<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Process Mining-based Understanding and Analysis of Volvo IT&apos;s Incident and Problem Management Processes The BPI Challenge 2013</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Chang</forename><forename type="middle">Jae</forename><surname>Kang</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">PMIG</orgName>
								<address>
									<addrLine>34 Geobukgol-ro, Seodaemun-gu</addrLine>
									<settlement>Seoul</settlement>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Young</forename><forename type="middle">Sik</forename><surname>Kang</surname></persName>
							<email>yskang@mju.ac.kr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of MIS</orgName>
								<orgName type="department" key="dep2">School of Business Administration</orgName>
								<orgName type="institution">Myongji University</orgName>
								<address>
									<settlement>Seoul</settlement>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yeong</forename><forename type="middle">Shin</forename><surname>Lee</surname></persName>
							<email>yeongshinlee@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of MIS</orgName>
								<orgName type="department" key="dep2">School of Business Administration</orgName>
								<orgName type="institution">Myongji University</orgName>
								<address>
									<settlement>Seoul</settlement>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Seonkyu</forename><surname>Noh</surname></persName>
						</author>
						<author>
							<persName><roleName>Woo</roleName><forename type="first">Hyeong</forename><forename type="middle">Cheol</forename><surname>Kim</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Cheol</forename><surname>Lim</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Juhee</forename><surname>Kim</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Regina</forename><surname>Hong</surname></persName>
							<email>reginaxoxo@nate.com</email>
						</author>
						<title level="a" type="main">Process Mining-based Understanding and Analysis of Volvo IT&apos;s Incident and Problem Management Processes The BPI Challenge 2013</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">6BC58973BE7EC695305787084DCFA2B3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>process mining</term>
					<term>event logs</term>
					<term>process analysis</term>
					<term>big data</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Recently, there has been a strong interest in the application of innovative process mining techniques to promote evidence-based understanding and analysis of organizations' business processes. Following the trend, we analyze real life event logs of incident and problem management processes supported by Volvo IT's VINST system by using process mining and other analytical techniques. The incident and problem management logs contain 7554/2306 cases and 65533/9011 events respectively. To create relevant datasets for answering the given questions, we preprocess the logs with the help of PL-SQL and Java. The datasets are analyzed using ProM and Disco's stateof-the-art process mining capabilities, SQL, and traditional spreadsheet-based techniques. We provide evidence-based answers to the questions and demonstrate the potential benefits of process mining-based understanding and analysis of business processes. Finally, concluding remarks and limitations are discussed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Our digital universe is rapidly growing. Because of the increasing automation of and IT support for business processes, IT systems are playing a key role in this rapid growth <ref type="bibr" target="#b1">[2]</ref>. They are accumulating invaluable (big) data, which often records in detail which activities were executed when and by whom <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b10">11]</ref>. If managers extract process knowledge from the data, they can directly translate that knowledge into better process performance and decision making for process improvement initiatives <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>How can we put the invaluable data to good use? Process mining provides an evidence-based approach to extract valuable insights from an organization's processes by depending on the data <ref type="bibr" target="#b7">[8]</ref>. Through process mining, we can discover the actual 'as-is' process models depicting the way activities were performed. Process mining can verify the conformance of processes against some 'ideal' behaviours (e.g. as documented in standards, guidelines, and business policies) <ref type="bibr" target="#b5">[6]</ref>. Moreover, it can also find performance issues in processes (such as bottleneck) and analyze the interaction between resources performing activities <ref type="bibr" target="#b9">[10]</ref>. Process insights gained from using process mining and other analytical techniques can then help us precisely find process improvement opportunities <ref type="bibr" target="#b7">[8]</ref>.</p><p>The situation depicted in the BPI Challenge 2013 focuses on the incident and problem management processes supported by Volvo IT's VINST system. The incident and problem management logs include 7554/2306 cases and 65533/9011 events respectively. We attempted to address the given questions drawn from four major issues by using process mining and other analytical techniques. To achieve this goal, we sought to understand the data and create relevant datasets for the questions. Furthermore, we tried to clarify the issues at the log data level. Specifically, to provide evidence-based answers for the questions, we aimed to address the following issues in detail:</p><p>1. Push to front mechanism  Defining push to front mechanism at the log data level  Addressing the three questions 2. Ping pong behaviour  Defining ping pong behaviour at the log data level  Addressing the two questions 3. Wait user  Understanding the given three questions  Addressing the three questions 4. Process conformity per organization  Defining the range of comparison in conformity  Addressing the given question As noted by <ref type="bibr" target="#b0">[1]</ref>, process mining projects are typically iterative; after stakeholders provide feedback on findings, a new round of analysis is triggered. However, since we were not in contact with the stakeholders of Volvo IT, we are not able to receive any feedback on our analysis results and thus start a new round of analysis. In spite of this limitation, we believe that our answers and analysis results are plausible and thus validate the potential benefits of process mining-based analysis. We hope that our analysis results encourage an increasing number of managers to pay attention to process mining-based understanding and analysis of business processes in a big data world.