The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - Third Quarter (2012 vol.5)
pp: 333-344
Xibin Gao , North Carolina State University, Raleigh
Munindar P. Singh , North Carolina State University, Raleigh
Pankaj Mehra , Inlogy Inc. Los Altos
ABSTRACT
A contract is a legally binding agreement between real-world business entities whom we treat as providing services to one another. We focus on business rather than technical services. We think of a business contract as specifying the functional and nonfunctional behaviors of and interactions among the services. In current practice, contracts are produced as text documents. Thus the relevant service capabilities, requirements, qualities, and risks are hidden and difficult to access and reason about. We describe a simple but effective unsupervised information extraction approach and tool, Contract Miner, for discovering service exceptions at the phrase level from a large contract repository. Our approach involves preprocessing followed by an application of linguistic patterns and parsing to extract the service exception phrases. Identifying such (noun) phrases can help build service exception vocabularies that support the development of a taxonomy of business terms, and also facilitate modeling and analyzing service engagements. A lightweight online tool that comes with Contract Miner highlights the relevant text in service contracts and thereby assists users in reviewing contracts. Contract Miner produces promising results in terms of precision and recall when evaluated over a corpus of manually annotated contracts.
INDEX TERMS
Contracts, Artificial neural networks, Law, Delay, Pattern matching, text mining., Contract analysis, service exceptions
CITATION
Xibin Gao, Munindar P. Singh, Pankaj Mehra, "Mining Business Contracts for Service Exceptions", IEEE Transactions on Services Computing, vol.5, no. 3, pp. 333-344, Third Quarter 2012, doi:10.1109/TSC.2011.1
REFERENCES
[1] P. Radha Krishna and K. Karlapalem, "Electronic Contracts," IEEE Internet Computing, vol. 12, no. 4, pp. 60-68, July/Aug. 2008.
[2] F. Meneguzzi, S. Miles, C. Holt, M. Luck, N. Oren, N. Faci, and M. Kollingbaum, "Electronic Contracting in Aircraft Aftercare: A Case Study," Proc. Seventh Int'l Conf. Autonomous Agents and Multiagent Systems, pp. 63-70, 2008.
[3] Y. Yang and X. Liu, "A Re-Examination of Text Categorization Methods," Proc. 22nd Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 42-49, 1999.
[4] R.J. Wieringa and J. Gordijn, "Value-Oriented Design of Service Coordination Processes: Correctness and Trust," Proc. ACM Symp. Applied Computing (SAC), pp. 1320-1327, 2005.
[5] P.P. Maglio and J. Spohrer, "Fundamentals of Service Science," J. Academy of Marketing Science, vol. 36, no. 1, pp. 18-20, Mar. 2008.
[6] M.A. Hearst, "Automatic Acquisition of Hyponyms from Large Text Corpora," Proc. 14th Conf. Computational Linguistics, pp. 539-545, 1992.
[7] E. Frank, G. Paynter, I.H. Witten, C. Gutwin, and C.G. Nevill-Manning, "Domain-Specific Keyphrase Extraction," Proc. 16th Int'l Joint Conf. Artificial Intelligence (IJCAI), pp. 668-673, 1999.
[8] H. Zha, "Generic Summarization and Keyphrase Extraction Using Mutual Reinforcement Principle and Sentence Clustering," Proc. 25th Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 113-120, 2002.
[9] D. Muey, http://search.cpan.org/~dmueyhtml-obliterate-0.3 , 2012.
[10] S. Yona, http://search.cpan.org/~shlomoylingua-en-sentence-0.25 , 2012.
[11] Alias-i, http://alias-i.comlingpipe, 2012.
[12] V. Hatzivassiloglou and K.R. McKeown, "Predicting the Semantic Orientation of Adjectives," Proc. 35th Ann. Meeting of the Assoc. for Computational Linguistics and Eighth Conf. European Chapter of the Assoc. for Computational Linguistics, pp. 174-181, 1998.
[13] X. Ding, B. Liu, and P.S. Yu, "A Holistic Lexicon-Based Approach to Opinion Mining," Proc. Int'l Conf. Web Search and Web Data Mining, pp. 231-240, 2008.
[14] A. Arenas and M. Wilson, "Contracts as Trust Substitutes in Collaborative Business," Computer, vol. 41, no. 7, pp. 80-83, July 2008.
[15] S. Bajaj, D. Box, D. Chappell, F. Curbera, G. Daniels, P. Hallam-Baker, M. Hondo, C. Kaler, D. Langworthy, A. Malhotra et al., "Web Services Policy Framework (WS-Policy)," Version, vol. 1, no. 2, pp. 2003-2006, 2006.
[16] H. Ludwig, A. Keller, A. Dan, R. King, and R. Franck, "Web Service Level Agreement (WSLA) Language Specification," http://www.research.ibm.com/wslaWSLASpecV1-20030128.pdf , 2003.
[17] V. Tosic, B. Pagurek, K. Patel, B. Esfandiari, and W. Ma, "Management Applications of the Web Service Offerings Language (WSOL)," Information Systems, vol. 30, no. 7, pp. 564-586, 2005.
[18] G. Gangadharan, V. D'Andrea, R. Iannella, and M. Weiss, "ODRL Service Licensing Profile (ODRL-S)," Proc. Fifth Int'l Workshop Technical, Economic, and Legal Aspects of Business Models for Virtual Goods, 2007.
