execution of highly routine tasks (in the following, called routines)
performed by humans in their application’s user interface (UI). SW robots encode, by
means of executable scripts, sequences of fine-grained interactions with a computer
system, such as opening a file, selecting a field in a form or a cell in a spreadsheet,
copy and paste data across cells of a spreadsheet, extract semi-structured data from
documents, read and write from/to databases, open e-mails and attachments, make
calculations, etc. (Willcocks, 2016). A typical routine that can be automated by a SW
robot using a RPA tool is transferring data from one system to another via their re-
spective UIs, e. g., copying records from a spreadsheet application into a web-based
enterprise information system (Leno et al., 2020b).
Commercial RPA tools allow SW robots to automate a wide range of routines in
a record-and-replay fashion. The current practice for identifying the single steps of a
routine is by means of interviews, walk-throughs, and detailed observation of work-
ers conducting their daily work (Jimenez-Ramirez et al., 2019). A recent approach pro-
https://doi.org/10.1515/9783110676693-011
202 | S. Agostinelli et al.
posed by Bosco et al. (2019) makes this identification less time consuming and error-
prone, as it enables to automatically extract from a UI log, which records the UI inter-
actions during a routine enactment, those routine steps to be automated with a SW
robot. While this approach is effective in the case of UI logs that keep track of single
routine executions, i. e., there is an exact 1:1 mapping among a recorded user action
and the specific routine it belongs to, it becomes inadequate when the UI log records
information about several routines whose actions are mixed in some order that re-
flects the particular order of their execution by the user. In addition, since the same
user action may belong to different routines, the automated identification of those user
actions that belong to a specific routine is far from trivial. The challenge to automat-
ically understand which user actions contribute to which routines inside a UI log is
also known as segmentation (Agostinelli et al., 2019; Leno et al., 2020b).
In this chapter, after discussing in detail the issue of segmentation and all its po-
tential variants, we present a technique for automatically deriving the boundaries of
a routine by analyzing the UI log that keeps track of its execution, in order to clus-
ter all user actions associated with the routine itself in well-bounded routine traces.
A routine trace represents an execution instance of a routine within a UI log. To be
more precise, as shown in Figure 1, starting from a UI log previously recorded by a
RPA tool and an interaction model representing the expected behavior of a routine per-
formed during an interaction session with the UI, we propose a supervised algorithm
that leverages trace alignment in process mining (Adriansyah et al., 2011; de Leoni and
Marrella, 2017; de Leoni et al., 2018) to automatically identify and extract the routine
traces by the UI log. Such traces are finally stored in a dedicated routine-based log,
which captures exactly all the user actions which happened during many different ex-
ecutions of the routine, thus achieving the segmentation task. By identifying the rou-
tine traces, we are also able to filter out those actions in the UI log that are not part of
the routine under observation and hence are redundant or represent noise. It is worth
noticing that a routine-based log obtained in this way can eventually be employed by
the commercial RPA tools to synthesize executable scripts in form of SW robots that
will emulate the routine behavior.
The rest of the chapter is organized as follows. Section 11.2 introduces a running
example that will be used to explain our technique. Section 11.3 describes the rel-
evant background on interaction models and UI logs. Section 11.4 illustrates the
concept of segmentation and all its peculiarities. Section 11.5 presents the details of
our technique to the automated segmentation of UI logs. Finally, Section 11.6 dis-
cusses the related work, while Section 11.7 draws conclusions and outlines future
works.
is complete a priori knowledge of the specific routines that are enacted on the UI and
of their concrete composition (this may happen only if the exact sequence of user ac-
tions required to achieve the routines’ targets on the UI is recorded in the context of
controlled training sessions), their automated identification from a UI log is challeng-
ing, since the associated user actions may be scattered across the log, interleaved with
other actions that are not part of the routine under analysis, and potentially shared by
many routines.
11.3 Preliminaries
In this section, we present some preliminary concepts used throughout the chapter.
In Section 11.3.1, we describe the Petri Net modeling language, which will be used
to formally specify the interaction models required to represent the structure of the
routines of interest, while in Section 11.3.2 we introduce the notion of UI log.
agrams (Sutcliffe and Wang, 1991), and ConcurTaskTrees (CTT) (Mori et al., 2002). Tex-
tual notations include regular expressions (van Den Bos et al., 1983), Linear Tempo-
ral Logic (LTL) (Pnueli, 1977), Communicating Sequential Processes (CSPs) (Dignum,
2004), GOMS (John and Kieras, 1996), modal action logic (Campos et al., 2016), and
BNF and production rules (Feary, 2010).
While there are major differences in expressive power between different nota-
tions, an increased expressive power is not always desirable as it may suggest a
harder to understand description, i. e., the dialog of a UI can become unmanageable
(Dix et al., 2004). To guarantee a good trade-off between expressive power and under-
standability of the models, we decided to use Petri Nets for their specification. Petri
Nets have proven to be adequate for defining interaction models (Dix et al., 2004;
Palanque and Petri, 1995; Marrella and Catarci, 2018). They may contain exclusive
choices, parallel branches, and loops, allowing the representation of extremely com-
plex behaviors in a very compact way. Last but not least, Petri Nets provide a formal
semantics, which allows to interpret the meaning of an interaction model unambigu-
ously.
From a formal point of view, a Petri Net W = (P, T, S) is a directed graph with a
set P of nodes called places and a set T of transitions. The nodes are connected via
directed arcs S ⊆ (P × T) ∪ (T × P). Connections between two nodes of the same type
are not allowed. Places are represented by circles and transitions by rectangles. Fig-
ures 3 and 4 illustrate the Petri Nets used to represent the interaction models of R1
and R2. Transitions are associated with labels reflecting the user actions (e. g., system
commands executed, buttons clicked, etc.) required to accomplish a routine on the UI.
For example, a proper execution of R1 requires a path on the UI made by the following
user actions:
– loginMail, to access the client e-mail;
– accessMail, to access the specific e-mail with the travel request;
– downloadAttachment, to download the Excel file including the travel request;
– openWorkbook, to open the Excel spreadsheet;
– openGoogleForm, to access the Google Form to be filled;
– getCell, to select the cell in the i-th row of the Excel spreadsheet;
– copy, to copy the content of the selected cell;
– clickTextField, to select the specific text field of the Google form where the content
of the cell should be pasted;
– paste, to paste the content of the cell into the corresponding text field of the
Google form;
– formSubmit, to press the button to finally submit the Google form to the internal
database.
Note that, as shown in Figure 3, the user actions openWorkbook and openGoogleForm
can be performed in any order. Moreover, the sequence of actions ⟨getCell, copy,
clickTextField, paste⟩ will be repeated for any travel information to be moved from
the Excel spreadsheet to the Google form. On the other hand, the path of user actions
in the UI to properly enact R2 is as follows:
– loginMail, to access the client e-mail;
– accessMail, to access the specific e-mail with the request for travel insurance;
– clickLink, to click the link included in the e-mail that opens the Google form with
the request to activate the travel insurance on a web browser;
– approveRequest, to press the button on the Google form that approves the re-
quest;
– rejectRequest, to press the button on the Google form that rejects the request.
sitions, drawn with a black-filled rectangle, are said to be “invisible,” and are not
recorded in the UI logs (cf. Inv1, Inv2, and Inv3).
To understand our segmentation technique based on trace alignment in process
mining, we also need to briefly illustrate the dynamic behavior of a Petri Net, i. e.,
its operational semantics. Given a transition t ∈ T, ∙ t is used to indicate the set of
input places of t, which are the places p with a directed arc from p to t (i. e., such that
(p, t) ∈ S). Similarly, t ∙ indicates the set of output places, namely, the places p with
a direct arc from t to p. At any time, a place can contain zero or more tokens, drawn
as black dots. The state of a Petri Net, i. e., its marking, is determined by the number
of tokens in places. Therefore, a marking m is a function m : P → ℕ. In any run
of a Petri net, the number of tokens in places may change, i. e., the Petri Net marking.
A transition t is enabled at a marking m iff each input place contains at least one token,
i. e., ∀ p ∈ ∙ t, m(p) > 0. A transition t can fire at a marking m if and only if it is enabled.
As a result of firing a transition t, one token is “consumed” from each input place and
t
one is “produced” in each output place. This is denoted as m → m . In the remainder,
σ
given a sequence of transition firing σ = ⟨t1 , . . . , tn ⟩ ∈ T , m0
∗
→ mn is used to indicate
t1 t2 tn
m0 → m1 → . . . → mn , i. e., mn is reachable from m0 .
Since the executions of a routine have a start and a end, the interaction models
represented through Petri Nets need to be associated with an initial and final marking.
For example, in both routines of Figures 3 and 4, the markings with respectively one to-
ken in place start or in place end are the initial and final marking (and no tokens in any
other place). In the remainder of this paper, we assume all Petri Nets to be 1-bounded.
A Petri Net is 1-bounded if in any reachable marking from the initial marking, no place
ever contains more than 1 token. One-boundedness is not a large limitation as the be-
havior allowed by interaction models can be represented as 1-bounded Petri Nets (Dix
et al., 2004; Marrella and Catarci, 2018).
11.3.2 UI logs
A single UI log in its raw form consists of a long sequence of user actions recorded dur-
ing one user session.1 Such actions include all the steps required to accomplish one
or more relevant routines using the UI of one or many SW applications. For instance,
in Figure 5, we show a snapshot of a UI log captured using a dedicated action log-
ger2 during the execution of R1 and R2. The employed action logger enables to record
the events that happened on the UI, enriched with several data fields describing their
“anatomy.” For a given event, such fields are useful to keep track of the name and the
1 We interpret a user session as a group of interactions that a single user takes within a given time
frame on the UI of a specific computer system.
2 The working of the action logger is described in Agostinelli et al. (2020). The tool is available at
https://github.com/bpm-diag/smartRPA
208 | S. Agostinelli et al.
timestamp of the user action performed on the UI, the involved SW application, the
human/SW resource that performed the action, etc.
For the sake of understandability, we assume here that any user action associated
to each event recorded in the UI log is mapped at most with one (and only one) Petri
Net transition, and that the collection of labels associated to the Petri Net transitions
is defined over the same alphabet as the user actions in the UI log,3 i. e., the alphabet
of user actions in the UI log is a superset of that used for defining the labels of Petri Net
transitions. In the running example, we can recognize in R1 and R2 a universe of user
actions of interest Z = {A, B, C, D, E, F, G, H, I, L, M, N, O}, such that A = loginMail, B =
accessMail, C = downloadAttachment, D = openWorkbook, E = openGoogleForm,
F = getCell, G = copy, H = clickTextField, I = paste, L = formSubmit, M = clickLink,
N = approveRequest, and O = rejectRequest.
As shown in Figure 5, a UI log is not specifically recorded to capture pre-identified
routines. A UI log may contain multiple and interleaved executions of one or many
routines (cf. in Figure 5 the blue/red boxes that group the user actions belonging to R1
and R2, respectively), as well as redundant behavior and noise. We consider as redun-
dant any user action that is unnecessarily repeated during the execution of a routine,
e. g., a text value that is first pasted in a wrong field by mistake and then is moved in
the right place through a corrective action on the UI. On the other hand, we consider
as noise all those user actions that do not contribute to the achievement of any routine
target, e. g., a window that is resized. In Figure 5, the sequences of user actions that
are not surrounded by a blue/red box can be safely labeled as noise.
Based on the foregoing, our segmentation technique aims at extracting from the
UI log all those user actions that match a distinguishable pattern as represented by the
interaction model of a generic routine R, filtering out redundant actions and noise. To
be more specific, any sequence of user actions in the UI log that can be replayed from
3 In de Leoni and Marrella (2017), it is shown how these assumptions can be removed.
11 Automated segmentation of user interface logs | 209
the initial to the final marking of the Petri Net-based interaction model of R is said to
be a routine trace of R, i. e., a complete execution instance of R within the UI log. For
example, a valid routine trace of R1 is ⟨A, B, C, D, E, F, G, H, I, L⟩. The interaction model
of R1 suggests that valid routine traces are also those ones where (1) A is skipped (if the
user is already logged in the client e-mail); (2) the pair of actions ⟨D, E⟩ is performed
in reverse order; (3) the sequence of actions ⟨F, G, H, I⟩ is executed several times be-
fore submitting the Google form. On the other hand, two main routine traces can be
extracted from R2: ⟨A, B, M, N⟩ and ⟨A, B, M, O⟩, again with the possibility to skip A,
i. e., the access to the client e-mail. Note that within a routine trace, the concept of
time is usually defined in a way that user actions in a trace are sorted according to the
timestamp of their occurrence.
We conclude this section by introducing the concept of routine-based log as a spe-
cial container that stores all the routine traces extracted by a UI log and associated to
a generic routine R. Thus, the final outcome of our segmentation technique will be a
collection of as many routine-based logs as are the interaction models of the routines
of interest.
11.4 Segmentation
Given a UI log consisting of events including user actions having the same granular-
ity4 and potentially belonging to different routines, in the RPA domain segmentation
is the task of clustering parts of the log together which belong to the same routine.
In a nutshell, the challenge is to automatically understand which user actions con-
tribute to which routines, and organize such user actions in well-bounded routine
traces Agostinelli et al. (2019), Leno et al. (2020b).
As shown in Section 11.3.2, in general a UI log stores information about several
routines enacted in an interleaved fashion, with the possibility that a specific user
action is shared by different routines. Furthermore, actions providing redundant be-
havior or not belonging to any of the routine under observation may be recorded in the
log, generating noise that should be filtered out by a segmentation technique. We can
distinguish among three main forms of UI logs, which can be categorized according
to the fact that (1) any user action in the log exclusively belongs to a specific routine;
(2) the log records the execution of many routines that do not have any user action in
common; (3) the log records the execution of many routines, and the possibility exists
that some performed user actions are shared by many routines at the same time. In
the following, we analyze in detail case by case.
4 The UI logs created by generic action loggers usually consist of low-level events associated one-by-
one to a recorded user action on the UI (e. g., mouse clicks, etc.). We will discuss the abstraction issue
in Section 11.6, where state-of-the-art techniques are shown that enable to flatten the content of a log
to a same granularity level.
210 | S. Agostinelli et al.
– Case 1: This is the case when a UI log captures many executions of the same rou-
tine. Of course, in this scenario it is not possible to distinguish between shared
and non-shared user actions by different routines, since the UI log keeps track
only of executions associated to a single routine.
Starting from our running example in Section 11.2, let us consider the simplest
case of a UI log U that records a sequence of user actions resulting from many non-
interleaved executions of R1: U = {A11 , B11 , C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 , . . . , A12 ,
B12 , C12 , D12 , E12 , F12 , G12 , H12 , I12 , L12 }. For the sake of understandability, we use
a numerical subscript ij associated to any user action to indicate that it be-
longs to the j-th execution of the i-th routine under study. Of course, this in-
formation is not recorded in the UI log, and discovering it (i. e., the identifi-
cation of the subscripts) is one of the “implicit” effects of segmentation when
routine traces are built. Applying a segmentation technique to the above UI
log would trivially produce a routine-based log UR1 where the (already well-
bounded) executions of R1 are organized as different routine traces: UR1 =
{⟨A11 , B11 , C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 , ⟩, . . . , ⟨A12 , B12 , C12 , D12 , E12 , F12 , G12 , H12 , I12 ,
L12 ⟩}.
The same routine-based log UR1 would be obtained when the executions of R1 are
recorded in an interleaved fashion in the UI log, e. g., U = {A, B11 , B12 , C11 , D11 , C12 ,
D12 , E12 , F12 , G12 , H12 , I12 , L12 , E11 , F11 , G11 , H11 , I11 , L11 , . . .}. Here, the segmentation
task becomes more challenging, not only because the user actions of different
executions of a same routine are interleaved among each others, and it is not
known a priori to which execution they belong, but also for the presence of some
user actions that potentially belong at the same time to many executions of the
routine itself. This is the case of A (that corresponds to loginMail), which can be
performed exactly once at the beginning of a user session and can be “shared” by
many executions of the same routine.
Another variant is when the execution of a routine is affected by noise or redun-
dant actions. For example, let us consider the following UI log recorded after many
executions of R1: U = {A11 , B11 , C11 , Y1 , D11 , E11 , F11 , G11 , G11 , G11 , H11 , I11 , L11 , . . . , A12 ,
Yn−1 , B12 , C12 , D12 , E12 , Yn , F12 , G12 , H12 , I12 , I12 , I12 , L12 }. This log contains elements of
noise, i. e., user actions Yk∈{1,n} ∈ Z (recall that Z is the universe of user actions
allowed by a UI log, as introduced in Section 11.3.2) that are not allowed by R1, and
redundant actions like G11 (copy action) and I12 (paste action) that are unneces-
sarily repeated multiple times. Noise and redundant actions need to be filtered out
during the segmentation task because they do not contribute to the achievement
of the routine’s target.
– Case 2: In this case, a UI log captures many executions of different routines, with
the assumption that the interaction models of such routines include only transi-
tions associated to user actions that are exclusive for those routines. For example,
let us suppose that in both interaction models of R1 and R2 the transitions A and B
11 Automated segmentation of user interface logs | 211
are not required, and the UI log is as follows: U = {C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 ,
M21 , N21 , . . . , C12 , D12 , E12 , F12 , G12 , H12 , I12 , L12 , M22 , O22 }. The output of the segmenta-
tion task would consist of two routine-based logs, one per routine, which include
the following routine traces:
– UR1 = {⟨C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 ⟩, . . . , ⟨C12 , D12 , E12 , F12 , G12 , H12 , I12 , L12 ⟩};
– UR2 = {⟨M21 , N21 ⟩, . . . , ⟨M22 , O22 ⟩}.
Similarly to what was already seen in Case 1, it may happen that many executions
of the same routine (and, in this case, also of many different routines) are inter-
leaved among each other, and that noise and redundant actions are also recorded
in the log. Since we are assuming that there are no shared actions among different
routines, the complexity of the segmentation task in the presence of interleaved
actions, noise, and redundancy can be reduced to the case of a single routine; cf.
Case 1.
– Case 3: In this case, a UI log captures many executions of different routines, and
there exist user actions that are shared by such routines. This case perfectly re-
flects what happens in the running example of Section 11.2. Let us consider the fol-
lowing UI log: U = {A, B, C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 , B, M21 , N21 , . . . , B, C12 , D12 ,
E12 , F12 , G12 , H12 , I12 , L12 , B, M22 , O22 }, where A and B are shared by R1 and R2, as they
are included in the interaction models of both routines. By analyzing the log, it can
be noted that A is potentially involved in the enactment of any execution of R1 and
R2, while B is required by all executions of R1 and R2, but the association between
the single executions of B and the routine executions they belong to is not clear.
The complexity of the segmentation task here lies in understanding to which rou-
tine traces the execution of A and B belong. The outcome of the segmentation task
will be a pair of routine-based logs generated as follows:
– UR1 = {⟨A, B11 , C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 ⟩, . . . , ⟨A, B12 , C12 , D12 , E12 , F12 , G12 ,
H12 , I12 , L12 ⟩};
– UR2 = {⟨A, B21 , M21 , N21 ⟩, . . . , ⟨A, B22 , M22 , O22 ⟩}.
Consider that while A can belong to some routine executions and not to others,
making it impossible to understand to which exact routine execution it can be
associated, in the case of B it is important to identify the association between its
i-th execution and the specific routine execution it belongs to.
The above cases have in common that all the user actions are stored within a single UI
log. It may happen that the same routine is spread across multiple UI logs, in particu-
lar when there are multiple users that are involved in the execution of the routine on
different computer systems. This case can be tackled by “merging” the UI logs where
the routine execution is distributed into a single UI log, reducing the segmentation
issue to one of the already analyzed cases.
212 | S. Agostinelli et al.
Definition 11.5.1 (Alignment moves). Let W = (P, T, S) be a Petri Net and let U be a UI
log. A legal alignment move for W and U is represented by a pair (qU , qW ) ∈ (T∪{≫}×T∪
{≫}) \ {(≫, ≫)} such that:
– (qU , qW ) is a move in log if qU ≠ ≫ and qW = ≫;
– (qU , qW ) is a move in model if qU =≫ and qW ∈ T;
– (qU , qW ) is a synchronous move if qU = qW .
Definition 11.5.2 (Alignment). Let W = (P, T, S) be a Petri Net with an initial marking
and final marking denoted with mi and mf . Let also U be a UI log. Let ΓW be the uni-
verse of all alignment moves for W and U. Sequence γ ∈ Γ∗W is an alignment of W and
U if, ignoring all occurrences of ≫, the projection on the first element yields U and the
σ
projection on the second yields a sequence σ ∈ T ∗ such that mi → mf .
A move in log for a transition t indicates that t occurred when not allowed; a move
in model for a visible transition t indicates that t did not occur when, conversely, ex-
pected. Many alignments are possible for the same UI log and a Petri Net. For exam-
ple, Figure 6 shows two possible alignments for a UI log consisting of the following
sequence of user actions ⟨A, B, M, N⟩ and the Petri Net in Figure 4, representing the
interaction model of R2. Note how moves are represented vertically. For example, as
shown in Figure 6, the first move of γ1 is (A, A), i. e., a synchronous move of A, while
the first and second moves of γ2 are a move in log and model, respectively. We aim at
finding a complete alignment of U and W with minimal number of deviations (i. e.,
of moves in log/model) for visible transitions, also known in the literature as opti-
mal alignments. With reference to the alignments in Figure 6, γ1 has four synchronous
moves and γ2 has one move in log for visible transitions and one move in model for the
invisible transition Inv3 (that does not count for the computation of the fitness value).
As a consequence, γ1 is an optimal alignment and can be returned. Note that its fit-
ness value is exactly equal to 1, since it consists only of synchronous moves enabling
U to be completely replayed from the initial to the final marking of W. For the sake of
simplicity, we are assuming here that all the deviations have the same severity. How-
ever, the severity of a deviation can be customized on an ad hoc basis (de Leoni and
Marrella, 2017).
A B M N
γ1 =
A B M N
A ≫ B M N
γ2 =
≫ Inv3 B M N
Figure 7: Overview of the general approach underlying the proposed segmentation technique.
The algorithm takes as input a UI log U and a set of interaction models Wset and returns
a set of routine-based logs Uset . For each interaction model w ∈ Wset (one for each
routine of interest) represented as Petri Nets, the algorithm performs the following
steps:
1. Filtering: The filtering phase is used to filter out noisy actions from the UI log.
Specifically, for each interaction model w ∈ Wset , a local copy of the UI log U w
is created (line 3). Then, all user actions that appear in U w but that cannot be
replayed by any transition of w are removed from U w . The output of this step is
a model-based filtered UI log Uϕw (line 4). Working with Uϕw rather than with U w
will allow us to apply the trace alignment technique neglecting all the potential
moves in the log with user actions that could never be replayed by w. As a con-
sequence, this will drastically reduce the number of alignment steps required to
find optimal alignments, and at the same time optimize the performance of the al-
gorithm. Before moving to the next step, a new routine-based log URw is initialized
(line 5).
2. Trace alignment: The second step consists of applying the trace alignment tech-
nique discussed in Section 11.5.1 for any interaction model w ∈ Wset and its asso-
ciated model-based filtered UI log Uϕw . This enables to extract from Uϕw all those
user actions that match a distinguishable pattern with w in the form of an opti-
mal alignment γ opt (line 7). Trace alignment allows to pinpoint the synchronous
moves between Uϕw and w. If they exist, the user actions involved in synchronous
opt
moves are extracted and stored into γsm (line 8). Note that focusing just on syn-
11 Automated segmentation of user interface logs | 215
chronous moves allows us to exclude all redundant user actions from the analysis.
Then, the algorithm:
(a) creates a trace τsm consisting of the user actions associated with the syn-
opt
chronous moves stored in γsm (line 10);
w
(b) creates a (temporary) UI log Usm containing only the trace τsm (line 11),
which is required to properly run (again) trace alignment;
w
(c) performs a new alignment between Usm and w with the goal to compute the
fitness value (line 12).
w
In the case the fitness value is equal to 1, this means that Usm (and, consequently,
τsm ) can be replayed from the start to the final marking of w, making τsm a valid
routine trace of w. In such a case, τsm is stored into URw (line 14) and all the events
associated to the synchronous moves in τsm are removed by Uϕw (line 18). On the
contrary, a fitness value lower than 1 indicates the presence of at least one move
216 | S. Agostinelli et al.
in the model in τsm with respect to w, i. e., τsm cannot be completely replayed by
w and is not a valid routine trace, meaning that we can discard it (line 16).
opt
The above two steps can be repeated until γsm is not empty (line 20), i. e., until there
are synchronous moves in the computed alignment. At the end of the iteration, the
routine-based log URw is stored into Uset (line 21), and the algorithm starts to analyze
the next interaction model into Wset . In conclusion, the algorithm computes a number
of routine-based logs equal to the number of interaction models under study.
It is worth to notice that: (i) for the computation of the trace alignment, the algo-
rithm relies on the highly scalable planning-based alignment technique implemented
in our previous work (de Leoni and Marrella, 2017), which we have properly cus-
tomized for our purposes; and (ii) the algorithm is able to achieve cases 1, 2, and 3
discussed in Section 11.4, except when there are interleaved executions of shared user
actions by different routines. In that case, the risk exists that a shared user action is
associated to a wrong routine execution, i. e., clustered in a wrong routine trace.
– (line 7): computes the trace alignment between Uϕw and the interaction model of
R1, namely, w;
A B C D E F G G G H I L B ... B
γ opt =
A B C D E F G ≫ ≫ H I L ≫ ... ≫
– (line 8): extracts the synchronous moves from γ opt into γsm opt
;
opt
– (line 9): evaluates to True, as γsm is not empty;
opt
– (line 10): computes the trace τsm starting from γsm , so τsm = ⟨A, B, C, D, E, F, G, H,
I, L⟩;
w
– (line 11): adds the trace τsm in Usm ;
w
– (line 12): computes trace alignment between Usm and w;
A B C D E F G H I L
A B C D E F G H I L
w
Usm can be replayed without deviations from the start to the final marking of w,
meaning a perfect fitness between the log and the interaction model;
– (line 13): evaluates to True, as the fitness of the alignment (cf. line 12) is equal
to 1;
– (line 14): adds τsm in URw , i. e., τsm is recognized as a valid routine trace;
– (line 18): removes all the events associated with the synchronous moves in τsm
from Uϕw ; thus, Uϕw = {G, G, B, . . . , B, C, D, E, F, G, H, I, I, I, L, B};
opt
– (line 20): since γsm is not empty, the algorithm comes back to line 6.
After repeating the above steps from line 7 to line 14, the algorithm discovers a
second routine trace τsm = ⟨B, C, D, E, F, G, H, I, L⟩ and adds it to URw . Like before,
all the events associated with the synchronous moves in τsm are removed from
Uϕw . Thus, Uϕw = {G, G, B, . . . , I, I, B}.
The subsequent iterations of the algorithm do not discover new routine traces for
R1, since the only synchronous moves extracted in the various alignment steps
between w and Uϕw are the Bs, Gs, and Is that are discarded (due to the fitness
opt
value of γsm that is < 1). It is worth to notice that redundant user actions G and I
are removed from Uϕw during these iterations. The algorithm ends to iterate when
opt
γsm is empty, that is, when there are no more synchronous moves to extract;
– (line 21): after the last iteration ends, the routine-based log URw is stored into Uset ,
and the algorithm starts to analyze the interaction model of R2.
The outcome of the segmentation task will be a set of routine-based logs (in this case
two, since the number of interaction models under study is two) generated as follows:
Uset = {{⟨A, B11 , C11 , D11 , E11 , F11 , G11 , H11 , I11 , L11 ⟩, . . . , ⟨B12 , C12 , D12 , E12 , F12 , G12 , H12 , I12 ,
L12 ⟩}, {⟨A, B21 , M21 , N21 ⟩, . . . , ⟨B22 , M22 , O22 ⟩}}.
218 | S. Agostinelli et al.
11.7 Conclusion
To tackle the segmentation challenge, in this chapter we have presented a technique,
coupled with a supervised algorithm, leveraging trace alignment in process mining to
identify sequences of user actions in a UI log that belong to specific routine executions,
clustering them in well-bounded routine traces. Our work is based on a supervised as-
sumption since we know a priori the structure of the routines, namely, the interaction
models. Despite this limitation, we consider this contribution as an important first
step towards the development of a more complete and unsupervised technique to the
segmentation of UI logs.
In this direction, as a future work, we are going to perform a robust evaluation
of the algorithm on synthetic and real-world case studies with heterogeneous UI logs.
In addition, we aim at relaxing the supervised assumption in different ways: (1) by
employing declarative rules (Pesic et al., 2007) rather than Petri Nets to represent in-
teraction models, allowing us to reason over a partial knowledge of the working of
the routines; (2) by investigating sequential pattern mining techniques (Dong, 2009)
to examine frequent sequences of user actions having common data attributes; (3) by
analyzing web log mining techniques (Mobasher and Nasraoui, 2011), whose input is a
set of clickstreams and the goal is to extract sessions where a user engages with a web
application to fulfill a goal; (4) by employing machine learning techniques to automat-
ically identify sequences of user actions associated with a routine execution without
any previous knowledge of the routines’ structure.
Bibliography
Adriansyah A, Sidorova N, van Dongen BF (2011) Cost-based fitness in conformance checking. In: Int
conf on application of concurrency to system design. IEEE, pp 57–66
Agostinelli S, Marrella A, Mecella M (2019) Research challenges for intelligent robotic process
automation. In: Business process management workshops – BPM 2019 int workshops,
pp 12–18
Agostinelli S, Lupia M, Marrella A, Mecella M (2020) Automated generation of executable RPA scripts
from user interface logs. In: Business process management: blockchain and robotic process
automation forum – BPM 2020 blockchain and RPA forum
Baier T, Mendling J, Weske M (2014) Bridging abstraction layers in process mining. Inf Sci
46:123–139
11 Automated segmentation of user interface logs | 221
Leno V, Augusto A, Dumas M, La Rosa M, Maggi FM, Polyvyanyy A (2020a) Identifying candidate
routines for robotic process automation from unsegmented UI logs. In: 2nd international
conference on process mining, ICPM’20, pp 153–160
Leno V, Polyvyanyy A, Dumas M, La Rosa M, Maggi FM (2020b) Robotic process mining: vision and
challenges. Bus Inf Syst Eng
Leopold H, van der Aa H, Reijers HA (2018) Identifying candidate tasks for robotic process
automation in textual process descriptions. In: Int conf on bus proc mod, dev and supp
(BPMDS’18)
Mannhardt F, de Leoni M, Reijers HA, van der Aalst WMP, Toussaint PJ (2018) Guided process
discovery – a pattern-based approach. Inf Syst 76:1–18
Marrella A (2019) Automated planning for business process management. J Data Semant 8(2):79–98
Marrella A, Catarci T (2018) Measuring the learnability of interactive systems using a petri net based
approach. In: 2018 designing interactive systems conf, DIS ’18. ACM, New York, pp 1309–1319.
ISBN 978-1-4503-5198-0
Marrella A, Mecella M, Sardiña S (2018) Supporting adaptiveness of cyber-physical processes
through action-based formalisms. AI Commun 31(1):47–74
Mobasher B, Nasraoui O (2011) Web Usage Mining, Web Data Mining. Exploring Hyperlinks,
Contents, and Usage Data, B. Liu
Mori G, Paternò F, Santoro C (2002) CTTE: support for developing and analyzing task models for
interactive system design. IEEE Trans Softw Eng 28(8)
Palanque PA, Petri RB (1995) Net based design of user-driven interfaces using the interactive
cooperative objects formalism. In: Interactive systems: design, specification, and verification.