</p><p>The rest of the paper is structured as follows. The next section shows which tools we used and our understanding of the data. We also explain how the two event logs were filtered and split into relevant datasets for answering the given questions. In section 3, we explain our analysis approaches and give evidence-based answers for the given questions. The final section provides the concluding remarks and the limitation of our analyses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Materials and Methods</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Used Tools</head><p>There are several tools used in this analysis: process mining tools (ProM and Disco), a database management system, and a spreadsheet application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.1">ProM and Disco</head><p>We chose ProM and an evaluation version of Disco (Version 1.3.6; Fluxicon) as process mining tools. We got a lot of help from Disco's capabilities like statistics, filtering function, and process map generator, which is shown in &lt;Fig. 1&gt;, to make a conclusion in many parts of the analysis with little effort. We also used ProM's innovative process mining techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Disco's process map generating function</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.2">Eclipse SDK and Oracle Database System</head><p>Although in general it could be said that Disco has excellent filtering functions, we sometimes needed more complicated and sophisticated preprocessing and data conversion features. That is the reason way we used Eclipse SDK(Version 4.2.2; Eclipse Foundation), the programming framework, and Oracle Database Express Edition (Version 11.2.0.1.0; Oracle).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.3">Microsoft Excel</head><p>Microsoft Excel, which is well known spreadsheet application, is very useful to draw charts or graph of data. We, therefore, used Microsoft Excel(Microsoft Office 2010; Microsoft Corporation) to convey conclusion effectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Understanding of the Data</head><p>We received three datasets which consists of 16 attributes respectively. Some rough information of each dataset is displayed in &lt;Fig. 2&gt;.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Rough information of the given dataset</head><p>Moreover, sub statuses are involved in one particular status and &lt;Fig. 3&gt; shows their correlations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Correlations between Statuses and sub statuses</head><p>There are two problem management datasets (i.e., open and closed datasets) and this means that problem management datasets are divided into two datasets. However, the incident management dataset exists as only one which includes those two concepts (open and closed). Among 7,554 incidents, 1,980 ones still remain uncompleted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Analysis from the Given Questions</head><p>It is possible to draw various conclusions from one analysis using different process mining techniques. For example, it could be interesting topics to analyze social networks between action owners or to figure out every pattern of incident management process. In this analysis, however, we sought to focus on the given questions with data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">The Outline of Analysis</head><p>Through this analysis, 'SR_Number' attribute of the given data is used for case id and 'Change_Date+Time' attribute is used for time. 'Activity' could be changed flexibly in dealing with every given question and also be combined with more than two attributes. In this case, we decided to use plus sign ('+') to distinguish each attribute value. &lt;Fig. 4&gt;, for instance, shows the log data of an activity which consists of status and sub status combined together.</p><p>Fig. <ref type="figure">4</ref>. Activity combined with a status and a sub status Doing this analysis, it is necessary to extract data from all datasets meeting particular conditions. For example, supposing we should extract data of which organization attribute value is 'Org Line A2' from dataset consisting of 15 lines, in this case only 4 shaded lines, as seen in &lt;Fig. 5&gt;, could be extracted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 5.</head><p>Extracting events whose organization attribute value is 'Org Line A2'</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Push to Front Mechanism</head><p>This issue deals with the Volvo IT's strategy/philosophy that most of the incidents need to be resolved by the first line support teams (mainly service desks). In general this increases work efficiency. Because the issue is only related to the incident management process, the problem management dataset was not considered for this analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1">Defining Push to Front Mechanism at Log Data Level</head><p>It could be defined that the push to front mechanism operates well when incidents are closed without any involvement of support teams which are in the second or third lines. Here, we intend to set and define operational principle of push to front mechanism at a log data level.</p><p>There are records of support teams -specially, names of support teams -on incident management datasets. &lt;Fig. 6&gt; shows some representative examples of names of support teams out of 649 support teams total. We supposed that the support teams which don't have any followed words like '2nd', '3rd', or '2nd 3rd' are just in the first line: for example, 'A14' in the &lt;Fig. 6&gt;.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 6. An example of names of support teams</head><p>When we make a judgment if push to front mechanism works well, only completed incidents are intended for the judgment first. It is because there is possibility for support teams in 2nd or 3rd lines to get involved in uncompleted incidents during its procedures even if it is not happened yet.</p><p>To judge whether push to front mechanism of the completed incidents works well, we should make clear the fact that there is no involvement of support teams in 2nd and 3rd lines during the procedures of incidents. &lt;Fig. 7&gt; shows one of the cases (incidents) in which push to front mechanism works very well. Meanwhile, an incident requires the approval of the support team being taken over the work when it needs to switch from the current support team to other ones. For this reason, the incident remains in standby status till the support team approves when the current support team assigns a new team which will take responsibility of an incident (in other words, the status now is to be 'Queued'). You can see 'Queued' status in the part shown in red color (see &lt;Fig. 8&gt;). However, you are able to figure out that the attribute value of the support team has been changed from 'U3' to 'S30 2nd', although the support team in charge has actually not been changed because it's not approved yet. In this case, it can be said that the push to front mechanism operates well because there was no actual change of a support team.