[19] A. Arenas, M. Wilson, S. Crompton, D. Cojocarasu, T. Mahler, and L. Schubert, "Bridging the Gap between Legal and Technical Contracts," IEEE Internet Computing, vol. 12, no. 2, pp. 13-19, Mar./Apr. 2008.
[20] Z. Milosevic, M. Orlowska, and S. Sadiq, "Linking Contracts, Processes and Services: An Event-Driven Approach," Proc. IEEE Third Int'l Conf. Services Computing (SCC), pp. 390-397, 2006.
[21] M.P. Singh, A.K. Chopra, and N. Desai, "Commitment-Based Service-Oriented Architecture," Computer, vol. 42, no. 11, pp. 72-79, Nov. 2009.
[22] P.R. Telang and M.P. Singh, "Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach," IEEE Trans. Services Computing, vol. 5, no. 3, 2012.
[23] N. Desai, N.C. Narendra, and M.P. Singh, "Checking Correctness of Business Contracts via Commitments," Proc. Seventh Int'l Conf. Autonomous Agents and MultiAgent Systems (AAMAS), pp. 787-794, May 2008.
[24] C. Molina-Jimenez, S. Shrivastava, and M. Strano, "Exception Handling in Electronic Contracting," Proc. IEEE Conf. Commerce and Enterprise Computing (CEC), pp. 65-73, 2009.
[25] B. Grosof and T. Poon, "SweetDeal: Representing Agent Contracts with Exceptions Using XML Rules, Ontologies, and Process Descriptions," Proc. 12th Int'l Conf. World Wide Web, pp. 340-349, 2003.
[26] M. Klein, C. Dellarocas, and J. Rodriguez-Aguilar, "A Knowledge-Based Methodology for Designing Robust Electronic Markets," Proc. First Int'l Conf. Autonomous Agents and Multiagent Systems (AAMAS), 2002.
[27] A. Khandekar, P. Krishna, and K. Karlapalem, "A Methodology and Toolkit for Deploying Contract Documents as E-Contracts," Proc. 26th Int'l Conf. Conceptual Modeling—Tutorials, Posters, Panels and Industrial Contributions, vol. 83, pp. 91-96, 2007.
[28] K. Karlapalem, A. Dani, and P. Krishna, "A Frame Work for Modeling Electronic Contracts," Proc. 20th Int'l Conf. Conceptual Modeling, vol. 2224, pp. 193-207, Nov. 2001.
[29] T.D. Breaux, M.W. Vail, and A.I. Anton, "Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations," Proc. IEEE 14th Int'l Conf. Requirements Eng. (RE), pp. 49-58, Sept. 2006.
[30] N. Kiyavitskaya, N. Zeni, T.D. Breaux, A.I. Anton, J. Cordy, L. Mich, and J. Mylopoulos, "Automating the Extraction of Rights and Obligations for Regulatory Compliance," Proc. 27th Int'l Conf. Conceptual Modeling, vol. 5231, pp. 154-168, Oct. 2008.
[31] G. Koliadis, N. Desai, N. Narendra, and A. Ghose, "Analyst-Mediated Contextualization of Regulatory Policies," Proc. IEEE Seventh Int'l Conf. Services Computing (SCC), 2010.
[32] A. Yale-Loehr, I.D. Schlesinger, A.J. Rembert, and M.B. Blake, "Discovering Shared Services from Cross-Organizational Software Specifications," Proc. IEEE Int'l Conf. Services Computing, pp. 186-193, 2010.
[33] G.A. Miller, "WordNet: A Lexical Database for English," Comm. ACM, vol. 38, no. 11, pp. 39-41, Nov. 1995.
[34] H. Guo, A. Ivan, R. Akkiraju, and R. Goodwin, "Learning Ontologies to Improve the Quality of Automatic Web Service Matching," Proc. 16th Int'l Conf. World Wide Web, pp. 118-125, 2007.
[35] G. Spanoudakis, A. Finkelstein, and D. Till, "Overlaps in Requirements Engineering," Automated Software Eng., vol. 6, no. 2, pp. 171-198, 1999.
[36] I. Hussain, L. Kosseim, and O. Ormandjieva, "Using Linguistic Knowledge to Classify Non-Functional Requirements in SRS Documents," Proc. 13th Int'l Conf. Natural Language and Information Systems: Applications of Natural Language to Information Systems, pp. 287-298, June 2008.
[37] J. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.
[38] M. Berland and E. Charniak, "Finding Parts in Very Large Corpora," Proc. 37th Ann. Meeting of the Assoc. for Computational Linguistics on Computational Linguistics, pp. 57-64, 1999.
[39] R. Girju and D.I. Moldovan, "Text Mining for Causal Relations," Proc. 15th Int'l Florida Artificial Intelligence Research Soc. Conf., pp. 360-364, 2002.
[40] J. Leidner and F. Schilder, "Hunting for the Black Swan: Risk Mining From Text," Proc. 48th Ann. Meeting of the Assoc. for Computational Linguistics, System Demonstrations, pp. 54-59, 2010.
[41] K.V. Indukuri and P. Radha Krishna, "Mining E-Contract Documents to Classify Clauses," Proc. Third Ann. ACM Bangalore Conf. (Compute '10), pp. 1-5, 2010.
174 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool