Role-Method-Work Alignment (Contextual Enactment)

About this pattern

This is a generated FPF pattern page projected from the published FPF source. It is canonical FPF content for this ID; it is not a fpf-memory product feature page.

How to use this pattern

Read the ID, status, type, and normativity first. Use the content for exact wording, the relations for adjacent concepts, and citations to keep active work grounded without pasting the whole specification.

Type: Architectural (A) Status: Stable Normativity: Normative unless marked informative

At a glance. This pattern is the entry-bearing alignment pattern for engineer-managers when the real confusion is not "what component is this" but who is responsible, how the work is supposed to happen, when the plan lives, and what actually happened.

Use this when. Use this pattern when the real job is to separate role, method, plan, capability, and actual work before a team treats one cue, one schedule, one display, one copied/generated statement, or one document as if it already counted as the role assignment, the method, the work plan, execution evidence, or the work itself.

Start here when. The dominant ambiguity is role vs method vs schedule vs actual run, and the team keeps arguing about a "process" without separating recipe, plan, capability, and executed work.

First output. One explicit Role / Method / MethodDescription / WorkPlan / Work separation, plus one traceable chain from U.RoleAssignment through the governing method description to the actual U.Work occurrence or intended U.WorkPlan.

Governed object in plain terms. One alignment frame linking U.Role, U.Method, U.MethodDescription, U.WorkPlan, and U.Work through U.RoleAssignment; not a single work occurrence, not a checklist, not a language-style repair pattern, and not a mere cue note.

Governing move in plain terms. Keep design-time role/method/plan distinct from run-time work while making the chain between them inspectable enough for enactment, audit, and reroute.

What goes wrong if missed. Teams collapse role, recipe, plan, capability, and actual run into one fuzzy "process" story, then mistake documentation for execution, capability for evidence, schedule for occurrence, or a weaker briefing for the source that makes work admissible.

What this buys. One inspectable enactment frame that lets a team ask who held what role, which method governed, what plan existed, and what work actually occurred before taking action, blame, or approval as if those distinctions were the same.

Not this pattern when. Not this pattern when the honest need is only one dated work occurrence (A.15.1), only planning or schedule baseline (A.15.2), only a cue note that has not yet become an enactment-alignment question (A.16 / A.16.1), or only boundary/policy wording without a live role-method-work question (A.6 / A.6.B).

Typical next governing patterns/sources. A.15.1 for dated execution, A.15.2 for schedule/baseline planning, A.15.3 for slot-filling plan items, B.5.1 for the simple engineering-process reading, F.11 when method/work vocabulary itself must be aligned across contexts, and F.17 when the result should land on a human-facing work sheet.

Causal-use work boundary. Realized counterfactual-rung sampling, counterfactual randomization, intervention assignment, target-trial emulation work, and causal evidence collection remain U.MethodDescription, U.WorkPlan, and U.Work structures here. A.15 can say who performs which sampling or intervention work under which method and role; it does not make the resulting causal use admissible. C.28 owns the causal-use question, causality-ladder rung, causal estimand, support basis, counterfactual sampling realizability, and supported/unsupported use.

Common wrong escalations / reroutes. If the first honest artefact is still only a cue, reroute to A.16 / A.16.1; if the live question is boundary, promise, agreement-like service, or policy wording, reroute to A.6; if you only need one executed occurrence rather than the alignment frame, continue straight to A.15.1.

Authority-looking first-use split (subordinate work-reliance stress case). Use this compact entry only when an approval-, permission-, gate-, command-, credential-, delegation-, revocation-, status-, provenance-, dashboard-, copied-review-, generated-explanation-, schema/API-, or composed-chain case is about to guide work, action, release/reliance, execution evidence, approval use, role/status use, or another operational move. The trigger is the attempted use, not the displayed word. This subsection stays subordinate to the role/method/plan/work alignment frame; the detailed source-exit tables, role prompts, display guidance, lint cues, and stress cases live under A.15:4.4 after the core solution.

Here "authority-looking case" is only a recognition phrase for the encountered situation; it is not a U.* kind, not a profile, not a score, and not a new evidence source or governing source.

First stress-case output. Name the intended stronger use, actor/role, affected object/context/window, visible item, exact source exit or safe next move, and the stronger uses still unsupported. If exact support is incomplete, use the item only for orientation/source-finding, reopen or refresh the exact source, narrow the scope/window, run a bounded reversible probe under an explicit U.WorkPlan, route repair to the accountable source role, or block only the unsupported stronger reliance.

Boundary to weakened renderings. A lighter briefing, summary, redacted note, or coarsened rendering may help orient work or cue attention, but it does not become a sufficient action cue, implementation checklist, work plan, work occurrence, approval, gate, or execution authority by convenience alone. If a weaker rendering needs return to a stronger source before work can proceed admissibly, keep that boundary explicit here and use A.6.3.CSC Controlled Semantic Coarsening for the weaker-source relation rather than treating the weakened rendering as executable.

Recognition block vs assurance block. Read At a glance, Use this when, Start here when, First output, Governed object, Governing move, and What this buys as the primary recognition block. Read the authority-looking first-use split as a specialized work-reliance stress case, and read the entity distinctions, canonical relations, checklist, and relations below as assurance blocks that tighten the same alignment-frame claim; they do not widen the pattern into one single work occurrence, one cue note, one wording pattern, or one undifferentiated "process" object.

In any complex system, from a software project to a biological cell, there is a fundamental distinction between what something is (its structure), what it is supposed to do (its role and specified capability), and what it actually does (its work). Confusing these distinctions is a primary source of design flaws, budget overruns, and failed projects. Teams argue about a "process" without clarifying if they mean the documented procedure, the team's ability to execute it, or a specific execution that happened last Tuesday.

Keywords

  • role-method-work split
  • U.WorkPlan vs U.Work
  • contextual enactment
  • coordinated-work evidence
  • work-reliance stress case
  • authority-looking briefing/source exit
  • checkpoint return
  • weakened briefing.

Relations

A.15coordinates withControlled Semantic Coarsening
A.15coordinates withEvidence Graph Referring (C-4)
A.15explicit referenceU.Work: The Record of Occurrence
A.15explicit referenceU.PreArticulationCuePack
A.15explicit referenceMethod Quartet Harmonisation
A.15explicit referenceUnified Term Sheet (UTS)
A.15explicit referenceEvidence Graph Referring (C-4)
A.15explicit referenceContract Unpacking for Boundaries
A.15explicit referenceRole Taxonomy
A.15explicit referenceMethod‑CAL

Content

Problem frame

In any complex system, from a software project to a biological cell, there is a fundamental distinction between what something is (its structure), what it is supposed to do (its role and specified capability), and what it actually does (its work). Confusing these distinctions is a primary source of design flaws, budget overruns, and failed projects. Teams argue about a "process" without clarifying if they mean the documented procedure, the team's ability to execute it, or a specific execution that happened last Tuesday.

This pattern provides the canonical alignment for modeling contextual enactment in FPF, serving as the ultimate implementation of the Strict Distinction Principle (A.7). It weaves together several foundational concepts into a single, coherent model of how intention becomes action:

  • A.2 (Contextual Role Assignment): Provides the Holder#Role:Context structure for assigning roles.
  • A.4 (Temporal Duality): Provides the strict separation between design-time and run-time.
  • A.12 (External Transformer): Ensures that all actions are attributed to an external agent.