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 8. A part of incident management dataset</head><p>Based on the discussion about lines involved in incidents and 'Queued' status awaiting assignment mentioned above, there are some definitions at a log data level to make a judgment if push to front mechanism works or not.</p><p> An incident is closed without any involvement of 2nd or 3rd lines  'Queued' status does not include the change of support teams Thus, based on those clear definitions given at log data level and related to the operation of push to front mechanism, we sought to give answers to those following questions.</p><p> For what products is the push to front mechanism most used and where not?  Where in the organization is the push to front process most implemented (field=involved organization), specifically if we compare the Org Line A2 with the Org Line C</p><p> What functions are most in line with the push to front process?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2">Products Using Push to Front Mechanism Frequently or Not</head><p>There are 704 products related to the incident management process. Among those products, only 284 are influenced by push to front mechanism. We found a list of top 10 products which had used push to front mechanism frequently among those 284 products by using the definition we have mentioned (see &lt;Fig. 9&gt;). Considering only absolute frequency, the product used push to front mechanism the most is 'PROD424'. However push to front mechanism was found just in 69% of all cases related to it, 'PROD424'. On the contrary, 'PROD383' has its absolute frequency 196 and at the same time 96% out of total cases related to it show the usage of push to front mechanism. (PRODUCT: product number, Push to front: cases which work with push to front mechanism well, Case Frequency: total number of cases related to an appointed product, Push to front / Case Frequency: rates of cases related to push to front mechanism among all cases of an appointed product) Fig. <ref type="figure">9</ref>. Top 10 products using push to front mechanism a lot Out of 704 products, there are 420 which have never used push to front mechanism. We selected 10 products which have many related cases among those 420 products (see &lt;Fig. 10&gt;). For example, there are 70 incidents related to 'PROD607'. However, they have never adopted the push to front mechanism. Fig. <ref type="figure">10</ref>. Products which have never used push to front mechanism at all</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.3">Organizations and Function Division keeping Push to Front Mechanism well</head><p>This time, let us look into the organizations and function divisions which work with push to front mechanism well. There are 25 organizations total -including 'Other'in the incident management process. Among those 25, there are 13 organizations working with push to front mechanism more than once. &lt;Fig. 11&gt; shows how the 12 organizations -not involving 'Other' -follow push to front mechanism. Although there are some organizations -like 'Org Line V8', 'Org Line G2', 'Ogr Line V10', and so on -applying push to front mechanism to every related case, it is only about less than 10 cases. Meanwhile, there is 'Org Line C' that many cases following push to front mechanism have been found and they count for 75% of all the cases. It, therefore, could be said that push to front mechanism is well followed by 'Org Line C'.</p><p>On the contrary, compared with 'Org Line C', 'Org Line A2' has fairly low percentages of push to front mechanism -only 15% -shown related to cases. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 11. Comparison between organizations taking push to front mechanism</head><p>Next we analyzed 24 function divisions in a similar way. There are 9 function divisions -excluding null value -which have followed push to front mechanism more than once. &lt;Fig. 12&gt; compares how well those 9 function divisions follow push to front mechanism. It was found that this mechanism is well followed by function divisions dealing with many incidents. In case of 'V3_2' and 'E_5', in particular, we got surprising result that 97% and 99% of 'V3_2' and 'E_5' respectively of all cases they involved in show well fulfilled push to front mechanism. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Ping Pong Behaviour</head><p>Ideally, an incident should be resolved quickly and with minimum interference of not too many support teams. However, in reality, support teams send incidents to each other repeatedly. These phenomena are called ping pong behaviour, which definitely leads to prolonging the total life time of an incident. We can witness this behaviour in both the incident and problem management processes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.1">Defining Ping Pong Behaviour at the Level of Log Data</head><p>Ping pong behaviour denotes that support teams pass the buck to each other repetitively when they deal with an incident or a problem. For elaborate analysis, we need to define it more specifically and clearly at the level of log data. Discussion below describes how ping pong behaviour is specifically and clearly defined at the level of log data.</p><p>In 3.2, we already explained how data is recorded when incidents remain in standby status. A status value is 'Queued' when an incident is in standby status and the support team is changed to be recorded even if the incident is not completed yet (see &lt;Fig. 8&gt;). To work out these errors, we got rid of all the rows in 'Queued' status where incident management data sets and problem management data sets have.</p><p>We looked into the type of these behaviours first to define ping pong behaviour more specifically and clearly at the level of log data. Ping pong behaviour is considered clearly just in case both action owners and support teams have been changed. On the other hand, as shown in &lt;Fig. 13&gt;, there are some patterns that action owners have not been changed, but support teams. We will consider it ping pong behaviour because these types correspond to the definition of ping pong behaviour as described.</p><p>Fig. <ref type="figure">13</ref>. In case that action owners have not been changed, but support teams Lastly, a difficult type to judge is in case that support teams have not been changed, but action owners (see &lt;Fig. 14&gt;). It cannot be disregarded that these types influence on incident/problem management processes. However, we made a decision that these types are not appropriate to ping pong behaviour, based on the definition of ping pong behaviour as described.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 14. In case that support teams have not been changed, but action owners</head><p>Based on the previous discussion, we will consider all the shaded areas Ping pong behaviour. These types reflect descriptions below at the level of log data.</p><p> Support teams have been changed.  