<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Professional use of Process Mining for analyzing Business Processes</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Josef</forename><forename type="middle">K J</forename><surname>Martens</surname></persName>
							<email>jef.martens@capgemini.com</email>
							<affiliation key="aff0">
								<orgName type="department">Cluster TRAILS</orgName>
								<orgName type="institution">Capgemini</orgName>
								<address>
									<addrLine>Reykjavikplein 1</addrLine>
									<postCode>3543 KA</postCode>
									<settlement>Utrecht</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Professional use of Process Mining for analyzing Business Processes</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">218EC2E11D7420C096683A4D8A0A64A7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process Mining</term>
					<term>Consultancy</term>
					<term>Business Analysis</term>
					<term>SEMBA</term>
					<term>Business Process Management</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A professional application of Process Mining has been established in the context of a methodology as defined by a consultancy firm. The results of the research show where in the context of consultancy Process Mining is used and how clients can benefit from expertise and standardized work.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1.1</head><p>Reason for research <ref type="bibr">Luftman et al.</ref> analyze IT management issues and multiple topics have been identified and known to shift in importance over time <ref type="bibr" target="#b0">[1]</ref>[2][3][4] <ref type="bibr" target="#b4">[5]</ref>. Results by Luftman and Ben-Zvi <ref type="bibr" target="#b0">[1]</ref> shows that the topic of Business productivity and cost reduction is the most important issue for C-level management in 2010. From the top 5 topics from 2010, three issues (Business productivity and cost reduction, IT and Business alignment, IT reliability and efficiency) are presented in some form in the BPI challenge 2013 <ref type="bibr" target="#b5">[6]</ref>. Process Mining allows for analysis of raw data sets to discover process flows and analyze the important elements related to such flows <ref type="bibr" target="#b6">[7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.1">Business productivity and cost reduction</head><p>Business productivity is measured by Key Performance Indicators (KPI) which are common in mature businesses, aligned to strategic and tactical goals and drive the decision making processes <ref type="bibr" target="#b7">[8]</ref>. Common KPIs are constructed by evaluating data against a benchmark value about input, output and throughput of business processes and their related waste and outage.</p><p>Having an excellent productivity performance with maximized effectiveness of expenses on the operation of assets and employees allow for margin translates to a maximization of profit in the case of for profit organizations. To achieve this optimum state, it is essential to know what the operational performance is of the complete-and sub-system of the organizational processes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.2">IT and Business Alignment</head><p>Bridging the gap between Business and IT is one of the most challenging activities for IT and Business professionals, it has been "…a top concern of IT managers for almost 30 years" <ref type="bibr" target="#b0">[1]</ref>. Blum et al. <ref type="bibr" target="#b8">[9]</ref> researched the position of the information manager, a role which is concerned with many of the issues as described by Luftman et al. and concluded that the organizational maturity defines the position and importance acceptance of higher management to solve such issues.</p><p>The Business Analyst (BA) is the role that inhibits a set of competences that allow BA professionals to close the gap <ref type="bibr" target="#b9">[10]</ref>. Therefore, Business Analysts of Capgemini present you these research results for the BPI Challenge 2013.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.3">IT reliability and efficiency</head><p>The case for 2013 in the BPI Challenge is based on information of an IT system which is part of the IT department of Volvo <ref type="bibr" target="#b10">[11]</ref> responsible for problem and incident management in combination with a call center. Call centers are the de facto standard for efficiency studies <ref type="bibr" target="#b11">[12]</ref> and their performance is highly reliant on supporting IT systems for providing applicable knowledge. Because the Volvo call center as subject of analysis is the problem solving unit for incidents, reliability and efficiency are applicable topics of research for this analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Aim</head><p>There are multiple aims for this BPIC '13 research:</p><p>1. To position Process Mining in the collection of competences of Business Analysts in relation to Business Process Management 2. To position the research method characteristics in the context of Business Analysis 3. To provide proof that Process Mining is beneficial in a methodological approach of analysis in context of Business and IT gaps and the SEMBA method 4. To provide insight in how Business Analysis is applied and what next steps are with Process Mining outcomes.</p><p>The aims as presented are positioned by answering the questions as stated by Volvo <ref type="bibr" target="#b10">[11]</ref>, where we assume that the author is the requestor.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3">Added value</head><p>There are two sides for the added value of this paper. For professionals, this paper shows how Process Mining and facilitating tools can be applied and how the rationale is defined when handling complex customer cases. For Science, this paper allows to relate the insight of the requirements of consulting professionals for non-standard expertise and how Process Mining is validated as an important method for Business Analysts and their profession.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3.1">Professionals -positioning in practice</head><p>The consulting profession is a field of expertise that is highly reliant on academic work and evidence driven. Customers grow in their insights and requirements and demand factual decision making solutions, from one-off decisions to continuous business management tooling.