Springer, Berlin
Paternò F (1999) Model-based design and evaluation of interactive applications, 1st edn. Springer,
Berlin. ISBN 1852331550
Pesic M, Schonenberg H, van der Aalst WMP (2007) DECLARE: full support for loosely-structured
processes. In: IEEE int enterprise distributed object computing conf (EDOC 2007), pp 287–300
Pnueli A (1977) The temporal logic of programs. In: F. of Comp. Sc
Statecharts DH (1987) A visual formalism for complex systems. Sci Comput Program 8(3):231–274
Sutcliffe AG, Wang I (1991) Integrating human computer interaction with Jackson system
development. Comput J 34(2)
Sy O, Bastide R, Palanque P, Le D, Navarre D (2000) PetShop: a CASE tool for the petri net based
specification and prototyping of CORBA systems. In: Petri nets, vol 2000
van Den Bos J, Plasmeijer MJ, Hartel PH (1983) Input–output tools: a language facility for interactive
and real-time systems. IEEE Trans Softw Eng 3
Wasserman AI (1985) Extending state transition diagrams for the specification of human-computer
interaction. IEEE Trans Softw Eng 8:699–713
Willcocks L (2016) Service automation: robots and the future of work. Steve Brookes Publishing,
Warwickshire, United Kingdom. ISBN 0956414567
Wil M. P. van der Aalst
12 Process mining and RPA
How to pick your automation battles?
Abstract: Robotic process automation (RPA) has lowered the threshold for process au-
tomation. Repetitive tasks done by people are handed over to software robots. For RPA,
there is no need to change or replace the pre-existing information systems. Instead,
software robots replace users by interacting directly with the user interfaces normally
operated by humans. Actually, RPA can be seen as “the poor man’s workflow manage-
ment solution” because it is cheaper than traditional automation. Therefore, it can be
used to automate routine work that would normally not be cost-effective. Process min-
ing plays a key role in deciding what to automate and how. Therefore, RPA is closely
related to process mining. Before introducing RPA, one needs to analyze the processes
to be automated. Process mining can help to identify promising candidates. Moreover,
after RPA has been implemented, process mining can be used to monitor processes
and systems even if these use a mixture of RPA, workers, and traditional automation.
12.1 Introduction
This chapter aims to relate robotic process automation (RPA) and process mining and
put both in a historical context. Workflow management (WFM) has been around for
several decades (van der Aalst and van Hee, 2004). In the mid 1990s, the term straight
through processing (STP) was used to describe the ultimate goal of WFM: making op-
erational processes cheaper, faster, and better by avoiding manual intervention. This
turned out to be challenging and many WFM projects failed. WFM was subsequently
replaced by business process management (BPM), which had a broader scope and
put more emphasis on management aspects (van der Aalst, 2013; Dumas et al., 2013;
Weske, 2007). However, traditional BPM often relied on modeling, leading to a “dis-
connect” with reality. We have all seen the idealized process models expressed in lan-
guages like BPMN that completely failed to capture the real problems. Moreover, the
goal should not be to model, but to improve the process at hand. This often did not
happen because it would be too expensive to change the information systems or the
actual inefficiencies and compliance problems remained invisible.
Some will argue that RPA is not new at all, thereby referring to “screen scraping”
(capturing data by reading text from a computer display and transferring it to a new
Acknowledgement: We thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.
https://doi.org/10.1515/9783110676693-012
224 | W. M. P. van der Aalst
application) and “Taylorism” (i. e., analyzing and improving work processes system-
atically). However, the combination of process mining and RPA provides new ways of
learning and automating routine processes.
The goal of this chapter is not to discuss specific RPA or process mining tech-
niques. Instead, we focus on the relations between both worlds and possible inter-
faces. Therefore, we elaborate on the specifics of event data used in an RPA context.
Moreover, we discuss possible use cases for this combination. These show that pro-
cess mining and RPA complement each other: the former learns about processes and
the latter automates them.
In this chapter, we first sketch the history of process automation (Section 12.2). In
this context, we position RPA as “the poor man’s WFM” in Section 12.3. Then we intro-
duce process mining as a way to exploit event data (Section 12.4). Section 12.5 connects
process mining and RPA by discussing the specifics of RPA-based event data. This sec-
tion shows that many design choices are needed to bridge the gap between both. Sec-
tion 12.6 elaborates on the interplay between both worlds. Section 12.7 concludes the
chapter.
Figure 1: Positioning of WFM/BPM systems in a historical context (based on van der Aalst, 1998,
2013).
interaction (forms, buttons, graphs, etc.) was subcontracted to tools that can auto-
matically generate user interfaces. The trend to subcontract recurring functionality to
generic tools continued in different areas. Workflow management (WFM) systems are
similar to database management (DBM) systems but focus on processes rather than
data. In the mid 1990s, many WFM systems became available. These systems focused
on automating workflows with little support for process analysis, process flexibility,
and process management. Nevertheless, many expected that WFM systems would be
as common as DBM systems. However, this did not happen. WFM systems were suc-
ceeded by business process management (BPM) systems that were broader in scope.
The BPM discipline combines knowledge from information technology and knowl-
edge from management sciences and applies this to operational business processes
(van der Aalst, 2013; Dumas et al., 2013; Weske, 2007). BPM systems are generic soft-
ware systems that are driven by explicit process designs to enact and manage oper-
ational business processes. Examples of BPM systems include the software products
from Pegasystems, Appian, IBM, Bizagi, Oracle, Software AG, TIBCO Software, Boni-
tasoft, Kofax, and Signavio. However, despite the availability of WFM/BPM systems,
process management is not subcontracted to such systems at a scale comparable to
DBM systems. The application of “pure” WFM/BPM systems is still limited to specific
industries such as banking and insurance. However, WFM/BPM technology is often
hidden inside other systems. For example, ERP systems like SAP and Oracle provide
workflow engines. Therefore, the landscape is not so clear. Organizations such as Gart-
ner also invent new terms such as “intelligent business process management suites”
(iBPMSs), yet the actual usage of such systems remains limited.
There seem to be three main reasons why the adoption of WFM/BPM technology
is low.
226 | W. M. P. van der Aalst
The above three obstacles for WFM/BPM explain the current interest in RPA and pro-
cess mining.
Figure 2: People tend to be the glue between different applications (left). RPA does not change the
“back-end” like in traditional automation (compare with Figure 1). Robots interact with the informa-
tion systems as if they are people (right).
multiple information systems, people are often the “glue” between the different parts
(cf. Figure 2). See, for example, the scenario where a user copies address information
from one information system to another one.
Figure 3 further illustrates the positioning of RPA with respect to the traditional
setting and the situation where WFM/BPM software is used. Both RPA and WFM/BPM
automate simple tasks and provide the glue between existing information systems.
WFM/BPM connects to these systems via the “back-end” using APIs. RPA connects
to these systems via the “front-end” using (graphical) user interfaces. In van der Aalst
et al. (2018), the terms “inside-out” and “outside-in” are used for respectively the back-
end WFM/BPM approach and the front-end RPA approach. RPA can be much more
cost-effective than traditional automation because the information systems do not
need to be changed or replaced. RPA can automate various mundane and routine tasks
in the workplace. At the same time, there are some risks. RPA can handle processes
and tasks that are repetitive and deterministic. However, these should require little to
no judgment and have few exceptions. Technical glitches, exceptions, changing user
interfaces, or changing contextual factors provide problems for software robots. There
are also obvious security risks, and the lack of communication may conceal important
issues (e. g., recurring problems are detected too late). Therefore, sometimes it is bet-
ter to only use RPA as an “auto-completion tool” where a human still needs to confirm
the suggested solution. In Auth et al. (2019) the relation between RPA and enterprise
architecture (EA) is discussed in more detail.
228 | W. M. P. van der Aalst
Figure 3: Three situations. (a) Traditional setting. (b) WFM/BPM setting. (c) RPA setting.
Most of the RPA vendors emphasize the link between RPA and artificial intelligence (AI)
and machine learning (ML). Classical RPA applications are rule-based and are basically
programmed by people. More innovative RPA approaches, sometimes called cognitive
RPA, aim to learn from humans by observing repetitive tasks (Houy et al., 2019). For
example, natural language processing (NLP) techniques are used to classify text and
routed to the right resource. Image recognition can be used to recognize a button or an
edit field, and optical character recognition (OCR) can retrieve handwritten text. How-
ever, the examples reported are typically focusing on a single well-defined task (like
classification). Note that it is relatively easy to recognize buttons, etc., and program
actions like clicking such a button and entering a username and password. However,
all of this is done without understanding the semantics of the actions. Moreover, AI
and ML are rarely used for learning dynamic behavior.
In Leopold et al. (2018a), the authors propose an NLP-based approach that auto-
matically identifies and classifies tasks from textual process descriptions as manual,
user, or automated. The goal of the approach is to reduce the effort that is required to
identify suitable candidates for RPA. However, the work highly depends on the pres-
12 Process mining and RPA | 229
Figure 4: Relating RPA and process mining (based on van der Aalst et al., 2018).
230 | W. M. P. van der Aalst
Process mining starts from event data, typically stored in an event log (see Sec-
tion 12.5). An event log views a process from a particular angle. Each event in the
log refers to at least (1) a particular process instance (called a case), (2) an activity,
and (3) a timestamp. There may be additional event attributes referring to resources,
people, costs, etc., but these are optional. With some effort, such data can be extracted
from the information systems used by the organization. For example, an SAP system
may hold thousands of tables with information about hundreds of processes. In real-
life information systems, there may be many possible case identifiers. Therefore, it
is often better to use an intermediate logging format where events may refer to any
number of objects (cf. Definition 3).
Process mining uses such event data to answer a variety of process-related ques-
tions. Process mining techniques such as process discovery, conformance checking,
model enhancement, and operational support can be used to improve performance
and compliance (van der Aalst, 2016). Currently, there are over 30 commercial of-
ferings of process mining software (e. g., Celonis, Disco, ProcessGold, myInvenio,
PAFnow, Minit, QPR, Mehrwerk, Puzzledata, LanaLabs, StereoLogic, Everflow, Time-
linePI, Signavio, and Logpickr). They all can discover so-called directly follows graphs
(DFGs) showing frequencies and bottlenecks. DFGs can be seamlessly simplified by
removing nodes and edges based on frequency thresholds. DFGs are simple and pro-
vide interesting insights, but only provide a starting point. More advanced discovery
algorithms like the inductive miner discover better process models, also showing con-
currency (e. g., Petri Nets, BPMN diagrams, and UML activity diagrams) (van der Aalst,
2016). Typically, four types of process mining are identified (van der Aalst, 2016).
– Process discovery: learning process models from event data. A discovery tech-
nique takes an event log and produces a process model without using additional
information. An example is the well-known Alpha algorithm, which takes an
event log and produces a Petri Net explaining the behavior recorded in the log.
Most of the commercial process mining tools first discover DFGs before conduct-
ing further analysis.
– Conformance checking: detecting and diagnosing both differences and common-
alities between an event log and a process model. Conformance checking can be
used to check if reality, as recorded in the log, conforms to the model and vice
versa. The process model used as input may be descriptive or normative. More-
over, the process model may have been made by hand or learned using process
discovery.
– Process reengineering: improving or extending the model based on event data.
Like for conformance checking, both an event log and a process model are used as
input. However, now, the goal is not to diagnose differences. The goal is to change
the process model. For example, it is possible to repair the model to better re-
flect reality. It is also possible to enrich an existing process model with additional
perspectives. For example, replay techniques can be used to show bottlenecks or
12 Process mining and RPA | 231
resource usage. Process reengineering yields updated models. These models can
be used to improve the actual processes.
– Operational support: directly influencing the process by providing warnings, pre-
dictions, or recommendations. Conformance checking can be done “on-the-fly,”
allowing people to act the moment things deviate. Based on the model and event
data related to running process instances, one can predict the remaining flow
time, the likelihood of meeting the legal deadline, the associated costs, the prob-
ability that a case will be rejected, etc. The process is not improved by changing
the model, but by directly providing data-driven support in the form of warnings,
predictions, and/or recommendations.
All techniques start from the so-called control-flow perspective, which focuses on the
ordering of activities. Then the time perspective (bottlenecks, delays, and frequen-
cies), the data perspective (understanding decisions), and the resource and organiza-
tion perspective (social networks, roles, and authorizations) are added.
Figure 5: To learn processes in an RPA context, we need to record all relevant user interactions. Ac-
tions performed by users (typing, clicking, etc.) can be seen as low-level events.
view may be adequate for control-flow discovery, but is too simple for RPA applications
that lack a clear case notion. Therefore, we introduce so-called object-centric event logs
(van der Aalst, 2019). An event in such a log may refer to any number of objects and
attribute values.
Definition 1 (Universes and events). To define events, we introduce the following uni-
verses:
– 𝕌ei is the universe of event identifiers;
– 𝕌act is the universe of activity names;
– 𝕌time is the universe of timestamps;
– 𝕌ot is the universe of object types (also called classes);
– 𝕌oi is the universe of object identifiers (also called entities);
– type ∈ 𝕌oi → 𝕌ot assigns precisely one type to each object identifier;
– 𝕌omap = {omap ∈ 𝕌ot ↛ 𝒫 (𝕌oi ) | ∀ot∈dom(omap) ∀oi∈omap(ot) type(oi) = ot} is the
universe of all object mappings indicating which object identifiers are included
per type;1
– 𝕌att is the universe of attribute names;
– 𝕌val is the universe of attribute values;
1 𝒫(𝕌oi ) is the powerset of the universe of object identifiers, i. e., objects types are mapped onto sets
of object identifiers. omap ∈ 𝕌ot ↛ 𝒫(𝕌oi ) is a partial function. If ot ∈ ̸ dom(omap), then we assume
that omap(ot) = 0.
12 Process mining and RPA | 233
Definition 2 (Event projection). Given e = (ei, act, time, omap, vmap) ∈ 𝕌event , πei (e) =
ei, πact (e) = act, πtime (e) = time, πomap (e) = omap, and πvmap (e) = vmap.
Consider a event e with πact (e) = “place order” and πtime (e) = “2020-10-07
08:23:19”; πomap (e) ∈ 𝕌ot ↛ 𝒫 (𝕌oi ) maps a subset of object types onto sets of object
identifiers for an event e. For example, πomap (e)(Order) = {o4567 }, πomap (e)(Item) =
{i786 , i888 , i923 }, and πomap (e)(Payments) = 0 (i. e., the place order event e refers to
one order, three items, and no payments). And πvmap (e) ∈ 𝕌att ↛ 𝕌val maps a sub-
set of attribute names onto attribute values. For example, πvmap (e)(cost) = 75 and
πvmap (e)(location) = “Berlin”.
An object-centric event log is a collection of partially ordered events (van der Aalst,
2019). Event identifiers are unique, i. e., two events cannot have the same event iden-
tifier.
Definition 3 (Object-centric event log). Consider the event log L = (E, ⪯E ) with E ⊆
𝕌event and ⪯E ⊆ E × E such that:
– ⪯E defines a partial order (reflexive, antisymmetric, and transitive);
– ∀e1 ,e2 ∈E πei (e1 ) = πei (e2 ) ⇒ e1 = e2 , and
– ∀e1 ,e2 ∈E e1 ⪯E e2 ⇒ πtime (e1 ) ≤ πtime (e2 ).
Object-centric event logs generalize the traditional event log notion where each
event has precisely one case identifier. We can mimic such logs using a special object
type Case ∈ 𝕌ot such that πomap (e)(Case) = 1 for any event e ∈ E. Since traditional
process mining techniques assume this, it is common practice to convert event data
with events referring to a variable number of objects to classical event logs by “flat-
tening” the event data. Assume that we take a specific object type as a case identifier.
If an event has multiple objects of that type, then we can simply create one event for
each object. If an event has no objects of that type, then we simply omit the event. If
an event has precisely one object of the selected type, then we keep that event. Hence,
by selecting an object type as the case identifier, we can “flatten” the log and apply
standard process discovery and conformance checking techniques.
Let us assume that we want an event log L = (E, ⪯E ) in order to apply various
process mining techniques in an RPA setting as described before. How can we get such
2 𝕌att ↛ 𝕌val is the set of all partial functions mapping a subset of attribute names onto the corre-
sponding values.
234 | W. M. P. van der Aalst
an event log in the context of RPA? As illustrated in Figure 6 we cannot directly use the
low-level events and need to aggregate and correlate user interactions.
Figure 6: Low-level user interactions need to be aggregated and correlated to build event logs.
Aggregation
First, we need to decide at what level we would like to record user activities. Examples
of low-level activities include click, double click, select item, type text, copy, paste,
close window, etc. It is possible to see each of these as individual events or they can
be grouped into higher-level events such as filling out a form. It is also possible to think
of hierarchical recordings having multiple levels. Only low-level events can be seen as
atomic. For example, it may take a few minutes to fill out a form in one system while
gathering information from other systems. How to segment low-level events and create
such a hierarchy is situation dependent.
Correlation
Related to aggregation is the topic of correlation. A user may use different systems at
the same time and work on multiple cases. Copying an address from SAP and pasting
the address in a web form are clearly related. However, the user may also simply type
the address in the web form manually (while looking at the SAP screen). Correlation
is often based on comparing values, e. g., the zip code “D-52074” or URL “pads.rwth-
aachen.de” appearing in two different windows. In object-centric event logs, events
can have multiple object identifiers without picking a specific case notion. This pro-
vides the required flexibility. However, the mapping from values and identifiers in the
user interface to event attributes and objects remains something that is application-
12 Process mining and RPA | 235
and situation-dependent. This is unavoidable given the ad hoc nature of low-level user
interaction recordings.
The process sketched in Figure 6 is far from trivial. Earlier, we defined events to
be of the form e = (ei, act, time, omap, vmap) ∈ 𝕌event . The correlation between events
(aggregated or not) needs to take place via omap (i. e., the objects the event is re-
ferring to). For example, events e356 and e412 are related because πomap (e356 )(Zip) =
{“D-52074”} and πomap (e412 )(Zip) = {“D-52074”}. Events may have standard attributes
and object types, e. g., vmap and omap may contain mandatory information on user
name, computer name, window ID, session ID, etc. When aggregating events, it makes
sense to have two times (timestart and timeend ) for each event. Similarly, it may make
sense to split omap and vmap into input and output, i. e., omapin , vmapin , omapout ,
and vmapout . This way one can infer create, read, update, and delete actions in forms.
For example, if omapin (Price) = 500 and omapout (Price) = 600, then we know that
the price was increased by 100. Hence, high-level events could be of the form e =
(ei, act, timestart , timeend , omapin , vmapin , omapout , vmapout ) to better capture the du-
ration, input, and output. However, the resulting log can still be viewed as an object-
centric event log that can be used to generate different flattened event logs depending
on the questions that need to be answered.
The above discussion shows that it is far from trivial to create meaningful event
logs from low-level user interactions. However, this step is essential when deciding on
what to automate.
BPM discipline. The role of RPA in BPM architectures was already elaborated in Houy
et al. (2019). The paper focuses on the use of RPA in public administration (e. g., auto-
matically classifying documents). In Syeda et al. (2020) a review of the state of the art
in RPA and 15 challenges are given. Both papers identify a gap between the inflated ex-
pectations and the actual tool support provided. RPA vendors tend to present general-
purpose artificial intelligence and machine learning techniques as breakthroughs in
process automation. However, process mining shows that even structured processes
like Purchase-To-Pay (P2P) and Order-To-Cash (O2C) tend to be much more complex
than anticipated. Such reality checks are essential to make proper RPA decisions.
To conclude the chapter, we discuss the relationship between process mining and
RPA in more detail using Figure 7. In Figure 7a, the traditional usage of process mining
is described. In this scenario, event data are extracted from the information systems
supporting the process. Workers are not observed directly. In Figure 7b, process min-
ing is applied to event data collected directly from the (graphical) user interfaces, i. e.,
the interactions between workers and information systems are directly recorded. This
scenario is particularly useful in the phase before RPA is introduced. Process mining
can be used to detect routine work that can be automated by mimicking the behavior
of workers. Rather than manually programming robots, process discovery can be used
to configure the robots correctly. In Figure 7c, process mining is used after introducing
RPA. Part of the work formerly done by workers is now done by software robots. In this
scenario, process mining is used to check whether the processes run as planned. If a
software robot malfunctions due to technical glitches, exceptions, changing user in-
terfaces, or changing contextual factors, then this can be detected using conformance
checking techniques. Note that a lack of human oversight of the work produced by
robots constitutes a real risk of catastrophic outcomes. Figure 7d describes the most
advanced scenario. In this scenario, the work is flexibly distributed over workers and
software robots. For example, tasks are initially performed by robots and are escalated
to workers the moment there is a complication of exception. Similarly, workers can
hand off work to robots using an “auto-complete” option. Moreover, the RPA solution
may adapt due to changes in the underlying process (e. g., concept drift).
12.7 Conclusion
Process automation has a long history. WFM and BPM systems have been around for
decades, but their application is limited to high-volume structured processes. RPA
has lowered the threshold for automation. The phrase “RPA is the poor man’s WFM”
(coined in the paper on which this chapter is based) illustrates this. Due to RPA, it
is possible to automate many mundane repetitive routines in an economically viable
manner. Process mining helps to identify process fragments that can be supported us-
ing RPA. This is the reason that process mining and RPA vendors have joined forces.
12 Process mining and RPA | 237
Figure 7: Process mining can be used before and after the introduction of RPA. Robots and workers
use the same (graphical) user interfaces and the role distribution may be flexible and change over
time. Fortunately, process mining provides a holistic view of the processes at hand and the interplay
between robots and workers.
For example, in October 2019, process mining vendor ProcessGold was acquired by
RPA vendor UiPath. Similarly, vendors like Celonis started to support “task mining”
and “action automation” (using the action engine) to boost RPA-related capabilities.
Skan is combining computer vision and machine learning capabilities with process
mining.
According to Deloitte and EY, up to 30 % to 50 % of RPA projects fail, and most
are more expensive and time consuming than planned (Dutta et al., 2016; Wright
et al., 2017). Process mining can be used to avoid such failures. As Figure 4 shows,
the scope of process mining includes everything from routine activities and processes
automated using WFM, BPM, and RPA to one-of-a-kind activities and processes that
require human interventions and creativity. Moreover, process mining helps to sup-
port the different phases of RPA as highlighted in Figure 7.
Hence, there is huge potential. However, many challenges need to be addressed.
Actually, the uptake of RPA triggers many interesting research questions.
– What event data to store and how to structure these? Computer vision, image recog-
nition, OCR, and NLP can be used to capture events. However, how to add seman-
tics and how to decide that event are relevant for the process.
238 | W. M. P. van der Aalst
Process mining plays a key role in answering these questions and can be placed in a
larger context where work is distributed among machines and people.
The frontier between the tasks performed by humans and those performed by ma-
chines and algorithms is continuously moving and changing global labor markets. In
Hawksworth et al. (2018) three waves of automation (algorithmic, augmentation, and
autonomous) are predicted to replace much of the work previously done by people. In
Frey and Osborne (2017), Frey and Osborne predict the degree of computerization for
702 occupations. They estimate that 47 % of jobs in the US will be replaced by (soft-
ware) robots. In Leopold et al. (2018b) three types of roles are identified: stable roles
(work that remains), new roles (new types of work that did not exist before), and re-
dundant roles (work that is taken over by, e. g., robots). These broader trends highlight
the economic and social impact of RPA and process mining.
Bibliography
Auth G, Czarnecki C, Bensberg F (2019) Impact of robotic process automation on enterprise
architectures. In: Draude C, Lange M, Sick B (eds) INFORMATIK 2019. Lecture Notes in
Informatics, vol 295. GI, pp 59–65
Dumas M, La Rosa M, Mendling J, Reijers H (2013) Fundamentals of business process management.
Springer, Berlin
Dutta D, Gillard A, Kaczmarskyj G (2016) Get ready for robots: why planning makes
the difference between success and disappointment. Ernst and Young. https://
eyfinancialservicesthoughtgallery.ie/wp-content/uploads/2016/11/ey-get-ready-for-robots.
pdf
Ellis CA (1979) Information control nets: a mathematical model of office information flow. In:
Proceedings of the conference on simulation, measurement and modeling of computer
systems. ACM Press, Boulder, Colorado, pp 225–240
12 Process mining and RPA | 239
Frey CB, Osborne MA (2017) The future of employment: how susceptible are jobs to computerisation?
Technol Forecast Soc Change 114(C):254–280
Gao J, van Zelst SJ, Lu X, van der Aalst WMP (2019) Automated robotic process automation: a
self-learning approach. In: Panetto H, Debruyne C, Hepp M, Lewis D, Ardagna CA, Meersman
R (eds) On the move to meaningful Internet systems, international conference on cooperative
information systems (CoopIS 2019). Lecture Notes in Computer Science, vol 11877. Springer,
Berlin, pp 95–112
Geyer-Klingeberg J, Nakladal J, Baldauf F, Veit F (2018) Process mining and robotic process
automation: a perfect match. In: Proceedings of the industrial track at the 16th international
conference on business process management (BPM 2018), pp 124–131
Hawksworth J, Berriman R, Goel S (2018) Will robots really steal our jobs? An international analysis
of the potential long term impact of automation. Technical report, PricewaterhouseCoopers
Houy C, Hamberg M, Fettke P (2019) Robotic process automation in public administrations. In:
Michael R, Sebastian H, Ratz D, Richter D, Schweighofer E (eds) Digitalisierung von Staat und
Verwaltung. Lecture Notes in Informatics, vol 291. GI, pp 62–74
Leno V, Polyvyanyy A, Dumas M, La Rosa M, Maggi FM (2020) Robotic process mining: vision and
challenges. Bus Inf Syst Eng
Leopold TA, Ratcheva V, Zahidi S (2018b) The future of jobs report. Technical report, Centre for the
New Economy and Society, World Economic Forum
Leopold H, van der Aa H, Reijers HA (2018a) Identifying candidate tasks for robotic process
automation in textual process descriptions. In: Gulden J, Reinhartz-Berger I, Schmidt R,
Guerreiro S, Guédria W, Bera P (eds) Enterprise, business-process and information systems
modeling. Springer, Berlin, pp 67–81
Syeda R, Suriadia S, Adamsa M, Bandaraa W, Leemans S, Ouyang C, ter Hofstede A, van de Weerd I,
Wynn M, Reijers H (2020) Robotic process automation: contemporary themes and challenges.
Comput Ind 115(1):103162
van der Aalst WMP (1998) The application of Petri nets to workflow management. J Circuits Syst
Comput 8(1):21–66
van der Aalst WMP (2013) Business process management: a comprehensive survey. ISRN Softw Eng
1–37. https://doi.org/10.1155/2013/507984
van der Aalst WMP (2016) Process mining: data science in action. Springer, Berlin
van der Aalst WMP (2019) Object-centric process mining: dealing with divergence and convergence
in event data. In: Ölveczky PC, Salaün G (eds) Software engineering and formal methods (SEFM
2019). Lecture Notes in Computer Science, vol 11724. Springer, Berlin, pp 3–25
van der Aalst WMP, van Hee KM (2004) Workflow management: models, methods, and systems. MIT
Press, Cambridge, MA
van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng
60(4):269–272
Weske M (2007) Business process management: concepts, languages, architectures. Springer,
Berlin
Wright D, Witherick D, Gordeeva M (2017) The robots are ready. Are you? Untapped advantage in your
digital workforce. Deloitte. https://www2.deloitte.com/uk/en/pages/consulting/articles/the-
robots-are-ready-are-you.html
|
Part IV: RPA applications
Christian Langmann and Julia Kokina
13 RPA in accounting
Abstract: Finance and accounting are the leading areas for the implementation of
robotic process automation (RPA). Next to other technologies RPA is a core driver of
the digitalization of accounting. However, academic research in this area is still lim-
ited, especially on the adoption of RPA in corporate accounting settings. Therefore,
this chapter reviews existing academic research on RPA in accounting settings and
provides insights into the suitability of the various processes in accounting and man-
agement accounting for RPA. Finally, we look at the future impact that RPA will likely
have on the role of corporate accountants.
https://doi.org/10.1515/9783110676693-013
244 | C. Langmann and J. Kokina
verse insights from literature targeting accounting practitioner and academic audi-
ences. Our chapter is structured as follows:
– Section 13.2: In this section, we first analyze publications in academic journals
focused on the various aspects of RPA implementation. We highlight that much
of the published work on the topic has been in the area of auditing and public
accounting in the US context, with a slight focus on RPA implementation in cor-
porate settings.
– Section 13.3: Based on the identified shortcomings from the literature review, we
identify broad characteristics of accounting processes that make them good can-
didates for RPA. Further, we discuss the differences between financial and man-
agerial accounting and position these areas alongside two dimensions of task ana-
lyzability and exception quantities using Perrow’s framework. Finally, we provide
some examples of specific accounting tasks that organizations have automated
with RPA.
– Section 13.4: In this section, we present RPA process suitability via visualizations
using heatmaps that was discussed on a broad theoretical basis in Section 13.3.
We highlight a separate heatmap for processes within financial and managerial
accounting. We underscore that process suitability for RPA is determined at a more
granular sub-process level as opposed to automating a process in its entirety.
– Section 13.5: We discuss the RPA-enabled changing roles of accountants that in-
volve a shift from being a scorekeeper mainly focusing on transaction processing
and compliance to becoming a valued strategic advisor and business partner. To
provide a real-world example, we describe future management accounting roles
at BASF. In addition, we address the need for accountants’ digital upskilling in
order to successfully work with the new technologies.
– Section 13.6: We conclude with providing key takeaways from our chapter and a
future outlook on RPA in accounting. The impact of RPA on the role and skills
of future accountants provides further research opportunities, especially when
looking at the combination of RPA with other cognitive advanced digitalization
technologies.
can be classified as structured which makes them good candidates for automation.
Moffitt et al. (2018) report that repetitive audit tasks in areas such as reconciliations,
testing of internal controls, and substantive testing can be automated. Furthermore,
the role of the auditor would shift from mainly performing data collection, processing,
and analysis to evaluating the audit procedures (Moffitt et al., 2018). As it relates to
RPA implementation in audit, they emphasize the importance of the validity of both
RPA tools and the data, ensuring proper validity checks and segregation of duties,
the need to automate the processing of notable items generated by RPA tools, and
the need for privacy and security considerations in order to manage digital audit evi-
dence.
Huang and Vasarhelyi (2019) introduce a four-stage framework for RPA implemen-
tation in audit practice and present the outcomes of a pilot project that automates the
confirmation process. The RPA-enabled confirmation process occurs by first logging
into the electronic confirmation platform, sending confirmation requests, extracting
account balances, and downloading the final confirmation (Huang and Vasarhelyi,
2019). The results are then compared to the same confirmation process performed
manually to ensure a complete match for accuracy. This paper showcases the feasi-
bility of RPA implementation for certain audit tasks without introducing additional
detection or audit risks while decreasing the number of hours spent on the process.
By introducing artificial intelligence (AI) to RPA, Zhang (2019) presents a frame-
work for intelligent process automation (IPA) for audits. IPA encompasses a suite of
technologies that can be found on the continuum between RPA and cognitive automa-
tion, technologies that can automate tasks using structured data as well as unstruc-
tured data for inference involving processes (Lacity and Willcocks, 2017). As it relates
to auditing, Zhang (2019) describes potential opportunities for IPA use in the audits of
pensions (by using natural language processing [NLP] or computer vision to organize
digital pension plans) and inventory (by using drones to scan RFID tags and an AI tool
to analyze images). Further evidence is needed to ascertain whether IPA can or should
be implemented in actual audit engagements.