The intent of this pattern is to establish a normative, unambiguous vocabulary and set of relations for describing the entire evolution of an action, from the specification of a capability to its concrete, resource-consuming execution.

To keep plan-run separation explicit, this pattern references A.15.2 U.WorkPlan for schedules/calendars and A.15.1 U.Work for dated execution. Ambiguous terms like "process / workflow / schedule" are constrained by L-PROC / L-FUNC / L-SCHED (E-cluster): a workflow is a Method/MethodDescription, a schedule is a WorkPlan, and what happened is Work.

Terminology note (L-ACT). The words action/activity are not normative in the kernel. When a generic "doing" is needed, we use the didactic term enactment (not a type). Normative references must be to U.Method / U.MethodDescription / U.Work / U.WorkPlan. See lexical rules L-PROC / L-FUNC / L-SCHED / L-ACT.

Problem

Without this formal framework, models suffer from a cascade of category errors:

  1. Role-as-Part: A Role (e.g., AuditorRole) is incorrectly placed inside a structural bill-of-materials (ComponentOf), making the system's architecture brittle and nonsensical.
  2. Specification-as-Execution: A MethodDescription (the "recipe") is treated as evidence that the work was done. This leads to "paper compliance," where a system is considered complete simply because its documentation exists.
  3. Capability-as-Work: A team's ability to perform a task (Capability) is conflated with the actual performance of that task (Work). This obscures the reality of resource consumption and actual outcomes.
  4. Work-without-Context: An instance of work is logged without a clear link back to the role, capability, and specification that governed it, making the work unauditable and its results impossible to reproduce.
  5. Ambiguous "Process/Activity": The overloaded term "process" is used indiscriminately to refer to all of the above, creating a fog of miscommunication that paralyzes decision-making. Activity/action terms must be resolved via L-ACT to Method/MethodDescription (recipe), WorkPlan (schedule), or Work (run).

Forces

ForceTension
Structure vs. FunctionThe need to model the stable, physical structure of a system (mereology) vs. the need to model its dynamic, functional behavior (roles and actions).
Design vs. RunThe need for a timeless, reusable description of a capability (design-time) vs. the need for a specific, dated record of its execution (run-time).
Clarity vs. JargonThe need for a precise, formal vocabulary to prevent ambiguity vs. the reality that teams use informal, domain-specific jargon like "process" or "workflow."
Accountability vs. ComplexityThe need for a complete, end-to-end audit trail for every action vs. the desire to keep models simple and avoid excessive documentation.

Solution

The solution is a stratified alignment that cleanly separates the design-time and run-time for contextual enactment. The bridge between these worlds is the U.RoleAssignment.

The Core Entities: A Strict Distinction

FPF mandates the use of the following distinct, non-overlapping entities to model action. Using them interchangeably is a conformance violation.

A) Design-Time Entities (The World of Potential):

  • U.Role: A contextual "mask" or "job title" (e.g., TesterRole). It specifies a function but is not the function itself.
  • U.Method: The abstract way-of-doing inside a context (paradigm-agnostic; may be imperative, functional, logical, or hybrid).
  • U.MethodDescription: A U.Episteme describing a U.Method (the SOP/algorithm/proof/recipe on a carrier).
  • U.Capability: An attribute of a U.System that represents its ability to perform the actions described in a MethodDescription. This is the "skill" or "know-how."
  • U.WorkPlan: An U.Episteme declaring intended U.Work occurrences (windows, dependencies, intended performers as role kinds, budgets) - see A.15.2.

B) The Bridge Entity:

  • U.RoleAssignment: The formal assertion Holder#Role:Context that links a specific U.Holon to a U.Role within a U.BoundedContext. This holder-to-role assignment link is what "activates" the requirements associated with a role.

C) Run-Time Entity (The World of Actuality):

  • U.Work: An occurrence or event. It is the concrete, dated, resource-consuming execution of a U.MethodDescription by a Holder acting under a U.RoleAssignment; capability checks are evaluated at run time against the holder. This is the only entity that has a start and end time and consumes resources.

Kinds of Work and the primary target

Well-formedness constraint A15-WF-1 (work target and kind). A U.Work occurrence has primaryTarget: U.Holon with cardinality 1..1 (total) and kind with cardinality 1..1 (total).

Local kind values used here:

  • Operational - transforms a U.System or its environment.
  • Communicative (SpeechAct) - transforms a deontic/organizational frame (e.g., commitments, authority states, approvals).
  • Epistemic - transforms a U.Episteme (e.g., curating a dataset). The primaryTarget disambiguates enactment: what is being acted upon. Example: an approval is kind=Communicative, primaryTarget = Commitment(change=4711). A deployment is kind=Operational, primaryTarget = ServiceInstance(prod-us-eu-1).

Didactic Note for Managers: The "Chef" Analogy

This model can be easily understood using the analogy of a chef in a restaurant.

  • ChefRole is the Role. It's a job title with certain expectations.
  • A Cookbook (U.MethodDescription) contains the recipe for a Souffle. It's a piece of knowledge.
  • The chef's skill in making souffles is their U.Capability. They have this skill even when they are not cooking.
  • The restaurant's rulebook (U.BoundedContext) states that anyone in the ChefRole must have the Capability to follow the recipes in the cookbook.
  • The actual act of making a souffle on Tuesday evening - using eggs and butter, taking 25 minutes, and consuming gas - is the U.Work.

Confusing these is like mistaking the cookbook for the souffle. FPF's framework simply makes these common-sense distinctions formal and mandatory.

The Canonical Relations: Connecting the Layers

The entities are connected by a set of precise, normative relations that form an unbreakable causal chain. The following diagram illustrates this flow from the abstract context down to the concrete execution.

graph TD
    subgraph Design-Time Scope (Tᴰ)
        A[U.BoundedContext] -- defines --> B(U.Role)
        M[U.Method] -- isDescribedBy --> D[U.MethodDescription]
        Cap[U.Capability] -- supports --> M
        H(U.System as Holder) --> RB(U.RoleAssignment)
        B -- is the role in --> RB
        A -- is the context for --> RB
        A -- bindsCapability(Role,Capability) --> Cap
    end

    subgraph Run-Time Scope (Tᴿ)
        W[U.Work]
    end

    RB -- performedBy --> W
    W  -- isExecutionOf --> D

    style A fill:#e6f3ff,stroke:#36c,stroke-width:2px
    style B fill:#fff2cc,stroke:#d6b656,stroke-width:2px
    style Cap fill:#d5e8d4,stroke:#82b366,stroke-width:2px
    style M fill:#d5e8d4,stroke:#82b366,stroke-width:2px
    style D fill:#f8cecc,stroke:#b85450,stroke-width:2px
    style H fill:#e1d5e7,stroke:#9673a6,stroke-width:2px
    style RB fill:#dae8fc,stroke:#6c8ebf,stroke-width:3px,stroke-dasharray: 5 5
    style W fill:#ffe6cc,stroke:#d79b00,stroke-width:2px,font-weight:bold
  • bindsCapability(Role, Capability): A U.BoundedContext asserts that a given Role requires a specific Capability. This is a design-time rule.
  • isDescribedBy(Method, MethodDescription): A U.Method is formally described by one or more MethodDescriptions. This links the abstract way-of-doing to the recipe on a carrier.
  • isExecutionOf(Work, MethodDescription): A specific U.Work is a run-time realization of a design-time MethodDescription. Capability checks are evaluated against the holder at run time.
  • performedBy(Work, RoleAssignment): A U.Work is always performed by a specific Agent (a U.RoleAssignment). This links the action to the actor-in-context.