</p><p>Capgemini established the Structured Expert Method for Business Analysis (SEMBA) as method for Business and IT analysis. SEMBA consists of four phases (Focus &amp; Direction, As-Is Analysis, To-Be Design and Migration Design) and multiple streams (Business Context, Business Process, Information, Application Landscape and Requirements Engineering), depicted in figure <ref type="figure" target="#fig_0">1</ref>. SEMBA is established with predefined deliverables, which allow for a consistent, predictable outcome of complex analysis. The method is a standard, however, the content and interpretations are customer tailored. The combination of evidence driven tools with a standardized methodology of analysis resulting in predictable delivery is developed for client satisfaction <ref type="bibr" target="#b12">[13]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3.2">Science -positioning in literature</head><p>The BPI Challenge is a great way to present and combine science with application in practical settings. Where the BPI Challenge is a challenge for academics and professionals, this paper is a presentation of analysis and professional positioning for anyone interested in the field of process mining and business process management. As Business Analysts bridge the gap between Business and IT, this paper bridges the gap between science and business by applying research findings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Research Design</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.1</head><p>The case positioned in SEMBA For this analysis and the deliverable (this paper) the limitations are based on time restrictions and client contact. The time restriction is 18 hours and there cannot be client interaction because of the design of the BPI challenge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.1">Focus and Direction</head><p>In the focus and direction phase, there are seven steps followed. As SEMBA is a Capgemini proprietary approach to analysis, not all details are presented in this case. The common result is that the problem is defined as the combination of questions as stated in the Volvo case description in the context of the Volvo IT department related to incident and problem management with the use of a call center in multiple countries. The client expects answers to the stated questions with the use of the provided input: datasets and descriptions of the dataset and the system where the dataset is obtained from.</p><p>The approach is described from paragraph 2.2, normally this phase describes the approach and scope of the activities. The outcome of this phase is a formal and exhaustive overview of what is to be done, who does it, how activities are done, when activities take place, where and why. The scope for this research has no objective to capture requirements, therefore the stream Requirements Engineering will be left out of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.2">As-Is Analysis</head><p>For the BPI Challenge 2013, the As-Is situation is established for some of the streams.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Business Context</head><p>The business context is related to the IT department of Volvo. The unit of analysis is the functioning of the VINST system, its users and the registrations in the system across a limited timeframe. The VINST system is used globally by multiple support organizations.</p><p>Due to limitations in report size this item is kept condensed and refer to the VINST context description <ref type="bibr" target="#b10">[11]</ref> and VINST user guide [XX] for more detail.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Business Processes</head><p>The business processes for analysis are related purely to the registration of activities within the VINST system. There are no satellite systems or procedures in scope. The higher hierarchy process could be captured under "Incident and Problem Management". The classes of activities can be defined as Incident solving and Problem solving activities. Activities can be handled by first, second and third line support employees. Support employees have each a specific area of expertise related to technology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Information</head><p>Information is stored and transformed in the VINST System. Information is related to the employees working for Volvo on a global scale, their position in the organizational hierarchy, their expertise, products and geographical position. Furthermore, information is assumed to be present in the VINST system which enables knowledge transfer for storing, retrieving and adding solutions to problems related to products and services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Application Landscape</head><p>There is no formal description available other than the VINST system. No peripheral system, interface or other element is mentioned in the context other than an e-mail facility.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.3">To-Be Design</head><p>The phase To-Be design is not applicable for this research. For applicable cases, the outcomes and decisions of the As-Is phase are used to create at least one To-Be design. The design elements can be prescreened to design only one most feasible solution, or multiple scenarios are considered. In case of multiple scenario's, the individual scenarios are scored using multiple optional activities such as Multi-Criteria Decision Analysis (MCDA) techniques covering related aspects or Simulation for business performance, for example. The outcome is a so called Gap Analysis which covers the difference between the As-Is situation and the To-Be design(s). The Gap Analysis covers each of the aforementioned streams: Business context, Business Processes, Information and Application Landscape.</p><p>Creation of To-Be designs can be accelerated by usage of reference models such as the Supply Chain Operations Reference (SCOR®) <ref type="bibr" target="#b16">[17]</ref>, Process Classification Framework by APQC [18], Frameworx <ref type="bibr" target="#b17">[19]</ref> and the Banking Industry Architecture Network (BIAN) <ref type="bibr" target="#b18">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.4">Migration Design</head><p>The phase "Migration Design" is not applicable for this research. For applicable cases, the outcome of the To-Be design phase is used to review the methods of how the As-Is situation can be migrated to the To-Be design. Common scenarios are i.e. Big-Bang, Pilot location, Linear migration and Exponential migration amongst others.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Research method</head><p>As discussed in chapter 2, the basic steps for Process Mining are followed as described by van der Aalst et al., to cover the exploratory element of this research. Then professional insights on what to analyze or ask the problem owner in a next activity to proceed towards a To-Be phase or suggestions for improvement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.1">Research design</head><p>Because of the characteristics of Process Mining mainly consisting of exploratory research, the limited interaction for research by the researchers, the data type being Quantitative and a setting which resembles a Laboratory, the research method is determined as Non-reactive research, as presented in table <ref type="table" target="#tab_0">1</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Method</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.2">Exploratory research</head><p>Process mining for processes is mainly exploratory research <ref type="bibr" target="#b6">[7]</ref>. First, the researcher needs to get a feeling for what the data represents. Second, assumptions and statements about the dataset need to be stated to test which part of the data is relevant for the desired answer. The two aforementioned elements are attained iteratively by doing small experiments and testing.