Exclude from the scenario that support teams have been changed while 'Queued' status are recorded.</p><p> Ignore whether alternations to action owners only.</p><p>We will answer the questions below based on the clear definition at the level of log data on ping pong behaviour.</p><p> What are the functions, organizations, support teams responsible for most of the ping pong?</p><p> What products are most affected by it?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.2">The Functions, Organizations, Support Teams Responsible for Most of the Ping Pong Behaviour</head><p>We, first of all, looked into ping pong behaviours shown in support teams. &lt;Fig. 15&gt; shows the top 20 support teams that have passed their incident. For example, through that &lt;Fig. 15&gt;, we could find that 'G96' handed over its incidents far more than took over from another teams. Most cases (86.6%), however, have low impact level. There could be found different features of 'D4' to 'G96'. 'D4' takes over incidents as much as it hands over although most of those cases shown on the chart below are at medium impact level at 97.3%.</p><p>(Involved_ST: support teams, Hand over: the number of handing over incidents to other support teams, Take Over: the number of taking over incident from other support teams, Impact(Hand Over): rates of handing over incidents to other support teams by impact)    It is related to 882 ping pong behaviours total. For incidents occurrence is as high as occurrence of ping pong behaviours, it could be said that one ping pong behaviour occurs once one incident does on average. Although 'PROD542' on the second of the list is related to ping pong behaviours less than 'PROD424', there could be found 6 ping pong behaviours when only one incidents are arose and most of its incidents show higher impact level. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Wait User</head><p>In this part, we sought to deal with questions related to abuse of 'Wait-User' which is one of the sub statuses. Dataset of incident management process on which this sub status -'Wait-User' -is only found, therefore, becomes a target dataset. We also decided to cover status information on the analysis to be more specific. Following &lt;Fig. 24&gt; shows every activity found on processes when we set process activities by combining statuses with sub statuses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 24. Names of activities found on processes (combination of statuses and sub statuses)</head><p>As shown on &lt;Fig. 24&gt;, the 'Wait-User' sub status is always regarded as 'Accepted' status. 'Accepted+Wait-User' hence is supposed to be the focus of analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.1">Our Understanding of the Given Questions</head><p>There are following some given questions related to 'Wait-User' sub status.</p><p> Who is making most use of this sub status (action owner)?  What is the behaviour per support team, function, organization etc?  (mis)-usage per location?  Etc.</p><p>We intend to only answer the three of the questions mentioned above excluding different possible ones. To understand these three questions, it is required to conceptualize 'the behaviour' in the second question. We understood this concept as the pattern of using 'Wait-User'. Even though there are several possible interpretations of '(mis)-usage' in the third question, moreover, we sought to keep on analyzing focusing on the abusive behaviour on 'Wait-User'. The 'Wait-User' sub status, as mentioned above, is combined with 'Accepted' status and analyzed by being substituted with ''Accepted+Wait-User'. Based on this understanding, consequently, we intend to deal with and make answers the following subjects.</p><p> Action owner using 'Accepted+Wait-User' the most frequently.</p><p> Each pattern of using 'Accepted+Wait-User' found in support team, function division, and organization.</p><p> Locations where abuse of 'Accepted+Wait-User' is found.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.2">Action Owner Using 'Accepted+Wait-User' the Most Frequently</head><p>To get answers to these questions, we counted number of uses for 'Accepted+Wait-User' analyzed by user. We also explored the percentages of usage of 'Accepted+Wait-User', considering the total number of events occurred by users, to have more validity in analysis. We, at this point, excluded 'Siebel', not a real action owner but only used in the system, from the analysis result. Although 'Pawel' mostly uses 'Accepted+Wait-User', 'Muthu' can be also recognized to use as much as 'Pawel' when we consider its number of events. In case of 'Krzysztof', meanwhile, it shows its highly placed frequency based on the absolute numerical value, whereas it shows its outstandingly lower frequency when we consider its total number of events.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.3">Each Pattern of Using 'Accepted+Wait-User' Found in Support Team, Function Division, and Organization</head><p>We intend to call the pattern of usage of 'Accepted+Wait-User' as a combination of activities occurred right before and after it. Based on this definition, we found that the total number of patterns of usage of 'Accepted+Wait-User' was 40 (see &lt;Fig. 26&gt;). Before we generate this result, the uncompleted case was removed from the dataset.   &lt;Fig. 29&gt; shows the pattern of usage and frequency of use found in organizations 'Org Line C' and 'Org Line A2'. We could find that 'Org Line C' uses more patterns than 'Org Line A2'. 'Org Line C' uses whole patterns that were found in incident management process. Some parts of the patterns between two organizations are a little different. For example, a flow like 'Accepted+In Progress' → 'Accepted+Wait-User' → 'Accepted+Assigned' is the fourth largest in 'Org Line C', which is found on the list at 10 in case of 'Org Line A2'.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.4">Locations Where Abuse of 'Accepted+Wait-User' Is Found</head><p>There are 22 countries total which are involved in incident management process. In this context, we found that 'Accepted+Wait-User' is used repeatedly in the same case (see &lt;Fig. 31&gt;).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 31.</head><p>Repetitive usage in 'Accepted+Wait-User by country &lt;Fig. 31&gt; shows the result which is sorted in descending order depending on the total number of cases. It is shown that there are the largest number of cases in 'se', and the smallest number in 'tr'. In this context, it is possible that the higher a country is on the list, the more 'Accepted+Wail-User' is repeated. In case of 'be', however, we could find that there are enough number of repetitions (especially there is a case repeated over 20 times) as much as 'se' and 'pl'.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Process Conformity per Organization</head><p>Lastly, we focused on how much the incident and problem management processes arose in one organization conform to those in others.</p><p>There is an open problems management dataset, among the given problems management, composed of uncompleted problems management. Because it is hard to say that this kind of process which is a conclusion drawn from uncompleted problems management has representativeness, we excepted this open problems management dataset from analysis. The problems management dataset, therefore, is a closed problems management dataset. And the uncompleted incident management was removed from incident management dataset, either.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.1">The Range of Comparison in Conformity</head><p>In Volvo IT, there are 25 organizations total including 'Org Line A2' and 'Org Line C'. As shown below, &lt;Fig. 32&gt; represents the number and rate of events related to each organization in incidents and the problems. As in the figure above, over 83% of all events related to incident management is about 'Org Line A2' and 'Org Line C', which comprise more than 67% of problem management events. Consequently, we decided to consider 'Org Line A2' and 'Org Line C' as organizations which have representativeness and compare and analyze process between these two organizations: 'Org Line A2' and 'Org Line C'.</p><p>To analyze processes in different angles, on the other hand, process mining analysis helps various attributes (or combination of attributes) included in event log to be set as activities. Let us suppose, for example, there are status, support team, etc among attributes which are set as activities in incident management dataset. As shown in &lt;Fig. 33&gt; and &lt;Fig. 34&gt;, we are able to find that the two types of incident management process which set status or support team as activities show different angle each. In this context, it is obvious that the processes of two organization 'Org line A2' and 'Org Line C' could also have various figures as looked from different angles.</p><p>Considering angles to compare and analyze processes of two different organizations, therefore, is making a significant attempt. However, to compare processes of two organizations, we intend to set the combination of two attributes ('status' and 'sub-status') as activities. It is because that this setting shows the most typical figure of the process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.2">The Standards of Comparing Conformity</head><p>Creating a standard of comparing conformity between two processes, we focused on the components of process model. There are differences in process model components in notations. We, therefore, chose a notation used by Disco while there are many notations of process model. This notation consists of activities representable as square boxes and flows between activities representable as arrows. Accordingly, standard to compare the processes of two organizations are supposed to be activities composing processes and flows between activities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.3">Data Extraction</head><p>To compare processes of two organizations, we extracted data from 'Org Line A2' and 'Org Line C' using the standard and range we set earlier(refer to &lt;Fig. 35,36,37,38&gt;).</p><p>To measure the conformity of a process of one organization to a process of the other, first of all, it was planned for two organizations to be compared each other based on the extracted data (in a structural perspective). Then we sought to compare every possible inter-organizational flows between two organizations (in behavioural perspective). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.4">Comparison in Structural Perspective</head><p>&lt;Fig. 39&gt; shows the activities composing incident management processes for two organizations and their occurrences. We observed several activities performed by 'Org Line C' which was not found on 'Org Line A2': 'Completed+Cancelled' and 'Unmatched+Unmatched'. There are differences, moreover, in occurrence frequency. For example, 'Org Line A2' and 'Org Line C' comprise 24.06% and 14.22% each of occurrence in 'Queued+Awaiting Assignment'.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.5">Comparison in Behavioural Perspective</head><p>As stated above, we sought to explore and compare the every possible process of two organizations. To explore every possible flows, we used a footprint matrix, which is usually utilized for comparing the conformity between (drawn)process models and event log in conformance checking which is one of the process mining methods.</p><p>Comparing activities composing incident management processes, we found that there are two activities, Completed + Cancelled and Unmatched + Unmatched, on 'Org Line C' only. We attempted in analysis, excluding events related to those two activities, to compare two processes in behavioural perspective. We moreover used alphabetic characters like &lt;Fig. 41&gt; instead of using names of activities for the convenience of expression.  There are three commonly used symbols on footprint matrix here: #, →, ||. By using these symbols, we could easily find the differences between behaviours drawn from two processes. For example, 'X # Y' means that there is no relation between activity X and activity Y in terms of execution order. 'X → Y' means that activity Y follows activity X and there is no inverse scenario. Lastly, 'X || Y' shows that activity X is performed in parallel with activity Y. That is, activity X is followed by activity Y and the inverse scenario is also possible. The red boxes above on the footprint matrices show the differences found by comparing two organizations. We could recognize the parts showing differences between behaviours of two processes.</p><p>Besides, there is another method of comparing two processes: counting flows in each case and comparing them. There is comparative outcome via this method on &lt;Fig. 43&gt;. The last method, added to this, is to calculate the average time to make flows for each process and compare the outcome. &lt;Fig. 44&gt; contains the result of it. To compare problem management processes between two organizations, similarly, those methods mentioned above are used. As shown on &lt;Fig. 45&gt;, first of all, we used alphabetic characters instead of using names of activities which compose problem management processes, giving the convenience of expression. The following comparative methods are similar with methods used for comparing incident management processes. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>Real life event logs of incident and problem management processes supported by Volvo IT's VINST system were provided for the BPI Challenge 2013. The two logs include 7554/2306 cases and 65533/9011 events respectively. Furthermore, several questions derived from four main issues related to the two processes were raised. To address the questions, we tried to understand the data and create relevant datasets for the questions. Moreover, we attempted to clarify the issues at the log data level.</p><p>Although we cannot get any feedback from Volvo IT's stakeholders about our answers and analysis results, we strongly believe that the answers and analysis results are plausible because they are evidence-based. For the first issue, push to front mechanism, we clearly identified products for which the mechanism is most used. Furthermore, we found organization and function divisions that comply with the mechanism. Recall that the mechanism increases work efficiently. Therefore, based on these findings, managers are likely to find ways to improve work efficiency such as sharing best practices of push to front mechanism among organizations and function divisions.</p><p>For the ping pong behaviour issue, we found the function divisions, organizations, and support teams responsible for most of ping pong behaviour. We also identified the products which are most affected by this behaviour. These finding help managers reduce the total life time of both an incident and a problem. For example, managers may decide against purchasing products leading to severe ping pong behaviour in the future.</p><p>Volvo IT, typically, recommends its action owners not to use the 'wait user' sub status. However, action owners do not always comply with the guideline. To address this third issue, we found who are mainly breaking it and explored the pattern of using 'wait user' sub status per support team, function division, and organization. We also identified locations where abuse of the sub status is found. Based on these findings, managers may give warning to nonconforming action owners.</p><p>Finally, we addressed the final issue, process conformity per organization. After defining the range of comparison in conformity, we compared the incident and problem processes of the two organizations (i.e., 'Org Line A2' and 'Org Line C') from structural and behavioural perspectives. Based on the findings, managers may decide where they should focus on to achieve process standardization between the two organizations' processes <ref type="bibr" target="#b2">[3]</ref>. Overall, we believe that our process insights gained from the answers and analysis results can help managers precisely identify process improvement opportunities. Therefore we strongly recommend that more managers pay attention to these process mining and other analytical techniques for better process performance and decision making for process improvement initiatives in a big data world <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. A case not involved by support teams in 2nd and 3rd lines</figDesc><graphic coords="7,156.00,256.70,283.45,87.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 15 .</head><label>15</label><figDesc>Fig. 15. Top 20 support teams handing over their incident to other teams (incident management process) &lt;Fig. 16&gt;, in this context, shows organizations and function divisions which support teams that have responsibility to ping pong behaviour -showing large frequencybelong to.</figDesc><graphic coords="12,184.30,328.10,226.80,206.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 16 .</head><label>16</label><figDesc>Fig. 16. Support teams, organizations, and function divisions which have responsibility to most of the ping pong behaviours (incident management process)</figDesc><graphic coords="13,297.84,158.70,115.01,88.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 19 .Fig. 20 . 3 . 3 . 3</head><label>1920333</label><figDesc>Fig. 19. Top 20 support teams handing over their incident to other teams (open problem management process)</figDesc><graphic coords="14,180.89,408.09,117.51,92.81" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>(Fig. 21 .Fig. 22 .Fig. 23 .</head><label>212223</label><figDesc>Fig. 21. Top 10 products ping pong which are the most deeply related to ping pong behaviour. (Incident management process)</figDesc><graphic coords="15,127.70,147.35,340.05,121.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 25 .</head><label>25</label><figDesc>Fig. 25. Top 10 action owner using 'Accepted+Wait-User' frequently</figDesc><graphic coords="17,184.20,523.30,226.90,132.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 26 .</head><label>26</label><figDesc>Fig. 26. Pattern of usage of 'Accepted+Wait-User' found on incident management process and its occurrence frequency</figDesc><graphic coords="18,141.85,304.20,311.75,348.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 27 .</head><label>27</label><figDesc>Fig. 27. Selected two representative support teams, organizations, and function divisions of each We extracted every incident management process log from the six selected groups: two support teams, two organizations, and two function divisions. Then we compared each pattern of usage and the frequency of use by organizational units. &lt;Fig. 28&gt; shows what kind of pattern the support teams 'G97' and 'G96' have and how frequently they use the pattern. The red parts are equally shared pattern which both two support teams have. The support team 'G97' uses a little more pattern than 'G96' and both teams show similar pattern-usage together.</figDesc><graphic coords="19,212.65,396.25,170.15,111.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 28 .</head><label>28</label><figDesc>Fig. 28. Pattern of usage of 'Accepted+Wait-User' 'and the frequency of use found in support teams 'G97' and 'G96'</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 29 .</head><label>29</label><figDesc>Fig. 29. Pattern of usage of 'Accepted+Wait-User' 'and the frequency of use found in 'Org Line C' and 'Org Line A2' In &lt;Fig. 30&gt;, it is possible to check the pattern of usage and frequency of use which were found in function divisions 'V3_2' and 'A2_1'. Each division 'V3_2' and 'A2_1' use 33 patterns and 27 patterns respectively. The order of lists shown in those two function divisions are different each other.</figDesc><graphic coords="22,126.67,416.82,342.28,265.98" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Fig. 30 .</head><label>30</label><figDesc>Fig. 30. Pattern of usage of 'Accepted+Wait-User' 'and the frequency of use found in function divisions 'V3_2'and 'A2_1'</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Fig. 32 .</head><label>32</label><figDesc>Fig. 32. The number and rate of events related to each organization in incidents and the problems</figDesc><graphic coords="25,125.75,246.70,210.25,103.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Fig. 33 .Fig. 34 .</head><label>3334</label><figDesc>Fig. 33. An incident management process viewed from the angle of the status</figDesc><graphic coords="25,209.90,516.60,175.55,156.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Fig. 35 .Fig. 36 .Fig. 37 .Fig. 38 .</head><label>35363738</label><figDesc>Fig. 35. Incident management processes of 'Org Line A2'</figDesc><graphic coords="27,127.80,147.35,339.85,171.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head>Fig. 39 .</head><label>39</label><figDesc>Fig. 39. Activities composing incident management processes for two organizations, 'Org Line A2' and 'Org Line C', and their occurrences &lt;Fig. 40&gt; illustrates the activities composing problem management processes for two organizations and their occurrences. Differently from the incident management processes, in problem management process, the activities performed in two organizations are in conformity with each other. The percentages, moreover, of activities occurrences are about the same.</figDesc><graphic coords="28,124.80,421.20,340.45,128.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head>Fig. 40 .</head><label>40</label><figDesc>Fig. 40. Activities composing problem management processes for two organizations, 'Org Line A2' and 'Org Line C', and their occurrences</figDesc><graphic coords="29,124.80,147.25,169.90,120.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_16"><head>Fig. 41 .</head><label>41</label><figDesc>Fig. 41. Names of activities substituted with alphabetic characters (incident management processes) &lt;Fig. 42&gt; shows footprint matrices drawn from each incident management process of two organizations.</figDesc><graphic coords="29,240.95,452.30,113.40,124.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_17"><head>Fig. 42 .</head><label>42</label><figDesc>Fig. 42. Footprint matrices drawn from incident management processes of 'Org Line A2' and 'Org Line C'</figDesc><graphic coords="30,127.80,147.35,339.85,162.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_18"><head>Fig. 43 .</head><label>43</label><figDesc>Fig. 43. Comparative outcome of counting flows in each of two organizations (incident management process)</figDesc><graphic coords="30,127.80,499.70,339.85,171.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_19"><head>Fig. 44 .</head><label>44</label><figDesc>Fig. 44. Comparative outcome of calculating the average time to make flows for two organizations (incident management process) (in hours)</figDesc><graphic coords="31,124.80,193.30,340.70,181.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_20"><head>Fig. 45 .Fig. 46 .Fig. 47 .Fig. 48 .</head><label>45464748</label><figDesc>Fig. 45. Names of activities substituted with alphabetic characters (problem management processes)</figDesc><graphic coords="31,226.90,489.85,141.60,93.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,124.80,333.25,347.75,184.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,124.80,207.35,340.20,237.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,132.10,456.95,331.20,170.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="24,124.80,147.35,340.45,318.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Organization Push to front Case Frequency Push to front / Case Frequency</head><label></label><figDesc></figDesc><table><row><cell>Org line C</cell><cell>2470</cell><cell>3290</cell><cell>75%</cell></row><row><cell>Org line B</cell><cell>202</cell><cell>463</cell><cell>44%</cell></row><row><cell>Org line A2</cell><cell>188</cell><cell>1258</cell><cell>15%</cell></row><row><cell>Other</cell><cell>178</cell><cell>187</cell><cell>95%</cell></row><row><cell>Org line V2</cell><cell>29</cell><cell>62</cell><cell>47%</cell></row><row><cell>Org line V8</cell><cell>9</cell><cell>9</cell><cell>100%</cell></row><row><cell>Org line G2</cell><cell>8</cell><cell>8</cell><cell>100%</cell></row><row><cell>Org line V11</cell><cell>8</cell><cell>22</cell><cell>36%</cell></row><row><cell>Org line V10</cell><cell>7</cell><cell>7</cell><cell>100%</cell></row><row><cell>Org line H</cell><cell>6</cell><cell>6</cell><cell>100%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Involved_ST Hand Over Take Over Impact (Hand Over) Fig. 17. Top</head><label></label><figDesc>Support teams, organizations, and function divisions which have responsibility to most of the ping pong behaviours (closed problem management process)</figDesc><table><row><cell cols="4">Involved_ST Hand Over Take Over</cell><cell></cell><cell cols="2">Impact (Hand Over)</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>LOW</cell><cell>MEDIUM</cell><cell>HIGH</cell><cell>MAJOR</cell></row><row><cell>G271 2nd</cell><cell>18</cell><cell></cell><cell>4</cell><cell>0.0%</cell><cell>38.9%</cell><cell>61.1%</cell><cell>0.0%</cell></row><row><cell>G273 3rd</cell><cell>7</cell><cell></cell><cell>18</cell><cell>0.0%</cell><cell>42.9%</cell><cell>57.1%</cell><cell>0.0%</cell></row><row><cell>G236 2nd</cell><cell>5</cell><cell></cell><cell>5</cell><cell>0.0%</cell><cell>60.0%</cell><cell>40.0%</cell><cell>0.0%</cell></row><row><cell>M1 2nd</cell><cell>5</cell><cell></cell><cell>5</cell><cell>0.0%</cell><cell>80.0%</cell><cell>20.0%</cell><cell>0.0%</cell></row><row><cell>G165 2nd</cell><cell>5</cell><cell></cell><cell>3</cell><cell>0.0%</cell><cell>60.0%</cell><cell>40.0%</cell><cell>0.0%</cell></row><row><cell>G263 2nd</cell><cell>4</cell><cell></cell><cell>4</cell><cell>0.0%</cell><cell>25.0%</cell><cell>75.0%</cell><cell>0.0%</cell></row><row><cell>G75</cell><cell>4</cell><cell></cell><cell>2</cell><cell>0.0%</cell><cell>75.0%</cell><cell>25.0%</cell><cell>0.0%</cell></row><row><cell>G134 2nd</cell><cell>3</cell><cell></cell><cell>3</cell><cell>0.0%</cell><cell>33.3%</cell><cell>33.3%</cell><cell>0.3%</cell></row><row><cell>G153 2nd</cell><cell>3</cell><cell></cell><cell>2</cell><cell>0.0%</cell><cell>33.3%</cell><cell>33.3%</cell><cell>0.3%</cell></row><row><cell>G58 3rd</cell><cell>3</cell><cell></cell><cell>2</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G167 2nd</cell><cell>3</cell><cell></cell><cell>4</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G55 2nd</cell><cell>3</cell><cell></cell><cell>3</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G230 2nd</cell><cell>2</cell><cell></cell><cell>2</cell><cell>0.0%</cell><cell>50.0%</cell><cell>50.0%</cell><cell>0.0%</cell></row><row><cell>W16 3rd</cell><cell>2</cell><cell></cell><cell>2</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G288 2nd</cell><cell>2</cell><cell></cell><cell>2</cell><cell>0.0%</cell><cell>50.0%</cell><cell>50.0%</cell><cell>0.0%</cell></row><row><cell>G143 2nd</cell><cell>2</cell><cell></cell><cell>3</cell><cell>0.0%</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell></row><row><cell>G4 2nd</cell><cell>2</cell><cell></cell><cell>1</cell><cell>50.0%</cell><cell>0.0%</cell><cell>50.0%</cell><cell>0.0%</cell></row><row><cell>G88 2nd</cell><cell>2</cell><cell></cell><cell>3</cell><cell>50.0%</cell><cell>50.