skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Kim, I., Frank, K., Wolf, J.R., & Pentland, B.T. (2021) “Predicting Process Structure after a Disruption: An Example from the Clinical Documentation Process”
Using data from the audit trail of an electronic medical record system, we examine the effects of a disruption on the clinical documentation process. We use process mining to construct a network that describes the process and then we use a latent factor selection model to analyze changes to that network. Rather than attempting to discover a particular process model, our goal is to identify theory-based factors that explain change and stability in the overall pattern of actions. We conduct the analysis at two levels of granularity and we compare time periods with and without disruption. The paper contributes to current research on routine dynamics as network dy-namics by demonstrating the use of network science to predict the structure of an organizational routine.  more » « less
Award ID(s):
1734237
PAR ID:
10302054
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
BPM Routine Dynamics Workshop
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract Criminal networks are frequently at risk of disruption through arrest and interorganizational violence. Difficulties in designing empirical studies of criminal network recovery, however, have problematized research into network responses to disruption. In this study, we evaluate criminal network resilience by examining network recovery from disruption in an array of different criminal networks and across different disruption strategies. We use an agent‐based model to evaluate how criminal networks recover from disruption. Our results reveal the vulnerabilities and time to recovery of numerous criminal organizations, and through them, we identify which disruption strategies are most effective at damaging various criminal networks. 
    more » « less
  2. We use evidence from a disruption of clinical documentation routines to propose a novel, predictive mechanism for routine dynamics based on path coherence. Path coherence refers to the continuity of situational attributes from one event to the next along a path, for example, a set of activities conducted by the same person has high actor coherence. Situational attributes include classic descriptors such as who, what, when, where, and why. To be recognized as a path, a minimal level of coherence is required, but path coherence can vary along a path. For example, in a medical clinic, typical paths flow from place to place (e.g., reception, waiting room, exam room) and involve different clinical staff (e.g., receptionist, nurse, physician). Using latent factor network models, we compare clinical documentation routines in five outpatient clinics before and after a technological disruption (an upgrade to the electronic health record system). We show that coherent paths are up to 14 times more likely to persist and up to 40 times more likely to form than less coherent paths. We use these findings to theorize about the role of path coherence in routine dynamics. Path coherence in narrative networks is like homophily in social networks, but with a completely different underlying mechanism. We discuss the implications of our findings for organizational path dependence, resilience, and inertia. Funding: This research was supported by the National Science Foundation [Grants SES-1734237 and BCS-2120530]. This research was also supported in part by the University of Rochester CTSA [Grant UL1 TR002001] from the National Center for Advancing Translational Sciences (NCATS) of the National Institutes of Health (NIH). 
    more » « less
  3. Abstract Tidal disruption events (TDEs) are among the brightest transients in the optical, ultraviolet, and X-ray sky. These flares are set into motion when a star is torn apart by the tidal field of a massive black hole, triggering a chain of events which is – so far – incompletely understood. However, the disruption process has been studied extensively for almost half a century, and unlike the later stages of a TDE, our understanding of the disruption itself is reasonably well converged. In this Chapter, we review both analytical and numerical models for stellar tidal disruption. Starting with relatively simple, order-of-magnitude physics, we review models of increasing sophistication, the semi-analytic “affine formalism,” hydrodynamic simulations of the disruption of polytropic stars, and the most recent hydrodynamic results concerning the disruption of realistic stellar models. Our review surveys the immediate aftermath of disruption in both typical and more unusual TDEs, exploring how the fate of the tidal debris changes if one considers non-main sequence stars, deeply penetrating tidal encounters, binary star systems, and sub-parabolic orbits. The stellar tidal disruption process provides the initial conditions needed to model the formation of accretion flows around quiescent massive black holes, and in some cases may also lead to directly observable emission, for example via shock breakout, gravitational waves or runaway nuclear fusion in deeply plunging TDEs. 
    more » « less
  4. Abstract Many statistical models for networks overlook the fact that most real-world networks are formed through a growth process. To address this, we introduce the Preferential Attachment Plus Erdős–Rényi model, where we let a random network G be the union of a preferential attachment (PA) tree T and additional Erdős–Rényi (ER) random edges. The PA tree captures the underlying growth process of a network where vertices/edges are added sequentially, while the ER component can be regarded as noise. Given only one snapshot of the final network G, we study the problem of constructing confidence sets for the root node of the unobserved growth process; the root node can be patient zero in an infection network or the source of fake news in a social network. We propose inference algorithms based on Gibbs sampling that scales to networks with millions of nodes and provide theoretical analysis showing that the size of the confidence set is small if the noise level of the ER edges is not too large. We also propose variations of the model in which multiple growth processes occur simultaneously, reflecting the growth of multiple communities; we use these models to provide a new approach to community detection. 
    more » « less
  5. We consider the problem of analyzing timestamped relational events between a set of entities, such as messages between users of an on-line social network. Such data are often analyzed using static or discrete-time network models, which discard a significant amount of information by aggregating events over time to form network snapshots. In this paper, we introduce a block point process model (BPPM) for continuous-time event-based dynamic networks. The BPPM is inspired by the well-known stochastic block model (SBM) for static networks. We show that networks generated by the BPPM follow an SBM in the limit of a growing number of nodes. We use this property to develop principled and efficient local search and variational inference procedures initialized by regularized spectral clustering. We fit BPPMs with exponential Hawkes processes to analyze several real network data sets, including a Facebook wall post network with over 3,500 nodes and 130,000 events. 
    more » « less