At run time, capability thresholds declared by the context/spec are checked against the holder; U.Work outcomes provide evidence for capability conformance.

This chain provides complete traceability: a specific instance of U.Work can be traced back to the U.MethodDescription that governed it, the U.Method it describes, and the Agent (Holder + Role + Context) that was authorized and responsible for its execution.

Bounded specialization scouting and CheckpointReturn

When one human-plus-AI pair faces a new task family or candidate solution corridor, the governed work system may temporarily compose four distinct local roles inside the same dyad: a human-side UtilityOwnerRole, an AIScoutRole, an AISpecialistProbeRole, and a human-side CommitAuthorityRole. The payoff of the dyad is faster admissible specialization of the next move, not disappearance of the human decision step.

For this bounded dyadic work question, the pair should declare one utility target first, enumerate heterogeneous candidate approaches that may satisfy that target, spend a bounded scout or probe budget before any committed route is chosen, and return one CheckpointReturn that compares the tested approaches rather than silently treating one successful probe as a committed rollout. A.15 owns this dyadic move and local role split only; it does not re-own the checkpoint-record semantics of C.24 or the budget/guard enforcement of E.16.

Every CheckpointReturn should carry:

  • the declared utility target and current TaskFamily
  • the candidate approaches actually tested
  • the evidence observed on each tested approach, including progress toward the named work-measure threshold and important failure signals
  • the budget already burned and the residual budget still available
  • the recommended next action: continue probing, commit, narrow, hand off, or stop
  • the exact commit trigger that would justify leaving the probe state

Low-human-overlap approaches remain admissible here only while they stay tied to the declared utility target, budget guard rails, and evidence basis by value.

Authority-looking work-reliance stress case

Authority-looking first-use split (subordinate work-reliance stress case). Use this subsection when an approval-, permission-, gate-, command-, credential-, delegation-, revocation-, status-, provenance-, dashboard-, copied-review-, generated-explanation-, schema/API-, or composed-chain case is about to be used as a work cue, action basis, release/reliance basis, execution basis, approval-use basis, role/status-use basis, or next operational move. The trigger is the attempted use, not the wording. This subsection does not change the governed object of A.15: it uses the role/method/plan/work separation to decide whether the encountered case has exact work-relevant support here or must exit to another FPF pattern before stronger reliance.

Here "authority-looking case" is only a recognition phrase for the encountered situation; it is not a U.* kind, not a profile, not a score, and not a new evidence source or governing source.

The central behaviour is: name the intended stronger use, choose the minimum sufficient next move, recover only the source needed for that move, and do not raise claim strength beyond that recovered support. If the exact governing source is already available, cite that source directly rather than routing through wording analysis.

Positive repaired path. A visible item becomes usable for action or reliance when the team can pair it with the exact governing source, affected actor/action/object/context/window, and source-supported use. The repaired outcome is the smallest admissible action/reliance statement plus the unsupported stronger uses that remain blocked.

Load posture by intended stronger use:

Load postureUse whenMinimum useful record
Orientation/source-finding noteThe item is only a cue, search handle, learning aid, or reversible local probe trigger.visible item / intended stronger use not yet supported / source to reopen / stop condition.
Routine reliance noteThe team needs ordinary bounded reliance without release, safety, compliance, delegated status, contested source, or cross-context reuse.Intended use, actor/role, affected object, visible source/ref, time/window, and reopen condition.
Stronger reliance pathThe intended use is external-impact, irreversible, release-bearing, gate-bearing, compliance/safety-bearing, delegated/revoked/status-bearing, generated/copied/provenance-mediated, contested, or cross-context.Exact governing source exit plus the live A.10, A.6, B.3, A.2.9, A.2.8, A.21, A.20, or A.15.1 support fields needed for that use.

A small A.15 note is enough for the first posture:

FieldValue
intended stronger useWhat the user is tempted to do with the visible item.
actor/roleWho would act or rely.
affected object/contextRelease, service, person/role holder, work item, claim, tenant, environment, or window.
visible itemDashboard tile, copied text, credential view, generated explanation, API wording, or other cue.
exact source needed or safe next moveSource to reopen, status to refresh, reversible probe, accountable source to ask, or weakened use.
stop/reopen conditionWhat blocks stronger reliance and what would reopen it.

When exact source support is incomplete, choose one admissible degraded-operation move after naming the intended stronger use; pick the lightest move that preserves practical action and source recoverability:

  1. Use the item only for orientation or source-finding.
  2. Reopen the exact source or refresh status/currentness.
  3. Narrow actor/action/object/context/window until the recovered source really covers the move.
  4. Run a bounded reversible probe under an explicit U.WorkPlan when no external-impact reliance is being made.
  5. Ask the accountable issuer, gate source, evidence source, role/status source, or boundary source to expose or repair the missing source.
  6. Repair the U.WorkPlan, U.MethodDescription, dashboard label, source link, or boundary wording that made the overread plausible.
  7. Proceed only inside the recovered scope/window.
  8. Block only the stronger reliance that lacks source support.

Broken-source repair route. If the exact source is required but unavailable to the acting user, route the repair to the accountable issuer/source role, gate source role, evidence source role, role/status source role, or boundary source role. The acting user records the blocked stronger use and the source to expose or repair, then proceeds only with the safe narrowed move available under recovered support.

Visible items are carriers, renderings, or cues unless another FPF source gives them stronger typed status for the live use. Do not treat a file, display, dashboard tile, model card, credential view, or generated text as the object, work occurrence, gate decision, role/status, evidence relation, or assurance claim by presentation alone.

Adversarial misuse guard. Do not let release pressure, delegated pressure, compliance pressure, green-dashboard pressure, or copied/generated wording convert a cue into action support. Pressure may trigger source recovery or scope narrowing; it does not replace the exact governing source.

Source exits for stronger use:

  • cue-only orientation: use only for attention or source-finding; stay with A.16 / A.16.1 for pre-articulation cues or A.6.A for action invitation. Cue-only orientation is not action guidance, work plan, gate passage, approval, work occurrence evidence, or assurance.