</p><p>For the research on the stated (sub)question, three basic topics will be stated: Research scope, Filters used and the results of the research with optional elaboration for each of the topics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Research scope</head><p>The research scope limits the unit of analysis to least possible number of attributes to consider with the relevant subset of the data. The research scope is limited through some elements: the dataset, the assumption, the method and a threshold. The dataset element shows which dataset is used. The assumption is the description of which assumption(s) would lead to the right subset of the data. The method element describes how the assumption is translated into the subset. The threshold is set for limiting the results as presented for this research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Filters used</head><p>The filters used give a description on how the tool was set and which settings were set to obtain the subset results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results</head><p>The results show in either figure or table form the results using the aforementioned limitations, settings and scope.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.3">Explanatory research</head><p>The explanatory element in the research is highly limited, due to no client interaction, no strategic and tactical information about the company and no baseline information about performance or access to operational teams and systems.</p><p>Possible explanations will be provided as suggested research topics based on previous commercial engagements of the researcher. These explanatory contents are not tested to be applicable in the Volvo situation and should be tested with a proper hypothesis which is refined by client interaction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Data usage</head><p>Provided data sets Incidents <ref type="bibr" target="#b13">[14]</ref>, Open Problems <ref type="bibr" target="#b14">[15]</ref> and Closed Problems <ref type="bibr" target="#b15">[16]</ref>. Sets are provided in the XES data format, however for this research the prepared combined dataset by Fluxicon is used for the Disco tool <ref type="bibr" target="#b20">[22]</ref>. Because a non-primary source is used for the data, a comparison has been run between exports of the Fluxicon dataset and the provided XES dataset. There have not been found any inconsistencies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.1">Assumptions</head><p>On the topic of data, there are many possible issues resulting in an incomplete or sometimes unusable dataset. Because of the nature of the BPI Challenge and the available prepared data, the assumption is that the dataset is fit for research purposes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Tooling</head><p>In this paragraph multiple toolsets for analysis of the process mining category are discussed. Four software candidates are discussed about features and applicability for use in this research case.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.1">ProM 5</head><p>ProM <ref type="bibr" target="#b21">[23]</ref> is the acronym which stands for Process Mining. The tool is open source and mainly aimed at researchers and scientific application. It is a collection of custom written plugins for various insights that can be obtained from datasets. Version 5 is the last version that has a certain interface which is more complex but powerful for the experienced user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.2">ProM 6</head><p>ProM 6 <ref type="bibr" target="#b21">[23]</ref> is a continuation of the ProM application which has been overhauled on the UI and activity design so analysis is more straightforward and entry-user friendly. The package is a platform which can be upgraded with multiple plug-ins for several types of analysis depending on the requirements of the user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.3">Fluxicon Disco</head><p>Fluxicon is the company which creates the commercial tool Disco for process mining analysis of datasets <ref type="bibr" target="#b20">[22]</ref>. Disco is capable of delivering quick analysis results on desktop computers and is optimized for the areas of process discovery and a set of statistical overviews. It has multiple options to filter data into subsets and quickly trim sets for specific analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.4">Perceptive Process Mining</head><p>Perceptive is the company which creates the product Perceptive Process Mining (PPM) for analysis of datasets <ref type="bibr">[24]</ref>. PPM is capable to analyze datasets in both social network and process flow methods, using cloud technology to provide performance beyond desktop computers. The tool is powerful and feature rich but requires more experienced researchers to use the tool to its maximum effectiveness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.5">Tool selection</head><p>The tool(s) will be selected based on the availability of the tool, the user friendliness and timely analysis results whilst working with the tool.</p><p>Based on the access to the tool, Perceptive Process Mining is not used, it would require a license or accredited access to the tool for analysis. Due to time restrictions the researcher did not contact Perceptive to consider this opportunity.</p><p>Based on previous experiences with ProM 5 and 6, the applications are not used for this research.</p><p>The research tool for this paper is Disco by Fluxicon, the demo product with the prepared dataset made available.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.5</head><p>Process discovery methodology</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.1">Social Network Analysis</head><p>Social network analysis is a representation of the dataset which uses the people or departments as the unit of analysis instead of the events. This allows for another dimension of outlier and deviant activity analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.2">Process Network Analysis after Process Discovery</head><p>Process Network analysis is the analysis of sequential events that form some sort of network based on the number of similar cases and flows of events. The flow of events is constructed using Process Discovery, in this research based the fuzzy mining technique. Some tools allow for automated generated models to be derived from datasets for further use. There is a limitation on the discovered processes in such forms, as events are the result of a process, not the process itself.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.3">Methodology selection</head><p>Due to the restricted timeframe as discussed in paragraph 2.1 and the dismissal of ProM, Social Network analysis will not be applied for this research. Process Network analysis will be applied with the notion that the discovered processes might not be the processes but the sequences of end-states per process step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Results</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Questions</head><p>In this paragraph, the questions are answered in the described methodology from chapter 2. ** Cumulative percentage is obtained by adding up the various (rounded) results from the relative frequency. The resulting set (with disregard of the set threshold) can add up to another number than 100%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Research scope: For what Products Push to Front is NOT used</head><p>The standard assumption would be that you would select the product list from the previous sub-question and would subtract it from the total list of products. However, when doing that, you will never discover whether there are duality issues with the same product(s). Therefore, the following research approach is followed:</p><formula xml:id="formula_0">Element Description Dataset Incidents Assumption</formula><p>Events have a specific sequence and the scope is limited to these events.