<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Business Process Intelligence Challenge 2013</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>B.F. van Dongen</string-name>
          <email>b.f.v.dongen@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>B. Weber</string-name>
          <email>barbara.weber@uibk.ac.at</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>D.R. Ferreira</string-name>
          <email>diogo.ferreira@ist.utl.pt</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>J. De Weerdt</string-name>
          <email>jochen.deweerdt@qut.edu.au</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology</institution>
          ,
          <addr-line>Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Queensland University of Technology</institution>
          ,
          <addr-line>Brisbane</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Technical University of Lisbon</institution>
          ,
          <addr-line>Lisbon</addr-line>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Universitat Innsbruck</institution>
          ,
          <addr-line>Innsbruck</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>For the third time, the Business Process Intelligence workshop hosted the
Business Process Intelligence Challenge. The goal of this challenge is twofold. On
the one hand, the challenge allows researchers and practitioners in the eld to
show their analytical capabilities to a broader audience. On the other hand, the
challenge (and it's data) allows for researchers to prove that their techniques
work on real-life data sets.</p>
      <p>Every year, the challenge organizer's look for a real-life event log which
contains event-data of one or more operational business processes of an organization.
This data is provided to the participants as-is, without any pre-processing or
ltering (other than anonymization). The logs are made publically available and
are given a DOI for future reference.</p>
      <p>In contrast to authors of scienti c papers, challenge participants are not asked
to write scienti c descriptions of algorithms, techniques or tools, nor are they
asked to provide scienti cally well set-up case studies. Instead, the participants
are asked to analyze the provided log data using whatever techniques available,
focusing on one or more of the process owner's questions or proving other unique
insights into the process captured in the event log.</p>
      <p>A jury consisting of academic and industry members with a strong
background in business process analysis assesses the submitted reports on
completeness of the analysis, presentation of the results and on originality. Finally, the
jury decides on a winner who receives a prize o ered by one of the challenge's
sponsors:
Fluxicon - Process mining for professionals. The process mining
technology in Fluxicon's products can automatically create smart ow diagrams of
your process. All you need are event logs that are already on your IT
systems. Because our products work with this objective information, you no
longer need to rely on belief or hearsay you will know what's going on.
Perceptive Software. Through the recent purchase of Pallas Athena,
Perceptive Software has become a world-leading Business Process Management
Software (BPM) and Solutions provider. Their innovative software platforms and
user-friendly designs are well known and recognized throughout the industry.</p>
    </sec>
    <sec id="sec-2">
      <title>2 The Event Log of Volvo IT Belgium</title>
      <p>For the 2013 edition of the BPI challenge an event log was provided by Volvo IT
Belgium. The log contains events from an incident and a problem management
system called VINST. The primary goal of the incident management process
is restoring a customer's normal service operation as quickly as possible when
incidents arise ensuring that the best possible levels of service quality and
availability are maintained. The problem management system includes the activities
required to diagnose the root cause(s) of incidents and to secure the resolution
of those problems to enhance the quality of ITservices delivered and/or operated
by Volvo IT.</p>
      <p>
        The data contained events related to the two processes as well as di erent
organisational entities and was separated into three event logs:
Incidents [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A log of 7554 cases containing 65533 events pertaining to the
incident management process.
      </p>
      <p>
        Closed Problems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A log of 1487 cases containing 6660 events pertaining
to closed problems in the problem management process.
      </p>
      <p>
        Open Problems [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A log of 819 cases containing 2351 events pertaining to
open problems in the problem management process.
      </p>
      <p>The process owner was particularly interested in four di erent questions.
Push to Front (incidents only). Is there evidence that cases are pushed to
the 2nd and 3rd line too often or too soon?
Ping Pong Behavior. How often do cases ping pong between teams and which
teams are more or less involved in ping-ponging?
Wait User abuse. Is the \wait user" substatus abused to hide problems with
the total resolution time?
Process Conformity per Organisation. Where do the two IT organisations
di er and why?</p>
    </sec>
    <sec id="sec-3">
      <title>3 Submissions</title>
      <p>
        While the rst BPI challenge in 2011 attracted only three submissions and the
second BPI challenge in 2012 attracted six, a total of 12 submissions were
received for assessment by the jury this year. In this section, all submissions are
presented. For each submission, a short abstract is included followed by a
selection of the jury's comments on that submission in italics.