  • issuing, approval, authorization, delegation, or revocation act: cite A.2.9 U.SpeechAct / SpeechActRef, including act type, actor/role, affected object, judgement context, window, carrier/evidence refs when currentness matters, and instituted effects if claimed; because U.SpeechAct <: U.Work, the same act can satisfy dated work-occurrence evidence only when it is used as that communicative work occurrence;

  • role or status reliance: cite A.2.1 / U.RoleAssignment, a status-changing U.SpeechAct, a governing context-state record, a credential proof/status result under A.10, or an A.21 GateDecision when the status is gate-owned; do not infer a status kind from a label;

  • deontic permission, obligation, prohibition, or recommendation-as-duty: cite U.Commitment / A.2.8 and the instituting SpeechActRef when provenance matters; if "permission" means admissibility predicate, gate passage, authorization act, role/status effect, credential status, cue, or advice, route to A.6.B, A.21, A.2.9, A.2.1, A.10, A.16, or A.6.A instead;

  • boundary, policy, API, schema, "allowed", "authorized", "approved", "recommended", or "guaranteed" wording: split the statement through A.6 / A.6.B; route agreement-like guarantee, SLA, promise, or contract-bearing wording through A.6.C, A.2.3, A.2.8, and A.2.9 before action reliance;

  • gate decision or gate passage: cite A.21 OperationalGate(profile), GateDecision, GateDecisionRationale, DecisionLogRef, gate profile/version, check set, scope/window, and replay/freshness pins;

  • constraint or flow-validity witness: cite A.20 ConstraintValidity status/witness, GateCheckRef.aspect = ConstraintValidity, path/window/sentinel/pins as applicable; this is not the same thing as a gate decision;

  • release/deployment/rollback work occurred: cite A.15.1 dated U.Work occurrence and the A.10 evidence carrier path; a gate decision or command-like cue is not execution evidence;

  • evidence, provenance, authenticity, currentness, copied-source, or generated-source support: exit to A.10; evidence support does not approve, permit, execute, pass a gate, or raise assurance by itself;

  • assurance, readiness, safety, compliance, trust, release confidence, R, F, G, or CL increase: exit to B.3;

  • generated explanation: use E.17.EFP for explanation faithfulness or source-finding relation, then require A.10 claim-level source support for every operative claim that will be relied on.

  • approval-use split: if approval means someone approved something, cite A.2.9 U.SpeechAct / SpeechActRef; if the approval institutes a deontic binding, cite A.2.8 U.Commitment and the instituting act; if it means a gate passed, cite A.21 GateDecision / DecisionLogRef; if it is being used as evidence that release or other work occurred, cite A.15.1 dated U.Work plus A.10; if it is only approval wording in boundary, API, policy, or schema prose, split through A.6 / A.6.B; if it is evidence of approval, exit to A.10; if it is confidence because something was approved, use B.3 only when a typed assurance claim is live.

  • permission-use split: if permission is a deontic relation, cite A.2.8 U.Commitment and the instituting source; if it is an admissibility predicate, cite the A.6.B A-* claim; if it means gate passage, cite A.21; if it means an authorization act, cite A.2.9; if it changes or depends on role/status, cite A.2.1 or status-changing support; if it means credential status, use A.10; if it is only a UI label, badge, dashboard display, or permission-looking wording, treat it as orientation/source-finding until the exact source is recovered.

  • authorization-use split: if authorization means a speech act authorizing, cite A.2.9; if it means a policy/admissibility predicate over subject, action, object, context, and policy version, split through A.6.B; if it means gate decision or gate passage, cite A.21; if it means access proof, credential proof, status proof, or currentness, use A.10; if it means role assignment or role/status effect, cite A.2.1 or status-changing support; if it is being used to say execution happened, do not use authorization as evidence of execution, cite A.15.1 dated U.Work plus A.10 instead.

Return products for loop closure:

Route usedReturn product for this A.15 splitWhat the return product does not hide
A.6 / A.6.BRouted claim IDs (L-* / A-* / D-* / E-*) plus the intended stronger-use question.Raw wording is not action support.
A.10Claim-bound evidence path, freshness/currentness posture, and supported/unsupported use for the attempted claim.Evidence support is not approval, permission, gate passage, work occurrence, or assurance.
B.3Typed assurance claim, no-assurance-use disposition, or rejected/downgraded assurance claim.Assurance wording is not a generic trust label.
A.21OperationalGate(profile), GateDecision, DecisionLogRef, gate profile/version, scope/window, and replay/freshness pins.Gate passage is not execution evidence or assurance.
A.20ConstraintValidity status/witness, path/window/sentinel/pins where live.Constraint validity is not the gate decision itself.
A.2.9SpeechActRef with act type, actor/role, affected object, judgement context, window, and instituted effects if claimed.A speech act is not deontic binding, gate passage, or work occurrence by itself.
A.2.8U.Commitment / deontic relation with accountable role/agent, content, object, window, and instituting source when needed.Commitment is not proof that work occurred.
A.15.1Dated U.Work occurrence plus evidence carrier path when relied on.Work occurrence is not permission or assurance.
E.17.EFPExplanation class and source-finding/faithfulness relation over existing source-bearing material.Explanation is not operative source support without A.10 claim-level evidence.

Stronger action or reliance - especially external-impact, irreversible, release-bearing, role/status-bearing, gate-bearing, compliance/safety-bearing, delegated, contested, or assurance-bearing use - is admissible only for the actor, action, affected object, audience, scope, environment, version, policy context, operational mode, and time/window for which exact governing FPF support is recoverable. Cue-only, source-finding, learning, and bounded reversible probes stay lightweight and do not require a full source dossier.

Quick dispositions:

Encountered caseFirst A.15 disposition
Release dashboard green tileDisplay/source-finding only until A.21 GateDecision / DecisionLogRef, release/work target, scope/window, gate profile/version, and A.10 evidence path are recoverable; use B.3 only if assurance strength is claimed.
Repaired dashboard relianceTile plus current GateDecisionRef, gate profile/version, release/work target, time/window, and A.10 evidence path may support gate-passage reliance for that release and environment; it still does not support compliance proof, rollback success, or assurance increase unless those sources are separately present.
Copied review summary or copied approvalCopied wording/currentness at most; approval, authorization, permission, commitment, or work occurrence needs the original A.2.9 SpeechActRef, A.21 decision, A.2.8 commitment, or A.15.1 work source plus A.10 evidence.
Delegation chain / forwarded approvalEach link names delegator, delegatee, delegated action/object/scope/window, source permitting delegation, subdelegation allowance if any, revocation/currentness state, and evidence path. A forwarded approval is not delegated authority by copy alone.
Role/revocation/status displayResolve to role assignment, status-changing speech act, context-state record, credential proof/status result, or gate decision with freshness/revocation support; visual status cannot defeat a higher-priority revocation or supersession source.
Conflicting sourcesDo not resolve by color, visual salience, copied wording, or apparent recency. Name source order, governing decision source, freshness policy, and supersession rule; stronger reliance is contested until resolved, while source-finding and bounded reversible probes remain available.
Credential badgeUse the display to find issuer/trust anchor, holder/subject binding, verifier/relying context, proof/status result, revocation/freshness, and validity window. If those checks pass, rely only on credential-currentness for that holder/context; permission, authorization, role/status effect, or gate passage needs A.2.8, A.2.9, A.2.1, A.6.B, or A.21 support.

| Rollback command-like cue | Treat as cue or action invitation unless exact command/authorization, work occurrence, execution result, or gate support is recoverable. | | Generated explanation says "authorized" | Explanation may help find sources; it does not issue, approve, revoke, commit, authorize, pass a gate, evidence execution, or raise assurance. A citation or source mention inside the explanation supports stronger reliance only when the cited carrier supports that exact relied-on claim in the relying context under A.10. |

| Extracted-source -> rewrite -> representation shift -> explanation -> gate/release use | Reopen the strongest exact source at the first lossy or non-commutative transform step; stronger use waits for exact transform, evidence, explanation, gate, or assurance support. | | Repeated green-tile/no-source failures | Treat recurrence as upstream source-system repair work: expose decision refs, fix dashboard semantics, add source links/currentness, revise boundary wording, or add review/lint cues so the acting user is not repeatedly forced to reconstruct missing source support. |

Worked dashboard/approval slice:

A release dashboard shows a green approval-looking tile for Release-2026.05.08-prod. Treat the tile as orientation and source-finding only until the team can name the intended stronger use and the exact governing source.