Moving beyond conceptual work, Tiberius and Hirth (2019) conduct an explor-
atory survey of experts in a two-round Delphi study in Germany to generate the most
likely scenario with regard to a broad array of technological trends in auditing for 5–10
years into the future. In terms of RPA-related predictions, the study reports that 93 % of
respondents agreed that routine audit tasks will be automated, thus relieving auditors
to focus more on more challenging judgment encompassing work. Interestingly, the
overall expert impression is that they do not foresee significant disruptive changes
caused by the advancements in technology influencing auditing practice in the near
future.
Highlighting the importance of engaging with professionals, Manita et al. (2020)
report results of interviews with experienced auditors of the five largest firms in
France. They suggest that digitalization will make audit more relevant and improve
its value proposition by removing the need to manually perform repetitive tasks, thus
13 RPA in accounting | 247
and technology roles, they thematically organize the skills and competencies spe-
cific to RPA implementation alongside the following five roles: Identifier, Explainer,
Trainer, Sustainer, and Analyzer. They find that the work of accountants is transition-
ing from “doing” to “reviewing” and that accountants are uniquely positioned to serve
as subject matter experts or Explainers who can communicate to bot developers in
great detail the steps and internal controls of a particular process or task. In addi-
tion, accountants can successfully fulfill the Sustainer role, in which they manage bots
and monitor the environment for changes and determine whether the IT organization
needs to be notified in order to make those changes in bot code.
Oesterreich et al. (2019) also look within organizations to determine how the role
of a controller has changed as a result of automation. They report that controllers’
roles have become more data-driven and that data science and IT skills are central to
their role in addition to being able to fulfill the role of a strategic business partner.
In sum, the literature review shows that much of the published work on RPA has
been in the area of auditing and public accounting in the US context, but only few
studies have looked at RPA in corporate accounting settings. As a result, we analyze
the characteristics of (corporate) accounting processes that make them good candi-
dates for RPA in the next section.
In order to apply Perrow’s framework to accounting processes, a closer look at the ac-
counting discipline itself is recommended. The accounting discipline is made up of
various branches, not just one. The two major branches are management accounting
and financial accounting, further branches are tax accounting and auditing. Manage-
ment accounting and financial accounting are comprised of different processes and
tasks that fulfill the information needs of different stakeholders. Financial account-
ing has the primary responsibility of preparing financial statements through book-
keeping processes in accordance with law, rules, standards, and regulations to com-
municate this information to parties outside the organization. Instead, management
accounting is not governed by any statue and covers key processes such as strategic
and operational planning (budgeting), forecasting, and management reporting, with
the primary focus on the information needs of the internal decision makers like the
management (Libby et al., 2020).
As a result, the nature of management accounting tasks differs from financial ac-
counting tasks. While the two disciplines contain both routine and non-routine tasks,
research implies that financial accounting tasks are generally to a greater extent struc-
tured with fewer exceptions, and therefore tend to experience higher routineness than
management accounting tasks. For example, Alix et al. (1996) note that bookkeeping
as central part of financial accounting “[. . . ] is a highly structured, repetitive part of
accounting” (Alix et al., 1996, 375) and Moffitt et al. (2018) point out that “[. . . ] tasks as-
sociated with payroll, accounts payable, and accounts receivable are often mundane
and recurring [. . . ]” (Moffitt et al., 2018, 3).
Further support for this view can be drawn from the shared service center (SSC)
literature. SSCs are regarded as ideal for tasks that are structured, standardized, and
repetitive and are in a transaction processing environment (e. g., Lacity et al., 2011).
A survey in Germany, Austria, and Switzerland conducted by the University of St.
250 | C. Langmann and J. Kokina
Gallen together with KPMG indicates that financial accounting tasks like bookkeeping
are regarded as highly suitable for SSCs due to their repetitive and transactional na-
ture, whereas management accounting tasks were seen with less prevalence (Reimann
and Möller, 2013). Correspondingly, other research shows that companies primarily
transfer financial accounting tasks such as accounts payable to SSCs whereas man-
agement accountings tasks such as planning and budgeting are rarely transferred out
(PWC, 2013; Stewart et al., 2004).
Based on the argumentation above on the nature of their tasks, financial account-
ing and management accounting processes can be depicted in Perrow’s framework as
illustrated in Figure 2. Hence, financial accounting processes as a whole tend to have
a higher degree of routineness, whereas management accounting processes have a
higher number of exceptions and a lower analyzability which leads to lower degree
of routineness. Undoubtedly, this conceptual view provides opportunities for further
empirical research.
To provide some examples of specific accounting tasks that organizations have auto-
mated with RPA, Kokina and Blanchette (2019) summarize early RPA implementation
and find that RPA is widely used to automate processes in the following financial ac-
counting areas:
Order-to-cash
– Customer master file: new customer record creation, customer data maintenance,
customer credit limit approval, loans, and bank account applications.
– Invoicing: customer order entry, invoice preparation, invoice exception handling,
and reinvoicing.
– Cash receipts: identification of duplicate payments and cash application.
13 RPA in accounting | 251
Procure-to-pay
– Vendor master file information: vendor creation.
– Purchase order activity: purchase order creation and modification, and open pur-
chase order management.
– Invoice processing: incomplete invoice information identification, audit and re-
view of travel invoices, preparation of procure-to-pay reports, and unpaid invoice
issue resolution.
– Cash disbursements: payment processing and requesting payment date for in-
voices.
Record-to-report
– Journal entries: data entry and account classification, journal entry preparation
and entry.
– Reconciliation and analysis: extraction of account activity from bank web site,
uploading and validation of bank statement activity.
– Account analysis: accruals creation, calculation of warranties, commissions, and
rebates.
– Closing process: export and data consolidation, reconciliation process.
In these automations, RPA was most often used to open, read, and create e-mails, log
in to enterprise apps, copy/paste and fill in forms, read or write to database, follow de-
cision rules, extract data from documents, and obtain human input via e-mails/work-
flow. RPA functionality such as moving files and folders, collecting statistics, making
calculations, and pulling data from the internet were used less frequently.
Transferring this line of argumentation to the applicability of RPA for account-
ing, financial accounting in general seems to be more suitable for RPA than manage-
ment accounting processes. Indeed, empirical studies (see Section 13.2) and publicly
available reports of companies like Merck (Pellegrino and Mega, 2020), Daimler (PWC,
2018), KION Group, or ProSieben Media (Beisswenger et al., 2020) indicate that the
introduction of RPA in the accounting field is mainly driven by financial accounting
processes. Reports on the introduction of RPA in the field of management accounting,
instead, are far more seldom or limited to the use of RPA for automating management
reports (Hermann et al., 2018).
Figure 4: RPA – heatmap of management accounting processes (Wenning and Przytulla, 2020).
Both heatmaps highlight that rather than an entire accounting process (e. g., fixed as-
set accounting or management reporting) being suited for RPA, sub-processes are the
right level of detail for selection. For example, not the entire management reporting
process is well suited for RPA, but rather the sub-process steps of “report generation”
and “management reporting system and data process.” These sub-process steps typ-
ically are highly repetitive, rule-based, and standardized, and are mostly carried out
frequently (daily, monthly). Other sub-process steps such as the “management evalua-
tion and initiation of measures” are highly individual and unstructured, and normally
require an individual discussion which makes them unsuitable for RPA.
Although the heatmaps’ indications seem logical and convincing, in practice pro-
cesses may vary completely from company to company. As a result, a sub-process
like “report generation” might be conceptually convincing to be supported by RPA,
in reality however, the process could have such small volumes (e. g., only one small
report once a month), not making it a good case for introducing RPA into that pro-
cess.
report preparation, while supporting a shift towards the role of a business partner
(El-Sayed and Youssef, 2015; Byrne and Pierce, 2007; Järvenpää, 2007). By partially
or completely taking over accounting processes, RPA is such a technology with direct
and indirect effect on tasks and competencies – and therefore on the role – of accoun-
tants. In order to better understand the impact coming from RPA, we first take a look
at the traditional role of accounting.
ing this role screens, for example, RPA tools concerning their portability and applica-
bility for particular accounting processes (Seufert and Kruk, 2016).
While the pathfinder seems a rather broad role concerning digitalization technolo-
gies, some companies develop roles in the accounting organization specifically for
RPA as a technology. Deutsche Post DHL, one of the world’s leading logistics compa-
nies, for example, introduced two new roles in accounting, each focusing on differ-
ent aspects of RPA. In the role of a process champion an accountant is responsible for
monitoring and controlling an automated end-to-end process. Accordingly, this role
ensures the actual process is carried out as defined by the target process, both opera-
tionally by employees and system-wise by the automated technologies. The rationale
is that even if RPA is a rule-based technology that basically works successfully with
careful implementation, failures can still occur again and again such as unexpected,
new pop-ups which the technology does not know how to handle. Instead, the au-
tomation design expert at Deutsche Post DHL is also an employee of the accounting
department (e. g., accounts payable or central accounting) with a focus on technically
maintaining established RPA solutions, i. e., performing first-level maintenance activ-
ities. Next to maintenance, this role also technically implements desired extensions
and improvements in robots (Wenzel, 2020). Next to these new roles within account-
ing departments specifically linked to RPA, Kokina et al. (2019) identified further roles
such as the identifier, who spots opportunities for RPA, and analyzer, who uses the
output of RPA tools to provide future-oriented insight.
In summary, RPA as an automation technology acts as an enabler that further
shifts the emphasis of accounting away from the traditional role as information
provider towards a business partner and roles like a pathfinder or automation design
expert.
13 RPA in accounting | 257
analysis, or machine learning algorithms will make robots more intelligent and suit-
able for more complex tasks. IPA has the power to grasp even more process activities in
accounting and therefore speed up the shift of roles and competencies outlined above.
Although there is a body of literature, individual reports from corporates, and first
empirical studies on the use of RPA within accounting, further research is required in
a number of fields. First, while there are a number of conceptual papers and studies
on the suitability of RPA in public accounting and auditing, only very few empirical
studies have looked at the implementation of RPA in financial accounting, tax, or even
management accounting at all. Hence, empirical research on the suitability of RPA for
management accounting processes provides a research opportunity. Second, further
empirical research could explore the ways in which RPA is changing the role of ac-
countants and their skills and competencies. Finally, future research could look at
the long-term effects of RPA on the accounting function itself. The shift of processes
towards RPA in an organization might change the entire organizational setup, includ-
ing accounting departments. Today’s responsibilities and resources of departments
in the corporate landscape might fundamentally change with a broad introduction of
RPA.
Bibliography
Abernethy MA, Brownell P (1997) Management control systems in research and development
organizations: the role of accounting, behavior and personnel controls. Account Organ Soc
22(3–4):233–248
Alix J, Rock RJ, Stenger T (1996) Financial handbook for bankruptcy professionals: a financial and
accounting guide for bankruptcy judges, attorneys, and accountants. West, Saint-Paul, USA
American Institute of Certified Public Accountants (AICPA) (2020) Robotic process automation
fundamentals for accounting and finance professionals certificate. Available at: https://www.
aicpastore.com/ConsultingServices/PRD~PC-188710/PC-188710.jsp
Anagnoste S (2018) Robotic automation process – the operating system for the digital enterprise. In:
Proceedings of the international conference on business excellence, vol 12(1), pp 54–69
Appelbaum DA, Kozlowski S (2020) Auditing an RPA-enabled accounting information system.
Working paper presented at the 2020 Joint Midyear Meeting of the AIS, SET, and International
Sections. American Accounting Association
Bakarich KM, O’Brien P (2020) The robots are coming. . . but aren’t here yet: the use of artificial
intelligence technologies in the public accounting profession. Working paper presented at the
2020 Joint Midyear Meeting of the AIS, SET, and International Sections. American Accounting
Association
Beisswenger A, Schlott A, von Hirschhausen G, Küster T, Hamann K, Leser C (2020) Robotic process
automation im accounting – Beispiele von ProSiebenSat. 1, KION und PwC. ReThinking Finance
3:17–26
Berruti A, Nixon G, Taglioni G, Whiteman R (2017) Intelligent process automation: the engine at the
core of the next–generation operating model. Digital McKinsey, March 14
Bhimani A, Willcocks LP (2014) Digitisation, ‘big data’ and the transformation of accounting
information. Account Bus Res 44(4):469–490
13 RPA in accounting | 259
Brownell P, Dunk AS (1991) Task uncertainty and its interaction with budgetary participation and
budget emphasis: some methodological issues and empirical investigation. Account Organ Soc
16(8):693–703
Burns J, Baldvinsdottir G (2005) An institutional perspective of accountants’ new roles – the
interplay of contradictions and praxis. Eur Account Rev 14(4):725–757
Byrne S, Pierce B (2007) Towards a more comprehensive understanding of the roles of management
accountants. Eur Account Rev 16(3):469–498
Cooper L, Holderness DK, Sorensen T, Wood DA (2019a) Robotic process automation in public
accounting. Account Horiz 33(4):15–35
Cooper L, Holderness DK, Sorensen T, Wood DA (2019b) Perceptions of robotic process automation
in public accounting. Working paper. Available at: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=3445005&download=yes
Deloitte (2018) Internal controls over financial reporting considerations for developing and
implementing bots. Available at: https://www2.deloitte.com/content/dam/Deloitte/us/
Documents/audit/us-audit-internal-controls-over-financial-reporting-considerations-for-
developing-and-implementing-bots.pdf
El-Sayed H, Youssef MAE-A (2015) “Modes of mediation” for conceptualizing how different roles for
accountants are made present. Qual Res Account Manag 12(3):202–229
Eulerich M, Masli A (2020) The use of technology based audit techniques in the internal audit
function—is there an improvement in efficiency and effectiveness? Working paper presented
at the 2020 Joint Midyear Meeting of the AIS, SET, and International Sections. American
Accounting Association
Eulerich M, Pawlowski J (2020) Using robotic process automation (RPA) in the internal audit function:
use cases and a potential framework. Working paper presented at the 2020 joint midyear
meeting of the AIS, SET, and international sections. American Accounting Association
Forrester (2019) The RPA services market will grow to reach $12 billion by 2023. July 10
Fry LW, Slocum JW (1984) Technology, structure, and workgroup effectiveness: a test of a
contingency model. Acad Manag J 27(2):221–224
Hermann K, Stoi R, Wolf B (2018) Robotic process automation im finance & controlling der
Mann+Hummel Gruppe. Controlling 30(3):28–34
Houy C, Hamberg M, Fettke P (2019) Robotic process automation in public administration. In:
Räckers M, Halsbenning S, Rätz D, Richter D, Schweighofer E (eds) Digitalisierung von Staat
und Verwaltung 2019. Gesellschaft für Informatik e. V., Bonn, Germany, pp 62–74
Huang F, Vasarhelyi MA (2019) Applying robotic process automation (RPA) in auditing: a framework.
Int J Account Inf Syst 35
IMA – Institute for Management Accountants (2019) IMA management accounting
competency framework. Available at: https://www.imanet.org/-/media/
590889ef44ad401bb94d83cd43e584b8.ashx?la=en
International Group of Controlling (2012) Controlling process model. Available at: https://www.igc-
controlling.org/fileadmin/downloads/Standards/Controlling_Process_Model.pdf
Järvenpää M (2007) Making business partners: a case study on how management accounting culture
was changed. Eur Account Rev 16(1):99–142
Kipp P, Curtis MB, Li Z (2020) The attenuating effect of intelligent agents and agent autonomy on
managers’ ability to diffuse responsibility for and engage in earnings management. Working
paper presented at the 2020 joint midyear meeting of the AIS, SET, and international sections.
American Accounting Association
Kokina J, Blanchette S (2019) Early evidence of digital labor in accounting: innovation with robotic
process automation. Int J Account Inf Syst 35
260 | C. Langmann and J. Kokina
Kokina J, Davenport TH (2017) The emergence of artificial intelligence: how automation is changing
auditing. J Emerg Technol Account 14(1):115–122
Kokina J, Gilleran R, Blanchette S, Stoddard D (2019) Accountant as digital innovator: roles and
competencies in the age of automation. Available at: https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=3449720
Lacity MC, Willcocks LP (2017) Robotic process automation and risk mitigation. SB Publishing,
London, UK
Lacity MC, Solomon S, Yan A, Willcocks LP (2011) Business process outsourcing studies: a critical
review and research directions. J Inf Technol 26(4):221–258
Lacity MC, Willcocks LP, Craig A (2015). Robotic process automation at Telefónica 02. Available at:
https://www.umsl.edu/~lacitym/TelefonicaOUWP022015FINAL.pdf
Langmann C, Turi D (2020) Robotic Process Automation (RPA) – Digitalisierung und Automatisierung
von Prozessen. Springer, Wiesbaden, Germany
Lawson R (2019) New competencies for management accountants. CPA J 89(9):18–21
Libby R, Libby PA, Hodge F (2020) Financial accounting, 10th edn. McGraw–Hill Education, New York
City, USA
Manita R, Elommal N, Baudier P, Hikkerova L (2020) The digital transformation of external audit and
its impact on corporate governance. Technol Forecast Soc Change 150
Moffitt KC, Rozario AM, Vasarhelyi MA (2018) Robotic process automation for auditing. J Emerg
Technol Account 15(1):1–10
Munoko I, Brown–Liburd HL, Vasarhelyi M (2019) The ethical implications of using artificial
intelligence in auditing. J Bus Ethics
Needles BE, Powers M, Crosson SV (2013) Financial and managerial accounting, 10th edn. Cengage
Learning, Boston, USA
Oesterreich TD, Teuteberg F, Bensberg F, Buscher G (2019) The controlling profession in the
digital age: understanding the impact of digitization on the controller’s job roles, skills and
competences. Int J Account Inf Syst 35
Pellegrino M, Mega P (2020) Robotics Process Automation @ Merck. ReThinking Finance 3:33–42
Perrow C (1970) Organizational analysis – a sociological view. Brooks/Cole, Belmont, USA
Peters MD, Wieder B, Sutton SG, Wakefield J (2016) Business intelligence systems use in
performance measurement capabilities: implications for enhanced competitive advantage.
Int J Account Inf Syst 21:1–17
Pietrzak Ż, Wnuk-Pel T (2015) The roles and qualities of management accountants in organizations –
evidence from the field. In: Presented at the 20th international scientific conference economics
and management – 2015 (ICEM–2015), pp 281–285
PWC (2013) Financial shared service center on the rise toward valuable business partners – 2nd
generation FSSCs. Available at: https://www.pwc.de/de/finanzdienstleistungen/assets/pwc_
studie_financial_shared_service_centers.pdf
PWC (2018) Digitalisierung im Finanz– und Rechnungswesen und was sie für die Abschlussprüfung
bedeutet. Available at: https://www.pwc.de/de/im-fokus/digitale-abschlusspruefung/pwc-
digitale-abschlusspruefung-2018.pdf
PwC (2020) Robotic Process Automation (RPA) in der DACH–Region. Analyse mit blick auf finance
& accounting. Available at: https://www.pwc.de/de/rechnungslegung/robotic-process-
automation-rpa-in-der-dach-region.pdf
Reimann A, Möller K (2013). Shared Services für Controlling–Prozesse. Available at: https://assets.
kpmg/content/dam/kpmg/pdf/2013/09/shared-services-controllingprozesse-neu-2013-
kpmg.pdf
Rieg R (2018) Tasks, interaction and role perception of management accountants: evidence from
Germany. J Manag Control 29(2):183–220
13 RPA in accounting | 261
Abstract: Like many service industries, the financial industry is largely characterized
by administrative and back-office processes and distinguished by a broad systems
landscape with a high proportion of legacy systems. Missing interfaces between in-
formation systems, user interfaces, or web applications often require many manual
activities. As banks are often functionally organized into traditional departments, a
process-oriented organizational structure is rarely in place. The financial industry
therefore offers enormous potential for the use of robotic process automation (RPA)
and the raising of potential benefits such as process-related cost savings, time reduc-
tions, and quality improvements.
The aim of this chapter is to describe the tremendous opportunities that the use of
RPA technology offers to the financial industry and to explain how these opportunities
can be realized. Therefore, we start by explaining the challenges that progressive dig-
italization poses to the industry and how RPA, but also more advanced technologies
(that work not only rule-based but also define own rules), such as artificial intelli-
gence, can help to overcome them. As well as providing an overview of the various
applications of RPA in the financial industry, we also provide a comprehensive case
study of a relevant practical application.
Keywords: Robotic process automation, RPA applications, process automation, finan-
cial industry
14.1 Introduction
In financial institutions, they are on the daily agenda of many employees: time con-
suming processes that are completely rule-based and that follow rigid patterns. These
processes keep them away from other, often more important activities. Maintaining
data, checking, and entering systems using long lists and bridging non-existent tech-
nical interfaces by manual transfer work: in financial institutions, these activities are
mostly found in the back office, but also in IT or controlling (management account-
ing) and financial accounting. Automating such activities creates opportunities for
other, more complex tasks. But automation – here, the execution of repetitive tasks
by software robots (Ivancic et al., 2019) – is not always done as easily and quickly as
is sometimes propagated. Often, the costs of automation by creating interfaces and
(re)programming the applications exceed their possible benefits or are simply techni-
cally not feasible. There is an alternative: robotic process automation (RPA) – the use
https://doi.org/10.1515/9783110676693-014
264 | M. R. Smeets et al.
of software for automated handling of digital processes. RPA is still a quite emerging
technology, and it is currently receiving enormous attention, especially in the finan-
cial sector (e. g., Kumar, 2018 and Smeets et al., 2019).
The following part of the chapter places RPA in the sector focus of the financial
industry. The chapter begins by briefly explaining the individual challenges that the
digitization of the financial industry involves. It then shows to what extent RPA can
make a valuable contribution to overcoming possible hurdles on the way to becom-
ing a digital financial institution. The potential contribution of RPA is illustrated in
more detail using three different categories of use cases. These are those in which RPA
supports employees, replaces them, or enables completely new processes or even new
business models. A final, comprehensive example clearly illustrates how RPA can help
to overcome departmental boundaries and digitize service processes end-to-end.
The example used is a case study from 2019/2020, which describes the end-to-end
digitalization and automation of a customer-oriented process in a German securities
institution. The case study is supplemented by numerous experiences of the authors
from several years of strategic and operational consulting of financial institutions in
their application of RPA and similar technologies.
1 Alt and Puschmann (2016) provide a good overview of the potential, but also the challenges of dig-
italization for the financial industry.
14 RPA for the financial industry | 265
business processes that have been tried and tested in the field are reproduced dig-
itally, without considering the differences between a digital and an analogue pro-
cess (more on this in the further course). This regularly leads to unclear and ineffi-
cient processes. They are often only partially digitalized and are provided with me-
dia breaks. An actual end-to-end digitalization – a process that starts and ends with
digital input without analogue interruptions – is missing, as the following example
shows.
A bank enables its customers to take out a liability insurance policy online – all
digital – a typical commission business with which banks generate commission
earnings outside the asset and liability business. For this purpose, the bank places
advertisements on its own homepage. A direct link to the product offer is miss-
ing in the advertisement. Instead, it refers to the menu item to be selected. Once
there, customers will find a wide variety of insurance packages, some with mod-
ular components that can be selected. As soon as the customers have made their
decision, they enter their own data in an online mask and finally receive a confir-
mation that the data have been saved and forwarded. These data are now initially
stored temporarily until a clerk in the bank’s back office retrieves and prints them
– after information by e-mail. With the help of the printout, he or she records the
data in various systems. If individual data do not match, he or she creates a letter
to the respective customer to request the remaining data or data that need to be
corrected. If he or she receives the data a few days to weeks later, he or she creates
the insurance policy in the system and sends all documents to the new customers
(Smeets et al., 2019).
The example can be transferred to other areas and products, for example consumer
credits or savings accounts. It shows the weak points of this digitalization attempt:
– The process is not planned from the customer’s side, otherwise a direct jump to
product completion would be possible.
– The variety of possible product variations makes it almost impossible to close a
deal without prior comprehensive consultation – an example of digitalizing a sta-
tionary process without redesigning and adapting it accordingly – in other words,
transforming it.
– The subsequent steps and the printing and recapture of data show the break be-
tween digital and no longer digital process flow. There is no end-to-end digitaliza-
tion.
The bank first revises the process by replanning it from the customer’s side and
eliminating obstacles and detours. The online product offering is reduced signifi-
266 | M. R. Smeets et al.
cantly after analyses show that more than 80 % of customers who take out policies
online choose a certain basic variant of liability insurance. All other combinations
are chosen only very rarely. In the future, only two basic variants can be taken out
online. For more specific variants, in the future there will again be stationary (or
even media) advice from bank employees. Once customers have entered their data
online, these could ideally be transferred directly into the legal database of all the
necessary systems (Smeets et al., 2019).
From the customer’s perspective, the process is fundamentally changed. The cus-
tomer now finds a digital process that is so simple that they can find their way around
on their own. However, a complete digitalization of the process has still not been
achieved. As before, customer data are still processed by bank employees – manually
– which still leads to unnecessary effort and costs. So, we must distinguish: digital-
ization of a process from the customer’s point of view differs from digitalization from
the point of view of the institute. While the former is achieved primarily through pro-
cess adjustments, the latter requires technological adjustments. One technological
alternative for taking the second step is RPA.
Cost savings
One of the most relevant arguments for process automation is the cost savings that
can be achieved. These are often possible because employees can use their capacities
for other activities if robots take over repetitive processes or process parts from them.
This results in a reduction of the bound full-time equivalents (FTE) for the respective
process. It should be noted that automation by RPA does not necessarily mean that the
staff previously involved in process execution are released and no costs are incurred
for them. Rather, the purpose of RPA is to free them from repetitive, time consuming
processes, so that there is then more capacity available for value adding activities. The
magnitude of the potential cost savings of RPA varies and depends on the process (its
complexity and many other factors), the application area, and the industry. Cost sav-
ings range from 25 % (e. g., Ostrowicz, 2018 and Watson and Wright, 2017) up to 90 %
(Smeets et al., 2019). The focus is in the range of approximately 30 % and 60–70 %
(e. g., Willcocks and Lacity, 2016; Willcocks et al., 2017 and Tucci, 2015). The orders of
magnitude also differ depending on the cost factors included. License costs, mainte-
nance costs, and more should be considered, which unfortunately is not always the
case. Based on the authors’ many years of practical experience with RPAs, an order of
magnitude of approximately 25 % cost saving compared to the current process using
RPA technology appears to be a realistic value for financial industry.
Quality
Of course, the basic principle is always that the quality of a work result should be
as high as possible. However, the quality objective is not always explicitly stated as
a strategic goal and is often assumed to be more of a given. Nevertheless, such an
increase in quality in process handling can also be a strategic goal for an RPA applica-
tion. Human process handling, especially with frequent, repetitive activities, is prone
to errors. However, process handling by RPA bots is not – if correctly developed and
tested. Unsystematic errors – errors that occur randomly, for example caused by hu-
mans – are excluded by RPA. The only risk that remains is that of systematic errors,
which should not be neglected. Incorrect programming that is not noticed until the
RPA rollout can quickly lead to large volumes of false process results. This can be coun-
teracted with appropriate tests, which are also required by supervisory authorities in
the financial industry for software development (in Germany, e. g., BaFin, 2018).
268 | M. R. Smeets et al.
Time reduction
Time reduction can be the third explicit goal of automation with RPA. It goes hand in
hand with cost savings, as the following usually applies: Process costs are reduced
through shorter processing times. Nevertheless, time savings can also be an advan-
tage and can be considered an independent strategic goal. Especially in processes in
which the (external) customer is directly or indirectly involved, an increase in speed
can generate competitive advantages and improve customer satisfaction. This does
not only apply to external customers, for example customers of the organization. In-
ternal areas involved in or triggering processes are also considered customers and, as
recipients of the services of another area, also often have the expectation of a high
process speed.2 Here, RPA contributes significantly to an increase in process speed
(Willcocks and Lacity, 2016).
If the objective is “time reduction,” the following things are important and should
be considered: The speed of the robot depends largely on the underlying process. If
this was prepared and optimized accordingly before automation (“process streamlin-
ing”), a bot can usually work faster. In the same way, the quality of the process devel-
opment (i. e., the RPA code) influences its speed. Reaction times of automated systems
cannot be influenced. Since the robot works on the surface (the graphical user inter-
face [GUI]), it is completely dependent on the speed of these applications.
Further potentials
In addition to the above-mentioned potential benefits, RPA offers the financial indus-
try further exciting opportunities. One is to use the technology to reduce compliance
and similar risks. Two options are conceivable here. First, once an RPA artifact has
been developed in accordance with the specifications and protected against modifica-
tion, it cannot be modified unintentionally or unnoticed. Misuse is thus significantly
restricted. In addition, every step and every system input by the bot is documented,
both within the target applications and in RPA’s own documentation. This means that
all actions are fully verifiable by third parties, for example auditors (Willcocks and
Lacity, 2016). The same applies to operational risks, for example those that lie out-
side the actual business activity. These are, for example, human errors, system errors,
or errors within internal processes. Operational risks are a significant risk category,
especially in the financial sector (Kaiser and Köhne, 2007). The discussed significant
increase in process quality when using RPA reduces potential operational risks. Sec-
ond, it is possible to carry out significantly more testing with RPA than with humans.
Standardized test routines or even preparatory activities such as the gathering of infor-
mation, which is particularly necessary in the audit areas, can be automated quickly
and easily with RPA.
2 This is not always given. It depends on the customers’ targets. If a customer outweighs quality over
time, this statement might not be sufficient.
14 RPA for the financial industry | 269
In practice, a high level of workload for the IT department can regularly be ob-
served. In particular, this is the case when the bank has a heterogeneous system
landscape with many applications and legacy systems. RPA can also provide support
here by offering an alternative to build interfaces between these applications and
systems.
RPA provides further potential for the financial industry by reducing the time-to-
market for placing new products or setting up new processes, by standardized collec-
tion and evaluation of information, and much more.
The individual assessments vary. For example, a study by the Information Services
Group (ISG) assumes that IT will be the area most affected by automation in the com-
ing years (Otto and Longo, 2017). Other studies differ, for example one conducted
by PWC in 2017 among several dozen professionals in the United States. According
to this study, the highest potential is offered by the back-office areas, with well over
80 % agreement. This is followed by the areas of finance and IT. In the areas of com-
pliance, legal, risk control, and human resources, only minor potential for RPAs is
assumed (approximately 5 % agreement). The same applies to sales. Ostrowicz (2018)
also confirms the applicability in back-office, risk management, accounting, and
HR.
Why are especially these units suitable? Wherever data are available in a digi-
tal format and are processed digitally, the use of RPAs is a viable option. If the de-
270 | M. R. Smeets et al.
Back to the online process with still existing system breaks and manual activities: In the future, a
bot will take over the data entered by the customer and transfer them to all necessary systems –
without paper printouts, without errors, and much faster than before. Instead of letters to cus-
tomers, e-mails will be sent. Since the entry mask for customers was previously optimized and
now contains mandatory fields and plausibility checks, the number of queries is reduced to a min-
imum. Only the final dispatch of the insurance policy is still done by a dispatch service provider.
RPA thus manages to process a large proportion of cases automatically in the future. Human in-
teraction will only be necessary in exceptional cases (Smeets et al., 2019).
The example shows how an end-to-end digitalization and thus digital (partial) trans-
formation can be achieved with few changes. RPA enables an enormous reduction of
effort compared to large IT-technical changes. The adaptations can be implemented
14 RPA for the financial industry | 271
much faster so that a short time-to-market is ensured, and increasingly shorter change
cycles can be calmly faced. Murdoch (2018) even calls RPA a digital disruptor. This
means that RPA can modify existing processes in such a way that they are not returned
to their original state over time.