M. Arias and E. Rojas, Ponti cia Universidad Catolica de Chile,
Chile [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
This essay focusses on a couple of the process owners questions. The authors
of [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] present an analysis realized through applying di erent kinds of tools and
process mining techniques. They provide an analysis, which discoveres behavior
characteristics associated with products, resources and organizational lines.
The Jury: This is a solid analysis covering many details of the analysis. The
report illustrates the method of analysis coming from general to more re ned
questions that are answered step by step, typically through ltering and process
discovery or other kinds of analysis. The report also highlights problems with
existing tools and how they have been resolved.
      </p>
      <p>
        A. Bautista, S. Akbar, A. Alvarez, T. Metzger and M. Reaves, CKM
Advisors, USA [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
The goal of this study is to identify opportunities that improve operational
performance of information technology incident management at Volvo, Belgium.
Findings are derived exclusively from computational analysis of the event logs.
Improvements that increase resource e ciency and reduce incident resolution
times and subsequently customer impacts are identi ed across the following
areas: service level push-to-front, ping pong between support teams, and Wait-User
status abuse. Speci c products, support teams, organizational structures, and
process elements most appropriate for further study are identi ed and speci c
analyses are recommended.
      </p>
      <p>The Jury: It is very interesting to analyze the data at product and country
granularities, in order to suggest possible candidates as root causes of bottlenecks.
In general, the number of variables taken into account is remarkable and this
suggests long and accurate work on actual data.</p>
      <p>
        S. vanden Broucke, J. Vanthienen and B. Baesens, KU Leuven,
Belgium and University of Southampton, UK [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
This report presents results related to the following investigations. First, an
open-minded exploratory analysis of the given event logs and second, answering
the four speci c questions posed by the process owner. To do so, the authors
utilize both already existing as well as dedicated developed tools, and heavily
combine traditional data analysis tools and process-oriented techniques. They
indicate the existence of a gap between these two categories of tools and as such
emphasize the importance of a hybrid approach in a process intelligence context
throughout the report.
      </p>
      <p>The Jury: I particularly liked how carefully and consistently the potential
biases were revealed, and that interpretations (particularly concerning individual
employees) were given with caution. It's very important to keep in mind that
the actual root cause of what can be observed behind a process often lies outside
of the data analyst's view (e.g., \Is this team slow or just deals with the more
complicated cases?").</p>
      <p>
        E. Dudok and P. van den Brand, Perceptive Software, The
Netherlands [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
This paper describes the results of the exploratory process mining e orts on the
incident management process. Speci c areas of interest provided by the process
owner are analyzed as well as some additional areas of interest that quali ed
for further investigation based on the information provided. Interesting results
include uncovering speci c support teams and products for which speci ed
unwanted behavior such as lack of push to front, ping pong, and wait user abuse
was prominent. Also some interesting relations were found, e.g. between the wait
user abuse and incident impact category, and the hypothesis that a correlation
exists between the number of handovers and total resolution time was proven.
The Jury: The submission addresses all questions of the process owner in a
convincing and very detailed manner. This report goes deep into the di erent
questions and presents ndings in such a way that that they are accessible to
readers without deep process mining knowledge. In addition, conclusions are
explained not at a technical level, but a business level. Most important conclusions
are brie y summarized at the end of each question. In addition, an executive
summary is provided at the end of the document summarizing the main insights and
outlining potential additional directions of analysis. In addition to the questions
of the Process Owner an additional area of analysis (Resolution Veri cation) is
added.
      </p>
      <p>
        F. van Ge en and R. Niks, Rabobank, The Netherlands and O&amp;I
Management Consultants, The Netherlands [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
Process mining is an accessible technique to visualize and analyze process
variation and to yield improvements. The authors experienced that Process Mining
can help to overcome some of the barriers of the Six Sigma DMAIC cycle in
improvement projects. This results in a signi cant acceleration to complete such
a cycle.
      </p>
      <p>The Jury: The report is less of a classical solution to the BPI challenge,
but a case study on conducting a DMAIC (De ne, Measure, Analyze, Improve,
Control) Analysis from the Six Sigma Toolkit in a faster and more objective way
through the use of Process Mining tools. The BPI challenge data is used as an
exemplary case study to support this idea. The paper is a nice testimonial about
the usefulness of process mining techniques in the context of BPM improvements
e orts such as Six Sigma.</p>
      <sec id="sec-3-1">
        <title>J. Hansen, ChangeGroup, Denmark [9]</title>
        <p>The purpose of this document is to answer the questions raised by Volvo IT
Belgium. In addition, an attempt is made to capture the incident and problem
management processes in the form of BPMN models.</p>
        <p>The Jury: The submission addresses all questions of the process owner
using Disco, Excel, Word and Enterprise Architect. The report does not comprise
any additional analyses, but provides process documentation in form of BPMN
models.</p>
        <p>
          J. Hevia and C. Saint-Pierre, Ponti cia Universidad Catolica de
Chile, Chile [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]
In this work, the authors tried to give response to the client concerns and provide
analysis based on the data, with proposals to improve the performance of the
processes in the company. The paper attempts to identify the impact of various
failures and the organizaton of the process so that in the future Volvo can correct
and thus, provide a better service to it's customers.