StepRequired move
Intended stronger useRelease reliance, gate passage, compliance proof, assurance increase, or evidence/currentness support.
Gate decision sourceCite the current A.21 GateDecision / DecisionLogRef, gate profile/version, release/work target, scope/window, and replay/freshness pins. Without that source, the tile is not release permission or gate passage.
Constraint or flow-validity sourceCite A.20 ConstraintValidity status/witness only when the claim is about constraint or flow validity, not about the gate decision itself.
Evidence/currentness sourceUse A.10 for the dashboard query, carrier integrity, evidence refs, time/window, freshness/revocation stance, verifier/relying context, and rival explanation such as stale display or copied status.
Assurance sourceUse B.3 only if the tile is being used to raise readiness, compliance, trust, safety, release confidence, R, F, G, or CL; otherwise no assurance tuple is live.
Admissible repaired useWith the decision and evidence path recovered, rely on gate passage only for the named release/work target, environment, gate profile/version, and time/window.
Blocked overreadsThe dashboard color does not create approval, permission, compliance proof, rollback success, work occurrence, or assurance by display.

Role prompts:

Role in the situationPrompt
Acting userWhat can I safely do next without turning the visible item into unsupported action support?
Release engineerWhich A.21 gate decision/log, release/work target, and A.15.1 work occurrence are separate here?
Issuer/gate/evidence/role sourceWhat source, status, decision ref, or evidence path must be exposed or repaired?
Auditor/reviewerWhich evidence path, decision ref, speech-act ref, commitment, work occurrence, or assurance claim must be recoverable?
Boundary authorWhich words need routed claim IDs before they can guide action?
ManagerIs repeated ambiguity a source-system repair item rather than another manual check for the acting user?
LLM/tool userWhich exact source does the explanation help find, and which operative claims still need A.10 support?
Security/compliance sourceWhich revocation, currentness, proof/status, source order, or supersession source must be exposed?
Model/data sourceWhich intended-use, evaluation-condition, version/window, limitation, and evidence path bound the model/data documentation?
Assurance reviewerWhich named claim is actually being strengthened, with what assurance tuple, evidence path, limitations, and reopen condition?
Search aliases for this subsection include: approval, approval-looking display, authorization, authorization-looking display, permission, permission display, allowed wording, green dashboard, release tile, release readiness, model card, datasheet, data card, provenance, provenance mark, attestation, attestation label, credential, credential badge, generated explanation, copied review, copied approval, review summary, compliance-looking mark, delegation, delegation display, revocation, revocation status, gate passed, gate passage, rollback successful, rollback cue, and assurance label. These are search handles only; choose the actual starting pattern by the live question, not by the displayed word or artefact name.

First-entry map for authority-looking cases:

Live questionStart inFirst useful output
Can this visible item guide action or reliance?A.15Intended stronger use, minimum admissible next move, and exact source needed.
Is the problem boundary, policy, API, schema, or connector wording?A.6 / A.6.BRouted L-*, A-*, D-*, and E-* claims before stronger use.
Is the problem evidence, currentness, provenance, credential status, generated/copy source support, or source-chain recovery?A.10Claim-bound evidence/currentness path and supported/unsupported use.
Is the problem assurance, readiness, safety, compliance, trust, release confidence, or R/F/G/CL strength?B.3Typed assurance claim, no-assurance-use disposition, or downgraded/rejected assurance use.

Display guidance for bounded status: a visible status meant to guide work should expose source type, exact ref or link, freshness/window, scope, and unsupported stronger uses. For example, prefer Gate check passed / GateDecisionRef / release target / environment / window / not compliance proof, rollback success, or assurance increase over a bare approval-looking label.

Incident-learning fields for authority-looking overread: visible item, intended stronger use, affected actor/action/object/context/window, missing or stale source, exact governing source or source role, plausible overread, safe disposition used now, and upstream repair item for the source, dashboard, explanation, credential view, boundary wording, or publication face.

Contestability/redress route: when an authority-looking case affects person or team status, access, assignment, responsibility, release blockage, compliance posture, or safety-impacting work, name the review route before stronger reliance hardens. The route should name the disputed source or claim, the source role that can refresh or correct it, the evidence/status path to reopen, the safe interim disposition, and the time/window for review.

Lintable overread cues:

Lint signalExact reroute
approved, authorized, allowed, recommended, or guaranteed in boundary/API/schema/policy wordingSplit through A.6 / A.6.B into L-*, A-*, D-*, and E-*; route agreement-like wording through A.6.C, A.2.8, and A.2.9 where live.
Dashboard tile, status color, or release tile used as release evidence or gate passageRequire A.21 GateDecision / DecisionLogRef plus A.10 evidence/currentness path.
Credential screenshot or badge used as permission, authorization, or role/status supportRequire A.10 issuer/holder/verifier/status/currentness/relying-context support, then exact A.2.8, A.2.9, A.2.1, A.6.B, or A.21 source for the stronger use.
Generated explanation uses authorized, approved, or similar wordingUse E.17.EFP for explanation/source-finding relation and A.10 claim-level source support; issue/approval/gate/commitment claims still need A.2.9, A.21, or A.2.8.
Model card, datasheet, label, or note cited as readiness, safety, compliance, or release confidenceRequire a typed B.3 assurance claim, intended-use match, evaluation condition, limitations, and A.10 evidence path.
Provenance/attestation label cited as truth, safety, release, or permissionRequire A.10 bounded provenance/process claim plus separate evidence for truth, safety, release, permission, or assurance.
Evidence, assurance, gate, or work-occurrence words without their governing sourceRoute respectively to A.10, B.3, A.21, or A.15.1 before stronger reliance.

Stress cases for practice:

CaseExpected A.15 disposition
Green release dashboard tile with no GateDecisionRef.Source-finding only; recover A.21 decision/log plus A.10 evidence before gate-passage reliance.
Copied approval from last month.Recover original A.2.9 SpeechActRef, currentness/freshness, and any live A.2.8 commitment or A.21 gate source.
Credential badge screenshot after revocation.Treat as contested credential-currentness; use A.10 issuer/holder/verifier/status/revocation path and do not infer permission.
Generated explanation says authorized by policy.Use E.17.EFP for explanation/source-finding and A.10 claim-level support; issuing/gate/commitment claims still need their own sources.
Boundary wording says guaranteed approved for production.Split through A.6 / A.6.B; if agreement-like or promise-bearing, unpack through A.6.C, A.2.8, and A.2.9.
Dashboard says green while decision log says blocked.Treat as conflicting sources; name source order, governing decision source, freshness policy, and supersession rule before stronger reliance.

Archetypal Grounding

The Contextual Action Framework is universal. It applies identically to the modeling of physical engineering processes, knowledge work, and socio-technical systems.