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Method</head><p>Analyze the distribution of products Threshold All results with a relative percentage of &lt;1% of N cases is not represented</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Filters used on attributes of the dataset (in sequence)</head><p>Filter ** Cumulative percentage is obtained by adding up the various (rounded) results from the relative frequency. The resulting set (with disregard of the set threshold) can add up to another number than 100%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Q1.2 Where in the organization is the push to front process most implemented?</head><p>Research scope: differences between organizations A2 and C Element Description Dataset Incidents Assumption Events have a specific sequence and the scope is limited to these events.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Method</head><p>Compare input and output by case numbers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Filters used on attributes of the dataset (in sequence)</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Filter name</head><p>Filter by: Event values: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Attribute</head><p>Open problems are not reviewed due to their incomplete state. However, the dataset can be handled in the same manner as presented in the previous two exhibitions to obtain the results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.4</head><p>Q3 Wait User The answer from the selection and breakdown to the resource that uses this function the most provided only because we assume that the name is related to a system name: Siebel. This is furthermore assumed as the status changes produced by this user are mainly at a specific time (01:19 -01:22) each day, which is assumed to be an automated script.</p><p>Because of limitations of sharing personal details based on legal protection of employees and their performance assessment <ref type="bibr" target="#b19">[21]</ref> we will not publicize the names of individual employees making use of the Accepted / Wait User status. There is a rudimentary evaluation applied with respect of the 'distance' between the percentage of the handled incidents by country versus the usage of the Wait / User state. Distance is calculated by dividing the Total incident percentage by the Use Wait/User percentage. A threshold of 1,26 (126%) is used to distinguish if further analysis into the Wait / User state use for that particular country would be useful. The threshold is based on the average of the Distance (0,8548) added with one Standard Deviation (0,4099).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results: Impact</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Impact</head><p>The resulting countries for further analysis are "in" and "de".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Q4 Process Conformity per Organization</head><p>Research These resulting sets did not give enough information to be conclusive if both organizations have similar operations, because the spread in the case variants was huge, as well as a too small subset for Organization A2. The attribute Product was removed from the filterset, resulting in other datasets: N=1258 for Organization A and N=3274 for Organization C.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results:</head><p>The short answer to the question is no; the organizations do not work in the same way. When comparing the process flows derived from the resulting datasets, settings for Activities at 100% and Paths for 0%, a direct difference is visible:</p><p>Organization A2 (figure <ref type="figure" target="#fig_1">2</ref>) starts recording cases using the status Queued / Awaiting assignment, whereas Organization C (figure <ref type="figure" target="#fig_2">3</ref>) starts recording cases with the status Accepted / In Progress. Furthermore, the event Wait / User is used more frequently in Organization C3. This is a different way of working.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions &amp; Recommendations</head><p>This chapter discusses the conclusions and recommendations, about the research, the aims for this research paper and the limitations about the results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Conclusions</head><p>The data provided in this challenge was prepared well, but not yet cleaned, as some result sets show empty fields. The conclusion is that in such cases a choice should be made such as rework should be done to augment the dataset to become most effective, or strip the inconclusive cases for example. However, the researcher will best use the most pure dataset and remark deviations found.</p><p>The questions as asked by the problem owner are answered, except for the social network analysis question, behavior in various ways. From the results of the various questions, there can be concluded that there is not 'one' way of working around the globe whilst using the VINST system. Furthermore, within a product line there are differences as concluded from the most and least use of the push to front mechanism.</p><p>There are manu loops found in the dataset, of unknown cause. Analysis on the timespans shows that there are short periods of time between looping steps in most cases.</p><p>The SEMBA approach can benefit from Process Mining in creating an unbiased insight in how processes are used within a company. The Process Mining technique is therefore a valuable competence for Business Analysts, to complement basic modeling based on anecdotal or more formal process registrations.</p><p>Process Mining can be used to do exploratory and in lesser fashion explanatory research. In the situation that there is no interaction, it is not possible to do explanatory research. Process Mining is highly related to practical use, based on the source of the data. However, the interpretation of the data owner and data manipulating operators is required to make founded statements and conclusive hypothesis testing feasible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Recommendations</head><p>These recommendations stem from the insights and musings coming from the research. They show some insight in where consultants would go next and where further research is recommended. The first recommendation is to get access to the problem owner and system operators in order to provide meaningful answers. The feeling that arose during this research is that there might be questions behind these questions of higher importance. For example, issues with outsourcing could be driving the questions, or Service Level Agreement performance.