        </p>
        <p>The Jury: In general, this report tends to make excessive use of process
mining techniques even when simple data analysis would su ce to answer the clients
questions. However, in one particular instance, such approach allowed the
authors to discover unexpected behaviour which may be important for the client to
know (regardless of their initial questions). This is the case of the push-to-front
question, where the authors discovered an escalation of some incidents from level
1 directly to level 3, which might not be desirable.</p>
        <p>
          C. J. Kang, Y. S. Kang, Y. S. Lee, S. Noh, H. C. Kim, W. C. Lim, J.
Kim and R. Hong, Myongji University, Korea [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]
Recently, there has been a strong interest in the application of innovative
process mining techniques to promote evidence-based understanding and analysis of
organizations business processes. Following the trend, this report analyzes the
challenge logs. To create relevant datasets for answering the given questions,
the logs are pre-processed with the help of PL-SQL and Java. The datasets
are analyzed using ProM's and Disco's state-of-the-art process mining
capabilities, SQL, and traditional spreadsheet-based techniques. The authors provide
evidence-based answers to the questions and demonstrate the potential bene ts
of process mining-based understanding and analysis of business processes.
The Jury: I liked the analysis and found the reasoning style easy to follow.
The authors made a point of clearly de ning their interpre-tations and arguing
for their assumptions. The graphs were mostly well-explained. The solution to
process conformity per organization is perfect as far as I know.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>J. Martens, Capgemini, The Netherlands [12]</title>
        <p>A professional application of Process Mining has been established in the context
of a methodology as de ned by a consultancy rm. The results of the research
show where in the context of consultancy Process Mining is used and how clients
can bene t from expertise and standardized work.</p>
        <p>The Jury: This report attempts to diligently answer, one by one, all questions
from the client. I appreciate a consultant taking time to perform such a report,
and I do encourage the author to continue in this direction.</p>
        <p>
          Z. Paszkiewicz and W. Picard, Poznan Unviersity of Economics,
Poland [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]
In this paper, the authors provide answers to all the process owner's questions
using process mining and social network analysis techniques, and they state the
existence of hidden support lines degrading the overall performance of incident
handling, little localized ping-pong behavior and wait-user misuse, and various
levels of conformity across organizations.
        </p>
        <p>The Jury: The authors frequently state an hypothesis and then prove or
disprove it. This is very good. There is an interesting mix of tools deployed, data
inconsistencies are addressed, and assumptions are clearly stated. It's a detailed
and good-quality analysis. The chord diagrams are an innovative and interesting
contribution.</p>
        <p>
          S. Radhakrishnan and G. Anantha, SolutioNXT Inc., US [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]
The goal of this paper is to identify some key actionable patterns for
improvement. The authors have used a combination of process discovery tools (such as
Disco) and reusable scripting on MS Excel to perform their analysis. The focus
of their approach is to discern ndings and encapsulate them within real world
perspectives. The authors brought this real world perspective by reclassifying
the given dataset into a) All cases b) Incidents only b) Incidents escalated to
problems and c) Problems only. They assessed a) wait status abuse, b) ping
-pong behavior across levels and across teams and c) general case ow pattern.
They uncovered interesting nding and captured a set of clear recommendations
based on these ndings.
        </p>
        <p>
          The Jury: All the analyses are performed with Disco and a graphical fuzzy
model is used to respond to all questions. The work nishes with three interesting
business-level suggestions.
P. Van den Spiegel, L. Dieltjens and L. Blevi, KPMG Advisory,
Belgium [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]
The incident and problem management process forms an essential part in every
organization. Since businesses rely heavily on IT, each outage, issue or user
service request should be dealt with as quickly as possible in order to minimize
its impact on operations. The authors of this report objectively veri ed the
e ciency and e ectiveness of the underlying process. The analysis was performed
by means of a of a combination of process mining and data mining techniques
and tools, including Disco, ProM, Minitab and MS Excel. As part of the exercise,
aspects such as total resolution times of tickets, actual resolution process being
followed, ping-pong behavior between the di erent helpdesk lines, di erences
between distinct support teams etc. are investicated. Finally, recommendations
to improve the current process and increase integration between incident and
problem management are provided.