RPA can now often be the method of choice for digitalizing processes. The condition
for this is that the respective process or activity fulfils certain basic requirements. For
example, an RPA bot can only start working when digital data input is available in
a structured format (e. g., Willcocks and Lacity, 2016). In the above example, this is
the case when the data entered by the customer are made in a structured online input
mask and then transferred to the RPA bot. If, on the other hand, the customer writes an
e-mail with an order for product completion, this is unstructured digital input. RPA –
in our definition, thus, not able to deal with unstructured data – cannot handle this. In
such cases, complementary technologies can augment. In the case outlined, for exam-
ple, an AI component is conceivable. With the help of a correspondingly large amount
of training data (which can be seen as a major obstacle towards implementing such a
component), the AI component generates a kind of own experiential knowledge. Af-
ter some time, it is able to recognize and derive rules and thus structure unstructured
data (Davenport, 2019).
It becomes even more challenging when customer orders are not only received
unstructured, but also non-digital, for example, when orders are sent by letter. This
can also be remedied, for example by using optical character recognition (OCR) tech-
nology. OCR allows scanned documents to be converted into a machine-readable for-
mat. The common RPA software already has interfaces to OCR applications or has in-
tegrated them.
When it comes to digitalization, such a process line should be ruled out from the
outset and, ideally, should not occur nowadays. But there are still examples in practice
where exactly such data flows exist. In banks this is regularly the case when for exam-
ple garnishments and alike are received. These are often still sent by mail, so they
must first be digitalized.3 Since not all forms look the same, there are also unstruc-
tured data that must be structured as in the example above. Figure 1 shows a process
line combining RPA with OCR and AI. We are also going to discuss this interplay in the
case example in Section 14.5.
long. RPA now offers the possibility to set up new processes quickly and flexibly – even
if technical interfaces and other tools are not available.
In summary, RPA can therefore play three roles:
1. RPA as a support to humans in the execution of existing processes;
2. RPA as a replacement for humans in the execution of existing processes;
3. RPA as an opportunity to establish new business models or processes.
The following sections provide use cases for all three roles. Some of the examples can
be found in Smeets et al. (2019). Importantly, all examples shown below refer to the
exclusive use of RPA. If the above-mentioned complementary technologies like OCR
and AI could be used, this is explicitly mentioned.
Trading
Traders continuously monitor price thresholds to make changes to stop or limit prices
or to execute buy and sell orders when the threshold is breached. To relieve them of the
ongoing observation of prices and relevant market information, bots provide support
for some of the activities. The bots monitor the prices in the institute’s trading system
as well as information on relevant web sites and send e-mails to the traders based on
pre-defined patterns and when certain events occur. Once again, the advantage of RPA
lies in the integration of different data sources. While trading systems today already
have a wide range of functions, the integration of additional sources can generate a
competitive advantage.
274 | M. R. Smeets et al.
Resetting of passwords
Another example from the area of authorization management is the resetting of pass-
words, a use case that occurs daily in large quantities. Sometimes only small changes
are required to make such processes automatable – for example, the implementation
of a simple ticket system instead of a password hotline. Resetting passwords is just
one example of the potential of RPA in IT. In principle, RPA can automate entire ticket
systems and, in some cases, even answer first-level support queries independently
(Beardmore, 2017). RPA is also suitable for monitoring servers or complex job chains,
which is highly relevant for the IT areas of the financial industry.
Invoice processing
As a rule, incoming invoices are not posted immediately. Before the invoice amount is
transferred, the correctness and legality of the invoice is usually checked. If all data
are available in digital form, the entire process can be automated. If the data are avail-
able in an (as yet) unstructured form, an OCR component must also be connected up-
stream to make the data editable by RPA. Alternatively, initial cognitive components
are already being used here, for example to recognize relevant information in unstruc-
tured texts. AIMultiple (2019) represents such a process by integrating cognitive com-
ponents. The savings achieved here – without further explanation of the reference
value used – are estimated at 67 FTE and thus at about $4 million. At the same time,
the processing time decreases from 6–8 minutes to about 30 seconds.
– after a plausibility check – transfers the data by manual entry into the bank’s core
banking system. This solution already exists for some other activities. For a new prod-
uct or process, however, it does not seem to make sense. The alternative creation of an
interface that would enable a direct transfer of the data entered by the customer into
the core banking system is not possible in the short term, and initially not desired.
Instead, however, an RPA solution can be developed that enables both plausibility
checks and data transfer. In this way, an actual end-to-end digitalization of the pro-
cess is achieved. Furthermore, the processing time and thus the costs of the individual
process are low.
Compliance
The compliance unit monitors and checks various processes and other activities, just
like other controlling bodies of the institutions. It can only carry out the control ac-
tivities to the extent that it has resources – for example employees. The use of RPA
can create additional capacity here. This enables the establishment of additional test
routines. The bots are particularly suitable for routines that would mean repetitive
and non-complex activities for the employees, where the susceptibility to errors in
the control is particularly high.
4 The case study is largely taken from practice. It is mostly a process that was automated in the year
2020. In some parts, necessary adjustments were made for didactic reasons.
14 RPA for the financial industry | 277
The three processes considered here take place in a German securities institution.
One of its core tasks is the management of securities accounts for retail customers.
The securities institute has already been using the RPA technology for about 3 years.
Around 60 processes have so far been automated and controlled by robots. The in-
stitute is supported in the implementation of new RPA processes by an external
consulting firm that performs process analysis and RPA development. The processes
discussed here were identified as automatable in an investigation to exploit efficiency
improvement potentials around customer support. The original process flow is as
follows.
A large proportion of the customers contact the bank during the year and ask it to
prepare duplicates for statements of securities accounts, tax certificates, and the like.
There are various ways for the customer to do this. Firstly, the customers call the call
center and order the documents in a personal conversation with employees. Secondly,
customers send letters, faxes, or e-mails which are read by employees and processed
accordingly. Thirdly, the customers forward the order to the securities institution via
their house banks. The latter orders also reach the bank via e-mail. In all three ways,
employees are in contact with the customers or at least process the customer enquiry.
Processing in the call center involves entering customer data and enquiries in an Excel
list.
After the customer enquiry has been received by an employee in the first process,
a second employee in the back-office creates the customer documents manually in the
subsequent, second process. In doing so, he or she follows a kind of batch processing.
The larger the batch, the longer the processing takes – no concrete deadlines have
been agreed. An order is entered in the relevant system for this purpose. This is fol-
lowed by an archiving process. In addition, documentation is made in another Excel
list. This Excel list is passed on to a third employee.
This third employee, again in a different department, debits the fees correspond-
ing to the respective customer order from the customer’s securities account. Subse-
quently, archiving takes place here as well. The documents themselves have already
been printed by an external service provider after the second process has been com-
pleted and sent to the customer centrally. Figure 2 shows the processes.
The processes and their interaction in their current state show numerous problems
and – derived from them – potential for improvement:
1. Input channels:
a. There are too many different input channels.
b. Not all input channels are suitable for modern processes, for example, the in-
put channel fax; here, non-digital and unstructured data are delivered. The
processing can either be done by humans or – with enormous effort – by ma-
chines.
2. Process flow:
a. With at least three employees involved, the number of process participants is
too high.
b. Waiting times result in long process throughput times. All in all, the process
therefore takes too long – on the one hand from a business management point
of view and on the other hand from the customer’s perspective.
c. Not all process steps appear relevant and necessary. For example, the neces-
sity of documentation in an Excel list for statistical purposes must be strongly
questioned.
3. Systems used:
a. In addition to the input systems, data are recorded in Excel tables, a CRM sys-
tem, portfolio management, a booking system, and archiving software. There
are also other systems on the printing and dispatch side. All in all, there are
clearly too many systems.
b. There are almost no interfaces between the systems used. The only exceptions
are securities account management and the archiving system. Work steps can-
not therefore be automated or parallelized.
4. General: A long process duration results from the interaction of the above factors.
This has a negative effect on process costs and employee and customer satisfac-
tion.
Perhaps even more problem areas can be listed, but these are already numerous and
offer extensive potential for improvement. All in all, the initial situation offers a non-
digital process. This is of great relevance in terms of costs and in terms of external
impact on the institute’s customers.
ware, namely, RPA. The characteristics and requirements of such a technology should
therefore ideally be considered in the process redesign right from the start. A fur-
ther requirement for process optimization in this case is to overcome the department-
specific “silos.” Up to now, there have been three individual processes, each of which
is specific to a department. The objective is to develop a cross-departmental end-to-
end process.
5 We hereby assume that all process links are known and the procedure of eliminating systems does
not lead to risks.
280 | M. R. Smeets et al.
After selecting the process, the process analysis was carried out. The process was then
optimized so that the development of the RPA process can now begin. The develop-
ment follows an agile approach and takes place in so-called sprints. As soon as the
required quality of the software development has been achieved and the developer
tests have been completed, the user acceptance test (UAT) by the department follows.
If this is successful, the RPA process can be transferred to productive operation.
Special requirements for the development process must be observed regularly
when using a replication server in banks. In the financial industry in Germany, for
example, BAIT (BaFin, 2018) makes demands on the software development process.
Separation of functions and separate system environments must be considered. Many
14 RPA for the financial industry | 281
The process offers further potential. For example, the input channel could become
more standardized in the next step. If an online input mask were to be made available
for customers and affiliated banks, structured data input would be available right at
14 RPA for the financial industry | 283
the start of the process, not unstructured (e-mail) as is currently the case. This would
also make the machine learning component obsolete. If technical interfaces can be
created between the data entry mask and the processing system, the need for an RPA
solution could even be eliminated for part of the process.
14.6 Summary
Although a broad study is lacking, various minor studies and surveys indicate that
there is a gap between existing and used potential of RPAs in the global financial in-
dustry. In the financial industry, but also in other industries, RPA can play different
roles. It can facilitate the work for human employees, it can completely take over their
tasks, or the technology can be used to develop new business opportunities. RPA pro-
cesses can be found in all areas of banks and insurers, with the focus on the back-
office, finance, and IT. As the case example shows, the transition to a digital process
is not always difficult and can sometimes be done with little effort. It becomes under-
standable that AI can be a useful addition to RPA and can lift the process from partial
to full automation.
What is still missing is a more in-depth scientific investigation of the most di-
verse open questions concerning RPA. Which processes are actually best suited? What
are relevant success factors? How does RPA interact with other, related technologies?
What influences the acceptance of RPA by employees? And there are many more ques-
tions. Individual case studies are available, but comprehensive studies based on sci-
entific principles are not known to us so far and, therefore, offer great potential for
further research.
Bibliography
AIMultiple (2019) RPA use cases. Accessed January 20, 2019. https://blog.aimultiple.com/robotic-
process-automation-use-cases/#banking
Almato (2020). https://www.almato.com/automation/. Accessed May 22, 2020
Alt R, Puschmann T (2016) Digitalisierung der Finanzindustrie – Grundlagen der Fintech-Evolution.
Springer, Berlin Heidelberg
Beardmore L (2017) Robotic process automation. https://www.capgemini.com/service/business-
services/enabling-technologies/robotics-process-automation/. Accessed January 20, 2019
Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) (2018) Rundschreiben 10/2017 (BA) in
der Fassung vom 14.09.2018, Bankaufsichtliche Anforderungen an die IT (BAIT). Accessed
December 23, 2018. https://www.bafin.de/SharedDocs/Downloads/DE/Rundschreiben/dl_
rs_1710_ba_BAIT.html
Davenport TH (2019) The AI advantage. How to put the artificial intelligence revolution to work. The
MIT Press, Cambridge Massachusetts, London, England
Ivancic L, Susa Vugec D, Bosilj Vuksic V (2019) Robotic process automation: systematic literature
review. In: Di Ciccio G et al (eds) Business process management, vol 361, pp 280–295
284 | M. R. Smeets et al.
Jarrahi MH (2018) Artificial intelligence and the future of work: human-AI symbiosis in organizational
decision making. Bus Horiz 61(4):577–586
Kaiser T, Köhne MF (2007) Operationelle Risiken in Finanzinstituten. Eine praxisorientierte
Einführung, 2nd edn. Gabler, Wiesbaden
Kolbjørnsrud V, Amico R, Thomas RJ (2017) Partnering with AI: how organizations can win over
skeptical managers. Strategy Leadersh 45(1):37–43
Kumar KN (2018) Robotic process automation – a study of the impact on customer experience
in retail banking industry. J Int Bank Commer. http://www.icommercecentral.com/open-
access/robotic-process-automation-a-study-of-the-impact-on-customer-experience-in-retail-
banking-industry.php?aid=87176. Accessed May 16, 2020
Mahroof K (2019) A human-centric perspective exploring the readiness towards smart warehousing:
the case of a large retail distribution warehouse. Int J Inf Manag 45:176–190
Murdoch R (2018) Robotic process automation. Guide to building software robots, automate
repetitive tasks & become an RPA consultant. Self-published
Ostrowicz S (2018) Next Generation Process Automation: Integrierte Prozessautomation im Zeitalter
der Digitalisierung. Ergebnisbericht Studie 2018. Horváth & Partners, Frankfurt a. M.
Otto S, Longo M (2017) ISG-Studie: Robotic Process Automation (RPA) sorgt für mehr Produktivität
und nicht für Jobverluste. https://www.isg-one.com/docs/default-source/default-document-
library/isg-automation-index-de_final_form.pdf?sfvrsn=15defe31_0. Accessed January 20,
2019
PWC (2017) What PwC’s 2017 survey tells us about RPA in financial services today. https://www.pwc.
com/us/en/financial-services/publications/assets/pwc-fsi-whitepaper-2017-rpa-survey.pdf.
Accessed January 10, 2019
Ranerup A, Henriksen HZ (2019) Value positions viewed through the lens of automated
decision-making: the case of social services. Gov Inf Q 36:101377
Smeets M, Erhard R, Kaussler T (2019) Robotic Process Automation (RPA) in der Finanzwirtschaft.
Springer, Wiesbaden
Tucci L (2015) KPMG: death of BPO at the hands of RPA. https://searchcio.techtarget.com/blog/
TotalCIO/KPMG-Death-of-BPO-at-the-hands-of-RPA. Accessed December 30, 2018
Watson J, Wright D (2017) The robots are
ready. Are you? https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&
ved=2ahUKEwjizofA5MnfAhURYlAKHWHaBqoQFjAAegQIChAC&url=https%3A%2F%2Fwww2.
deloitte.com%2Fcontent%2Fdam%2FDeloitte%2Ftr%2FDocuments%2Ftechnology%2Fdeloitte-
robots-are-ready.pdf&usg=AOvVaw2luiVINhzNclPK70Ac7_zc. Accessed December 31, 2018
Willcocks L, Lacity M (2016) Service automation. Robots and the future of work. Steve Brooks
Publishing, Warwickshire
Willcocks L, Lacity M, Craig A (2017) Robotic process automation: strategic transformation lever for
global business services? J Inf Technol Teaching Cases 7:17–28
Oliver Gutermuth, Constantin Houy, and Peter Fettke
15 RPA for public administration enhancement
Abstract: Complex IT system landscapes are straining the digital transformation of
public administration. Even sophisticated IT modernization actions can barely com-
ply with the increased requirements regarding integrity, interoperability, and compati-
bility due to various dependencies. Robotic process automation (RPA) allows for cross-
system automation of work processes. The integration of artificial intelligence into
RPA tools supports the realization of the existing potential and the development of
new fields of application. Flexible RPA tools can support the automation of a wide va-
riety of processes quickly, consistently, and with reduced error-proneness. This chap-
ter introduces fundamentals of RPA and discusses its relevance for enhancing public
administration processes based on selected application examples as well as use cases
in a governmental organization in Germany.
15.1 Motivation
15.1.1 Initial situation of public administrations in Germany
Digital transformation is a major challenge for public administration, especially in
Germany. The process of digital transformation is accompanied by various moderniza-
tion priorities and comprehensive changes in order to be able to develop and tap the
existing potential and synergies using digital technologies. Against this background,
public administration must also meet the increased demands of citizens and compa-
nies concerning new communication channels, operate economically, and implement
a suitable human resources strategy. The introduction of new information technolo-
gies (IT) to support administrative processes can relieve activities and release a cer-
tain amount of capacity. However, this cannot always fully compensate the personnel
requirements in other areas due to differing qualifications. A current lack of skilled
employees and demographic factors exacerbate this problem.
A modern public administration requires integrated IT systems that use consistent
standards and match the individual requirements of different public administration
authorities. However, in public administrations in Germany there are highly diverse
Acknowledgement: The chapter is based on content and results taken from a study published in Ger-
man (Gutermuth et al., 2020), which was funded by the Nationales E-Government Kompetenzzentrum
(NEGZ e. V.), Berlin, Germany.
https://doi.org/10.1515/9783110676693-015
286 | O. Gutermuth et al.
Sections 15.3, 15.4, and 15.5 explain different application examples with varying scopes
and technological focuses. In these scenarios, we differentiate between simple RPA
approaches and cognitive services. In more detail, Section 15.3 deals with automation
concepts that could already be realized today with available RPA solutions, and that
can achieve success rather quickly with comparatively little effort. Section 15.4 de-
scribes application examples in which the performance of RPA can be significantly
enhanced using AI and cognitive services. Section 15.5 illustrates a more comprehen-
sive exemplary application scenario that combines different approaches and presents
the flexibility in designing automation concepts with RPA. Section 15.6 explains RPA
use cases in practice, especially RPA applications already used in a federal state of
Germany. The potential, as well as the opportunities and risks of the technology, are
discussed in the concluding Section 15.7.
software. The output data can be read (screen scraping) and transferred to a target
system.
– Individual solutions with software robots can be designed and introduced com-
paratively fast. Most available RPA solutions aim at providing good usability, es-
pecially concerning the control concept for software robots. Appropriate RPA so-
lutions can “learn” business processes by recording and analyzing manually exe-
cuted process instances. They try to understand the actions of humans, copy the
execution, and, if the process is varied, identify or ask for relevant influencing
factors.
1 The following section is based on Fettke (2019) and Fettke (2018) and was slightly adjusted.
15 RPA for public administration enhancement | 289
Even though there are now plenty of technical systems available that fulfill the char-
acteristics of a narrow AI and also exceed human capabilities in this particular task,
no systems are available which have any rudimentary universal or even super AI ca-
pability. While some researchers predict the existence of universal or super AI in the
future, other experts declare this claim pure speculation or even science fiction.
290 | O. Gutermuth et al.
However, there have been some recent breakthroughs in machine learning, in par-
ticular in deep learning. The importance of this achievement is demonstrated by the
fact that the Association for Computing Machinery (ACM) has awarded the renowned
Turing Award 2019 to the three deep learning pioneers Bengio, Hinton, and LeCun. Ta-
ble 1 presents typical applications that can now be processed very successfully using
machine learning approaches with deep neural networks.
Table 1: Applications of machine learning with deep neural networks (Ng, 2016).
These applications technically work more or less according to the same principle:
While the classical way of programming is to describe explicit rules and characteristics
of human faces, machine parameters, credit agreements, etc., in the form of explicit
algorithms, in machine learning no rules are programmed a priori. Instead, concrete
examples of human faces, machine parameters, problematic credit agreements, etc.,
are collected. During a training phase, the machine tries to extract characteristic fea-
tures from these example data on its own, which can then be used for the classification
and prediction of unknown situations. Machine learning has led to performance im-
provements in certain areas. However, it should be noted that in other application ar-
eas, the necessary data or the amount of data for machine learning is not available. In
addition, there are areas of application in which the use of machine learning does not
make a lot of sense. This is, e. g., valid for applications in which known physical laws
or normative specifications of a legislator must be considered. Why should (physical)
laws be learned from data to be able to process them by a machine? Here, it is better to
use classical methods of knowledge representation. In other words, machine learning
is only one of the numerous sub-themes of AI research. Furthermore, it is interesting
that several typical problems are only perceived as an application area of AI as long
as they have not yet been solved. This shifting of the boundaries of what is considered
AI is clearly illustrated by the examples of chess, route planning, or optical character
15 RPA for public administration enhancement | 291
recognition (OCR). Such systems are achievements of AI but are no longer necessarily
perceived as AI by the public.
Besides the operational capabilities of cognitive services, AI can also support the
preparation of an automation concept or the monitoring of RPA processes. A central
challenge in the preparation and design of automation is the analysis of the conven-
tional process execution and the transfer of this information into the control concept
of the software robot. If there are several variants of a process, the identification
and consolidated evaluation of factors leading to these variants are important for an
appropriate design realizing the automation potential. If these factors are not fully
known or very complex, AI can support both the identification and their weighting
by analyzing relevant patterns (Veit et al., 2017). This procedure can be done, e. g.,
by using process mining methods for the analysis of recorded process data. AI can
also support the recording of process execution data, e. g., by performing analyses of
graphical user interfaces to identify interaction elements.
Furthermore, AI can provide useful services even after an RPA-supported process
has been set up and gone live. Since automated execution can be critical, there are nu-
merous measures for monitoring software robot activities. Among other things, AI can
check the execution of a process instance against the entirety of past process instances
for deviations from reference patterns. If significant abnormalities are detected, the
2 The following section is based on Fettke (2019) and Fettke (2018) and was slightly adjusted.
292 | O. Gutermuth et al.
portal. The query is carried out with a virtual mouse click. Results can then also be
automatically read by identifying the relevant fields on the response web page. To log
the procedure, the software robot can transfer the data to a database or an electronic
list in which the addresses are compared with the data queried from the registration
office. As soon as all cases have been processed, the report data can be evaluated (e. g.,
marking of cases with deviations), and the responsible employee can be notified (e. g.,
automatic e-mail in case of deviations). Theoretically, many further steps can be imag-
ined, such as the automated creation of a letter to clarify the facts of the case. RPA can
significantly increase the frequency of such control processes and thus prevent un-
intended payment provision. Since, within this process, only a manageable amount
of data is transferred, it could even be carried out daily, ideally overnight, for a large
number of active cases.
administration’s problem in such processes results from the fact that the receipt of
payment must be ensured and assigned to continue or finish the process. However,
since the time of payment depends on the actions of the payer, there is a constant need
to monitor certain accounts. Some systems already contain an adequate interface or
integrate payment data that incoming payments can be identified and assigned au-
tomatically. In many areas, however, this can only be done with manual effort, as
incoming payments from various sources are recorded with sometimes incorrect or
incomplete payment data. Since transfer data for allocation purposes only contain
the name, bank details, and the purpose – which is quite error-prone due to the high
degree of freedom of design – the addressed procedure and the concrete case often
have to be determined manually.
The analysis of postings data to identify specific payments can be automated with
a software robot. This robot scans accounts at adjustable intervals and identifies rele-
vant data records. In the case of unique postings, the robot can document the receipt
directly in the respective systems and, if necessary, also generate a note to the respon-
sible clerk. If the data show certain inadequacies, the software robot can still suggest
an assignment within certain tolerance limits. Hence, it can determine an acceptable
degree of deviation based on rules and then either assign, report, or mark the transac-
tion for cancelation based on individual specifications. An RPA-supported monitoring
of incoming payments has advantages for both the receiving public authority and the
citizen or company liable to pay. The manual effort is reduced, and relevant data can be
transferred directly to the target system. On the other hand, the external stakeholders
liable to pay benefit from the increased processing speed as less time passes between
receipt of money and its assignment to continue or complete the process.
have to be considered. In the following, we will illustrate this based on two related
use cases with similar technological requirements but different consequences.
In the first example, e-mails (e. g., those collected by a pool address) are analyzed
using NLP techniques. The objective is to identify the request and to determine a suit-
able addressee for forwarding. This information results either from a given reference
(case number, etc.) or from the natural language context. If an unambiguous reference
is identified, it is possible to assign it directly to the addressee in charge. If this is not
successful, a software robot can try to analyze the content of the message using NLP
and weight identified indications. As an example, the information in the e-mail’s sub-
ject containing a reference to an addressed organizational unit can be processed with
higher relevance than contradictory notes in the body of the text. Likewise, a name
used as a form of address can be classified as particularly promising for the assign-
ment. In addition, sentence constructions can be semantically analyzed by identifying
parts of speech, grammatical structure, and meaningful keywords (e. g., “complaint”
or “grievance”) as well as their synonyms, if necessary, to derive the context of a mes-
sage. Based on the information obtained, RPA can use NLP techniques to design the
automated distribution for many incoming e-mails.
Another use case for processing natural language data is the examination of doc-
ument content. These documents could, e. g., be certificates in an application proce-
dure, such as medical findings or legal judgments. In principle, RPA can automatically
evaluate such documents using NLP techniques. Key terms and their synonyms can be
identified, which often allow interpretation and, e. g., summarize diagnoses based on
medical terms. NLP techniques can be used to determine whether a described state of
health has been confirmed or disproved. Whether RPA can already be used in practice
for such process types must be assessed based on the reliability of the method and the
consequences of possible errors.
In both scenarios, natural language data are processed. For e-mail content anal-
ysis, a faulty interpretation and the resulting choice of a wrong addressee usually is
not critical. However, drawing the wrong conclusions in the automated analysis of
certificates is comparatively severe. Nevertheless, the reliability of NLP procedures is
continuously developing and thus, the growing potential of using it in combination
with RPA is obvious. At present, however, it seems advisable to always consider the
given risk of misinterpreted documents in this context and to only choose work pro-
cesses with no high impact if such misinterpretations occur. Such NLP services should
currently preferably be used in a process assistance manner and support public ad-
ministration staff in their daily work processes.
Along with a form, a chat bot can offer mostly rule-based assistance by provid-
ing examples for form fields or explaining dependencies. At any time, users can call
up additional details, which should be easily provided by the chat bot as the content
is related to a specific part of the form. The chat bot can also save dialogue history.
Collected data can then be evaluated and used, for example, to enrich the chat bot’s
“knowledge” on frequently addressed topics. A further feature of chat bots is the abil-
ity to get feedback from the user. This is usually initiated by a question in which chat
bots ask to evaluate the interaction retrospectively. Based on this feedback, the chat
bot can learn and accumulate knowledge about which information was useful for a
specific request. Chat bots can support processes between external stakeholders and
public administrations to reduce the amount of consultation. At the same time, RPA
can provide new services in this context that would not be possible without the tech-
nology. For example, the dialogue with a chat bot can be processed in almost any lan-
guage because its digital character as a translation service can be integrated easily.
The automation of such a process often requires the usage of different application sys-
tems that should be interlinked. They can be implemented by a single software robot
performing some tasks based on rules and some based on cognitive services. For the
selected process, three major tasks can be identified for automation, which are ex-
plained in more detail in the following sections.
15.5.2 Classification
A software robot can monitor storage media for incoming digital documents. If a cor-
responding file is stored or created in a target directory, its content can be analyzed
immediately, e. g., classified. Artificial neural networks, which classify documents on
the basis of their appearance and with the help of image data, can be used for this
purpose (Houy et al., 2019). Such neural networks must be trained with a large num-
ber of document instances available in the public administration. Similarities within
a document type are automatically learned based on external characteristics such as
layout, etc. An application form, e. g., is characterized by its distinctive field struc-
tures and can be easily distinguished from other document types such as invoices or
letters.
In order to distinguish between application forms and other documents, it would
be sufficient for RPA to classify documents into two categories based on a neural net-
work. However, a comprehensively trained neural network allows much more detailed
differentiation (Houy et al., 2019). For recognizing different application forms, other
document classes should be identifiable, e. g., for each particular application proce-
dure. Successful recognition then also allows for the derivation of the organizational
units and systems involved in further processing. In connection with neural networks,
RPA can support a proper automated assignment of incoming application documents
and initiate automated processing.
error probability is critical, data extraction could still be performed, but the software
robot should then support the subsequent manual entry by suggesting the characters
which are probably correct. Finally, the suggested data entries should be corrected
and completed by an employee if necessary. Given that the form type has been identi-
fied and the field contents have been correctly extracted, the RPA-supported transfer
to all necessary systems (application software, databases, etc.) and the control of
further case processing can take place.
15.5.4 Processing
The processing of application forms’ content is highly dependent on the respective ad-
ministrative procedure. Nevertheless, there are some generic process steps relevant in
most cases. For example, a software robot can perform formal checks, which ensures
the completeness and plausibility of the information contained in the application. In
case of deficiencies, an automated dialogue with the applicant can be performed to
obtain the necessary information. Ideally, this dialogue should also be designed in a
digital form and manner so that a reply from the applicant can be processed automat-
ically. Such a procedure could largely be implemented in a rule-based way.
Once all the data in the application form have been entered, the content can be
checked. Content checks could comprise checking the current jurisdiction or deter-
mining the basis of alleged claims. Appropriate procedures have to be chosen individ-
ually. In-depth content checks usually require the inclusion of further information that
is difficult to process in a rule-based manner. The success of such operations mostly
depends on the degree of complexity and the quality of relevant information sources.
If, for example, certificates or records have to be analyzed, a software robot can ap-
ply advanced NLP methods. However, the usage of NLP techniques brings the risk
of misinterpretations and ambiguities. Thus, monitoring and checking the automat-
ically created results by a human actor is of importance. Whether an AI-supported
software robot can and should carry out content-related tasks automatically depends
on the reliability with which it recognizes and interprets relevant aspects and uses
them for decision-making. This is technically linked to whether it correctly recognizes
the relevant data by identifying known patterns and judging them appropriately. At
the moment, developing and using techniques that assist humans with well-founded
recommendations seem to be the best choice for public administrations until those
methods have matured.
Once the content processing steps in the business process have been completed,
application procedures are usually followed by activities such as the preparation of
a decision, accounting processes, and archiving. Here, many activities can be auto-
mated in a rule-based manner. This also applies to the creation of notifications. Fi-
nally, the software robot can document the executed steps with all relevant informa-
tion and save them to the documents in the electronic file.
15 RPA for public administration enhancement | 301
Figure 2: Overview of RPA potential in the above presented process “manual application handling.”
15 RPA for public administration enhancement | 303
ital transformation projects have been and are currently conducted, e. g., the devel-
opment and setup of digital demonstration labs, innovation workshops, urban data
hubs, platforms, etc. Their primary goal is to support public authorities (as a consul-
tant or project partner) in tapping the full potential of innovative technology to provide
the best possible service to their citizens.
The project group working on RPA projects within this GO consists of about 15
people treating different topics like RPA, business process management, and the po-
tential of machine learning in this context. Some of them belong to private exter-
nal service providers, and some of them are employees of the federal state’s govern-
ment.
15.6.2 Problem
The main problem for the RPA project group is the current lack of RPA experience in
public authorities. It is aware that the automation of processes can significantly reduce
the workload. Furthermore, only flexible RPA tools seem to be appropriate to meet the
different requirements in its area of responsibility. Hence, the GO has identified RPA
as an essential topic for the digital transformation of public authorities. They need a
strategy to provide RPA to all associated public authorities and support its implemen-
tation in selected processes. While they are still in the early stages, it is their strategic
goal to provide RPA solutions to most public authorities in the federal state as long as
the technology can offer proper support. The main problem that RPA is supposed to
solve is the growing workload of public administration employees while the budget
for according personnel is not developing similarly. The GO identified challenges (de-
scribed in more detail) along the way from the idea to the dissemination of a mature
RPA concept and the related IT platform. Primary challenges are the following:
1. Lack of technical knowledge: This includes a lack of process knowledge, which
already complicates the selection of potential process candidates and leads to ad-
ditional effort during the implementation. If an administrative procedure appears
suitable for RPA, the involved organizational units must be convinced by the po-
tential benefits and the feasibility of a technical realization.
2. Critical attitude: Employees whose activities are directly affected by automation
projects might have personal concerns. Hence, in such a scenario, there is a par-
ticular risk of retained information and neglected collaboration.
3. Governance: In addition to the operational challenges of RPA projects, other as-
pects need to be clarified. These include organizational details on the acquisition,
supervision, and maintenance of an RPA system. Especially the selection of an
RPA provider and the design of governance structures for operation, monitoring,
data management, etc., is essential. By facing these challenges, a general strategy
to introduce RPA in various cases must be created.
304 | O. Gutermuth et al.