</p><p>The second recommendation is to inquire about the procedural approach between the different organizations. The loops as presented in the data are a typical symptom of a missing event or misuse by employees of a status. The other approach would be to strip the dataset of the first iteration of "Accepted / In Progress" to make better sense of the volumes of cases and events.</p><p>The third recommendation is about the data itself. In some cases fields did not contain content or double entries or otherwise inconsistent content. This could be user errors, however a choice should be made upon including or excluding such cases.</p><p>The fourth recommendation is about the system automated actions. During the research multiple mutations were found which were executed by the user Siebel which is assumed to be the system. There are many events where it is unclear if the system ever should be able to set a case to such a state, i.e. "Waiting / User".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1">Practical Implications and Limitations</head><p>The question behind the question. Improving outsourcing? Contract issues? Performance improvement? As mentioned at the first recommendation, the question behind the question is something more valueable to be answered. Using the Process Mining technique researchers and consultants get the opportunity to spot 'the elephant in the room' and work towards a situation which has high client benefit.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The Structured Expert Method for Business Analysis (SEMBA)</figDesc><graphic coords="4,180.72,172.32,250.08,160.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Process flow for organization A2</figDesc><graphic coords="22,153.84,156.00,324.72,98.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Process flow for organization C</figDesc><graphic coords="22,153.84,276.48,338.16,85.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Non-reactive research selected as research method based on multiple criteria</figDesc><table><row><cell></cell><cell>Setting</cell><cell>Data Type</cell><cell>Researcher Role</cell></row><row><cell>Action Research</cell><cell>Field</cell><cell>Qualitative</cell><cell>Active</cell></row><row><cell>Case Study</cell><cell>Field</cell><cell>Qualitative</cell><cell>Passive</cell></row><row><cell>Experiment</cell><cell>Laboratory</cell><cell>Quantitative</cell><cell>Active</cell></row><row><cell>Non-reactive</cell><cell>Laboratory</cell><cell>Quantitative</cell><cell>Passive</cell></row><row><cell>Survey</cell><cell>Field</cell><cell>Quantitative</cell><cell>Passive</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>1.1 Q1.1 Push to front: For what Products is the push to front mechanism most used and where not?</head><label></label><figDesc>Research scope:For what Products Push to Front is used Absolute frequency is calculated using the N=X number and multiplied by the relative frequency. The resulting set (with disregard of the set threshold) can add up to another number than N=X.</figDesc><table><row><cell>PROD453</cell><cell>3,16%</cell><cell>59</cell><cell>43,34%</cell></row><row><cell>PROD321</cell><cell>2,76%</cell><cell>51</cell><cell>46,10%</cell></row><row><cell>PROD544</cell><cell>2,06%</cell><cell>38</cell><cell>48,16%</cell></row><row><cell>PROD832</cell><cell>1,96%</cell><cell>36</cell><cell>50,12%</cell></row><row><cell>PROD253</cell><cell>1,80%</cell><cell>33</cell><cell>51,92%</cell></row><row><cell>PROD369</cell><cell>1,46%</cell><cell>27</cell><cell>53,38%</cell></row><row><cell>PROD104</cell><cell>1,39%</cell><cell>26</cell><cell>54,77%</cell></row><row><cell>PROD434</cell><cell>1,37%</cell><cell>25</cell><cell>56,14%</cell></row><row><cell>PROD363</cell><cell>1,27%</cell><cell>24</cell><cell>57,41%</cell></row><row><cell>PROD328</cell><cell>1,24%</cell><cell>23</cell><cell>58,65%</cell></row><row><cell>PROD423</cell><cell>1,20%</cell><cell>22</cell><cell>59,85%</cell></row><row><cell>PROD815</cell><cell>1,17%</cell><cell>22</cell><cell>61,02%</cell></row><row><cell>PROD698</cell><cell>1,00%</cell><cell>19</cell><cell>62,02%</cell></row><row><cell>*</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Element</cell><cell>Description</cell><cell></cell><cell></cell></row><row><cell>Dataset</cell><cell>Incidents</cell><cell></cell><cell></cell></row><row><cell>Assumption</cell><cell cols="3">Events have a specific sequence and the scope is limited to these</cell></row><row><cell></cell><cell>events.</cell><cell></cell><cell></cell></row><row><cell>Method</cell><cell cols="3">Analyze the distribution of products</cell></row><row><cell>Threshold</cell><cell cols="3">All results with a relative percentage of &lt;1% of the cases is not</cell></row><row><cell></cell><cell>represented</cell><cell></cell><cell></cell></row><row><cell cols="4">Filters used on attributes of the dataset (in sequence)</cell></row><row><cell>Filter name</cell><cell>Filter by:</cell><cell></cell><cell>Event values:</cell></row><row><cell>Attribute</cell><cell>Org:group</cell><cell></cell><cell>NOT ({A..Z}{1..99} 2 nd OR</cell></row><row><cell></cell><cell></cell><cell></cell><cell>{A..Z}{1..99} 3 rd )</cell></row><row><cell>Endpoints</cell><cell cols="3">Activity -Mode discard cases Start event values:</cell></row><row><cell></cell><cell></cell><cell></cell><cell>All</cell></row><row><cell></cell><cell></cell><cell></cell><cell>End event values:</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Completed / In Call</cell></row><row><cell cols="3">The resulting set has N=1854 cases</cell><cell></cell></row><row><cell>Results</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Product</cell><cell>Relative</cell><cell>Absolute</cell><cell>Cumulative</cell></row><row><cell></cell><cell>Frequency</cell><cell>Frequency*</cell><cell>Percentage**</cell></row><row><cell>PROD424</cell><cell>14,57%</cell><cell>270</cell><cell>14,57%</cell></row><row><cell>PROD660</cell><cell>11,00%</cell><cell>204</cell><cell>25,57%</cell></row><row><cell>PROD566</cell><cell>5,61%</cell><cell>104</cell><cell>31,18%</cell></row><row><cell>PROD494</cell><cell>5,16%</cell><cell>96</cell><cell>36,34%</cell></row><row><cell>PROD13</cell><cell>3,84%</cell><cell>71</cell><cell>40,18%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>What functions are most in line with the push to front process?</head><label></label><figDesc>The most important organization elements are C and A2, as stated in the VINST data set description are confirmed by the data set with a distribution by organization of 67% of the cases handled by organization C and 17% of the cases handled by organization A2. The resulting breakdown of how many cases are receiving the status "Completed / In Call" show a difference (not calculated for significance) of 35,5% cases solved by organization C and 2,4% by organization A2.