ArchetypeU.System Archetype (Manufacturing)U.Episteme Archetype (Scientific Peer Review)
BoundedContextFactoryFloor:ProductionLine_BJournal:PhysicsLetters_A
RoleWeldingRobotRoleReviewerRole
HolderABB_Robot_Model_IRB_6700 (U.System)Dr_Alice_Smith (modeled as a U.System)
U.RoleAssignmentABB_Robot#WeldingRobotRole:Line_BDr_Smith#ReviewerRole:PhysicsLetters_A
MethodDescription (U.Episteme)Welding_Procedure_WP-28A.pdf (SOP)Peer_Review_Guidelines_v3.docx
Capability (Attribute of Holder)executeWeldingSeam(Type: 3F)evaluateManuscript(Field: QuantumOptics)
Work (Occurrence)Manufacturing Work: Weld_Job_#78345 (15:32-15:34 UTC, consumed 1.2 kWh, 5g Argon) - isExecutionOf Welding_Procedure_WP-28A.pdfPeer-review Work: Review_of_Manuscript_#PL-2025-018 (Completed 2025-08-15, took 4 hours) - isExecutionOf Peer_Review_Guidelines_v3.docx

Key takeaway from grounding: This side-by-side comparison reveals the power of the framework. A seemingly different activity like welding a car chassis and reviewing a scientific paper are shown to have the exact same underlying causal structure. Both involve a Holder (a system) acting in a Role within a Context, using a Capability described by a MethodDescription to produce a specific, auditable instance of Work. This universality is what allows FPF to compare and align disparate domains without collapsing their local structure.

Briefing is not execution authority

Source set. A release team has one governing deployment method description, one current work plan, one approval work item, and the evidence-bearing materials used to decide whether the rollout may proceed. A short rollout briefing is prepared for the daily stand-up.

Briefing slice. Status briefing only: rollback path appears verified in the current source bundle. Deployment authority remains with the governing approval record and work plan.

This briefing may orient the team and cue attention, but it is not the governing execution authority by itself. Work can proceed admissibly only when the underlying method description, current work plan, and any required approval records or evidence-bearing materials stay explicit and reopenable. If the team wants to treat the briefing as sufficient to execute, the case leaves simple orientation and must reopen the stronger governing materials rather than treating the shortened note as the work-enactment authority.

Bias-Annotation

Lenses tested: Gov, Arch, Onto/Epist, Prag, Did. Scope: Universal for contextual enactment across engineering, operational, and knowledge-work settings.

Bias risks and mitigations:

  • Governance bias (Gov): teams may over-treat role labels or approval displays as enough evidence that work happened. Mitigation: keep U.RoleAssignment, U.MethodDescription, U.WorkPlan, and U.Work distinct, and let only U.Work carry actuals and resource use.
  • Architectural bias (Arch): modelers may pull roles or capabilities into structural part hierarchies because those diagrams are already present. Mitigation: preserve role and capability as contextual-functional entities, not parts.
  • Epistemic bias (Onto/Epist): a documented recipe or schedule can be mistaken for proof of execution. Mitigation: require the traceability chain from U.RoleAssignment and U.MethodDescription to dated U.Work.
  • Pragmatic bias (Prag): teams may keep using one overloaded "process" word because it feels faster. Mitigation: resolve "workflow / schedule / what happened" through U.Method / U.MethodDescription, U.WorkPlan, and U.Work.
  • Didactic bias (Did): the chef analogy can make the pattern seem intuitive while hiding the need for explicit model links. Mitigation: pair the analogy with the canonical relations and checklist.

Conformance Checklist

To ensure the integrity of action modeling, all FPF-compliant models must adhere to the following normative checks.

IDRequirement (Normative Predicate)Purpose / Rationale
CC-A15-1 (Entity Distinction)The entities U.Role, U.Method, U.MethodDescription, U.Capability, U.WorkPlan, and U.Work MUST be modeled as distinct, non-overlapping types.This is the core enforcement of Strict Distinction (A.7). It prevents the category errors outlined in the "Problem" section.
CC-A15-1a (Work target/kind predicate)A conforming U.Work record SHALL satisfy A15-WF-1; validators SHOULD report missing primaryTarget or missing kind as an invalid work record.Keeps target and work kind enforceable as artifact validity without stating modeled-world admissibility through a free RFC sentence.
CC-A15-2 (Temporal Scope)U.Method/U.MethodDescription/U.WorkPlan exist in design-time; U.Work exists in run-time. Design artifacts are not mutated by operational events.Enforces Temporal Duality (A.4). Blueprints cannot be mutated by operational events.
CC-A15-3 (RoleAssignment Mandate)Every U.Work MUST be linked via performedBy to a valid U.RoleAssignment.Guarantees that every action has a clearly identified, context-bound actor, ensuring accountability.
CC-A15-4 (Traceability Chain)For every U.Work, an unbroken chain MUST exist: Work -performedBy-> RoleAssignment and Work -isExecutionOf-> MethodDescription -describes-> Method. Capability checks are evaluated against the holder at run time.Ensures end-to-end auditability from a specific action back to the recipe that governed it.
CC-A15-5 (No Roles in Mereology)A U.Role or U.Capability SHALL NOT be part of a mereological (partOf) hierarchy.The "Role-as-Part" anti-pattern is a violation. Roles and capabilities are functional, not structural. Enforces A.14.
CC-A15-6 (Resource Honesty)Resource consumption (U.Resource) MUST only be associated with U.Work, never with U.MethodDescription or U.Capability.Enforces that costs are tied to actual events, not to plans or potential. Aligns with Resrc-CAL (C.5).
CC-A15-7 (Plan/Run Split)Schedules/calendars MUST be represented as U.WorkPlan (A.15.2). A U.WorkPlan SHALL NOT be used as evidence of execution; only U.Work carries actuals.Preserves plan/run separation and prevents schedule-as-actual drift.
CC-A15-8 (Lexical Sanity)Unqualified "process/workflow/schedule" MUST be interpreted per L-PROC / L-FUNC / L-SCHED: workflow -> Method/MethodDescription; schedule -> WorkPlan; what happened -> Work.Keeps process vocabulary auditable and reduces lexical ambiguity.
CC-A15-9 (Realisation)A valid U.Work realizes a U.MethodDescription under a U.RoleAssignment. Spontaneous physical evolution without a MethodDescription is modeled as U.Dynamics, not as U.Work.Prevents background dynamics from being miscast as governed work.
CC-A15-10 (GateSplit)A SpeechAct that changes a Role's state (e.g., "Approve", "Authorize") MUST be modeled as a distinct U.Work step (kind=Communicative). It may open the Green-Gate for a subsequent operational step, but it SHALL NOT be conflated with that step.Preserves authority-state changes as distinct communicative acts.
CC-A15-11 (KindFit)The U.Role named in the performedBy assignment SHALL be appropriate for the U.Work kind (e.g., ApproverRole for communicative approvals; DeployerRole for operational deployments).Prevents kind-mismatched role attribution.
CC-A15-12 (Causal-use Work Boundary)Intervention assignment, counterfactual randomization, target-trial emulation, causal evidence collection, and realized counterfactual-rung sampling MAY be modeled here only as U.Method, U.MethodDescription, U.WorkPlan, U.Work, and role-assigned execution structure. Any claim that the resulting causal use is admissible SHALL cite C.28 for causal-use question, causality-ladder rung, causal estimand, support basis, support verdict, and supported/unsupported use.Prevents method/work structure from being mistaken for causal-use support.
CC-A15-13 (Authority-looking first-use split)Before an authority-looking case guides action or reliance, a conforming A.15 use SHALL name the intended stronger use and either cite the exact governing source exit or mark the case orientation-only, contested, reopened, or blocked. A conforming A.15 use SHALL NOT absorb evidence, assurance, boundary wording, gate decision, role/status, commitment, speech-act, or work-occurrence semantics from A.10, B.3, A.6, A.2.1, A.2.8, A.2.9, A.20, A.21, or A.15.1.Prevents displays, badges, copied text, generated explanations, and composed chains from becoming authority by appearance.

Common Anti-Patterns and How to Avoid Them

  • Role-as-part. Do not place U.Role or U.Capability inside structural partOf decomposition; keep them contextual and functional.
  • Recipe-as-evidence. Do not treat a U.MethodDescription or SOP as proof that work occurred; record dated U.Work instead.
  • Plan-as-actual. Do not let schedules, calendars, or intended assignments stand in for actual execution; use U.WorkPlan for intent and U.Work for actuals.
  • Capability-as-work. Do not treat possession of a capability as if the task has already been performed; capability supports execution but is not execution.
  • Approval collapse. Do not merge approval or authorization speech acts into the operational step they open; model them as distinct communicative U.Work when they change authority state.
  • Process soup. Do not leave "process / workflow / activity" uninterpreted in load-bearing passages; resolve the word to method, plan, or work.
  • Briefing-as-execution-cue. Do not treat a lighter review note, rollout summary, or redacted operations note as if it already authorized execution, approval, gate passage, or a work plan. Reopen the stronger governing method or evidence-bearing material before work proceeds.
  • Authority-looking case as source / work/role-status overread. Do not treat a dashboard tile, credential display, copied approval, generated explanation, provenance label, command-like cue, or composed source chain as approval, permission, gate passage, role/status currentness, work occurrence, evidence, or assurance by appearance. First name the intended stronger use, then exit to the exact governing source or block reliance.

Consequences

BenefitsTrade-offs / Mitigations
Unambiguous Communication: Provides a shared, precise vocabulary for teams to discuss roles, processes, and results, eliminating the ambiguity of terms like "process."Initial Learning Curve: Requires teams to learn and internalize the distinctions between the core entities. Mitigation: The "Chef" analogy and clear archetypes serve as powerful didactic tools. FPF tooling should guide users with templates.
End-to-End Auditability: The framework creates a "digital thread" that links every operational event (Work) back to its authorizing role, context, and specification. This is critical for regulated industries and for root cause analysis.Increased Formality: Requires more explicit modeling than informal approaches. Mitigation: This is a strategic investment. The upfront cost of formal modeling is offset by massive savings in debugging, re-work, and compliance efforts later.
Enables True Modularity: By separating capability from execution, the framework allows for easier substitution. A MethodDescription can be updated without invalidating past Work records. A Holder can be replaced with another, as long as it possesses the same Capability.-
Foundation for Governance: The model makes it possible to build powerful governance rules. For example: "Only an Agent with AuditorRole can execute Work that instantiates the ApproveRelease capability."-

Rationale

This pattern solves a problem that has plagued systems modeling for decades: the conflation of what a system is with what it does. Its rigor is not arbitrary but is grounded in several key intellectual traditions.

  • Ontology Engineering: The pattern is a direct application of best practices from foundational ontologies (like UFO), which have long insisted on the distinction between endurants (objects like a U.System) and perdurants (events/processes like U.Work), and between intrinsic properties and relational roles. FPF makes these powerful distinctions accessible to practicing engineers.
  • Process Theory: Formalisms like the Pi-calculus or Petri Nets model processes as dynamic interactions. The FPF Contextual Action Framework adds a more semantically rich enactment abstraction on top of such formalisms. The U.Work entity can be seen as an instance of a process, but FPF adds the crucial context of the Role, Capability, and MethodDescription that govern it.
  • Pragmatism and Practice: The framework is deeply pragmatic. The distinctions it makes (e.g., between a MethodDescription and U.Work) are precisely the ones that matter in the real world of project management, compliance, and debugging. When a failure occurs, a manager needs to know: was the recipe wrong (MethodDescription), did the chef lack the skill (Capability), or did they just make a mistake this one time (U.Work)? This framework provides the vocabulary to ask and answer that question precisely.

By creating this clean, stratified alignment for enactment, FPF provides a stable and scalable foundation for all of its more advanced patterns, from resource management (Resrc-CAL) and decision theory (Decsn-CAL) to ethics (Norm-CAL).

SoTA-Echoing

Claim 1. Best-known current workflow, digital-thread, and service-operations practice keeps recipe, plan, and execution separate.

Practice / source / alignment / adoption. Contemporary process modeling, service operations, and auditability practice after 2015 separates procedure, schedule, and executed occurrence because otherwise paper compliance becomes indistinguishable from completed work. In the manufacturing and peer-review slices above, this means a procedure or calendar never counts as the weld or the review itself. This pattern adopts that separation, adapts it through U.Method, U.MethodDescription, U.WorkPlan, and U.Work, and rejects the shortcut where one undifferentiated "process" object carries all three loads.

Claim 2. Best-known current accountability practice keeps actor-in-context explicit rather than attributing work to a role label or a document.

Practice / source / alignment / adoption. Contemporary governance, service delivery, and incident practice distinguishes accountable assignee, governing procedure, and actual run record because post-hoc review depends on knowing who acted, under what role, and under which method. In the slices above, that is why the robot or reviewer acts under U.RoleAssignment rather than the role or guideline acting on its own. This pattern adopts explicit actor-in-context attribution through U.RoleAssignment, adapts it to bounded-context semantics, and rejects anonymous work logs and role-as-part modeling.

Claim 3. Best-known current approval and execution practice treats communicative gate acts and operational acts as distinct kinds of work.

Practice / source / alignment / adoption. Contemporary release, compliance, and safety-critical practice separates approval, authorization, and review acts from the operational steps they permit because authority change and world change are not the same event. In the examples above, that means an approval is not the same work as a deployment or a weld. This pattern adopts that split, adapts it through communicative versus operational U.Work kinds, and rejects the collapse of approval into the thing being approved.

Local stance. The load-bearing SoTA claim for this pattern is practical and narrow: contextual enactment remains reviewable only when role, method, plan, and work stay distinct enough that audits can tell whether the problem was in the assignment, the recipe, the schedule, the capability, or the run itself.

Claim 4. Best-known current agentic work practice treats fast bounded specialization as a checkpointed scout/probe discipline rather than as a naked winner claim.

Practice / source / alignment / adoption. Contemporary agentic tool-use, adaptive workflow, and human-in-the-loop governance practice separates bounded exploration from committed rollout because a successful probe is not yet an admissible route choice. In the working moment above, that is why the pair returns one CheckpointReturn with candidate approaches, evidence, burned and residual budget, and a commit trigger rather than only a winner label. This pattern adopts checkpointed scout/probe discipline, adapts it through the dyad-local roles and CheckpointReturn, and rejects the shortcut where an early probe silently becomes a committed rollout.