As a part of this strategy, individual projects are executed to automate selected pro-
cesses. Now, the RPA project group of the GO is piloting some single approaches to
gather RPA knowledge and to demonstrate the technology’s strengths. Therefore, it
follows three steps:
1. The first step is to collect ideas for promising projects, analyze the specific poten-
tial, and discuss the possibilities for implementation.
2. In the second step, automation approaches are designed and piloted. Subse-
quently, change management, staff training, and other related organizational
actions shall be based on the concepts’ characteristics.
3. In a third step, it is their goal to create an overarching platform providing RPA
functionality that contains the required software and operational data.
In detail, the supervising RPA project group of the GO collects information on the en-
tire process sets in selected areas. The initiative can be inspired either by a central
authority, by the respective authority operating the processes recommended for RPA
support, or by third party knowledge like other public authorities, private organiza-
tions, or consultants. This information is analyzed regarding the expected benefits
and feasibility. Based on the resulting pre-selection (“long-list”), there are discussions
with experts from the respective area to decide whether an RPA concept should be de-
signed or discarded. In the case of promising processes, the analysis is intensified, and
reengineering of relevant activity structures is considered. The goal is to ensure that
15 RPA for public administration enhancement | 305
a process is first improved and then automated, if necessary. Then, the automation
concept is finally designed, implemented, and tested. If the tests are successful and
all prerequisites for a changeover have been met, the live operation will be started.
From this point on, operation, monitoring, and the necessary maintenance tasks are
handed over to the responsible organizational unit.
15.6.4 Results
The GO already implemented RPA in selected administrative procedures. We have
gathered information regarding two PoCs of RPA applications, which are currently
under construction. One example process is the classification of document types to
prepare their forwarding. Here, arriving paper documents are digitalized by an ex-
ternal service provider. The files are sent to the authority and must be forwarded to
the responsible organizational unit. Without RPA, employees had to open the data on
a screen, check the content, find out who is accountable, and forward every single
document manually. Now that RPA is introduced, the employees’ workload is reduced
as several document types can be identified and sent automatically. Therefore, an
RPA system is trained to identify numerous incoming document classes that have
common characteristics. For example, application forms for public services, which
are approximately 50 % of the incoming documents in this authority, can be easily
identified by their headlines and layout. This fact is used for classification by local-
izing the headline on the document, extracting this part of the image, improving the
image quality to read the letters, and applying OCR. Based on the recognized letters, a
match to familiar document types is calculated and decided by using the Levenshtein
distance approach.
This procedure is currently being extended to include other types of documents.
It is planned for the technique to go beyond the consideration of headlines but also
analyze additional text and layout characteristics for classification. For this purpose, a
support vector machine (SVM) is trained so that a universal classification component is
created, which allows adaption and extension. As a second PoC, the GO is working on
the setup of a similar procedure to forward incoming e-mails. This case does not need
to convert image data into text. To access the content of text messages, NLP techniques
receive significant attention. They can be used, e. g., to identify relevant entities (e. g.,
named entity recognition), essential information based on term frequencies (e. g., term
frequency/inverse document frequency [TF-IDF]), and important phrases using n-gram
analysis. In general, this case also targets the objective to locate responsible organiza-
tional units quickly and to carry out forwarding.
The tasks for which the GO has already developed an RPA support are entirely
independent of the piloting organizational unit and could also be easily transferred
to other departments and agencies. The current state of their projects demonstrates
that RPA can perform a useful administrative task and conveys a general impression
306 | O. Gutermuth et al.
of how successful concepts can be leveraged in many different areas. Thus, the two
objectives of supporting individual processes with RPA on the one hand and gathering
experience for further projects on the other hand were fulfilled.
15.7 Conclusions
15.7.1 Summary of application potential
In the above sections, we have developed and illustrated exemplary automation con-
cepts and explained use cases from practice with technical reference to typical public
administration processes. Table 3 summarizes the application examples, presents the
focus of automation, and lists the most important techniques offered in each applica-
tion example viz. use case.
15.7.2 Discussion
In general, the chapter has investigated and presented RPA as a versatile technology
for the automation of processes in public administrations. The described examples dif-
ferentiate between simple RPA concepts and cognitive services. These two categories
15 RPA for public administration enhancement | 307
Table 3: (continued)
Case study Paper ∙ identification of relevant areas and text ∙ rule-based processing
from practice document passages
classification ∙ image improvement ∙ image pre-processing
∙ text extraction ∙ OCR
∙ keyword comparison
E-mail ∙ interpretation of texts in natural ∙ rule-based processing
forwarding language
∙ identification and weighting of mail ∙ NLP
areas
∙ classification of competence
mark two poles of a broad range of possible RPA concepts. Considering these two dif-
ferent concepts was useful to investigate the current practicability of available tech-
niques and estimate the future potential of AI-based RPA technology. The following
discussion continues this distinction because it is particularly useful when consid-
ering opportunities and risks. First, however, the basic idea of RPAs is discussed in
general.
Generally, the main incentive for using RPA arises from the advantages of auto-
mated process execution, which can lead to reduced costs for personnel or create an
increased process execution performance without putting additional strain on the ex-
isting personnel. Opportunities also arise from the high operating speed of software
robots so that process run-times can be significantly reduced. At the same time, RPA
can log the details of the automated execution of each individual process instance,
thus increasing the traceability of processes to internal and external parties with re-
gard to their status. RPA can also be introduced in a very targeted manner, exactly
where there is an acute need or where a particularly high benefit is expected from
process automation. Compared to many other IT strategies (e. g., integrating a new IT
system), parallel processes that are not affected by this technology do not change at
all. Hence, comprehensive change management is often not necessary.
The primary challenge for successful RPA is the adequate setup of process control.
If the process design is inadequate, a process that has significant shortcomings may
be automated. The faulty execution and the resulting damage, as well as possible cor-
rection efforts, can then multiply within a short time Kirchmer (2017). To avoid such
shortcomings, the careful development of each individual concept is necessary. How-
ever, this requires sufficient process knowledge, which is still under development in
many areas of public administration and therefore requires process surveys to be car-
ried out first. If RPA concepts are successfully introduced, the released human work
capacities can and should be reorganized in a meaningful way. Accordingly, people
15 RPA for public administration enhancement | 309
could take care of new functions and tasks, which increase motivation. In the medium
and long term, RPA could entail the risk of neglecting the further development of ex-
isting IT systems because certain deficiencies are circumvented but not remedied by
RPA. Table 4 summarizes the opportunities and risks of general RPA concepts.
Opportunities Risks
Simple RPA concepts are characterized by comparatively little variation in the auto-
mated process. In the simplest case, the process does not vary at all. Here, a software
robot would execute a sequence of operating steps as often as required. If the course
of the process depends on certain influences, these can be clearly identified in sim-
ple RPA concepts and follow defined rules. This creates consistent process executions
and can reduce the susceptibility to errors. In most cases, routine processes are ad-
dressed that occur frequently but are not complex. This means that implementation
is relatively quick, and the RPA potential can be tapped quickly. At the same time, the
procedure executed by software robots remains easily comprehensible, so that a high
level of acceptance can be achieved among both employees and external process par-
ticipants. Simple RPA is currently already used in various industries to increase the
execution frequency of monotonous procedures and to relieve employees. There are
numerous suitable applications for such approaches in public administration, which
could easily be implemented from a technical point of view.
However, the versatility of RPA also entails some risks. Especially in public ad-
ministration, the number of processes that can be automated with simple RPA con-
cepts could quickly become confusing due to the high diversity of (legacy) systems
and processes. This already complicates the identification and selection of potential
process candidates. After the comprehensive implementation of simple RPA concepts,
the system diversity would continue to pose a risk because changes to individual IT
310 | O. Gutermuth et al.
components (e. g., updating application software) could then possibly result in a need
for maintenance of various RPA-supported processes that use that component. In ad-
dition to the acute expense, processes could also come to a complete standstill in this
way if no more personnel is scheduled for alternative processing. Table 5 summarizes
the opportunities and risks of simple RPA concepts.
Opportunities Risks
Cognitive services are targeting tasks for which humans need intelligence. In many
cases, they are very efficient because they can process complex information quickly.
The application focus is narrower compared to simple RPA concepts, and commercial
solutions are currently only just emerging. In terms of process automation, public ad-
ministration will see particular opportunities in the handling of image data such as
electronic documents or the processing of texts in natural language. These techniques
also enable the introduction of new approaches such as chat bots, which can expand
the existing range of services offered by the public administration. In addition, cog-
nitive services can also use the knowledge implicitly contained in recorded process
data to control process instances or to evaluate the decisions made by employees in a
process.
In the case of cognitive services, risks result primarily from the requirements for
included data. In public administrations in Germany, the necessary data needed for
proper machine learning are often not or only insufficiently available. For generic
tasks such as recognizing characters utilizing OCR, many RPA products offer pre-
trained solutions that can achieve good results. Other applications, such as the ex-
traction of data from invoice documents with unknown layouts, are currently under
development and becoming increasingly reliable. Here, public administrations can
benefit from the private sector, as there are overlaps in several areas of activity. How-
ever, RPA solutions for highly administration-specific procedures can only be created
with the involvement of public authorities and require the inclusion of their data.
Depending on the process, these data might first be created or comprehensively pro-
cessed. A significant challenge is the requirement to combine technically relevant
15 RPA for public administration enhancement | 311
Opportunities Risks
Cognitive ∙ fast acquisition and processing of complex ∙ dependency on data in
services data terms of quantity and quality
∙ interpretation of image data and natural ∙ initial setup effort with
language, especially for document uncertain prospects of
processing success
∙ new services such as multilingual dialogue ∙ acceptance problems due to
systems a lack of explanation
∙ process decisions can be based on implicit ∙ extensive testing required
knowledge in data
∙ control of the degree of automation from
process-related decision support to full
automation
15.7.3 Outlook
The automation of processes is a crucial endeavor to meet the requirements of a mod-
ern digital public administration. RPA provides a technology that creates new possi-
bilities. The opportunities and risks of the technology are emphasized. The contribu-
tion’s focus concentrates on a broad range of possible applications and the description
of the identified potential. While other IT strategies are often limited to a specific field,
RPA offers the opportunity to develop tailored solutions for multiple problems.
RPA supports the development of individual digitalization strategies for public
administrations. This feature also enables an adjusted agenda of priorities. Probably
public administrations will mainly limit RPA concepts to established techniques and
312 | O. Gutermuth et al.
pick up methods used in the private economy with some delay. Thus, for now, the focus
would be primarily on processes that can be automated with simple RPA concepts. The
primary objectives pursued would be to relieve the workload on personnel, cut costs,
raise consistency, and reduce errors and processing times.
However, RPA is being presented as a “tool” for public administrations for a good
reason. The technology requires an active deployment and maintenance. Even the
identification and selection of processes suitable for automation concepts is a severe
challenge due to the diversity of activities in the administration. However, this prepa-
ration can be supported by techniques such as the analysis of recorded process data
(Geyer-Klingeberg et al., 2018). If necessary, the general process flow should also be
reconsidered to prevent a transformation from flawed processes into automated flawed
processes. Taking these aspects into account, the administration should pragmatically
develop and test RPA concepts for individual non-critical processes with suitable con-
ditions. Experiences can thus be made, and an expansion of the usage can be prepared
based on such pilot automation projects.
Conversely, the diversity in the administration, which makes it difficult to overview
and select processes for RPA concepts, also marks an environment with excellent
pre-conditions to benefit from the technology. In particular, the transport of informa-
tion through heterogenous system landscapes can be made considerably faster and
highly consistent with RPA. Many organizational units facing similar challenges can
exchange experiences, develop common automation concepts, and often share the
technical infrastructure for an RPA system.
Cognitive services already indicate the performance of the next generation of RPA
product solutions. Soon, they will create and support automated processes that can
handle complex tasks that would either take a lot of time or even could not be per-
formed at all without AI. When these products mature, cognitive services should be
tested and evaluated in non-critical processes first. They could support employees,
assist the process execution, and operate “under observation” until reliability is en-
sured.
The presented concepts focus on the requirements and conditions of public ad-
ministrations in Germany. Accordingly, the organizational structures, the diversity of
IT systems, and the need for interfaces to overcome borders between responsible units
are quite specific and can differ from other countries. Nevertheless, it can be assumed
that even countries with low organizational fragmentation and intense system inte-
gration will have to handle a great diversity of processes with a wide range of prop-
erties. Therefore, the automation of processes may have a different focus compared
to Germany but still shows appropriate potential to benefit from RPA knowledge, the
proposed application examples, and gathered results.
If public administrations consider introducing RPA-supported processes, the
communication of the measures must be a focal aspect of the strategy. The technol-
ogy will lead to a shift of manual tasks from repetitive routine operations to more
individualized activities. The staff must sufficiently accept this change. Thus, it is
15 RPA for public administration enhancement | 313
crucial to create appropriate perspectives for those employees whose activity profile
has a high potential for automation. Similarly, the use of RPA must not compromise
the confidence of citizens and companies in the efficiency and objectivity of public
administration. RPA procedures should only be introduced if they are highly reliable
and should be permanently controlled under strict conditions.
While our chapter focuses on technical and organizational aspects, it has not in-
cluded some other important aspects such as legal and ethical details. Especially the
collection of legal requirements can reveal further challenges for an RPA strategy in
public administrations. Also, the need for ethical discussions can be expected mainly
due to the field of AI applications creating decisions for process flows. From a scientific
point of view, these aspects indicate additional research gaps and further challenges
for assessing the applicability of RPA in public administrations.
Bibliography
Fettke P (2018) Umsatzsteuer, Zoll und Künstliche Intelligenz - Eine Einführung.
Mehrwertsteuerrecht 11:457–496
Fettke P (2019) Künstliche Intelligenz für die Digitalisierung der Steuerfunktion. Rethinking Tax
1:12–22
Gartner Research (2019) Magic quadrant for robotic process automation software. 08 07 2019.
[Online]. Available: https://www.gartner.com/en/documents/3947184/magic-quadrant-for-
robotic-process-automation-software
Geyer-Klingeberg J, Nekladal J, Baldauf F, Veit F (2018) Process mining and robotic process
automation: a perfect match. In: 16th international conference on business process
management, Sydney
Gutermuth O, Houy C, Fettke P (2020) Robotergestützte Prozessautomatisierung für die Digitale
Verwaltung. Nationales E-Government Kompetenzzentrum (NEGZ) e. V., Berichte des NEGZ Nr
10
Houy C, Hamberg M, Fettke P (2019) Robotic process automation in public administrations. In:
Digitalisierung von Staat und Verwaltung. Gesellschaft für Informatik e. V., Bonn, pp 62–74
Kirchmer M (2017) Robotic process automation – pragmatic solution or dangerous illusion? BTOES
Insights (Business Transformation and Operational Excellence Summit Insights), 06 2017
Ng A (2016) What artificial intelligence can and can’t do right now. Harvard Business Review Digital
Articles, 9 11 2016
Smeets M, Erhard R, Kaußler T (2019) Robotic Process Automation (RPA) in der Finanzwirtschaft.
Springer, Wiesbaden
Veit F, Geyer-Klingeberg J, Madrzak J, Haug M, Thomson J (2017) The proactive insights engine:
process mining meets machine learning and artificial intelligence. In: 15th international
conference on business process management, 2017, Barcelona
vom Brocke J, Maaß W, Buxmann P, Maedche A, Leimeister J, Pecht G (2018) Future work and
enterprise systems. Bus Inf Syst Eng 60(4):357–366
Peter Pfeiffer and Peter Fettke
16 Applications of RPA in manufacturing
Abstract: Robotic process automation (RPA) tools are nowadays frequently used in
sectors with primarily office work like services, telecommunications, administration,
finance, and insurance. However, industrial domains like manufacturing also have
huge potential for RPA to automate a large variety of tasks. As in office work, there
are a lot of more or less complex activities and workflows that are repetitive and error-
prone. In this chapter, we will introduce potential use cases for RPA in manufacturing
along the Y-CIM model and show one practical application of cognitive RPA in this
domain for retrieving a computer-aided design (CAD) model from a query image. The
digitalization of the industrial sector offers a lot of possibilities for automation. Many
processes are supported by computer-aided machines and information is stored and
shared using a unified database. During product development and production, CAD
is frequently used nowadays to design and modify a workpiece realistically on a com-
puter before going into production. During manufacturing, CAD data are available and
can be used in computer-aided machines to automate certain parts of the manufactur-
ing process. A new artificial intelligence application will be introduced which is able
to propose a list of CAD models from a database given a photo of a workpiece. An oper-
ator can check this list and select the correct CAD model. This is not only a new method
to retrieve CAD models from images but also one of the first approaches to enable the
use of RPA in the industrial domain.
16.1 Introduction
Robotic process automation (RPA) and cognitive RPA have shown great applications in
domains where a lot of office work is being done. They are used to automate front- and
back-office tasks like payroll processes, customer interactions via chatbots, or other
administrative processes like transferring customer data from one system to another.
In some domains, e. g., public administration, a large variety of tasks can be auto-
mated using RPA and cognitive RPA as shown in Houy et al. (2019). In the industrial
domain, concepts like Industry 4.0 require new technologies to exploit the automation
potential and increase the efficiency (Lasi et al., 2014). However, RPA in the industrial
sector has not been investigated in literature so far. In this domain, a lot of repetitive
Acknowledgement: The chapter is based on content and results of the Software Campus Project
“R2TRIEV3,” which was funded by the German Federal Ministry of Education and Research (BMBF)
[01IS17043].
https://doi.org/10.1515/9783110676693-016
316 | P. Pfeiffer and P. Fettke
and error-prone tasks – just like in office work – are performed, which are great candi-
dates for automation. Examples are transferring and transforming production sensory
data into a structured database, retrieving relevant requirements from a document, or
scheduling new orders into the production. Digitalization of the industrial sector has
a huge impact on workflows and systems but also offers possibilities to enhance pro-
cesses.
With more digitalization in industrial sites, more information is collected which
allows more collaboration between machines, employees, and robots. Computer-
aided manufacturing (CAM) and computer-integrated manufacturing (CIM), intro-
duced by Scheer (2012), are widely used nowadays and serve as a great foundation
to implement RPA solutions in industrial sites. As an important part of digitaliza-
tion, automation helps people to work more efficiently and effectively by executing
certain activities without the need for human action. With more machines being
computer-aided, more information is available while more automation can be imple-
mented at the same time. The information can be stored and shared between machines
and humans in several workflows. Information and data created during the product
development can be used during manufacturing. In the same way, information cre-
ated during manufacturing can be used while monitoring, in quality control, or in
controlling. Intelligent services use this information, e. g., to automatically identify
workpieces and present related order information, order spare parts, or show the in-
dividual components of the workpiece. Furthermore, reports from information gained
during production can be created automatically.
As an example of RPA in manufacturing, a cognitive RPA service has been im-
plemented and will be presented in more detail in this chapter. It helps to automate
several tasks in manufacturing processes by retrieving similar computer-aided de-
sign (CAD) models to a workpiece in a photo or image. The application makes use
of CAD data, which are frequently used in product development, design, and pro-
duction. Before being produced, a workpiece is nowadays realistically designed on
the computer as a CAD model. In some production steps, information linked to the
physical workpiece like the material or its delivery date must be known. Once the
workpiece and its related CAD model are identified, this information can be accessed.
Finding the correct CAD model to a physical workpiece is a demanding task that re-
quires expert knowledge. Moreover, the person inspecting the real object might not
be the same as the one who designed the workpiece as CAD model. Finding the cor-
responding CAD model usually involves searching though the set of all CAD models
that have ever been designed or produced. With several hundreds or thousands of
different CAD models in the database of an average manufacturer, searching for the
correct one can be time-consuming. Usually there are at least as many CAD models
as products, or even more. Apart from the high number of objects in the database,
there are more problems and challenges one has to deal with. Three-dimensional rep-
resentations can be difficult for humans to understand, especially for persons who
16 Applications of RPA in manufacturing | 317
do not often deal with 3D models. Small deviations of similar looking CAD models
(e. g., in product families) are hard to detect and may cause the wrong model to be
selected.
In this chapter, new opportunities for RPA in the industrial sector will be outlined.
Therefore, automation candidate tasks along the Y-CIM model are investigated and
the use of RPA for these tasks is explained. In the next section, conceptual foundation
will be given. Section 16.3 introduces the RPA applications along the Y-CIM model.
For each task, a scenario explains the technical problem domain and outlines how
the task can be automated. The RPA solution to retrieve CAD models from a photo is
explained, implemented, and evaluated in Section 16.4 as an example for the use of
cognitive RPA in the manufacturing sector. Section 16.5 outlines related work while
Section 16.6 concludes the chapter.
16.2 Foundations
16.2.1 RPA and cognitive RPA
RPA is a term used for services that perform instructions on computer programs as
humans would do (van der Aalst et al., 2018) using (graphical) user interfaces, e. g.,
HTML, a lower-level interface like APIs, or the command line interface (Fettke and
Loos, 2019). The term is used in the academic world and by practitioners. However,
there is no established definition of the term. RPA is especially used for programs or
tools, so-called software bots or services, that automate processes or routines; usu-
ally repetitive, error-prone, rule-based ones humans perform. RPA, as a technology,
usually describes the software being used (Ansari et al., 2019). However, additional
hardware may be required sometimes to enable the use of RPA.
Different to workflow technology software, the information system the RPA service
operates on remains unchanged (van der Aalst et al., 2018). RPA does not require the
system or workflows to be changed to its needs. Only small changes in workflows or
information systems need to be made. Most tasks which are automated by RPA are
driven by simple rules and logic, for example, to transfer structured data from one
information system to another.
RPA tools often use technology from data analytics or process mining (van der
Aalst et al., 2018). Simple RPA services using rule-based approaches are often lim-
ited to simple and repetitive tasks on structured data and simple interfaces. However,
there are many of these tasks that have a huge automation potential. Artificial intel-
ligence and machine learning techniques enable RPA services to operate on unstruc-
tured data and non-static interfaces (van der Aalst et al., 2018) solving knowledge-
intensive tasks that can bring more value (Ivančić et al., 2019). Such applications are
called cognitive or intelligent RPA services and are one possibility of broadening the
318 | P. Pfeiffer and P. Fettke
scope of RPA as it is conceptually not limited to simple tasks (Fettke and Loos, 2019).
Cognitive RPA service tools support humans in coming to conclusions (Fettke and
Loos, 2019), e. g., by aggregating data into useful charts using intelligent data pro-
cessing. In contrast to simple RPA, cognitive RPA can take over a wider range of tasks.
Rather than setting up rules, scripts, or click-path, they can be trained on data from
previous executions by humans and act autonomously afterwards. Techniques from
natural language processing (NLP) or computer vision can be used in cognitive RPA,
e. g., to implement an intelligent chat bot that answers customers’ questions or a doc-
ument scanner that transfers data from a paper invoice into the ERP system. Such ap-
plications can bring huge benefit in automating repetitive and time-consuming tasks.
They increase efficiency, reduce errors, and allow humans to work on more valuable
tasks.
CAM describes the use of computers to control machines in production, e. g., for lo-
gistics, transport, or manufacturing. It is sometimes also used for computer-aided
production planning and control(CAP). In CAM, computerized numerical control
16 Applications of RPA in manufacturing | 319
machines are used instead of non-computerized ones. Furthermore, robots with sen-
sors, automated warehouse systems, and driverless transport systems are used. Using
computer-aided systems in production also requires new forms of organization, for ex-
ample, machining centers where machines automatically change tools and do several
manufacturing steps like drilling and milling in one place (Scheer, 1990).
CAD describes the use of computer (both hardware and software) during design, devel-
opment, analysis, and modification of an engineering or construction design (Groover
and Zimmers, 1983; Sarcar et al., 2008) and is a part of the Y-CIM model. It is used in
many industrial areas for the mechanical design of automotives, aircrafts, prosthetics,
320 | P. Pfeiffer and P. Fettke
electronic circuits, and much more. Modern CAD software uses vector-based graphics
to draw objects of any geometrical shape or raster graphics to show the overall ap-
pearance of an object. CAD models can be curves and figures in 2D or surfaces and
solids in 3D. Three-dimensional objects are constructed using wireframe, surface, or
volume models (Scheer, 2012). Standardized 2D and 3D elements for design are avail-
able through a database. Using Boolean operators such as union or subtraction, com-
plex structures can be created from standardized elements. Figure 2 shows an example
of a cylinder block as a 3D wireframe model.
Beside the mathematical or geometrical description of an object, CAD models can also
be described using physical attributes like density or optical, mechanical, and thermal
properties. Some CAD software allows to simulate forces and find weaknesses of the
design that may cause fractions. Usually, the output is an electronic file in a format
like DXF, STEP, or SLT. Beside drawing objects using shapes, CAD files often contain
information about the material, surface, dimensions, and tolerances. CAD software
allows to manipulate objects and enables to view them from any angle. Furthermore,
objects can be visualized in different materials.
16 Applications of RPA in manufacturing | 321
learning which are able to solve the K-way N-shot task. A survey on these approaches
can be found in Wang et al. (2020).
in detail from order to order. Companies translate these specifications into a fact
sheet when creating an offer, which usually has the same structure and contains
the same information for all products of a certain product family. Searching and
transferring this information from the requirements to the fact sheet can be au-
tomated using an RPA tool that automatically identifies, tags, and transfers rel-
evant information from the requirement sheet into the fact sheet. For this task,
several techniques from NLP are used. First, relevant words are localized in the
requirement sheet and tagged with an identifier, indicating what kind of informa-
tion the phrase contains. In NLP, this is a typical named entity recognition (NER)
task. In the next step, the tagged information is transferred to the fact sheet as a
key-value matching. Even if this algorithm can only transfer half of the relevant
data, the benefit is still significant, as some companies have to analyze more than
100 specification sheets per month. Furthermore, there is a benefit by automati-
cally highlighting the relevant parts of the requirement sheet and tagging it. Af-
terwards, a human employee double checks the transferred facts and validates
that no relevant information is missing. The highlighted section can guide them
through this step.
– (Semi-)automated offer creation:
After a fact sheet is available, an offer can be created. An RPA service can
(semi-)automatically calculate the total costs using the facts in the fact sheet
and the cost rates. Furthermore, CAD models that are similar to the fact sheet
and have similar requirements can be retrieved from recent offers for comparison.
Therefore, the requirements as well as the facts can be embedded in a multi-
dimensional space together with the CAD models using techniques from NLP (Le
and Mikolov, 2014) and computer vision (see Su et al., 2015). Similar CAD models
for a request can be retrieved in this multi-dimensional space. Afterwards, em-
ployees can be supported in the process by proposing similar CAD models, cost
rates, calculations, and more.
– Requirements and material planning:
Using the fact sheet and the information from the order as well as access to the cur-
rently and previously scheduled orders and the ERP system, the material planning
can be optimized using special optimization software. As an example, the opti-
mization target can be a faster or more cost-efficient production. Afterwards, an
RPA service can propose the optimization result and support employees in taking
these decisions.
– Predictive maintenance:
Defect machines can put a whole production line out of action. Maintaining ma-
chines in advance, before a defect happens, can keep the factory running, pre-
vent unexpected defects, and reduce the total downtime. Predictive maintenance
can be used to monitor machines by analyzing sensory streams, audio streams,
videos, or images for unwanted behavior (Fahim and Sillitti, 2019).
16.3.5 Others
Other tasks that are not directly concerned with the four mentioned main tasks can
also be automated.
– Taking simple or routine decisions:
Based on manufacturing data and information like the schedule, manufacturing
speed, etc., propose or take simple decisions. Rule mining and machine learning
can be used to derive these rules. If a rule can be applied, an RPA service can
propose the decision, predict the effects, and implement the decision (and ask a
human for verification if requested).
– Digitalize and automate older or analog machines:
Companies use their machines for many years. However, in order to integrate them
into automated production processes, they sometimes lack software or hardware
equipment, for example, older, non-computer-aided machines that use mechan-
ical buttons/keys that cannot be digitalized, machines where the software is not
maintainable or changeable anymore, or machines that lack connectivity. RPA
can help in those scenarios to integrate such machines into a fully digitalized fac-
tory. Therefore, hardware robots that press mechanical or display buttons, operate
levers, or collect and send sensory data from added sensors to the CIM system can
be installed. They replace a human worker required to operate such machines. In-
stead of one employee per machine, one employee can operate and monitor sev-
eral machines at once.
– Automated creation of bill of material (BOM):
As proposed by Madakam et al. (2019), an RPA service can be used to automati-
cally create the BOM for a product given the CAD model or other information.
In Table 1, the PEAS description of the RPA service will be given for each scenario. All
services use software based on CIM or similar systems. However, each service requires
access and works on a subset of information available in these systems.
326 | P. Pfeiffer and P. Fettke
Industrial companies usually have a large set of CAD models ranging from some hun-
dred to some thousand. Some manufacturers produce workpieces in product families
that have only very little variation from piece to piece. Furthermore, CAD models are
3D, which makes it more difficult to view them on a screen. Therefore, finding the cor-
rect CAD model to a workpiece is a demanding task that requires expert knowledge
and is very hard to solve for a non-expert. By using the algorithm, the following appli-
cations can be realized:
– CAD Retrieval: During the manufacturing process of a workpiece, information
about the order must be known at certain points in the process. As the order con-
tains information about the workpiece as a CAD model, the order and other infor-
mation can be retrieved when the CAD model of the workpiece at hand is known.
Using the algorithm, the CAD model and corresponding information (e. g., mea-
surement plan for quality check, other parts in this order, etc.) can be retrieved
using only an image of the workpiece.
– Retrieving the individual parts: Workpieces often consist of individual compo-
nents. By taking an image of the object, the RPA service can show the operator
the parts the workpiece consists of.
– Ordering of spare parts: Before ordering spare parts, the part and its name/ID must
be known. By using the system, the algorithm could order a spare part by just
taking an image of the broken object (assuming the object is still identifiable).
– Finding 3D-printable templates: For a given object (CAD model or image), the al-
gorithm can propose a set of similar 3D-printable objects, e. g., to replace a broken
or lost part.
In Figure 3, one can see a workflow as BPMN in which the CAD model for a workpiece
is required for the three following sample tasks. The left side of Figure 4 shows the
328 | P. Pfeiffer and P. Fettke
Figure 4: Left: BPMN without the Image-to-CAD system. Right: Workflow using the Image-to-CAD
system.
workflow retrieving the CAD model manually by searching the whole database before
being able to execute the sample tasks. On the right side, the retrieval process using
the Image-to-CAD system is shown. Technical details of the Image-to-CAD system will
be explained in the following. Instead of searching the whole database manually the
process changes slightly. First, an image must be taken (manually or automatically),
the Image-to-CAD system queried, and the correct model selected from the generated
proposal list of CAD models P. Instead of one manual task, the process now consists
of three steps. The first two steps can be automated. Selecting the correct CAD model
from the proposals in P should be done or at least validated by humans to avoid er-
rors. However, depending on the accuracy of the system, this task can also be auto-
mated.