</figDesc><table><row><cell cols="4">Organization Filters used on attributes of the dataset (in sequence) Org line A2 [set 1] Filters used on attributes of the dataset (in sequence) PROD424 15,36%</cell><cell></cell><cell>400</cell></row><row><cell cols="6">involved Activity -Mode discard cases Filter by: Organization involved Org line C [set 2] Start event values: Accepted / In Progress OR Queued / Awaiting Assignment End event values: Completed / Closed OR Completed / In Call Event values: All Activity -Mode discard cases Start event values: All End event values: Completed / In Call Filter by: Event values: Number of events 4,23% 110 The characteristics of these cases are (with the &lt;4% threshold still applied) Endpoints Filter name Attribute Endpoints Filter name Performance PROD660 Minimum number of events = 9 PROD542 4,01% 104 Group Org. Country Org. Involved Product Maximum number of events = 124 Endpoints Activity -Mode discard cases Value % Value % Value % Value % Start event values: End event values: Element Description All Research: responsibles for ping-pong behavior in closed problems? Org line G3 79,73 Us 77,66 G199 3 rd 79,73 PROD97 37,80</cell></row><row><cell cols="6">Assumptions Results The resulting set has N=1882 cases Cases with &gt;8 events are cases (based on sampling NOT Completed / In Call Dataset Closed Problems Org line G4 14,78 Se 19,59 G51 2 nd 5,50 PROD98 27,84</cell></row><row><cell>Results Results: functions</cell><cell cols="5">ping pong case flows 1-736351127 / 1-653989471 / 1-563477371) S30 2 nd 4,81 PROD96</cell><cell>14,09</cell></row><row><cell cols="6">Organization Organizational Role (Function) V3_2 A2_1 Mean time is &gt;=23d (1 st block is &lt;23 days and averaging 7d A2 (17%) [set 1] C (67%) [set 2] Percentage Absolute Frequency* 91,78% 1727 6,24% 117 1,67% 31 The resulting set has N=2601 cases. Organizational Role (Function) Percentage which is non-exceptional) Absolute Method Research on attributes functions / organizations / support teams Frequency V3_2 43,01% 1119 A2_1 / products Threshold Results: organizations All results with a relative percentage of &lt;4% of the cases is not 18,35% represented Organization involved Percentage Absolute Frequency</cell></row><row><cell>Input A2_4 (unknown) Org line C</cell><cell cols="3">Cases (N=) 0,10% 49,19% 10,61% % 2</cell><cell cols="2">Cases (N=) 276</cell><cell>%</cell><cell>56</cell></row><row><cell cols="5">Accepted / In Progress E_6 E_10 Filters used on attributes of the dataset (in sequence) N=595 46,20% N=4445 0,10% 2 9,47% Org line A2 25,26%</cell><cell>246</cell><cell>87,80% 29</cell></row><row><cell cols="6">Queued A2_2 A2_2 Filter name / Org line G3 Assignment * Absolute frequency is calculated using the N=X number and multiplied by the Awaiting N=694 63,80% N=619 12,20% 0,10% 2 4,67% 121 Filter by: 16,33% 19 Event values: Performance Number of events Minimum number of events = 9 Org line B 5,21% 6</cell></row><row><cell cols="6">Total relative frequency. The resulting set (with disregard of the set threshold) can add up to N= 1289 100,00% N=5064 Maximum number of events = 36 100,00% Output Cases (N=) % Cases (N=) another number than N=X. Results: organizations Performance Case duration Minimum duration = 23 d Results: support teams % Completed / Closed N=1258 97,60% N=3264 64,50% Completed / In Call N= 31 2,40% N= 1800 35,50% 3.3 Q2: Ping pong behavior Organization involved Percentage Absolute Frequency Org line C 61,46% Maximum duration = 6 years, 87 days Support team Percentage Absolute Frequency The resulting dataset has N=114 cases 1599 G199 3rd 16,33% 19</cell></row><row><cell cols="2">Total 2.1: What are the … Org line A2 Results: functions G21 2nd</cell><cell>N=1289 20,57% 7,18%</cell><cell cols="2">100,00% N=5064</cell><cell>100,00% 535</cell><cell>9</cell></row><row><cell>Org line B Organizational</cell><cell>Role</cell><cell cols="4">8,18% Percentage Absolute Frequency</cell><cell>213</cell></row><row><cell cols="6">Research scope: responsibles for ping-pong behavior in incidents? (Function)</cell></row><row><cell cols="6">3.2 Element (unknown) Results: products Description Q1.3 Research scope: the functions which solve first line support calls 20,48% Dataset Incidents Results: support teams A2_2 14,07% Products Percentage Absolute Frequency 23 16</cell></row><row><cell cols="6">Element Dataset Assumptions Cases with &gt;8 events are ping-pong cases (based on sampling Description Incidents Support teams Percentage Absolute Frequency E_10 13,09% 15 PROD97 11,26% 13 ping pong case flows 1-627819166 / 1-621825480 / 1-650013051) G97 15,96% 415 C_6 12,10% 14 PROD98 8,02% 9</cell></row><row><cell cols="6">Assumptions All support desks are investigated (not only A2 and C) Cases cannot have the end-state Completed / In-Call G96 5,82% E_8 6,90% PROD802 5,91%</cell><cell>151</cell><cell>8 7</cell></row><row><cell cols="6">Status Completed / In Call is the correct end state Research on attribute org:role Research on attributes functions / organizations / support teams / products Applying another filter to the dataset of N=114 cases where the Function Method Method (unknown) has been selected results in a subset of N=43 cases. PROD96 4,15%</cell></row><row><cell cols="6">Threshold Threshold Results: products All results with a relative percentage of &lt;1% of the cases is not All results with a relative percentage of &lt;4% of the cases is not</cell></row><row><cell>Product</cell><cell>represented represented</cell><cell>Percentage</cell><cell cols="3">Absolute Frequency</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>3.4.1 Q3.1: Who is making most use of the state Wait / User?</head><label></label><figDesc></figDesc><table><row><cell cols="3">Research: Most use of state Wait / User</cell></row><row><cell>Element</cell><cell>Description</cell><cell></cell></row><row><cell>Dataset</cell><cell>Incidents</cell><cell></cell></row><row><cell cols="3">Assumptions A subsequence is present which is Accepted / In Progress followed</cell></row><row><cell></cell><cell cols="2">in time by Accepted / Wait User</cell></row><row><cell>Method</cell><cell cols="2">Research on attributes impact / support teams / products</cell></row><row><cell>Threshold</cell><cell cols="2">All results with a relative percentage of &lt;4% of the cases is not</cell></row><row><cell></cell><cell>represented</cell><cell></cell></row><row><cell cols="3">Filters used on attributes of the dataset (in sequence)</cell></row><row><cell>Filter name</cell><cell>Filter by:</cell><cell>Event values:</cell></row><row><cell>Follower</cell><cell>Activity</cell><cell>Reference event value: Accepted / In Progress</cell></row><row><cell></cell><cell>Reference event</cell><cell>Follower event values: Accepted / Wait User</cell></row><row><cell></cell><cell>must be</cell><cell></cell></row><row><cell></cell><cell>eventually</cell><cell></cell></row><row><cell></cell><cell>followed by</cell><cell></cell></row><row><cell cols="3">The resulting dataset has N=2485 cases</cell></row><row><cell cols="3">Results: Who is making most use of this status?</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>3 Q3.3: Is there overuse of the Wait / User state by location?</head><label></label><figDesc></figDesc><table><row><cell>br</cell><cell></cell><cell>0,0316</cell><cell cols="2">0,0406</cell><cell>0,7783</cell><cell></cell><cell>No</cell></row><row><cell cols="5">3.4.2 Q3.2: What is the behavior per nl 0,0221 0,0198</cell><cell>1,1162</cell><cell></cell><cell>No</cell></row><row><cell>cn</cell><cell cols="2">A: Support team 0,0178</cell><cell cols="2">0,0181</cell><cell>0,9834</cell><cell></cell><cell>No</cell></row><row><cell>kr</cell><cell cols="2">B: Function C: Organization 0,0098</cell><cell cols="2">0,0088</cell><cell>1,1136</cell><cell></cell><cell>No</cell></row><row><cell cols="8">No results have been produced because this part is best researched using Social gb 0,0029 0,0041 0,7073 No</cell></row><row><cell cols="8">Network analysis. As described in paragraph 2.5.3, Social Network analysis is not included in this research. ca 0,0029 0,0061 0,4754 No</cell></row><row><cell cols="2">SE</cell><cell>0,0028</cell><cell cols="2">0,0083</cell><cell>0,3373</cell><cell></cell><cell>No</cell></row><row><cell cols="5">ru jp 3.4.Research: overuse of the Wait / User state 0,0024 0,0053 0,0023 0,0023 de 0,0016 0,0008</cell><cell>0,4528 1,0000 2,0000</cell><cell></cell><cell>No No Yes</cell></row><row><cell cols="8">Element Dataset au Assumptions A subsequence is present which is Accepted / In Progress followed Description 0,0014 0,0029 0,4828 No Incidents my 0,0009 0,0019 0,4737 No</cell></row><row><cell>0</cell><cell></cell><cell cols="4">in time by Accepted / Wait User 0,0009 0,0037 0,2432</cell><cell></cell><cell>No</cell></row><row><cell cols="2">Method th</cell><cell cols="6">Compare the wait / user resulting country breakdown to the general country breakdown of cases 0,0003 0,0004 0,7500 No</cell></row><row><cell cols="6">Filters used on attributes of the dataset (in sequence)</cell><cell></cell></row><row><cell cols="3">Filter name Filter by:</cell><cell></cell><cell cols="2">Event values:</cell><cell></cell></row><row><cell cols="2">Follower</cell><cell>Activity</cell><cell></cell><cell cols="4">Reference event value: Accepted / In Progress</cell></row><row><cell></cell><cell></cell><cell>Reference</cell><cell>event</cell><cell cols="4">Follower event values: Accepted / Wait User</cell></row><row><cell></cell><cell></cell><cell cols="2">must be eventually</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>followed by</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="8">The resulting dataset for Wait / User has N=2485 cases, the total dataset has</cell></row><row><cell cols="2">N=7554 cases</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="8">The results for the breakdown of the Wait / User state by location is presented in</cell></row><row><cell cols="2">table x.</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Country</cell><cell>Wait / User</cell><cell cols="2">Total</cell><cell cols="2">Distance</cell><cell>If</cell><cell>&gt;</cell><cell>1,2647</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>= Yes</cell></row><row><cell>se</cell><cell></cell><cell>0,2852</cell><cell cols="2">0,3214</cell><cell>0,8874</cell><cell></cell><cell>No</cell></row><row><cell>pl in</cell><cell>Cases</cell><cell>Major 0 0,2649 0,1484</cell><cell cols="2">High 83 0,2341 0,1047</cell><cell>1,1316 1,4174</cell><cell cols="2">Medium 1216 No Yes</cell><cell>Low 1186</cell></row><row><cell>be</cell><cell></cell><cell>0,0966</cell><cell cols="2">0,0907</cell><cell>1,0650</cell><cell></cell><cell>No</cell></row><row><cell>us</cell><cell></cell><cell>0,0648</cell><cell cols="2">0,0774</cell><cell>0,8372</cell><cell></cell><cell>No</cell></row><row><cell>fr</cell><cell></cell><cell>0,0406</cell><cell cols="2">0,0482</cell><cell>0,8423</cell><cell></cell><cell>No</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head></head><label></label><figDesc>: Do organization A2 and C work in the same way?</figDesc><table><row><cell cols="3">Filters used on attributes of the dataset (in sequence)</cell></row><row><cell>Filter name</cell><cell>Filter by:</cell><cell>Event values:</cell></row><row><cell>Attribute</cell><cell>Organization</cell><cell>A2 | C</cell></row><row><cell>Attribute</cell><cell>Product</cell><cell>PROD424</cell></row><row><cell>Endpoint</cell><cell>Filter by activity,</cell><cell>Start event values: All</cell></row><row><cell></cell><cell>discard cases</cell><cell>End event values: Completed / Closed</cell></row><row><cell cols="3">The resulting dataset has N=7 cases for A2 and N=448 for C</cell></row><row><cell>Results:</cell><cell></cell><cell></cell></row><row><cell>Element</cell><cell>Description</cell><cell></cell></row><row><cell>Datasets</cell><cell cols="2">Incidents &amp; Closed Problems</cell></row><row><cell>Assumptions</cell><cell cols="2">Test this for the top product with issues, as this will be the</cell></row><row><cell></cell><cell cols="2">largest impact if optimized.</cell></row><row><cell></cell><cell cols="2">Only successfully closed cases are compared. This allows for</cell></row><row><cell></cell><cell cols="2">standard flow to be expected.</cell></row><row><cell>Method</cell><cell cols="2">Compare the process flows of A2 and C. Research on attributes</cell></row><row><cell></cell><cell cols="2">organization AND product AND endpoint</cell></row><row><cell>Threshold</cell><cell cols="2">No threshold is applicable in process flow analysis</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Josef K.J. Martens</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>What research can do.</head><p>Research in the field of Process Mining is still in high flux. The role of such a developing field is that it gives guidelines on how to proceed and discover what works and what not. The author would like to thank and encourage anyone pushing forward to set the boundaries, however (in)feasible the results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>What research cannot do.</head><p>Provide specific answers, sometimes. This is exactly why Business Analysis is up and coming as a profession. Business Analysis allows for business improvement and setting up the requirements for what the desired state would be. But moving towards a To-Be design is always limited by time, money or quality, so there will never be a best fitting solution. Specific and a high fit between Business demand and IT delivery are only possible when the requirements are identified, assessed and put into context. Then the result will be realistic on the elements of time, budget and required quality. This realism allows for high customer satisfaction with limited resources.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>About the author:</head><p>Jef Martens is a Business Analyst for Capgemini and Business Process Management consultant. He is the curator of reference material for Capgemini on an international scale.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Key Issues for IT executives 2010: Judicious IT Investments Continue Post-Recession</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ben-Zvi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly Executive</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="263" to="273" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Key Issues for IT executives</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ben-Zvi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly Executive</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="49" to="59" />