Claim needSoTA practice (post-2015)Primary source (post-2015)Alignment with A.15Adoption status
Recipe, plan, case, decision, and executed occurrence must stay separable.Case-management, decision-modeling, and service-change practice distinguish discretionary case work, decision logic, planned change support, and the realized service/product change.OMG CMMN 1.1 (2016); OMG DMN 1.5 (2024); ITIL 4 Practitioner: Change Enablement (2023).The manufacturing, peer-review, and rollout slices keep U.MethodDescription, U.WorkPlan, approval work, and U.Work separate so a calendar or procedure never counts as the weld, review, deployment, or actual run.Adopt/Adapt. Adopt the separation of case, decision, plan, and occurrence; adapt it to FPF's U.Method, U.MethodDescription, U.WorkPlan, and U.Work; reject an undifferentiated "process" object.
Architecture and digital-thread practice need traceable views without confusing description, authority, and occurrence.Architecture-description and model-based systems practice treat descriptions, viewpoints, requirements, behavior, verification, and traceability as explicit review objects.ISO/IEC/IEEE 42010:2022; OMG SysML v2.0 Language Specification (2025).A.15 uses actor-in-context, role assignment, method description, and work occurrence so post-hoc review can ask whether the problem was assignment, capability, recipe, plan, approval, or run.Adopt/Adapt. Adopt explicit trace and viewpoint discipline; adapt it to role/method/work alignment; reject attributing work to a role label or document alone.
Approval and execution are distinct practical acts.Change-enablement and decision-modeling practice separates risk assessment, authorization, scheduling, decision logic, and the work that realizes change.ITIL 4 Practitioner: Change Enablement (2023); OMG DMN 1.5 (2024).In the release and gate examples, an approval or authorization changes authorization state; it is not the same work as deployment, welding, or other operational occurrence.Adopt. Adopt the communicative/operational split and reject collapse of approval into the thing approved.
Fast bounded exploration must not become committed rollout by convenience.Contemporary service and modeling practice supports adaptive work while preserving explicit authorization, traceability, and reviewable transition from option exploration to committed change.ITIL 4 Practitioner: Change Enablement (2023); ISO/IEC/IEEE 42010:2022; OMG SysML v2.0 Language Specification (2025).The scout/probe moment returns evidence, budget posture, and a commit trigger rather than only a winner label. The practical safeguard is that successful exploration still needs explicit commit authority before it becomes work enactment.Adapt/Reject. Adapt adaptive-change and traceability practice to FPF role/method/work splits; reject the shortcut where an early probe silently becomes a committed rollout.
Authority-looking displays need exact current source support before stronger reliance.Contemporary practice contributes complementary invariants: dynamic authorization separates subject/action/object/context/window decisions; credential practice separates issuer/holder/verifier/status/currentness; provenance and attestation separate origin/process support from truth or release; assurance practice separates claim/evidence/limitations/decay from visible labels; release/change practice separates decision, schedule, and executed work.NIST Zero Trust / dynamic authorization practice; Cedar policy language; Zanzibar-style relation authorization; W3C Verifiable Credentials / digital identity; C2PA content provenance; SLSA / in-toto attestations; ITIL 4 Change Enablement.The first-use split asks for intended stronger use, exact source exit, affected object, context, policy/gate version, time/window, freshness/revocation, evidence, and relying context before stronger reliance while leaving cue-only and source-finding uses lightweight.Adopt/Adapt/Reject. Adopt bounded currentness and source-support invariants; adapt them through exact FPF exits; reject treating a display, copy, explanation, credential, provenance mark, dashboard tile, or composed chain as authority.

The nearest recovery anchors are the manufacturing, peer-review, rollout briefing, and authority-looking case slices above, plus CC-A15-7, CC-A15-10, CC-A15-12, and CC-A15-13. If a SoTA row cannot be recovered through those local checks, do not let the source citation stand in for the local A.15 rule.

Relations

  • Directly Implements: A.7 Strict Distinction.
  • Builds Upon: A.2 (U.Role), A.2.1 (U.RoleAssignment), A.4 (Temporal Duality), A.12 (External Transformer).
  • Is Used By / Provides Foundation For:
    • C.4 Method-CAL: Provides the formal definition of U.MethodDescription and the Gamma_method operator for composing them.
    • C.5 Resrc-CAL: Provides the U.Work entity to which resource consumption is attached.
    • B.1.6 Gamma_work: The aggregation operator for U.Work.
    • B.4 Canonical Evolution Loop: The entire loop is a sequence of U.Work instances that modify MethodDescriptions.
    • A.15.2 U.WorkPlan: plan-run split, baselines and variance against U.Work.
    • C.28 CausalUse-CAL: causal-use meaning and support for intervention, counterfactual sampling, target-trial emulation, and causal evidence work; A.15 keeps the role/method/work chain.
  • Constrains: Any FPF pattern that models actions or processes must use this framework to be conformant. It serves as the canonical alignment for contextual enactment in the FPF ecosystem.
  • Coordinates with: L-PROC / L-FUNC / L-SCHED (E-cluster) for lexical disambiguation of process / workflow / schedule.
  • Coordinates with: A.6, A.6.B, and A.6.C for mixed boundary/policy/API/schema wording; A.10 for evidence/currentness/provenance; B.3 for assurance strength; A.21 for OperationalGate(profile), GateDecision, and DecisionLogRef; A.20 for ConstraintValidity status/witness; A.15.1 for release/deployment work occurrence; and E.17.EFP for generated-explanation faithfulness/source-finding.

Coordinated-work evidence and quantum-like route note

Use A.15 first when the claim is about who acts, by which method, under which role, producing which work result. Coordinated work, routine skill, team alignment, tacit knowledge, and role-method fit are not quantum-like by default.

Action path:

  1. Name the role, method, and work result before naming any distributed state.
  2. State which work traces, artifacts, events, observations, reports, metrics, or role enactments make the coordination visible.
  3. Ask whether role-method-work alignment alone explains the case. If yes, stay in A.15.
  4. If no participant statement, local component report, single carrier, dashboard, or exported representation carries the inferred state faithfully enough for the intended use, add a C.26.2 distributed-state reading.
  5. State the weakest claim, time window, rival explanations, and export loss.
  6. Route evidence strength through A.10 and assurance strength through B.3 when the claim supports action, audit, readiness, release, or compliance.

Add a C.26.2 distributed-state reading only when coordinated work is being used as evidence for a state that no participant statement, local component report, single carrier, dashboard, or exported representation carries faithfully enough for the intended use. That evidence-bound claim states:

FieldRequired content
CarrierWork trace, artifact, event, observation, report, metric, or role enactment that bears the evidence
Time windowWhen the reading holds and when it decays or must be refreshed
Probe or occasionWhat question, task, workshop, incident, handover, dashboard, or coordination situation made the state readable
Weakest claimThe minimal distributed-state reading supported by the carriers
Rival explanationsRoutine compliance, policy, command, coincidence, incentive, documentation artifact, or local skill that could explain the same work
Export lossWhat is lost when the state is summarized into one report, score, or statement

Useful outputs:

  • an A.15 work-alignment claim when work roles explain the case;
  • a C.26.2 weak distributed-state reading when coordination evidence survives ordinary rivals;
  • an A.10/B.3 evidence or assurance route when the reading will support stronger use;
  • no distributed-state claim when carriers, rivals, or time window cannot be named.

A.15:End