16 Applications of RPA in manufacturing | 329
The algorithm is split into two stages solving different tasks and two phases – one for
online operation and one for offline training. Figure 5 shows the architecture of the
algorithm as one system, called Image-to-CAD system, that can be used to solve the
given tasks. The first stage’s (stage 1) task is to classify the object in the image while
in the second stage (stage 2), similar CADs for a given CAD model are found using the
database D of CAD models. As a result, the Image-to-CAD system proposes a list P con-
sisting of the top j CAD models from database D that are most similar to the object in
the query image. Note that the system is intended to propose a list P from which an op-
erator has to select the correct CAD model. Following the top j CAD models, other CAD
models in the database are concatenated. This has different reasons. As mentioned
before, selecting the correct CAD model from a list to an object at hand already is a
challenging task. The task becomes harder the more CAD models are in database D
and the bigger the product families become. If only one sample image is available, the
task is very complicated as only one perspective is shown, and details might be hidden
(e. g., if characteristics that identify the workpiece are on the not captured side of the
object). Therefore, the algorithm always proposes a list of j CAD models to show the
operator the most similar objects. The list and the following models can be ordered
based on the similarity proposed by the algorithm. If the operator has physical access
to the workpiece or more information available, he can go through the list and select
the correct one. Furthermore, by letting the operator pick the correct model from the
list P or the following models, ground truth annotations are generated which can be
used for further training. That is, during operation (online phase) the user takes an
image of a workpiece, lets the system propose a list of CAD models, and picks the cor-
rect one from this list (Case A). If the correct model is not in the top j proposals of P,
the operator can search the other models in the whole database D (Case B) for the cor-
rect one by going through the other entries following P. Thereby, the image becomes
annotated with its correct label and can be used as another training example in the
offline phase.
As the workpieces and CAD models are individual from operator1 to operator,
stage 1 must be able to adapt to new workpieces and to work precisely with only a
1 Operator denotes the company or person (user) who uses the machine. However, in the same com-
pany different persons can operate one machine but share the same set of CAD models.
330 | P. Pfeiffer and P. Fettke
few examples available. Therefore, a neural network designed to solve the few-shot
learning task will be used. The annotations generated during operation are used as
new samples for the few-shot approach. In each query, the model solves the K-way
N-shot classification task with varying number of samples per class. Stage 2 searches
for similar CAD models in database D given the classification result from stage 1. Fur-
thermore, the operator’s picks during operation together with the corresponding im-
ages are saved and will be used as new training examples to improve the whole sys-
tem accuracy. For stage 2, two different approaches using different representations
of CAD models are used. Different to stage 1, they can be pre-trained on large-scale
data sets and to rely on images and annotations from the operator’s individual work-
pieces. However, feedback can be used to further fine-tune the similarity search on the
operator-specific objects.
During operation, both stages work collaboratively to propose similar objects to
the queried one. When the system is not in operation, e. g., during nighttime or breaks,
the collected feedback from the operator serve as annotations to train on new objects
and improve the accuracy on existing ones. As feedback is actively used to optimize
the system, its performance in terms of accuracy will likely improve over time. The
gradually increasing availability of training data makes the system an online learning
or incremental learning model.
The Image-to-CAD systems approach splits the complex CAD retrieval problem
into two distinct tasks and makes use of approaches specifically developed to solve
each subtask. In literature, 3D object retrieval is often done in one algorithm. However,
such approaches do somehow need to bridge the domain gap between 2D images and
3D data to work in the setting in this work. Furthermore, the low number of sample
images per object class makes the task even harder. The approach at hand solves the
16 Applications of RPA in manufacturing | 331
object identification task using 2D information rather than information from 3D and
retrieves similar objects in 3D based on the 2D image classification result. Although 3D
object detection has made great progress in recent time, object classification in 2D is
better understood and archives higher accuracies, especially when it comes to cases
with very few samples per class. This two-stage approach is not only the first known
algorithm able to retrieve 3D objects from 2D images in an industrial setting with very
few training examples, both stages might also be able to increase the performance if
used together over the performance of each stage individually. Depending on the use
case, stage 1 and stage 2 can be used as a stand-alone version, e. g., to find similar CAD
models to a query 3D CAD model (CAD-based CAD retrieval) using stage 2. If only the
CAD model identification is required (Image-based CAD model identification), stage 1
can be used stand-alone.
16.4.1.2 Stage 1
Stage 1 identifies the object in the image by solving a classification problem. Addition-
ally, only a few training examples per object are available and the objects are changing
from time to time. As input, one real-world image showing the query object is given
(the algorithm can be changed to use multiple input images) and a classification result
C of the top k classes c2 is returned. Stage 1 has access to all the recently queried im-
ages together with their annotations. From the operator picks, stage 1 also recognizes
if a new object was added to the database. If no sample image with annotation is avail-
able for a workpiece in D, stage 1 cannot classify it. Stage 1 can only classify a work-
piece once an image has been taken and annotated by the operator. The more images
with annotations are available for one workpiece, the better the accuracy in identify-
ing this workpiece becomes. For example, an individual product for a customer that is
produced only once will be seen by the algorithm only a few times. We assume that the
average number of sample images per class is around 5. Therefore, the task is consid-
ered a few-shot problem. Each time an image of an object is queried and an annotation
is made by the operator, the image is used as a new shot (N + 1). In the case it is the
first image of a new object, it is added as a new class (K + 1) in the K-way N-shot task.
At a certain point in time, e. g., after 5 newly added images from known objects, a new
class got added or when the algorithm is not in use, stage 1 has to be retrained in order
to be able to classify newly added objects or optimize the performance using recently
added shots.
For solving stage 1’s task, the matching network (MN) as introduced by Vinyals
et al. (2016) will be used. MNs, a combination of neural network architecture and train-
ing method, are designed to solve the K-way N-shot task with few examples. In the pro-
2 The number k for the top k classification results is not related to the K in the K-way N-shot task.
332 | P. Pfeiffer and P. Fettke
posed work, a convolutional neural network (CNN) is used as feature extractor which
is also able to adapt to difficult lightning scenes, illuminations, or object appearances.
Different to “classical” image classification network architectures with stacked convo-
lutional and a final fully connected layer with SoftMax activation function, MNs use
stacked convolutional layers together with an attention kernel and a full context em-
bedding (FCE) layer. The attention kernel acts as a trainable discriminator with which
nearest neighbors can be found using a distance metric. The FCE embeds the previ-
ously seen examples in a contextual vector.
16.4.1.3 Stage 2
Stage 2 uses the classification result C as input and produces a list P of the top j CAD
models as output. P contains the most similar objects as CAD models to the ones in C.
Therefore, the model is doing a similarity search in D based on the classification re-
sults C. As CAD models of all objects are available in database D, 3D information can be
obtained from it. The similarity is therefore measured on this information rather than
the input images of stage 1. To compare the CAD objects against each other, some fea-
tures or characteristics must be found and compared. In literature, this is often done
by constructing a feature vector from the CAD model data. An image-based and a point
cloud-based approach will be used in stage 2 as feature extractors. Both are neural net-
works – one is using 2D images for the view-based and the other one sets of 3D coordi-
nates for the point cloud-based approach – to produce a feature vector while learning
to solve a classification task. After being trained, the classification layer is removed
and the penultimate layer is used to produce the feature vector. These are compared
using the L2 or cosine distance metric. The view-based approach uses multiple 2D ren-
ders from the same 3D object in different perspectives. To this end, the multi-view CNN
(MVCNN) introduced by Su et al. (2015) is implemented. The second method processes
3D information directly. Point clouds are unordered sets of 3D coordinates (x, y, z) in a
Euclidean space. PointNet++ (Qi et al., 2017) is used to process the 3D information and
extract features from it in a metric space. Like CNNs, PointNet++ processes the point
clouds in hierarchically ordered layers and abstracts local features along its hierarchy.
the correct CAD model, either from P (Case A) or other models in D concatenated to
P after the top j results (Case B). Searching the whole database is the fallback case
for the algorithm where searching and selecting the correct CAD model takes as much
time as without the help of the algorithm (plus the time to propose P).
The training mode (offline phase) is run whenever the machine is not in use or
the requirements for retraining are given. This can for example be the case if a certain
number of new images with the operator’s feedback has been recorded or an initial
image of a new object has been added. Other reasons for retraining are possible, too.
For example, if the user is unsatisfied with the current accuracy or unused objects
have been deleted.
Retraining stage 1 involves training the model on the K-way N-shot classification
task on all images and classes available so far. All recently added and all historical
feedback is used. K is the number of different workpieces while N is the number of
images per workpiece.3 As stage 2 is intended to be trained on large-scale data sets,
retraining stage 2 should only be done if the accuracy is bad or the results of the sim-
ilarity search are not satisfying.
To speed up the total processing time required in the online phase to find the most
similar objects to a given one, stage 2 computes the feature vectors of all objects and
finds the most similar objects using the distance metric. This information is stored as
the search index. The search index allows to access the most similar objects immedi-
ately without searching through the whole database D in the online phase. This speeds
up the total computation time in the online phase drastically.
16.4.2 Evaluation
16.4.2.1 Data sets
For the evaluation we used two different data sets. Unfortunately, there is a lack of
large image data sets containing objects whose CAD models are known and where the
images are annotated with the CAD model in the image. The first data set is Model-
Net40 (Wu et al., 2015), which consists of 12,114 CAD models from 40 different classes.
For this data set, no images are available. Therefore, renders were created that are
used as query input for evaluation and pre-training the MVCNN in stage 2. The MVTec
ITODD (Drost et al., 2017) data set consists of real-world images with annotations and
CAD models. There are more than 3,500 scenes with three different images from differ-
ent perspectives each, showing 28 different industrial workpieces. For each scene, the
CAD model in the image can be retrieved from another file in the data set. We had to
3 As N must be the same for all K object classes, random images of a workpiece are copied for all
classes with less than N images.
334 | P. Pfeiffer and P. Fettke
clean the images manually from scenes where different CAD models are in one image.
We kept images with multiple instances of the same workpiece.
16.4.2.2 Stage 1
4 https://github.com/oscarknagg/few-shot
16 Applications of RPA in manufacturing | 335
the online phase, Q is also a 20-way 1-shot task which consists only of the query image
copied 20 times. Note that it is not possible to populate Q with 20 different classes as
the query image class is unknown. All training images are used as the support set in
the online phase. We furthermore increased the image size when using the MVTec data
set from 28×28 pixels in the original implementation to 64×64 and used rotations as
image augmentation which increased the accuracy consistently across all tasks. Using
other rotations like flipping, cropping, or resizing decreases the accuracy when using
MN. The prediction that occurs most often when querying with Q is used as the top 1
result, the second most often as top 2, and so on. This version of MN with fixed classes
and modified querying method is used in the Image-to-CAD system. In the following,
we will evaluate the accuracy of stage 1 if used to identify the CAD model in an image.
As baseline (Baseline CNN) method, we used a fully supervised ResNet18 with
SoftMax classification layer finetuned on the data sets in the specific task. We first eval-
uated the effect of having fixed classes (MN fixed) and later the effect when modifying
the querying method (MN fixed & query). We trained each model in each setting 5 times
and averaged the accuracies. The results on the Omniglot data set are shown in Table 2
comparing the original MN implementation with the fixed class training and the base-
line method. In Table 3, results on the industrial MVTec data set are shown comparing
the accuracies of the MN with fixed classes and the modified querying method against
the baseline model. Note that the number of different classes is much lower on MVTec
but the images are very challenging and match the real use case much more.
Baseline CNN 52.00 % 52.80 % 22.50 % 24.00 % 6.80 % 7.84 % 3.55 % 5.06 %
MN (original) 90.32 % 95.92 % 90.54 % 95.48 % 86.33 % 94.75 % 83.77 % 93.04 %
MN (fixed) 74.44 % 92.44 % 48.39 % 82.34 % 36.68 % 73.59 % 27.94 % –
Baseline CNN 66.00 % 71.20 % 44.00 % 50.00 % 28.50 % 45.00 % 22.50 % 36.50 %
MN (fixed) 85.20 % 96.32 % 81.60 % 93.12 % 75.92 % 89.30 % 73.58 % 91.31 %
MN (fixed & query) 53.20 % 91.00 % 45.89 % 73.00 % 38.60 % 75.80 % 34.80 % 72.70 %
However, the results are still significantly higher than for the baseline model, which
reached 27.66 % on average on the same tasks. On MVTec, MN performs better than the
baseline model but the drop in accuracy when using the modified querying method is
very high. However, MN’s accuracy benefits significantly when using 5 shots in com-
parison to the baseline model. We further noted that training the MN on a higher num-
ber of classes than being tested on later increases the accuracy across all tasks. On
MVTec, the MN (fixed) trained as a 28-way 5-shot model reached 91.92 % when queried
on a 20-way 5-shot task in comparison to 89.30 % reached by the model trained on this
task. All these findings have been validated on the ModelNet40 data set where renders
of all model were used. Due to the larger number of models in ModelNet40, we tested
with up to 500 classes (500-way 5-shot).
We also investigated how much the number of shots influences the accuracy us-
ing MN with fixed classes and modified querying method. Doubling the number of
shots (N) from 1 to 2 increased the accuracy on MVTec by 31.60 % on average while on
ModelNet40, the accuracy increased by 701.59 % on average. The higher the number
of classes (K), the higher the increase. Going from 2-shot to 3-shot increases the accu-
racy by 15.44 % on MVTec and by 31.21 % on ModelNet40, while doubling from 5 to 10
shots increases the accuracy only by 13.20 % and 3.79 %, respectively.
16.4.2.3 Stage 2
Both approaches, the view-based MVCNN5 and point cloud-based PointNet++,6 are
available as pytorch implementation. We trained both approaches on the ModelNet40
shape classification task on the standard training and test split for which we created
renders and point clouds from each model. Therefore, we built our own pipelines for
rendering and point cloud sampling in order to ensure that the resulting data are con-
sistent across both data sets – ModelNet40 and MVTec. Figure 6 shows a render of
a CAD model from MVTec and a render of the point cloud with the coordinates ren-
dered as white spheres. Note that PointNet++ consumes the set of coordinates and
not the render of the point cloud. While MVCNN reached a classification accuracy of
85 % on ModelNet40, PointNet++ with multi-scale grouping reached 86 %. Figure 7
shows the confusion matrices of both approaches where one can see that both made
the same mistake at times. The flowerpot was frequently classified as a plant by both
approaches (upper right greenish quarter) or a vase (blueish quarter further right). On
the other side, MVCNN misclassified a stool as a chair while PointNet often misclassi-
fied the curtain as a keyboard.
5 https://github.com/jongchyisu/mvcnn_pytorch
6 https://github.com/charlesq34/pointnet2
16 Applications of RPA in manufacturing | 337
Figure 6: The same CAD model as render (left) and point-cloud (rendered visualization).
Figure 7: Confusion matrices (accuracy) of the MVCNN (left) and PointNet++ (right).
In the online phase of stage 2, the classification layer is removed and the output of the
penultimate layer used as the feature vector on which the similarity is computed using
the L2 distance. Retrieving similar CAD models using a query CAD model works very
well with both approaches on ModelNet40 and MVTec likewise. In almost all queries,
the results are very reasonable. However, both approaches have some tendencies that
could be noted. While the view-based approaches only propose objects where the ren-
ders are similar, the point cloud-based approach proposes models that are structurally
similar. In some examples, objects with similar structure have been rendered once in
a horizontal position and once in a vertical position – e. g., in Figure 8. While MVCNN
did not propose the horizontally rendered objects when querying the vertically ren-
dered ones, PointNet++ ignores such rotations and proposes differently oriented ob-
338 | P. Pfeiffer and P. Fettke
Figure 8: Two examples of P for the view-based approach (left from query) and the point-cloud-
based approach (right).
jects as well. However, MVCNN is more sensitive to fine structures but fails in samples
where the renders are faulty. The sensitivity to fine structures could be increased in
PointNet++ when using more than 1,024 coordinates per point cloud. However, this
further increases the computation time required.
It is also possible to train both approaches on MVTec only. However, due to the
lower number of samples and the fact that only one model per class is available, in-
stead of several thousands in ModelNet40, the retrieval results are better when trained
on ModelNet40.
Figure 8 shows two queries (render from a handle in the left and a real image of a
bracket from MVTec data set in the right), resulting in four proposals P of the top 5
results using the Image-to-CAD system in the Image-based CAD model retrieval task.
Both approaches in stage 2 used the same classification result C from stage 1. The first
row shows the top 1 proposal of stage 2, the second row the top 2 proposals, and so
on. The top 1 proposal is also the top 1 classification result from stage 1 (C). The cosine
similarity distance, noted on top of each proposed CAD render, is therefore 0 in this
16 Applications of RPA in manufacturing | 339
case. On the right, the query image contains multiple instances of a bracket. The top 1
proposal when querying the bracket is not the correct CAD model. Both proposed the
correct model as the top 2 proposal. However, both are similar components. Note that
this error is caused by stage 1 as stage 2 only proposes the top 1 classification result of
C as its top 1 proposal.
In the following, the top 5 accuracy of the Image-to-CAD system will be tested,
i. e., the accuracy when using the top 1 classification result from C generated by stage
1 and finding the top j similar CAD models using stage 2 based on the top 1 result of
stage 1. This reflects the performance of the model in the image-based CAD model re-
trieval task. The top 5 accuracy denotes how often the correct CAD model is in the
top 5 results of P divided by the number of queries. As the system is not in operation
now, user feedback cannot be obtained and processed. In all experiments, both ap-
proaches in stage 2 were pre-trained on all CAD models in the ModelNet40 data set.
This gave the best results across all tasks. Stage 1 is trained 5 times on random classes
and shots. After each training phase, the whole system will be queried on 200 random
samples (or the maximum number of samples available in settings with a lower num-
ber of classes) using MVCNN or PointNet++ in stage 2 and the top 5 accuracies will
be noted and averaged across all runs. For evaluating the Image-to-CAD system in a
productive environment, an iterative algorithm simulating the real use case is imple-
mented.
Table 4 shows the top 5 accuracies on the MVTec and ModelNet40 data sets. On MVTec
and the 1-shot setting, the PointNet++ approach reaches higher accuracies, while
MVCNN performs slightly better in the 5-shot setting. On ModelNet40, the PointNet++
approach is better except for the 200-way 1-shot setting. The standard deviation of the
Image-to-CAD system is 1.93 and 1.78 in the 28-way 5-shot on the MVTec data set using
MVCNN and PointNet++, and 1.28 and 3.58 on ModelNet40, respectively.
The top 1 accuracy of the Image-to-CAD system is by design bounded by the ac-
curacy of stage 1. If the top 1 result of C is not correct, the top 1 result of P is also not
correct, as stage 2 proposed its query object top 1 result. The accuracies of the Image-
to-CAD system are increasing if the top 5 accuracy is used. This implies that stage 2
is able to retrieve similar objects and enhance the top j performance. On all data sets
and on both approaches for stage 2, the top 5 accuracies reached by the Image-to-CAD
system are consistently lower than the top 5 accuracy of stage 1 alone, i. e., the clas-
sification result C. It was also tested if combining the proposals P from the top 1 and
top 2 results of C can increase the top 5 accuracy of the Image-to-CAD system. There-
fore, stage 2 was queried on the top 1 and top 2 results from C and both proposals
combined, ordered by their distance and the first top j entries proposed as the final P.
Unfortunately, this did not increase the accuracy.
340 | P. Pfeiffer and P. Fettke
MVCNN PointNet++
1-shot 5-shot 1-shot 5-shot
ModelNet40
5-way 100.00 % 100.00 % 100.00 % 100.00 %
20-way 24.80 % 87.00 % 25.40 % 87.30 %
K-way training
100-way 2.00 % 82.00 % 2.00 % 84.30 %
200-way 2.60 % 81.90 % 1.10 % 84.50 %
MVTec
5-way 100.00 % 100.00 % 100.00 % 100.00 %
10-way 64.60 % 80.10 % 67.00 % 71.10 %
K-way training
20-way 44.50 % 79.20 % 45.80 % 77.10 %
28-way 43.40 % 83.20 % 45.40 % 83.30 %
Beside the static test on fixed K-way N-shot settings, the system will now be tested on
constantly increasing numbers of classes and samples. Therefore, a script was written
that iteratively either adds a new class (way) or new sample (shot), trains stage 1 on
the new setting, and tests its accuracy. Adding a new class (way) represents the initial
run when the operator queries the Image-to-CAD algorithm and picks a certain CAD
model from the database. Adding a new sample (shot) represents the case where an
already known workpiece is used in the Image-to-CAD system once more. Each time
a new sample is added, a random shot for a random class is selected and added to
the training set. Therefore, the number of samples the model is trained on increases
only for one class each time – not for all classes. For all other classes, the available
shots are used once more to balance the number of shots across all object classes. The
number of samples per class is therefore not balanced, which means, for example,
there might be classes for which 3 different samples (shots) exist, while for others, the
same sample (shot) is used 3 times. This script is intended to simulate the real use
case where new classes and samples are added from time to time but the utilization
is different from workpiece to workpiece – i. e. the number of times the workpiece is
queried with the Image-to-CAD system. It is run 5 times for MVCNN and PointNet++
each.
Figure 9 shows the top 5 accuracies and number of samples for one simulation
run using MVCNN. Starting with 1 class and 1 sample, a new random shot (sample)
was added to one random class every third iteration, while in each other iteration a
new class (way) was added. The K line shows the number of classes (ways) while its
color indicates the maximum number of samples (shots) available. As one can see,
with increasing use of the system, the number of classes and shots increases as well.
The accuracy is decreasing after the 7th iteration but tends to flatten (on average) from
16 Applications of RPA in manufacturing | 341
Figure 9: Top 5 accuracies in one iterative training run on the MVTec data set using MVCNN.
the 27th iteration on. The reached accuracies in the last iteration between all simula-
tion runs are similar on average (standard deviation of 2.04 and 4.28). The averaged
final top 5 accuracies reached in all 5 runs are 51.55 % using MVCNN and 46.83 % using
PointNet++. Due to the imbalanced number of samples per class, the accuracies are
lower than the 28-way 5-shot accuracies reached in the previous, static experiments.
Note that the accuracies between each run and between MVCNN and PointNet++ can-
not be compared directly as the number of samples and shots is different from run to
run due to the random adding of samples.
Table 5: (continued)
Sarkar and Object CAD model Write Ready query Domain adaption
Stricker recognition database recognition image, CAD by placing renders
(2019), recall model database, in real
Sarkar and synthetic environments and
et al. images fine-tuning CNNs
(2017)
Li et al. Area under curve CAD model Write Ready query Training a CNN to
(2015) (AUC) database proposals image, CAD map images and
model database, 3D shapes into a
and real image shared
database embedding,
retrieving similar
3D objects by
nearest neighbor
search in the
embedding space
ages (Bosche and Haas, 2008; Chang et al., 2015; Wang et al., 2014; Wu et al., 2015). As
these put another restriction on the use of the approach, they will not be discussed.
All of the presented methods have in common that they need to bridge the domain
gap between 2D images and 3D CAD model representation. Filaliansary et al. (2005)
presented a probabilistic approach to retrieve a CAD model given a 2D image. In a
first step, they selected characteristic views of a CAD model that represent the model
best by capturing it from many different perspectives and generating descriptors of
it. Three different descriptors were used – curvatures histogram, Zernike moments,
and curvature scale space – but only Zernike moments were applicable in their set-
ting. When querying an image, the approach computes the probability that the ob-
ject in the image belongs to one characteristic view – for all objects and views. They
demonstrated that the approach works with synthetic and real images on a set of me-
chanical parts. The presented idea is widely used in CAD model retrieval literature,
but the implementation uses outdated feature descriptors and has a very high com-
plexity. Different methods use similar retrieval approaches with 2D views, e. g., graph
models in Gao et al. (2010) or Hausdorff distance learning in Gao et al. (2014). In order
to get better feature descriptors, Leng et al. (2015) used a stacked local convolutional
autoencoder on the characteristic views. Grabner et al. (2018) proposed a method that
renders a variety of views of a CAD model offline from different perspectives. When
querying an image, the pose is estimated first and the candidate CAD model is found
using a trainable matching between images and renders in a certain pose. Sarkar and
Stricker (2019) and Sarkar et al. (2017) proposed and improved a method that extracts
344 | P. Pfeiffer and P. Fettke
features from snapshots of CAD models – renders of CAD models in varying poses
in real-world images used as background. Different to these methods, Li et al. (2015)
proposed a method that created a joint embedding between renders and real-world
images of CAD models.
16.6 Conclusion
In this chapter, new applications of RPA for industrial manufacturing were introduced
alongside the well-known Y-CIM model. We have shown that there is a large variety of
tasks in manufacturing that can be automated and supported by RPA services. Beside
simple applications from office domains that can be adopted to the industrial domain,
there are also simple tasks in the industrial domain, e. g., manufacturing data entry
or simple decision-making where RPA can bring similar benefits. Furthermore, there
is a large number of complex and cognitive demanding tasks where cognitive services
can be applied. CAM, CAP, and CIM build the ideal foundation to implemented RPA
solutions in the industrial domain. The presented Image-to-CAD system is one exam-
ple of a cognitive RPA service in manufacturing that was implemented and evaluated
with very realistic and challenging data. It is able to automate a variety of tasks in
the manufacturing process, e. g., help employees in retrieving the correct CAD model
of the workpiece at hand. In assembly line production, the Image-to-CAD system can
save a lot of time when many products must be investigated. It automates a repetitive,
error-prone, and cognitive demanding task that is usually done by humans. It uses a
lower-level interface (database D) and runs as a software tool on existing information
systems. Changes to existing workflows and information systems are minimal. The
accuracy of the Image-to-CAD system depends on the number of shots in comparison
to the number of different classes. If 5 samples of each workpiece are available, the
accuracy is very high. If the number is imbalanced, the accuracy decreases. Further-
more, MN accuracy diminishes a lot when modifying the querying strategy to single
image queries. On the other side, using more than one shot increases the accuracy
tremendously. For stage 2, both approaches obtain very reasonable results in retriev-
ing similar CAD models. The system shows that few-shot learning and view-based as
well as point-cloud-based methods have great potential to support employees in their
daily tasks.
Bibliography
Ansari WA, Ali W, Diya P, Patil S, Patil S (2019) A review on robotic process automation – the future of
business organizations. SSRN Electron J
Atos (2020) Robotic Process Automation (RPA) for Manufacturing. Digital Transformation
16 Applications of RPA in manufacturing | 345
Bosche F, Haas CT (2008) Automated retrieval of 3D CAD model objects in construction range
images. Autom Constr 17(4)
Chang AX, Funkhouser T, Guibas L, Hanrahan P, Huang Q, Li Z, Savarese S, Savva M, Song S, Su H,
Xiao J, Yi L, Yu F (2015) ShapeNet: an information-rich 3D model repository. Stanford University,
Princeton University, Toyota Technological Institute at Chicago
Drost B, Ulrich M, Bergmann P, Härtinger P, Steger C (2017) Introducing MVTec ITODD — a dataset
for 3D object recognition in industry. In: 2017 IEEE international conference on computer vision
workshops (ICCVW)
Fahim M, Sillitti A (2019) Anomaly detection, analysis and prediction techniques in IoT environment:
a systematic literature review. IEEE Access 7:81664–81681
Feld T, Hilt B, Homburg O, Konz A, Lehmann H, Linn C, Storck U, Werth D, Scheer AW, Wittenburg
G, Ziewer P (2017) Wie Unternehmen von Robotic Process Automation profitieren - Automate,
Predict, Inspect, Assist, Optimize. In: Scheer AW, Feld T (eds) Working paper scheer holding
2017. Scheer Holding
Fettke P, Loos P (2019) “Strukturieren, Strukturieren, Strukturieren” in the era of robotic process
automation. In: The art of structuring: bridging the gap between information systems research
and practice. Springer, Berlin
Filaliansary T, Vandeborre J-P, Daoudi M (2005) A framework for 3D CAD models retrieval from 2D
images. Ann Télécommun 60(11)
Gao Y, Tang J, Li H, Dai Q, Zhang N (2010) View-based 3D model retrieval with probabilistic graph
model. Neurocomputing 73(10)
Gao Y, Wang M, Ji R, Wu X, Dai Q (2014) 3-D object retrieval with Hausdorff distance learning. IEEE
Trans Ind Inform 61(4)
Grabner A, Roth PM, Lepetit V (2018) 3D Pose Estimation and 3D Model Retrieval for Objects in the
Wild. CoRR
Groover M, Zimmers EWJR (1983) CAD/CAM: computer-aided design and manufacturing. Pearson
Education, Upper Saddle River
Houy C, Hamberg M, Fettke P (2019) Robotic process automation in public administrations. In:
Digitalisierung von Staat und Verwaltung
Ivančić L, Suša Vugec D, Vukšić VB (2019) Robotic process automation: systematic literature review.
Springer, Berlin
Krupka D, Becker N (2020) Anwendungsszenarien KI-Systeme in der Produktionsautomatisierung.
Gesellschaft für Informatik e. V. (GI)
Lake BM, Salakhutdinov R, Tenenbaum JB (2015) Human-level concept learning through probabilistic
program induction. Science 350
Lasi H, Fettke P, Kemper H-G, Feld T, Hoffmann M (2014) Industry 4.0. Bus Inf Syst Eng 6(4):239–242
Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: International
conference on machine learning
Leng B, Guo S, Zhang X, Xiong Z (2015) 3D object retrieval with stacked local convolutional
autoencoder. Signal Process 112
Li Y, Su H, Qi CR, Fish N, Cohen-Or D, Guibas LJ (2015) Joint embeddings of shapes and images via
CNN image purification. ACM Trans Graph 34
Lin SC, Shih LH, Yang D, Lin J, Kung JF (2018) Apply RPA (robotic process automation) in
semiconductor smart manufacturing. In: 2018 e-manufacturing & design collaboration
symposium (eMDC)
Madakam S, Holmukhe RM, Durgesh Kumar J (2019) The future digital work force: robotic process
automation (RPA). J Inf Syst Technol Manag 16
Nederland, Knowledgebase Scheer (2019) Manufacturing and RPA. Robotic Process Automation –
Industry Best Practices Manufacturing
346 | P. Pfeiffer and P. Fettke
Qi CR, Yi L, Su H, Guibas LJ (2017) PointNet++: Deep Hierarchical Feature Learning on Point Sets in a
Metric Space. CoRR
Rehse J-R, Dadashnia S, Fettke P (2018) Business process management for industry 4.0 – three
application cases in the DFKI-smart-lego-factory. IT, Inf Technol 60(3):133–141
Sarcar MMM, Rao KM, Narayan KL (2008) Computer aided design and manufacturing. PHI Learning
Pvt. Ltd.
Sarkar K, Stricker D (2019) Simple domain adaptation for CAD based object recognition. In:
International conference on pattern recognition applications and methods (ICPRAM-2019)
Sarkar K, Varanasi K, Stricker D (2017) Trained 3D models for CNN based object recognition
Scheer AW (1990) CIM computer integrated manufacturing. Springer Verlag, Berlin Heidelberg
Scheer A-W (2012) CIM computer integrated manufacturing: towards the factory of the future.
Springer Science & Business Media
Scheer A-W, Jost W, Gungoz Ö (2007) A reference model for industrial enterprises. Reference
modeling for business systems analysis. IGI Global, pp 167–181
Su H, Maji S, Kalogerakis E, Learned-Miller E (2015) Multi-view convolutional neural networks for 3D
shape recognition. In: 2015 IEEE international conference on computer vision (ICCV)
van der Aalst W, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng 60(4)
Vareille J, Espes D, Autret Y, Le Parc P (2016) Low-cost high-tech robotics for ambient assisted living:
from experiments to a methodology. J Intell Syst 25(4):455
Vinyals O, Blundell C, Lillicrap TP, Kavukcuoglu K, Wierstra D (2016) Matching networks for one shot
learning. CoRR
Wang Y, Feng J, Wu Z, Wang J, Chang S-F (2014) From low-cost depth sensors to CAD: cross-domain
3D shape retrieval via regression tree fields. In: Fleet D, Pajdla Bernt Schiele T, Tuytelaars T
(eds) Computer vision – ECCV 2014. Springer International Publishing
Wang Y, Yao Q, Kwok J, Ni L (2020) Generalizing from a few examples: a survey on few-shot learning.
ACM Comput Surv 53:1–34
Wu Z, Song S, Khosla A, Yu F, Zhang L, Tang X, Xiao J (2015) 3D ShapeNets: a deep representation for
volumetric shapes. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR)
Xian Y, Lampert CH, Schiele B, Akata Z (2018) Zero-shot learning—a comprehensive evaluation of the
good, the bad and the ugly. IEEE Trans Pattern Anal Mach Intell 41(9)
|
Part V: RPA practice
Eldar Sultanow, Alina Chircu, René Plath, Daniel Friedmann,
Tim Merscheid, and Kalpesh Sharma
17 AI evolves IA
A practitioner view on artificial intelligence information
architecture
Abstract: In this chapter we develop an information architecture (IA) model for arti-
ficial intelligence (AI) technologies organized in four domains: human–computer in-
teraction, robotic process automation (RPA), cognitive Internet of Things (Cognitive
IoT), and customer service automation. The model showcases the business capabil-
ities afforded by the AI technology in a variety of industry sectors such as automo-
tive, pharma, hospitality, energy, public, logistics, entertainment, aviation, finance
and insurance, and E-commerce. The methodology used in this chapter is based on
well-established processes of developing an IA, informed by an analysis of AI use
cases published in academic and practitioner literature. The model can help compa-
nies integrate these technologies into a structural design within a shared information
environment, and offers a blueprint for understanding their benefits. In addition, the
model can serve as a source for innovation by showcasing applications in different
sectors. Individual employees and educators can also benefit from the model by un-
derstanding the impact of AI on current jobs and identifying upskilling and reskilling
needs and strategies.
17.1 Introduction
Artificial intelligence (AI), an academic and practitioner field focused on building sys-
tems that exhibit intelligent behavior (Asensio et al., 2014; Laird et al., 2017), was once
only science fiction. AI was first popularized in movies in which intelligent machines
sometimes helped humans, but more often overtook and enslaved mankind, terrify-
ing moviegoers and leaving them with mixed feelings about AI’s potential impact on
society. Today, however, AI has become a reality in many areas of the economy and so-
ciety. As AI technologies become more powerful, they are more and more able to solve
complex problems in an expanding number of settings, such as banking and finance,
healthcare, manufacturing, and government – just to name a few. AI’s benefits for
businesses include creating efficiencies, improving and standardizing processes, dis-
covering previously invisible patterns, learning from experience, and providing pre-
dictions.
https://doi.org/10.1515/9783110676693-017
350 | E. Sultanow et al.
2017). To evaluate the results, AI researchers use tests based on the “imitation game”
originally proposed by Turing in which judges observe behavior (such as providing
answers to questions or playing a video game) and try to determine if it is generated
by a human or not (Asensio et al., 2014).
Many AI researchers agree that in order to have human-like capabilities and emu-
late human minds, an AI-based system must incorporate several different components
– perception and motor, working memory, declarative long-term memory, and proce-
dural long-term memory, as well as processing algorithms for each capability and for
interaction and information exchanges among the components (Laird et al., 2017). The
memory components store, maintain, and retrieve content – both domain data about
symbols and their relationships, and metadata such as frequency, recency, etc. The
perception component converts external signals (vision, audition, etc.) into memory
content, while the motor component converts the memory content into external action
(Laird et al., 2017). The processing algorithms enable the system to operate by perform-
ing cognitive cycles and learning – i. e., automatically creating new symbol structures,
adjusting the metadata, and allowing the adaptation of the perception and motor sys-
tems (Laird et al., 2017). A machine that interacts with its environment, for example,
needs to identify objects in this environment. The technology behind this capability
is called computer (or machine) vision. The input data generated with video sensors
are converted and processed using machine learning (ML) algorithms that mimic what
happens in a human brain with visual processing, automatically discover patterns in
huge amounts of data, and learn from experience. The resulting AI-supported system
can thus continuously improve its abilities for decision-making and predictions. With
the help of natural language processing (NLP) the machine can also communicate its
decisions and predictions to a human using natural language (Laurent et al., 2015).
AI technologies will affect every department as well as most processes and em-
ployees of a company. Those who want to keep up with the rapid advances in AI tech-
nology face the challenge of drastically reshaping their entire organization. Existing
products and even whole business models will be changed by AI-based technologies
(Reeves, 2018). Companies that can rapidly adopt and effectively embed AI in their
operations are likely to enjoy long-term competitive advantage, as the technology–
process combination and AI’s ability to learn from the past will create dynamic capa-
bilities and path dependencies that will be difficult to imitate by others (Schoemaker
et al., 2018).
17.3 Methodology
The methodology used in this chapter is based on the well-established processes of
developing an IA (Evernden and Evernden, 2003; Gartner, 2018a; Information Archi-
tecture Institute, 2013), informed by the design science approach (Vaishnavi et al.,
2017). The methodology for developing the IA included deciding which information is
needed and which dimensions will be used to organize it, creating diagrams based on
the chosen dimensions (such as table or grid structures comparing one architectural
dimension against another), and providing related descriptions, definitions, and ex-
amples of how the information is or could be used (Evernden and Evernden, 2003).
To facilitate this process, we conducted a review of both academic and practitioner
literature, we used experiences from real-world projects conducted by several of the
chapter authors, and we sought feedback on the model content from industry experts,
who commented on its usefulness.
17 AI evolves IA | 353
Figure 1: Overall IA for AI: AI technologies, industry sectors, and business capabilities.
detailed diagram in Figure 2a and b. The elements of the model are explained in de-
tail in the next sections. The model reduces the complexity of the AI information envi-
ronment to only two dimensions: the technology domains and relevant sub-domains
(shown on the y-axis) and the industry sectors (shown on the x-axis). The intersec-
tions between domains and sectors show AI business capabilities and concrete use
cases of AI within the sectors. To meet the requirement of simplicity the model can
only show a selection out of the wide range of possible sectors. However, because of
the methodology we followed, the model has the advantage that all dimensions that
can be extended as new AI technologies are developed and applied in different sectors.
Computer vision, also known as machine vision, acts like the eye of a machine. The
impressions the machine gets from its video sensors are interpreted by ML algorithms.
To accomplish this, training of the algorithms requires evaluating a huge amount of
image data in order to increase the ability to recognize or even interpret complex im-
ages (Marr, 2018).
NLP and natural language generation (NLG) enable communication between comput-
ers (or machines in general) and humans in a natural language. While NLP means
the ability of a machine to understand natural language, NLG has the aim to enable
machines to answer in a natural language (Paris et al., 1991).
In general, the actions performed by RPA software bots are rule-based. A new ap-
proach is adding AI technologies to make the software bots “smart.” This way data
that are collected while running the processes as well as further data input can be
used to fulfill more complex tasks using ML techniques (Kroll et al., 2016).
opinions. With the new possibilities AI offers, enterprise transactions and event logs
can be automatically analyzed, and underlying processes can be documented fully
and objectively. Furthermore, processes can be simulated, and the results can be used
to optimize processes in a more cost-effective way (Tian, 2017).
IoT-enabled smart physical things are equipped with sensors that capture and share
a large amount of data about and with their environment in real-time. This data is up-
loaded into the cloud, making it accessible from everywhere, and enabling advanced
analytics to be performed as needed. The ability of IoT-enabled things to communicate
with each other and interact with their external environment is the basis for automa-
tions in every sector (Rajguru et al., 2015).
speeds up the issue resolution for the customer while the involved systems con-
stantly learn from the input and thus provide a better understanding of the customer.
Additionally, the company saves resources that can be used elsewhere (Schneider,
2017).
17.5.4.1 Self-service
Self-service follows the trend of customers trying to help themselves without interac-
tion with another human. Kiosks with touchscreens and displays enable the customer
to virtually try out products or place orders. Thus, the customer can inform him- or
herself about a product or service, customize it based on his preferences, and man-
age the whole purchase process on his own. However, the ways in which self-service
technologies are used differ from industry to industry (Salas, 2017).
Virtual assistance is a technology based on ML, speech recognition, and NLP that
interacts with a user and is able to hold an end-to-end conversation with him or her
(written or spoken) to help him or her with his specific request. Virtual assistance
applications attempt to understand commands, as well as the intent and context
of the request, even with lots of background noise. Virtual assistance applications
also attempt to personalize responses based on the identified voice of the interacting
user.
This technology can appear in the form of chatbots – which are rule-based soft-
ware bots that can help the user with simple repetitive tasks. Chatbots are text-based
dialogue systems that replace classic and inflexible FAQ pages. There are two differ-
ent types of chatbots: retrieval-based and generative bots. In the first approach, after
evaluating the request, the chatbot accesses a response repository. In the generative
approach, a chatbot learns from past conversations and their answers. These can be
conversations from person to person. Typical requests to a chatbot in the area of E-
commerce are the requests for the dispatch status of an order or help with the com-
missioning of newly purchased devices. If the system can no longer answer a question
independently, it can then be forwarded to a human support employee. Chatbots can
reduce the costs of customer service support up to 30 % (Techlabs, 2017).
When virtual assistance is combined with AI technology, the term “virtual agent”
is used. A virtual agent is able to guide the customer through complex processes. It
can hold an end-to-end conversation, it can understand what the customer wants
to achieve, and it learns and uncovers patterns. Connected to other systems, it pro-
vides insights that help meet the customer’s needs and improve the customer service
(Backhshi et al., 2018).
358 | E. Sultanow et al.
Figure 2: Detailed model showing AI-based capabilities (Part 1 – automotive, pharma, hospitality,
energy, and public industry sectors).
17 AI evolves IA | 359
Figure 2: (continued). (Part 2 – logistics, entertainment, aviation, finance and insurance, and E-
commerce industry sectors).
360 | E. Sultanow et al.
17.5.4.3 Personalization
The idea behind personalization is to customize the products, services, and every
touchpoint in the customer journey for each individual customer. The spectrum of in-
teractions that can be personalized is large – from simple product recommendations
to real-time redesign of websites. Based on a wide variety of data sources and ML algo-
rithms, personalization is the key to a positive customer experience and to generating
new business by cross-selling and up-selling (Schneider, 2017).
17.6.1 Automotive
The automotive industry is facing new trends such as autonomous driving, connectiv-
ity, electric cars, and car sharing. For all of these trends, AI is either the basic tech-
nology or is playing a major role. The domain of cognitive IoT in particular contains
many use cases starting from the manufacturing of a car as a physical product to the
maintenance of the car and the services that require a car that is able to interact with
its environment (Kässer et al., 2018). Autonomous driving alone has a great demand
for technologies from almost every domain in our model. Enabling a car to drive by
its own requires an interface with its surroundings. This is where specified IoT sen-
sors come into play. These sensors collect huge amounts of complex data during test
rides, which are processed by ML algorithms (Ravindra, 2017). Furthermore, we iden-
tify applications of AI-based technologies – smart factories – that are not limited to
the usage in the automotive sector. Nevertheless, the automotive sector is the one that
puts the most effort in the realization of smart factories (Gill et al., 2017). Cognitive IoT
is the most relevant domain in this context. A smart factory contains a high number
of items that are equipped with sensors and are connected in a network. The coordi-
nation and effective communication of the participants within this network requires
advanced AI technologies. A smart factory, however, is more than just the interaction
among physical items. The integration of enterprise resource planning (ERP) systems
or manufacturing execution systems (MESs) is a necessary prerequisite for the realiza-
tion of an autonomous operating smart factory. This involves the RPA domain in our
model as well (Radziwon et al., 2013).
17 AI evolves IA | 361
17.6.2 Pharma
Like in the automotive industry, the pharmaceutical industry is affected by major de-
velopments in AI technology. Cognitive IoT is one of the most relevant AI technologies
regarding use cases with a high benefit potential. IoT can help collect data that the
industry is depending on. Because of the high complexity of the supply chain within
the pharma industry, real-time decision-making is very difficult. The advantages of
IoT equipment are the way to face these challenges. Based on the data that is recorded
by sensors, all along the supply chain and the processing of these data with help of
ML and RPA, decisions can be made much more efficiently and the error rate that is
caused by the big variety of different systems can be significantly reduced (Behner
and Ehrhardt, 2016). In addition to this, the pharma industry operates in a regulatory
environment which requires extensive monitoring. IoT can help companies document
the production processes in order to meet strict regulations.
Disease identification and diagnosis of ailments are primary topics of the pharma
industry. ML has a high potential to advance these fields (Faggella, 2018). Pharma
product development can benefit from collecting large amounts of data from individ-
uals in order to improve treatment and prevent adverse effects in patients. The effi-
ciency of drug discovery increases significantly by the data which the patients col-
lect and provide. Further, the performance of new drugs can be monitored to a much
higher extent than before. With the analysis of such data, the effectiveness of medical
treatments can be understood and improved in a significant way. The data collection
362 | E. Sultanow et al.
can be outsourced in part to the patient him- or herself, who uses smart devices to
record health and body vitals data. The process includes use cases that fall under the
domain self-service and its sub-domain personalization especially through the use of
wearable devices. In 2017 around 140 million wearable devices were sold, and around
453 million sales are expected in 2022 (Gartner, 2019). The number of features and
functions are increasing, and more wearables now include health-related functions,
such as monitoring one’s heart rate or even recording an electrocardiogram (ECG) to
be sent to a doctor, as in the case of the Apple Watch. It is likely that in years to come,
patients will collect comprehensive data on their health conditions themselves. This
information can be precious for diagnosis, especially if the wearable device is a daily
companion of a patient. ML can help to process these data and detect abnormalities
– which can lead to scheduling doctor or emergency room visits, starting or changing
treatment, and a more targeted process overall. In addition to the sensors in wearables
worn by the patients, there are sensors that can be taken as a pill. These smart pills
are able to record data about the condition of the patients and the performance of a
treatment that wearables could not access. This can be valuable not only for research
and development purposes but also as a lifesaver in cases where the smart pill in col-
laboration with a smartwatch or a similar device can remind the patient to take the
medicine or consult a doctor (Champagne et al., 2015).
Many interesting use cases exist in the HCI and computer vision sub-domain in the
area of disease detection. For example, researchers have developed artificial neuronal
networks (ANNs) which compute the likelihood of breast cancer based on the interac-
tion of genes, nutrients, and demographic indicators, with an accuracy of about 94 %.
In addition, systems designed for the detection of cancer metastases showed an error
rate of 7.5 % for AI systems, an error rate of 3.5 % for human pathologists, and an er-
ror rate of only 0.5 % for human pathologists supported by AI (National Science and
Technology Council, 2016), showing the potential for collaboration between doctors
and AI to significantly improve detection. AI can also support endoscopic interven-
tions for diagnosis or treatment. While these minimal interventions allow wounds to
heal faster and minimize the risk of infection, they need to be performed at very early
disease stages in order to be successful. ML can help to process sensor data and to
draw further conclusions with the goal of detecting malignant changes earlier so that
therapy is still possible (Magoulas and Prentza, 2001). By analyzing data with ML,
multiple interventions can be avoided. This is especially valuable for elderly patients,
as each additional surgery is a burden on their overall state of health.
17.6.3 Hospitality
The hospitality sector puts a lot of effort in the automation of the customer service.
Via self-service applications, the customer can perform time-intensive procedures like
17 AI evolves IA | 363
check-ins and check-outs on his or her own. In an interaction with the devices and ap-
plications, the customer generates data that can be used to personalize offers and help
improve customer satisfaction (Taylor, 2017). In general, hotels have the problem that
their staff spends too much time with tasks that are monotonous and repetitious – a
problem that can easily be solved with current AI technologies. The key term here is
“intelligent hotel” – which relies on almost every technology domain we investigate
in this paper. Voice-activated services are already a common application of NLP tech-
niques. These techniques also form the basis for the interaction between hotel guests
and physical concierge robots. Self-service in the form of digital assistance helps re-
duce monotonous and repetitious tasks that otherwise would burden resources. These
resources now can be used to enhance the travel experience of the customer. The in-
teraction between the guests and the AI applications, in turn, are a source of data that
in a second step will be processed by ML algorithms. This leads to an increasing un-
derstanding of customer needs. During the planning of the travel, AI can be used by
providers to submit a personalized offer (Phillips, 2018). When it comes to dining out,
customer can book a restaurant table in interaction with a virtual assistant, and kiosks
can be used to speed up the order process. Based on AI, kiosks can recommend meals
to the customer based on his or her eating preferences or demographic data (Sennaar,
2018). During their whole journey, travelers benefit from personalized offers and from
saving time, which can lead to increased customer satisfaction, resulting in competi-
tive advantage for the providers using AI technologies.
17.6.4 Energy
The energy sector is characterized by two dominating topics: first, the prevention of
breakdowns and the maintenance of the grid, and second, the improvement of energy
efficiency. The cognitive IoT domain of the model is the most relevant one in this con-
text. The concept of a smart grid is to interconnect all participants in a power grid – in-
cluding areas of generation, storage, and consumption. The energy system, therefore,
supplies not only the actual electricity but also a large number of metrics. The smart
grid gives feedback about its internal state, and this way helps prevent breakdowns. If
an incident occurs nonetheless, the field workforce can fix damages much faster due
to the real-time information provided by the smart grid. AI can be used for grid reli-
ability and resilience, including rapid damage assessment and information sharing
for power restoration (SEAB, 2020). Two companies in this area are Brain4Drones LLC
and Elintrix. Brain4Drones (Brains4Drones, 2020) seeks to reduce outage durations,
improve the resilience of the energy sector, and keep linemen and first responders safe
by developing an accessory for drones that would enable them to rapidly assess the
condition of overhead distribution lines and transmitting those data back to the util-
ity. Elintrix (Elintrix, 2020) seeks to inform protective relaying operation and reduce
364 | E. Sultanow et al.
– less useful than one that can reliably deliver power at a set time. In search of a so-
lution to this problem, DeepMind and Google started applying ML algorithms to 700
megawatts of wind power capacity in the central United States. These wind farms –
part of Google’s global fleet of renewable energy projects (Katz, 2020) – collectively
generate as much electricity as is needed by a medium-sized city. Using a neural net-
work trained on widely available weather forecasts and historical turbine data, the
DeepMind system has been configured to predict wind power output 36 hours ahead
of actual generation. Based on these predictions, an ML model recommends how to
make optimal hourly delivery commitments to the power grid a full day in advance.
This is important, because energy sources that can be scheduled (i. e., can deliver a
set amount of electricity at a set time) are often more valuable to the grid (Elkin and
Witherspoon, 2019; Katz, 2020). ML and related techniques can also support invest-
ment optimization (Mahendra, 2019) – as in the case of BP using AI to enabling them
to analyze seismic images and geological models to increase the chances of success
when drilling wells (BP, 2017).
longer than expected. RPA definitely can improve these processes already to a high ex-
tent but even beyond that, AI allows predicting scenarios. This way time-consuming
tasks can be organized in a way that the response time can be further reduced (Mehr,
2017). Less obvious is the fact that even the cognitive IoT domain has significant ben-
efits for the public sector. There is for example the public transportation system that,
equipped with sensors, provides the citizens with real-time information about the
buses or trains they are waiting for. Another transportation-related use case for cog-
nitive IoT technology is the possibility of real-time analytics of traffic to prevent traffic
congestions (Maissin et al., 2016).
17.6.6 Logistics
Tractica Research estimates that the worldwide sales of warehousing and logistics
robots will reach 22.4 billion USD (Tractica, 2020) by the end of 2021. Robots are locat-
ing, tracking, and moving inventory inside warehouses, and they are conveying and
sorting oversized packages (Williams, 2010) at ground distribution hubs. The logistics
sector continuously stands under high pressure as transportation costs depend a lot
on fuel prices. To manage the risk of rising fuel prices, regulations, or other external
impacts which the logistics sector has no control over, the logistic managers must op-
timize all processes as a whole. Logistics has always been dealing with many sources
of information. IoT technologies now generate even more data that must be managed
because it is essential to overcome challenges (Taylor, 2017). ML algorithms can pro-
cess the data and use them to predict demand and improve capacity planning, routing,
and pricing. AI-generated insights can improve many facets of the supply chain like
route optimization and supply chain transparency. For example, UPS was able to save
10 million gallons of fuel annually (Kendall, 2017) by optimizing driver routes, and
companies are getting smarter with last-mile deliveries (Lebied, 2017). Predictive anal-
yses are further used for better risk management, which is a condition to ensure sup-
ply chain continuity. Platforms can integrate several players along the supply chain
and allow them to have access to the data and analytics. This is useful because of the
dependency between the players (Gesing et al., 2018). Because of the dependencies
within the supply chain, the breakdown of involved machines, transport vehicles, or
other technical equipment of the chain can lead to serious consequences. This risk
can significantly be lowered by IoT sensors that continuously give status updates as
a basis for predictive analytics and predictive maintenance (Riedl, 2018). By offering
IoT-enabled condition monitoring, spare parts, and equipment repair services, origi-
nal equipment manufacturers can remotely monitor asset health in their customers’
plants, anticipate failures, order the parts, and often execute repairs before the failure
occurs.
AI analysis can also be used to safeguard against other risks. Another good ex-
ample from DHL (Gesing et al., 2018) is their platform which monitors more than 8
17 AI evolves IA | 367
million online and social media posts to identify potential supply chain problems.
Through advanced ML and NLP the system can understand the sentiment of online
conversations and identify potential material shortages, access issues, and supplier
status.
Innovations in the field of HCI have the potential to save work steps. Equipping
warehouse workers with sensors integrated into their uniforms or in wearables is a
possibility to eliminate repetitive tasks like scanning each picked item. Also, the doc-
umentation of the movement of the items is made more time-effective and the error
rate is reduced at the same time.
As already mentioned, the logistics sector not only has to deal with a huge amount
of heterogeneous data but also with the interplay of many independent systems. Nev-
ertheless, RPA can solve problems and increase efficiency. The advancement of im-
age recognition technologies that were once used to decode handwritten addresses
on packages can now, empowered by AI, recognize movements of items. Warehouse
workers can pick items and machines will automatically recognize them and trans-
fer this information into the ERP system. In addition, the movement of goods along
the different stages of the supply chain from the manufacturer to the end customer
can be recorded into the systems and be further processed with the help of RPA (Es-
chberger, 2017), which can automatically digitize handwritten artifacts (invoices, bills,
payment, proof of deliveries, etc.) directly to the document repository and automati-
cally initiate workflows.
17.6.7 Entertainment
The potential AI technologies has to offer for the entertainment industry is outstand-
ing. The entertainment sector is represented in every domain shown in the model.
Multimedia devices interact with the consumer via gestures and voice commands, and
ML algorithms help to categorize content which makes a high level of personalization
possible (Narang, 2017).
The availability and the high number of data sources are advantages the enter-
tainment sector has – but the available data are generally unstructured. With the de-
velopment of AI technologies, it becomes easier to process these data and use them
to significantly improve the services of the industry. Improving service in this context
could mean a high level of personalization which requires insights about which con-
tent the customers want and other information in regard to their media consumption
behavior. Publishers and broadcasters in the entertainment sector benefit from the
fact that more and more customers consume the content via mobile apps. These apps
create data of high value for a better personalization (eMarketer, 2016). The diverse
social media channels are an important and extensive source of data in the form of di-
rect consumer feedback. People share their impressions for example about the latest
episode of their favorite series. AI with ML algorithms make it possible for the content
368 | E. Sultanow et al.
producer and other stakeholders to evaluate the data and turn them into valuable in-
sights for future productions (Newman, 2017).
AI also comes into play at the stage of content creation. It drastically changes the
way moviemakers bring their films to commercial success. Instead of spending in-
creasingly high amounts of money for special effects, AI helps to meet the consumers’
expectations more precisely and this way avoids spending for more and more special
effects that only bring limited value (Lourie, 2017).
As it is now possible to get these insights about what the ideal content could look
like, the industry already tries to get one step further and integrates machines into
the creative process of developing stories. Based on the knowledge gained from data,
AI is able to deliver optimized story frames which can then be filled with the ideas
of human authors. AI in this way becomes a co-author of movies (Newman, 2017),
although platforms that provide third-party content need to make sure that the foreign
content is not inappropriate (Narang, 2017).
17.6.8 Aviation
The applications of AI in the field of aviation span many different areas such cus-
tomer service, baggage screening, self-check-in, and the overall flight process. Using
AI-supported biometric recognition systems, passengers can perform a self-check-in
while their baggage is scanned for unauthorized items and its size and weight are de-
termined (Akcay et al., 2016). Moreover, AI can assist in the process of threat detection
during surveillance (Scylla, 2020). Using camera systems, for instance, suspicious be-
havior or harmful items can be detected. The images are transmitted in real-time to
an AI system for evaluation. With the support of AI image processing, security guards
may react faster and in a more effective way, which increases the overall security at the
airport. Furthermore, the surveillance also enables the measure of passengers flowing
in different areas throughout the airport, thus allowing for optimizing internal work-
flows.
However, the use of AI is not only limited to the area of security, as these technol-
ogy can also enhance the flight process. Using forecasting models, possible delays can
be predicted ahead of time (Chakrabarty, 2019). This allows passengers to plan their
journeys more precisely and react to delays at an early stage. In addition, necessary
ground operations like loading and unloading the plane can also be scheduled in a
more proactive manner.
By using AI-assisted real-time processing, it is also possible to inform passengers
about the processing status of their baggage at any time. In case the baggage is lost, it
can be found more easily, which leads to higher customer satisfaction and lower costs
due to otherwise necessary time-consuming search processes.
17 AI evolves IA | 369
17.6.10 E-commerce
The E-commerce sector is typically one that synergistically combines RPA with AI. The
automation and real-time access of the product inventory information is an essential
factor for a successful online shop. If a customer is not informed in time that a desired
product is no longer in stock, the customer will likely order from a competitor in the
future. A reliable system for automatically updating the current product inventory is
therefore crucial. The use of AI technology can further improve the system by analyz-
ing customer purchase data and forecasting demand. This enables the creation of in-
telligent reports, which, in turn, can be used to make management decisions (Lingam,
2018), e. g., increasing the capacity in a certain product category.
The process of adding new products to an online store includes aspects such
as uploading the product photo, including manufacturer documents, and providing
meaningful keywords. This is where RPA helps speed up the repetitive upload tasks.
In addition, AI systems can help with keyword research or assigning products directly
to the suitable categories based on their properties. Furthermore, products which are
often purchased together can be collectively presented to the customers (Kronberger
and Affenzeller, 2012).
The automation of customer returns can save valuable time, especially since re-
turns are not revenue-generating activities and need to be performed as efficiently as
possible. With the assistance of AI systems, it is possible to analyze these cases more
370 | E. Sultanow et al.
precisely and identify the most common reasons why a return is made, which in turn
can provide suggestions for improving products and order processes to minimize the
likelihood of returns.
For the E-commerce sector, certain times, such as the time before major holidays
such as Christmas, are always a challenge. In addition, unpredictable events such as
a natural disaster or a pandemic can also lead to increased demand in certain product
categories. In these cases, companies need to react fast in order to ensure increased in-
ventory levels and adequate delivery capabilities, which in turn will result in satisfied
customers and increased profits. By predicting the purchasing behavior of customers,
AI systems can provide important early warnings for these situations (Valecha et al.,
2018).
Informing customers automatically about the status of their order is a service that
can be found in a variety of online shops. In addition, AI systems can help to forecast
the arrival of an order based on past experience data as well as current events.
Different payment systems lead to increased complexity in the ordering process.
A guided process can help to maintain customer satisfaction during a checkout pro-
cess. For this purpose, the use of AI technologies, which can evaluate data collected
during the purchase process, is useful. This enables, for instance, the automated and
intelligent sorting of payment providers according to their popularity.
Personalized offers and promotions contribute to customer satisfaction by pro-
viding them with faster access to what they are looking for (Earley, 2016). In this case,
time is indeed money. If a customer fails to find what they are looking for on time,
it is likely that they leave the site without making a purchase. Using AI technology,
search results can be optimized, product rankings can be adjusted, and customized
categories can be generated, thus enhancing the customer experience.
Bibliography
Akcay S, Kundegorski ME, Devereux M, Breckon TP (2016) Transfer learning using convolutional
neural networks for object classification within X-ray baggage security imagery. In: 2016 IEEE
international conference on image processing (ICIP), proceedings, Phoenix, Arizona, USA,
September 25–28, 2016 IEEE, Piscataway, NJ, pp 1057–1061
Asensio JML, Peralta J, Arrabales R, Bedia MG, Cortez P, Peña AL (2014) Artificial intelligence
approaches for the generation and assessment of believable human-like behaviour in virtual
characters. Expert Syst Appl 41(16):7281–7290
Backhshi N, Berg H, Broersen S (2018) Chatbots point of view. Available at: https://www.forbes.
com/sites/forbescommunicationscouncil/2017/08/09/how-self-service-can-become-more-h.
Accessed December 5, 2018
372 | E. Sultanow et al.
Behner P, Ehrhardt M (2016) Digitization in pharma – gaining an edge in operations. Available at:
https://www.strategyand.pwc.com/media/file/Digitization-in-pharma.pdf. Accessed March 6,
2018
BMW Group (2018) Hey BMW, now we’re talking!. Available at: https://www.press.bmwgroup.com/
global/article/detail/T0284429EN/%E2%80%9Chey-bmw-now-we%E2%80%99re-talking-
bmws-are-about-to-get-a-personality-with-the-company%E2%80%99s-intelligent-personal-
assistant?language=en. Accessed June 6, 2020
Booth A, Peters P, Mohr N (2016) The digital utility: new opportunities and challenges. Available
at: https://www.mckinsey.com/industries/electric-power-and-natural-gas/our-insights/the-
digital-utility-new-opportunities-and-challenges. Accessed March 6, 2018
BP (2017) Caltech startup, beyond limits secures investment of $20 million from BP ventures.
Available at: https://www.bp.com/en/global/corporate/news-and-insights/press-releases/
caltech-startup-beyond-limits-secures-investment-of-20-million-from-bp-ventures.html
Accessed June 6, 2020
Brains4Drones (2020) Available at: https://brains4drones.com/. Accessed June 6, 2020
Bundesnetzagentur (2011) “Smart Grid” und “Smart Market”: Eckpunktepapier der
Bundes-netzagentur zu den Aspekten des sich verändern-den Energieversorgungssystems.
Available at: https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/
Energie/Unternehmen_Institutionen/NetzzugangUndMesswesen/SmartGridEckpunktepa-
pier/SmartGridPapierpdf.pdf?__blob=publicationFile&v=2. Accessed November 29, 2019
Burri RD, Burri R, Bojja RR, Buruga SR (2019) Insurance claim analysis using machine learning
algorithms. Available at: https://www.ijitee.org/wp-content/uploads/papers/v8i6s4/
F11180486S419.pdf. Accessed June 19, 2020
Chakrabarty N (2019) A data mining approach to flight arrival delay prediction for American Airlines.
Available at: https://arxiv.org/abs/1903.06740. Accessed June 19, 2020
Champagne D, Hung A, Leclerc O (2015) The road to digital success in pharma. Available at: https:
//www.mckinsey.com/industries/pharmaceuticals-and-medical-products/our-insights/the-
road-to-digital-success-in-pharma. Accessed December 5, 2018
Dawate R (2018) Artificial intelligence adoption in energy sector. Available at: https://www.
linkedin.com/pulse/artificial-intelligence-adoption-energy-sector-ramesh-dawate/. Accessed
December 5, 2018
Dickson B (2017) How artificial intelligence is revolutionizing human-computer interaction. Available
at: https://thenextweb.com/artificial-intelligence/2017/05/10/artificial-intelligence-
revolutionizing-human-computer-interaction/. Accessed December 5, 2018
Earley S (2016) There is no AI without IA. IT Prof 18(3):58–64
Eggers WD, Schatsky D, Viechnicki P (2017) AI-augmented Government. Available at: https:
//www2.deloitte.com/insights/us/en/focus/cognitive-technologies/artificial-intelligence-
government.html. Accessed March 20, 2018
Elintrix (2020) Smartgrid. Available at: http://www.elintrix.com/sectors/smart-grid/. Accessed June
06, 2020
Elkin K, Witherspoon S (2019) Machine learning can boost the value of wind energy. Available
at: https://deepmind.com/blog/article/machine-learning-can-boost-value-wind-energy.
Accessed June 06, 2020
eMarketer (2016) Internet of Things is changing how media and entertainment companies operate.
Available at: https://www.emarketer.com/Article/Internet-of-Things-Changing-How-Media-
Entertainment-Companies-Operate/1013545. Accessed March 20, 2018
Eschberger T (2017) Human machine interaction: how people and machines will complement each
other at a workplace in the future. Available at: http://www.lead-innovation.com/english-
blog/human-machine-interaction. Accessed December 5, 2018
17 AI evolves IA | 373
Laurent P, Chollet T, Herzberg E (2015) Intelligent automation entering the business world. Available
at: https://www2.deloitte.com/content/dam/Deloitte/lu/Documents/operations/lu-
intelligent-automation-business-world.pdf. Accessed May 12, 2018
Lebied M (2017) 5 examples of how Big Data in logistics can transform the supply chain. Available at:
https://www.datapine.com/blog/how-big-data-logistics-transform-supply-chain/. Accessed
June 6, 2020
Lingam YK (2018) The role of artificial intelligence (AI) in making accurate stock decisions in
E-commerce industry. Int J Adv Res Ideas Innov Technol 4(3):2281–2286
Lourie G (2017) How AI is changing the entertainment industry. Available at: https://techfinancials.
co.za/2017/08/24/ai-changing-entertainment-industry/. Accessed May 12, 2018
Magoulas D, Prentza A (2001) Machine learning in medical applications. In: Paliouras G, Karkaletsis
V, Spyropoulos CD (eds) Machine learning and its applications: advanced lectures. Lecture
notes in computer science, vol 2049. Springer, Berlin, Heidelberg, pp 300–307
Mahendra R (2019) AI is the new electricity. Smart Energy International. Available at: https://www.
smart-energy.com/industry-sectors/new-technology/ai-is-the-new-electricity/. Accessed June
6, 2020
Maissin J, Elst R, Colin F (2016) How will IoT improve public sector services? Available at: https:
//www2.deloitte.com/content/dam/Deloitte/lu/Documents/public-sector/lu_en_how-will-
iot-improve-public-sector-services_122015.pdf. Accessed May 12, 2018
Marr B (2017) Internet of Things and predictive maintenance transform the service industry.
Available at: https://www.forbes.com/sites/bernardmarr/2017/05/05/Internet-of-things-
and-predictive-maintenance-transform-the-service-industry/#4afe904aeaf4. Accessed May 12,
2018
Marr B (2018) The amazing ways Google uses artificial intelligence and satellite data to prevent
illegal fishing. Available at: https://www.forbes.com/sites/bernardmarr/2018/04/09/the-
amazing-ways-google-uses-artificial-intelligence-and-satellite-data-to-prevent-illegal-
fishing/#564ba2e21c14. Accessed May 12, 2018
Matthews S (2016) What is cognitive IoT? Available at: http://www.ibmbigdatahub.com/blog/what-
cognitive-iot. Accessed May 12, 2018
Mehr H (2017) Artificial intelligence for citizen services and government. Available at: https:
//ash.harvard.edu/files/ash/files/artificial_intelligence_for_citizen_services.pdf. Accessed
June 3, 2018
Moukalled M, El-Hajj W, Jaber M (2019) Automated stock price prediction using machine learning.
Available at: https://ep.liu.se/ecp/165/003/ecp19165003.pdf. Accessed June 19, 2020
Narang N (2017) Top 10 areas artificial intelligence is leading automation in media industry.
Available at: http://www.mediaentertainmentinfo.com/2017/09/top-10-areas-artificial-
intelligence-is-leading-automation-in-media-industry.html/. Accessed May 12, 2018
National Science and Technology Council (NSTC) (2016) Preparing for the future of artificial
intelligence. Available at: https://obamawhitehouse.archives.gov/sites/default/files/
whitehouse_files/microsites/ostp/NSTC/preparing_for_the_future_of_ai.pdf. Accessed
November 26, 2019
Newman D (2017) Top six digital transformation trends in media and entertainment. Available at:
https://www.forbes.com/sites/danielnewman/2017/04/25/top-six-digital-transformation-
trends-in-media-and-entertainment/#4138a4166729. Accessed May 12, 2018
Paris C, Swartout W, Mann W (1991) Natural language generation in artificial intelligence and
computational linguistics. Springer Science & Business Media
Phillips C (2018) How hotels are using artificial intelligence to provide an awesome user experience.
Available at: https://www.kdnuggets.com/2017/06/machine-learning-algorithms-used-self-
driving-cars.html. Accessed June 3, 2018
17 AI evolves IA | 375
Powal AS (2018) Implementing machine learning – what are the benefits for the energy sector?
Available at: https://www.powel.com/news/implementing-machine-learning--what-are-the-
benefits-for-the-energy-sector/. Accessed June 3, 2018
Radziwon A, Bilberg AS, Bogers M (2013) The smart factory: exploring adaptive and flexible
manufacturing solutions: analysis of Internet of Things in a smart environment.
Available at: https://ac.els-cdn.com/S1877705814003543/1-s2.0-S1877705814003543-
main.pdf?_tid=1e3f105d-8d9b-4af4-b93f-e6aff870fc95&acdnat=1527338193_
6078a0b8963b00a76d6818ad788d6a9c. Accessed May 26, 2018
Rajguru S, Kinhekar S, Pati S (2015) Analysis of Internet of Things in a smart environment. Available
at: https://pdfs.semanticscholar.org/35fe/c9f1837928c482ed3ad344fa639736bd2506.pdf.
Accessed May 12, 2018
Ravindra S (2017) The machine learning algorithms used in self-driving cars. Available at: https:
//www.kdnuggets.com/2017/06/machine-learning-algorithms-used-self-driving-cars.html.
Accessed May 26, 2018
Reeves M (2018) How AI will reshape companies, industries and nations. Available at: https:
//www.bcg.com/de-de/publications/2018/artificial-intelligence-will-reshape-companies-
industries-nations-interview-kai-fu-lee.aspx. Accessed May 12, 2018
Riedl J (2018) Digital transformation in the logistics industry. Available at: https://www.bcg.com/de-
de/industries/transportation-travel-tourism/center-digital-transportation/logistics.aspx.
Accessed May 12, 2018
Salas D (2017) How self-service can become more human. Available at: https://www.forbes.com/
sites/forbescommunicationscouncil/2017/08/09/how-self-service-can-become-more-
human/#8631d7559129. Accessed May 12, 2018
Scanbot SDK (2019) A Scanner SDK for the insurance sector. Available at: https://scanbot.io/en/
sdk/industries/insurance-scanner-sdk. Accessed June 19, 2020
Schneider C (2017) 10 reasons why AI-powered, automated customer service is the future. Available
at: https://www.ibm.com/blogs/watson/2017/10/10-reasons-ai-powered-automated-
customer-service-future/. Accessed May 12, 2018
Schoemaker PJH, Heaton S, Teece D (2018) Innovation, dynamic capabilities, and leadership. Calif
Manag Rev 61(1):15–42
Scylla Artificial Intelligence (2020) Available at: https://www.scylla.ai/. Accessed June 19, 2020
SEAB (2020) Preliminary Findings, SEAB AIML Working Group. Available at: https://www.energy.
gov/sites/prod/files/2020/04/f73/SEAB%20AI%20WG%20PRELIMINARY%20FINDINGS_0.pdf.
Accessed June 6, 2020
Sennaar K (2018) Examples of AI in restaurants and food services. Available at: https://www.
techemergence.com/ai-in-restaurants-food-services/. Accessed June 3, 2018
Taylor C (2017) Artificial intelligence and logistics is transforming business. Available at: https:
//www.datamation.com/big-data/artificial-intelligence-and-logistics-is-transforming-
business.html. Accessed June 3, 2018
Techlabs M (2017) Can chatbots help reduce customer service costs by 30 %?. Available at: https:
//chatbotsmagazine.com/how-with-the-help-of-chatbots-customer-service-costs-could-be-
reduced-up-to-30-b9266a369945. Accessed November 30, 2019
Tian Z (2017) Robotic process automation – robots conquer business processes in back offices.
Available at: http://digital.pwc.ch/de/blog-detail/rpa-data-analytics-diesel-fuer-die-digitale-
transformation.html. Accessed May 12, 2018
Tractica (2020) Warehousing and logistics robots. Available at: https://www.tractica.com/research/
warehousing-and-logistics-robots/. Accessed June 6, 2020
376 | E. Sultanow et al.
18.1 Introduction
According to Gartner, global spending on robotic process automation (RPA) totaled
680 million USD in 2018, an increase of 57 % over the previous year (Gartner, 2018).
By 2022 RPA software spending is expected to reach a total of 2.4 billion USD (Statista,
2020). Experts believe the biggest adopters of RPA are organizations running outdated
and failing legacy systems. Those organizations include banks, insurance companies,
https://doi.org/10.1515/9783110676693-018
378 | A. Stenzel et al.
utilities, telecommunications companies, and others (Koch and Fedtke, 2020). Every-
day processes often depend on existing legacy systems, and introducing a smarter,
more efficient, up-to-date option is often high-priced. RPA is particularly helpful in
these situations because it works without changing the existing IT systems. However,
there may be circumstances where other automation solutions are a better fit, for ex-
ample, processes with a frequently changing user interface. RPA would require con-
tinuous adjustment due to its dependency on the user interface (AI Multiple, 2020).
The IT and management consultancy Detecon explains the use of RPA based on
three real-world examples. This chapter considers cases where Detecon has accom-
panied clients in increasing their efficiency by applying automation to selected parts
of the businesses’ internal activities. Detecon shares practical insight and lessons
learned to reflect and define an RPA project approach based on experience. Our con-
sulting portfolio includes services to help clients understand RPA at an early stage
and support the implementation of RPA. For each of the practical cases we will de-
scribe the manual process, how we implemented RPA, and finally the findings of each
project. The three cases selected provide insights into the practical usage of RPA, with
which we aim to support the decision making process when implementing RPA. The
reader shall receive insights into the multitude of motivations for the usage of RPA,
and the resulting forms of implementation.
The employees of the client in our first case were simply overloaded with paper-
driven tasks. One of the client’s biggest goals was to help relieve their employees’ work-
load and motivate them to do more engaging and higher-quality tasks. The employees
generally welcomed the idea of automating parts of their work but the fear of becom-
ing obsolete was noticeable.
In the manual process, employees individually categorize each data entry. While de-
signing an optimized process flow, the option to upload one list with all the data en-
tries in the web portal was included, so the employees did not have to categorize each
entry individually. The external web portal offered two options through which the data
could be compared. One method was the individual comparison (manual process),
and the other was a bulk comparison where one list with approximately 20,000 data
entries could be uploaded at once. The second option has not been used by the client
and follows a certain template with specific file and formatting restrictions for upload-
ing.
In the manual process, the IT department delivered an unfiltered monthly extrac-
tion that holds information beyond what is needed. This was why the team leader had
to cleanse the data in the manual process. As part of the automation project we de-
cided together with the IT department that the monthly data extraction would follow
the required template for the bulk upload, with no additional information. Most of the
highly sensitive data were kept where they were and only relevant data for the online
query were extracted by the IT department. Therefore, the data cleansing by the team
leader was no longer necessary.
As the monthly extracted data still contained personal data, it was important for
the client to have a trusted employee manually upload the list with all the entries. To
address this requirement, we divided the automated process in three steps.
In the first step of the automated process the robot was programmed to notify the
employee monthly when the data are available and ready for upload. The robot is trig-
gered once the IT department provides the data in the required template on the teams
file share. Unnecessary e-mail transactions to transfer sensitive data are eliminated.
From there, the employee could access the file directly and upload it to the web portal.
After the employee uploaded the file manually and transferred the returned file
to the team share, the robot is once again triggered and begins the third automated
18 The broad use of RPA based on three practical cases | 381
step. The robot converts the returned file into the required format and begins the com-
parison of the two files. The robot checks the original file with the received file by
examining each entry of the two files to compare and categorize the data. The aim in
the initial conception of the RPA script was to divide the data into two categories, one
category for unchanged data entries and one for changed data entries. The employ-
ees then manually processed the category with changed data entries and updated the
changed values in the application.
As an added benefit, the robot created an overview of the categorization for statis-
tical purposes. One employee needed approximately five minutes to categorize each
data entry. For 20,000 data entries to categorize, the employee needed 1667 hours.
After automation, the robot needs only seven minutes to compare the two files. A vi-
sualization of the automated process is shown in Figure 2.
18.2.4 Findings
In the case presented above, employees not only perform redundant, manual tasks,
but they convert already digitalized data into paper lists, only to digitalize them again
after updating them. This fact combined with the high transactional volume made
it a suitable case to demonstrate how much automation potential lies in the public
sector.
Together with the employees, we looked at every step very critically and evaluated
whether there was potential to increase efficiency. We advise that the RPA developers
work closely together with the employees. It might seem time consuming at first, but
in our experience the employees’ process knowledge and their work experience must
be considered during implementation. In this case, the IT department was asked to
format the desired Excel spreadsheet when providing it to the team. This meant that
the IT department changed their monthly routine to support the overall efficiency of
the business process, even though it was less efficient for the IT department itself. If
many different departments depend on each other, it is challenging to organize such
a change.
382 | A. Stenzel et al.
The public service employees still have manual work, but the categorization was
outsourced to the robot, which was their most time consuming task. Often tasks are
performed a certain way because “it has always been done this way” – no matter how
inefficient or outdated the process is. After automating this process, the client’s goal
of better supporting their employees and freeing up their time for more meaningful
tasks was achieved. This case also shows that it is not always necessary to automate an
entire process, but it may be sufficient to automate specific time consuming sections
of the process.
confirmation of the results for the feasibility of the location. The employee saved these
results into the information sheet for the location by manually copy-pasting them.
This data extraction was highly standardized and regimented. Visualized in Figure 3
is the manual process for only one of the tasks in the overall process. In the day-to-day
business, this step takes several hours due to the number of times it is performed.
Figure 3: Second practical case – manual process for one of the employees’ tasks.
18.3.4 Findings
By introducing RPA, an optimized process flow was created that is less time consum-
ing for the employee and more controllable and transparent for management. The em-
ployees now interact with fewer systems during the consulting process and thus have
increased information transparency for their tasks.
As a result, not only was the process itself optimized, but the process structure was
changed as well. Combining RPA with a central data management system provides a
transparent overview and helps the employee to access the order placement forms
with all the relevant information to successfully migrate the client’s connection.
Figure 4 shows the two main benefits for the overall client consultation process for
the migration of their network connections: The transparency of data and the creation
of relevant order forms replace time consuming manual tasks across multiple research
systems.
Figure 4: Second practical case – benefits of automation during the overall client consultation pro-
cess.
An adaptation of the project procedure based on the RPA technology led to the devel-
opment of further cases in the context of data collection and creation for the migra-
tions of the network connections. This demonstrates a high scalability of RPA appli-
cations within projects.
18 The broad use of RPA based on three practical cases | 385
they directly affected a user. Other problems remained and reduced the performance
of the systems.
18.4.4 Findings
This case shows how RPA can not only optimize existing processes or help an existing
process by performing sub-processes, but also establish new processes to further im-
18 The broad use of RPA based on three practical cases | 387
prove business processes. In this case specifically, overall work performance was sig-
nificantly improved as a result of identifying potential hazards before they occurred.
Therefore, RPA supports optimal network utilization and improved security settings.
Similar preventive methods can be useful in various domains and industries.
To identify this type of RPA use case, a different approach is needed. Rather than
mapping existing processes, you observe ongoing challenges to design new business
processes performed by robots. Typically, these processes are not executed due to a
high time commitment, high error rates when executed by a person, or a lack of per-
sonnel. Since no existing business processes were automated in this example, the ef-
fects in the event of errors are minor. This type of RPA application is therefore a good
introduction to the topic to gain experience and realize first economic successes.
The cases have shown us that, in addition to the correct selection of the use of RPA,
based on process analysis, the early involvement of the employees and decision mak-
ers concerned is also essential. One of the most common challenges is that it is not
clear who is responsible for developing and operating RPA projects. A possible reason
may be that once the RPA script is developed, the operational implementation is un-
successful because the business or IT department does not have the time or resources
to align with each other. For RPA to be effective, there must be clear responsibility or a
central RPA team that has the time and skills to analyze potential processes and align
IT and business departments (Langmann and Turi, 2020).
RPA is a lean technology, but in spite of that, or perhaps because of it, you need
a solid strategy or governance behind it. We often experience that RPA is perceived
as a trend technology to quickly close automation gaps. Nevertheless, the basis for
successful implementation and operation must be created in advance to achieve the
desired effects in the long term (Jovanović et al., 2018).
ure 6. As part of the initial implementation, we advise considering the topic of setting
up a center of excellence. For subsequent implementation, the approach can be used
in an adapted form, based on the knowledge and circumstances in the company.
In the first step of our approach, RPA possibilities are identified. We recommend test-
ing RPA optimization possibilities in various process areas through short sprints. Fur-
thermore, we advise any organization considering automation to first thoroughly an-
alyze the manual business processes before performing any automation work. This
way any unnecessary or outdated steps can be eliminated and the process itself can
be optimized before any automation work begins. Automating outdated steps is just
as inefficient as performing them manually. When choosing a process, it is advised to
consider a large number of different processes. If a high number of cases are consid-
ered, the comparison of the individual processes makes it easier to determine where
RPA is most useful and has the most impact.
In the second step, all possible potential areas for improvement are analyzed
through the creation of a brief solution concept. Then, we conduct and document a
detailed process analysis of the status quo. This step includes how the process can be
optimized and defining the success factors to be achieved with the use of RPA. On this
basis, we are able to determine the applicability of RPA and transfer the process to a
prioritized RPA backlog.
In the third step, the feasibility of the chosen RPA possibility is analyzed by creat-
ing a business case for each of the processes under consideration. If the business case
shows that the selected use case is feasible for the client, the development of an RPA
script begins. Within the software of the RPA supplier the process flow is reconstructed
and thus the RPA script is developed.
As part of the fourth step, a first minimum viable product (MVP) should be devel-
oped and tested to show technical feasibility. The different interfaces to the business
units, triggers, and input and output parameters for the robot should be clarified at an
390 | A. Stenzel et al.
early stage. After the MVP is developed, the solution is transferred to operations and
documentation is handed over to the client. During the first few weeks of implemen-
tation our team provides a service for dedicated monitoring of the process operation.
Step five is to work on setting up a support organization for RPA solutions. The
goal is to promote RPA within the company and establish an organizational support
for RPA solutions by introducing a center of excellence.
In the final and sixth phase, the existing RPA processes will be further optimized
and enriched with additional technologies. They will be considered as part of the next
wave of RPA improvement and will therefore be continuously developed. We men-
tioned to carefully analyze, document, and visualize the manual process before per-
forming any automation work before. The truth is the optimization should never stop.
For RPA to be as effective as it can be, it needs continuous improvement.
18.7 Conclusion
To explain RPA and achieve employee buy-in for automation projects is one of the
most challenging aspects of automating business processes. Fear of automation mak-
ing our jobs obsolete is common. However, the possibility that automation creates
new, more engaging, and challenging tasks for employees that require decision mak-
ing skills is often overlooked. If an employee must perform many redundant tasks, it
might seem that the employee’s whole job is redundant – and therefore the fear of
not being needed or the fear of being easily replaced arises. No employee wants to be
redundant. But the underlying message is that only redundant tasks should be elimi-
nated so the employee can evolve and move on to more digital and challenging tasks
and therefore grow professionally. Employees should not see RPA as a threat but as
a support, especially when it comes to relieving mundane and repetitive tasks. This
way, employees are encouraged to actively participate in digitization initiatives. The
following guidelines summarize our experience from RPA projects. In our opinion, the
application of these guidelines provides for a higher efficiency in the topic RPA:
– Expertise should be built up in the company to implement RPA solutions and op-
erate the infrastructure.
– Processes should be identified and checked for RPA relevance.
– Optimization before automating business processes should be considered.
– Stakeholders and affected persons should be involved in RPA projects at an early
stage.
– Change management and communication measures should ensure that employ-
ees and RPA are aligned.
– Responsibility between RPA owner, IT department, and business side should be
determined.
– Synchronization between legacy systems and RPA should be ensured.
18 The broad use of RPA based on three practical cases | 391
Bibliography
AI Multiple (2020) 70 process automation tools of 2020: a comprehensive guide. Massachusetts,
United States
Dumitru VF, Stănculescu SM (2020) In: 6th BASIQ international conference on new trends in
sustainable business and consumption Editura ASE, Messina, Italy, pp 105–112
Gartner, Inc. (2018) Press releases. Goa, India
Jovanović SZ, Durić JS, Šibalija TV (2018) Robotic process automation: overview and opportunities.
Int J Adv Qual 6
Koch C, Fedtke S (2020) Der Rollout – wie führe ich RPA flächendeckend im Unternehmen ein?
Springer Vieweg, Berlin, Heidelberg
Langmann C, Turi D (2020) Robotic Process Automation (RPA)-Digitalisierung und Automatisierung
von Prozessen. Springer Books, Germany
Mergel IE Edelmann N Haug N (2019) Defining digital transformation: Results from expert interviews.
Germany and Austria: Government Information Quarterly
Smeets ME, Erhard R, Kaußler T (2019) Robotic Process Automation (RPA) in der Finanzwirtschaft.
Springer Books, Germany
Statista (2020) Robotic process automation software market revenue worldwide 2017–2022.
Worldwide
Andreas Kronz and Thomas Thiel
19 Digitization applied to automate freight
paper processing
How EgeTrans Internationale Spedition GmbH achieves end-to-end
automation by an integrated application of RPA and OCR
Abstract: Until today, paper-based tasks are part of a large part of the executed busi-
ness processes. The successful management of the resulting media discontinuities
consists not only of automated data extraction from unavoidable paper documents,
but also of automated further processing, which can be successfully realized with
robotic process automation (RPA) in many cases. This article outlines a real-life project
in the German logistics industry. EgeTrans Internationale Spedition GmbH makes use
of a combination of optic character recognition and RPA to extract information from
freight papers and transfer it to their legacy transport management system. Detailed
information about challenges, objectives, and solutions is provided to help the reader
understand the journey which EgeTrans and their advisors from Scheer Group have
been going through in the course of the project.
Keywords: Process automation, logistics, robotic process automation, manual task,
OCR, freight papers
https://doi.org/10.1515/9783110676693-019
394 | A. Kronz and T. Thiel
Being an owner-managed family business with lean structures, fast decision making,
clear responsibilities, and fast communication gives EgeTrans a high level of agility
and creates room for smart solutions – allowing to go off the beaten track and to con-
stantly deliver great impact.
The success of EgeTrans is based on two factors: clients and employees. They form
the basis on which the business can be further expanded. EgeTrans as a brand is syn-
onymous with an exceptional level of service quality. This is reflected in seamless cus-
tomer care, a constant flow of information, very fast response times, a clearly defined
personal contact for each client, and the support of the entire team. The firm’s dogma
to grow through and with both its customers and its employees is reflected in its rig-
orous innovation approach. EgeTrans constantly invests in its human capital by of-
fering an extensive training portfolio and by fostering international staff exchange.
Likewise, technological developments are followed closely. Given a positive outcome
of the following detailed analysis, new developments which add value are absorbed
quickly, but always at a controlled speed to ensure a sustainable long-term develop-
ment.
19 Digitization applied to automate freight paper processing | 395
The aforementioned criteria of processing speed and error reduction are among the top
arguments in the majority of RPA projects. The actual impact on the business process
however depends on various factors and differs from project to project. In the appli-
cation case at hand, EgeTrans managed to decrease average processing time by 72 %.
Simultaneously, data quality increased significantly, with 15 % of documents being
marked for manual review by the system.
ing a software robot perform a value adding process, e. g., looking up data in some
system or creating a document for the customer. Having received the deliverable back
from the software robot, the chat bot hands it over to the customer and finishes the
conversation. In this scenario, the robot does not only create the deliverable, but also
acts as an interface. To sum up, hyper-automation is the idea of automating processes
end-to-end, making use of a variety of technologies. RPA, utilizing its unrivaled flex-
ibility, often acts as a bridge in this context. Having this in mind, the project at hand
also falls in the category of hyper-automation. The freight paper processing was auto-
mated from end to end, from reading data out of a document to entering them into the
TMS. The technologies used to reach this goal were RPA and optical character recog-
nition (OCR).
19.3.2 OCR
The described freight paper processing demands a feature which goes beyond the core
RPA functionality: extracting data from documents. A special need of EgeTrans in this
context was that the process had to be able to process both digital and analogue (orig-
inally paper-based) documents. Digital documents, usually present in the form of na-
tive PDFs, contain both an image layer which humans read and an invisible text layer
which can be used by a computer to understand what is written in the document. On
the contrary, analogue documents, usually present in the form of scanned PDFs, only
contain an image layer which cannot be directly interpreted by a machine. To make
analogue documents machine-readable, they must run through a procedure called
398 | A. Kronz and T. Thiel
OCR. Having machine-readable documents is only the first step, though. The business
need was to specifically extract data from them. This step is called document under-
standing. Like freight papers, many other business documents like invoices contain
tables which need to be extracted. The challenge here is that even native PDF files of-
ten do not contain real tables, but the table is just a visual feature. As a simplification
in the course of this text, the totality of technologies used to extract data from busi-
ness documents is referred to as OCR. Even though offered by some RPA vendors from
one source, RPA and OCR should always be considered separately.
Freight papers arrive at EgeTrans via e-mail. This has not changed compared to the
pre-automation process. Naturally, digitization is change. Nevertheless, modifications
should not be forced where not indispensable. Man is a creature of habit. It is very
common to refuse change if it comes too fast. Where possible, it is always a good idea
to leave anchor points unchanged when digitizing a business process. An end-to-end
automated process has the advantage that it can be performed independently of any
human interaction. That is why it is not an employee watching the e-mail inbox. In-
stead, EgeTrans has a software robot do this job around the clock. After classifying
an incoming e-mail as relevant to the process and performing some initial checks, the
19 Digitization applied to automate freight paper processing | 399
robot imports the attachment into the OCR suite which afterwards performs all the
necessary steps to extract the desired data from the document. If the software faces
any issues, e. g., part of the data cannot be found or reliably extracted, a task is cre-
ated in a dedicated part of the suite. Subsequently, an employee needs to look into the
issue and fix it before the process can continue. This is a typical example of human–
robot collaboration, which is another characteristic of hyper-automation. Following
the verification step, the process is resumed by the software robot. Finally, it enters
the extracted data into the TMS. In the case of EgeTrans, the TMS is a command line-
based software which makes the automation of the process an even greater relief for
the employees.
19.4 Recommendations
An old saying is that mistakes are the best teachers. In times of agile project method-
ologies, this wisdom is all the more true. But even if there is nothing worth to be called
a mistake, the underlying principle of continuous learning is vital to corporate project
management. In that sense, of course there are lessons to be learned from EgeTrans’
freight paper processing automation. With this case study, the authors hope to give
readers seeking to get into or deepen their knowledge in the topic some helpful guid-
ance by making recommendations for mastering the complex task of digitizing their
companies.
not match their digital life styles. The crux of the matter here is: If you have not taken
the first step of your digitization journey, get started. Now.
days was mainly due to unattended robots, the current trend is towards attended au-
tomation, i. e., processes which intendedly need human attention (Thiel and Kronz,
2020). The authors are of the opinion that in the future, companies will provide more
and more employees with their own software robots of various kinds for individual
assistance. Without elaborating on the widespread alarmism that RPA will cause mass
unemployment, the goal of digitization is not to create deserted offices (Abolhassan,
2017). Humans will keep playing a key role in the value creation of the economy. Just
like humankind has always used tools to accomplish things that are impossible with
bare hands, digitization is just the application of this principle to business processes.
Supported by a combination of software robots and complementary technologies,
human employees are relieved of stupid and at the same time error-prone work and
can concentrate on activities that really add value.
Change is pain
It lies in the nature of the human being to be skeptical about change at first. It is impor-
tant to respect your employees’ fears. To overcome their concerns, take everybody by
their hands and make your firm’s digitization a joint journey (Thiel and Kronz, 2020).
As a side mark, this phenomenon does not depend on the kind of change which is
about to be induced. Change management is a wide-ranging and independent topic,
but should not go unmentioned as a decisive success factor in the course of this case
study. Many digitization projects have failed because they were set up and carried out
as pure technology projects, but ignored the organizational change aspect. In practice,
a distinct change manager role has proven to be a promising approach.
Bibliography
Abolhassan F (2017) Robotic Process Automation macht Unternehmen produktiver – wenn sie die
Mannschaft mitnehmen. IM+io Fachmag 3. https://www.im-io.de/digitalisierung/robotic-
process-automation-macht-unternehmen-produktiver-wenn-sie-die-mannschaft-mitnehmen/
Feld T, Kronz A, Scheer A-W (2020) Wie Unternehmen von Robotic Process Automation profitieren.
Scheer Group. https://www.scheer-group.com/workingpaper-rpa/
Forbes (2018) Why do strategies fail? https://www.forbesindia.com/blog/business-strategy/why-
do-strategies-fail/
Gartner (2019) Gartner Top 10 Strategic Technology Trends for 2020. https://www.gartner.com/
smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/
Scheer A-W (2017) Robotic Process Automation: Revolution der Unternehmenssoftware. IM+io
Fachmag 3:30–41. https://www.im-io.de/mdocs-posts/imio-art-07-scheer/
Thiel T, Kronz A (2020) 7 Fakten über Robotic Process Automation. Process 3:38–42
Index
3D data 330, 332, 343 CAD 315, 316, 319, 323, 324, 327, 329, 332, 333,
3D object detection 331 340, 343
3D print 327 CAD retrieval 327, 329
capital budgeting 59
ABC 59 capital lockup 55
CBA framework 51
accounting 243
center of excellence 42
accounting processes 248
chatbot 121, 296
active learning 321
classification 321, 329, 331
activity label parsing 189
cloud 141
activity-based costing 59
cognitive robots 135
AHP 55, 62
cognitive RPA 291, 294, 301, 306
AI technology 354
cognitive technologies 245
algorithm 329
commerce 369
alignment 33
commercial off-the-shelf solutions 47
analysis 179
compatibility 61
analytical hierarchy process 55
compliance 276
application case 307, 308
composition 156
artificial intelligence 135, 157, 246, 282, 288,
computer vision 323, 324
317, 341, 349, 398
computer-aided manufacturing 318
attended bots 288
computer-aided production planning and control
attention 332
(CAP) 318
attribute hierarchy 69
computer-integrated manufacturing 318, 325
audit automation 245
contextor 71
authorization management 274
contractual liability 137, 142
automated planning and acting 289
conversational interactions 163
automated reasoning 289
convolutional neural network 332, 343
automatic duck 4
cost categories 55
automation 32, 229, 328, 341
cost reductions 51
automation candidate detection 192
cost savings 267
automation target 267
cost-benefit analysis 51
automotive sector 358, 360 COTS 47
autonomy 138 culpability 143, 144
aviation sector 359, 368 culpable liability 147
customer service automation 356
balanced scorecard 51
behavioral monitoring 173 damage to a third party 144
bill or material 325 data maintenance 293
bills of material (BOM) 318 database 318
book entries 274 decision analysis 51
BPMN 327 decision making 87
branching probabilities 58 decision process 66
business process 318 deep learning 321
business process management system 10 demographic change 67
business process reengineering 9 design 180
business strategy 33 desktop activity mining 79
business unit 49 development 181
404 | Index