			<date type="published" when="2009">2009. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Key Issues for IT Executives</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kempaiah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">H</forename><surname>Rigoni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly Executive</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2008">2008. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Key issues for IT executives 2007</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kempaiah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly Executive</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="151" to="159" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Key Issues for IT Executives</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly Executive</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="269" to="286" />
			<date type="published" when="2005">2005. 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Van Dongen</surname></persName>
		</author>
		<ptr target="http://www.win.tue.nl/bpi2013/doku.php?id=challenge" />
		<title level="m">Business Processing Intelligence Challenge (BPIC) -Third International Business Process Intelligence Challenge</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Process Mining: Discovery, Conformance and Enhancement of Business Processes</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Transformative Influence of Business Processes on the Business Model: Classifying the State of the Practice in the Software Industry</title>
		<author>
			<persName><surname>Bonakdar</surname></persName>
		</author>
		<author>
			<persName><surname>Amir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">System Sciences (HICSS), 2013 46th Hawaii International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Blum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Landkroon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tjon Tjauw Liem</surname></persName>
		</author>
		<ptr target="http://www.nl.capgemini.com/sites/default/files/resource/pdf/Informatie_Managers_Survey_0.pdf" />
		<title level="m">Informatiemanagersurvey 2010-2011 -Are you in the driver&apos;s seat of your information vehicle? Whitepaper</title>
				<meeting><address><addrLine>Nederland B.V.</addrLine></address></meeting>
		<imprint>
			<publisher>Capgemini</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The Bridge and Beyond: Business Analysis Extends Its Role and Reach</title>
		<author>
			<persName><forename type="first">K</forename><surname>Schreiner</surname></persName>
		</author>
		<idno type="DOI">10.1109/MITP.2007.122</idno>
		<ptr target="http://dx.doi.org/10.1109/MITP.2007.122" />
	</analytic>
	<monogr>
		<title level="j">IT Professional</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="50" to="54" />
			<date type="published" when="2007">2007</date>
			<publisher>IEEE Computer Society</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Volvo IT: VINST Data Set -VINST information needed to understand the dataset</title>
		<author>
			<persName><forename type="first">W</forename><surname>Steeman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The viability of alternative call centre production models</title>
		<author>
			<persName><forename type="first">R</forename><surname>Batt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Moynihan</surname></persName>
		</author>
		<idno type="DOI">10.1111/j.1748-8583.2002.tb00075.x</idno>
	</analytic>
	<monogr>
		<title level="j">Human Resource Management Journal</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="14" to="34" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">SEMBA Structured Expert Method for Business Analysis</title>
		<author>
			<persName><forename type="first">Capgemini</forename><surname>Nederland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename></persName>
		</author>
		<ptr target="http://www.capgemini.com/sites/default/files/resource/pdf/SEMBA_Structured_Expert_Method_for_Business_Analysis.pdf" />
	</analytic>
	<monogr>
		<title level="m">Whitepaper by Capgemini Nederland B</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Steeman</surname></persName>
		</author>
		<idno type="DOI">10.4121/uuid:500573e6-accc-4b0c-9576-aa5468b10cee</idno>
		<ptr target="http://dx.doi.org/10.4121/uuid:500573e6-accc-4b0c-9576-aa5468b10cee" />
		<title level="m">BPI Challenge 2013</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>Ghent University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">BPI Challenge 2013</title>
		<author>
			<persName><forename type="first">W</forename><surname>Steeman</surname></persName>
		</author>
		<idno type="DOI">10.4121/uuid:3537c19d-6c64-4b1d-815d-915ab0e479da(2013</idno>
		<ptr target="http://dx.doi.org/10.4121/uuid:3537c19d-6c64-4b1d-815d-915ab0e479da(2013" />
		<imprint/>
		<respStmt>
			<orgName>Ghent University</orgName>
		</respStmt>
	</monogr>
	<note>open problems</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">BPI Challenge 2013</title>
		<author>
			<persName><forename type="first">W</forename><surname>Steeman</surname></persName>
		</author>
		<idno type="DOI">10.4121/uuid:c2c3b154-ab26-4b31-a0e8-8f2350ddac11(2013</idno>
		<ptr target="http://dx.doi.org/10.4121/uuid:c2c3b154-ab26-4b31-a0e8-8f2350ddac11(2013" />
		<imprint/>
		<respStmt>
			<orgName>Ghent University</orgName>
		</respStmt>
	</monogr>
	<note>closed problems</note>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="http://www.apqc.org/process-classification-framework" />
		<title level="m">What is SCOR? Retrieved 10-07-2013</title>
				<imprint>
			<date type="published" when="2013-07-10">10-07-2013</date>
		</imprint>
		<respStmt>
			<orgName>Supply Chain Council</orgName>
		</respStmt>
	</monogr>
	<note>Process Classification Framework</note>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="http://www.tmforum.org/TMForumFrameworx/1911/home.html" />
		<title level="m">Frameworx, eTOM and other Frameworks</title>
				<imprint>
			<biblScope unit="page" from="10" to="17" />
		</imprint>
	</monogr>
	<note>Accesed</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="http://bian.org/about-bian/" />
		<title level="m">Banking Industry Architecture Network</title>
				<imprint>
			<publisher>About BIAN</publisher>
			<date type="published" when="2013-07-10">10-07-2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Van Den Brand</surname></persName>
		</author>
		<title level="m">Training Perceptive Process Mining</title>
				<meeting><address><addrLine>Utrecht</addrLine></address></meeting>
		<imprint>
			<publisher>inhouse for Capgemini and Capgemini Consulting</publisher>
			<date type="published" when="2012-04">-04-2012</date>
		</imprint>
	</monogr>
	<note>Training date 26</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Fluxicon Blog Entry</title>
		<author>
			<persName><surname>Fluxicon</surname></persName>
		</author>
		<ptr target="https://fluxicon.com/blog/2013/06/bpi-challenge-2013/" />
	</analytic>
	<monogr>
		<title level="j">BPI Challenge</title>
		<imprint>
			<date type="published" when="2013-06-02">2013. Accessed 02-06-2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="http://processmining.org24.PerceptiveSoftware:PerceptiveProcessMining" />
		<title level="m">Process Mining group</title>
				<meeting>ess Mining group</meeting>
		<imprint>
			<date type="published" when="2013-06-10">Accessed 10-06-2013. Accessed 10-06-2013</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