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G21 2nd G57 2nd G271 2nd G119 2nd</cell><cell>2 1</cell><cell>28 18</cell><cell>32 4 7 3</cell><cell cols="2">LOW 7.1% 0.0% 100.0% MEDIUM 92.9% 0.0% 22.2% 0.0% 100.0%</cell><cell cols="2">HIGH 0.0% 0.0% MAJOR 0.0% 0.0% 72.2% 0.1% 0.0% 0.0%</cell></row><row><cell>G181 2nd</cell><cell></cell><cell>14</cell><cell>18</cell><cell>7.1%</cell><cell>57.1%</cell><cell>7.1%</cell><cell>0.3%</cell></row><row><cell>G186 2nd</cell><cell></cell><cell>14</cell><cell>6</cell><cell>7.1%</cell><cell>64.3%</cell><cell>0.0%</cell><cell>0.3%</cell></row><row><cell>G88 2nd</cell><cell></cell><cell>14</cell><cell>9</cell><cell>14.3%</cell><cell>42.9%</cell><cell>35.7%</cell><cell>0.1%</cell></row><row><cell>G230 2nd</cell><cell></cell><cell>12</cell><cell>12</cell><cell>8.3%</cell><cell>58.3%</cell><cell>25.0%</cell><cell>0.1%</cell></row><row><cell>G165 2nd</cell><cell></cell><cell>10</cell><cell>13</cell><cell>0.0%</cell><cell>60.0%</cell><cell>10.0%</cell><cell>0.3%</cell></row><row><cell>G141 3rd</cell><cell></cell><cell>9</cell><cell>6</cell><cell>33.3%</cell><cell>55.6%</cell><cell>11.1%</cell><cell>0.0%</cell></row><row><cell>G55 2nd</cell><cell></cell><cell>7</cell><cell>8</cell><cell>0.0%</cell><cell>71.4%</cell><cell>28.6%</cell><cell>0.0%</cell></row><row><cell>G290 3rd</cell><cell></cell><cell>7</cell><cell>10</cell><cell>0.0%</cell><cell>28.6%</cell><cell>71.4%</cell><cell>0.0%</cell></row><row><cell>G92</cell><cell></cell><cell>7</cell><cell>4</cell><cell>0.0%</cell><cell>57.1%</cell><cell>42.9%</cell><cell>0.0%</cell></row><row><cell>G273 3rd</cell><cell></cell><cell>6</cell><cell>17</cell><cell>0.0%</cell><cell>16.7%</cell><cell>83.3%</cell><cell>0.0%</cell></row><row><cell>G56 3rd</cell><cell></cell><cell>6</cell><cell>5</cell><cell>0.0%</cell><cell>50.0%</cell><cell>33.3%</cell><cell>0.2%</cell></row><row><cell>G153 2nd</cell><cell></cell><cell>6</cell><cell>3</cell><cell>0.0%</cell><cell>16.7%</cell><cell>50.0%</cell><cell>0.3%</cell></row><row><cell>G167 2nd</cell><cell></cell><cell>6</cell><cell>4</cell><cell cols="2">0.0% 100.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G288 2nd</cell><cell></cell><cell>6</cell><cell>4</cell><cell>0.0%</cell><cell>33.3%</cell><cell>66.7%</cell><cell>0.0%</cell></row><row><cell>G157 2nd</cell><cell></cell><cell>5</cell><cell>6</cell><cell>0.0%</cell><cell>20.0%</cell><cell>60.0%</cell><cell>0.2%</cell></row><row><cell>M1 2nd</cell><cell></cell><cell>5</cell><cell>6</cell><cell>0.0%</cell><cell>80.0%</cell><cell>20.0%</cell><cell>0.0%</cell></row><row><cell>G138 2nd</cell><cell></cell><cell>5</cell><cell>2</cell><cell>20.0%</cell><cell>80.0%</cell><cell>0.0%</cell><cell>0.0%</cell></row><row><cell>G263 2nd</cell><cell></cell><cell>5</cell><cell>6</cell><cell>20.0%</cell><cell>20.0%</cell><cell>60.0%</cell><cell>0.0%</cell></row></table><note>20 support teams handing over incidents (closed problem management process) Fig. 18.</note></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>The authors are grateful to Dr. Anne Rozinat and Dr. Christian Gunther (Fluxicon) for providing them with an evaluation version of Disco and an accompanying copy of the BPIC 2013 dataset. They also thank Sara Lee for her translation help. The authors also thank PMIG (Process Mining &amp; Intelligence Group) for helping data preprocessing with its software.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Analysis of patient treatment procedures</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">P J C</forename><surname>Bose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Process Management Workshops Lecture Notes in Business Process Information Processing</title>
		<imprint>
			<biblScope unit="volume">99</biblScope>
			<biblScope unit="page" from="165" to="166" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Gantz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Reinsel</surname></persName>
		</author>
		<title level="m">The 2011 IDC digital universe study: Extracting value from chaos</title>
				<imprint>
			<publisher>IDC</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Business Process Change: A Guide for Business Managers and BPM and Six Sigma Professionals</title>
		<author>
			<persName><forename type="first">P</forename><surname>Harmon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Morgan Kaufmann</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Big data: The management revolution</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mcafee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Brynjolfsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Harvard Business Review</title>
		<imprint>
			<biblScope unit="volume">90</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="60" to="69" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Business process analysis in healthcare environments: A methodology based on process mining</title>
		<author>
			<persName><forename type="first">Á</forename><surname>Rebuge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Ferreira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="99" to="116" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Process mining applied to the test process of wafer scanners in ASML</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rozinat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">S M</forename><surname>Jong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Gunther</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems, Man and Cybernetics. Part C</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="474" to="479" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Conformance checking of processes based on monitoring real behavior</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rozinat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="64" to="95" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Understanding process behaviours in a large insurance company in Australia: A case study</title>
		<author>
			<persName><forename type="first">S</forename><surname>Suriadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Wynn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ouyang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H M T</forename><surname>Hofstede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J V</forename><surname>Dijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advanced Information Systems Engineering Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="page" from="449" to="464" />
			<date type="published" when="2013">7908. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<title level="m">Process Mining: Discovery, Conformance and Enhancement of Business Processes</title>
				<meeting>ess Mining: Discovery, Conformance and Enhancement of Business esses</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Discovering social networks from event logs</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Supported Cooperative Work</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="549" to="593" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Business process mining: An industrial application</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M M</forename><surname>Weijters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Alves De Medeiros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M V</forename><surname>Verbeek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="713" to="732" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