        </p>
        <p>The Jury: I like the mapping of statuses on the standard ow. This really
bridges the gap between the data in the event log and the provided process model.
Furthermore, the authors make good use of their experience in the business
domain and include interpretations from a business level perspective beyond the
questions asked by the process owner in the case description. Overall, it's a solid
contribution with a good focus on business level insights.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 The Winner</title>
      <p>Using the jury's scores as initial ranking of the 12 submissions, we obtained a
clear top three:
{ A. Bautista, S. Akbar, A. Alvarez, T. Metzger and M. Reaves, CKM Advisors,</p>
      <p>USA
{ E. Dudok and P. van den Brand, Perceptive Software, The Netherlands
{ C.J. Kang, Y.S. Kang, Y.S. Lee, S. Noh, H.C. Kim, W.C. Lim, J. Kim and R.</p>
      <p>Hong, Myongji University, Korea</p>
      <p>All these submissions were praised for their thoroughness, completeness and
presentation. However, one winner had to be selected and the decision was made
to select, as winner of the BPI Challenge 2013:</p>
      <p>C.J. Kang, Y.S. Kang, Y.S. Lee, S. Noh,
H.C. Kim, W.C. Lim, J. Kim and R. Hong,</p>
      <p>Myongji University, Korea</p>
      <p>Their report was found to be complete, repeatable and thorough, while
maintaining a proper mix between general data analysis techniques and real business
process intelligence techniques. During the BPI workshop 2013, the prizes were
handed over to the rst author of the submission as shown in Figure 1.</p>
    </sec>
    <sec id="sec-5">
      <title>5 Conclusion</title>
      <p>The BPI challenge has proven to be a succesful way to let practitioners and
researchers come together and share their capabilities and techniques. The
various reports have signi cantly increased in quality over the years and this year's
result shows how mature the business process intelligence eld has become.</p>
      <p>With the help of the community, we hope to organize many succesful
challenges in the future.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <source>BPI Challenge</source>
          <year>2013</year>
          ,
          <article-title>incidents</article-title>
          . Ghent University. Dataset. http://dx.doi.org/10.4121/uuid:500573e6-accc
          <string-name>
            <surname>-</surname>
          </string-name>
          4b0c-
          <fpage>9576</fpage>
          -aa5468b10cee
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <source>BPI Challenge</source>
          <year>2013</year>
          ,
          <article-title>closed problems</article-title>
          . Ghent University. Dataset. http://dx.doi.org/10.4121/uuid:
          <fpage>c2c3b154</fpage>
          -ab26
          <string-name>
            <surname>-</surname>
          </string-name>
          4b31
          <string-name>
            <surname>-</surname>
          </string-name>
          a0e8-8f2350ddac11
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <source>BPI Challenge</source>
          <year>2013</year>
          ,
          <article-title>open problems</article-title>
          . Ghent University. Dataset. http://dx.doi.org/10.4121/uuid:
          <fpage>3537c19d</fpage>
          -6c64
          <string-name>
            <surname>-</surname>
          </string-name>
          4b1d
          <string-name>
            <surname>-</surname>
          </string-name>
          815d-915ab0e479da
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.</given-names>
            <surname>Arias</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Rojas</surname>
          </string-name>
          , Ponti cia Universidad Catolica de Chile,
          <source>Chile Volvo Incident and Problem Management Behavior Analysis Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http: //www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bautista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Akbar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alvarez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Metzger</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Reaves</surname>
          </string-name>
          , CKM Advisors, USA.
          <source>Process Mining in Information Technology Incident Management: A Case Study at Volvo Belgium Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper2.pdf
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. S. vanden Broucke,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vanthienen</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Baesens</surname>
          </string-name>
          , KU Leuven, Belgium and University of Southampton, UK.
          <source>Volvo IT Belgium VINST Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http: //www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper3.pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>E.</given-names>
            <surname>Dudok</surname>
          </string-name>
          and P. van den Brand, Perceptive Software,
          <source>The Netherlands. Mining an Incident Management Process Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/ Vol-
          <volume>1052</volume>
          /paper4.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>F. van Ge en and R.</given-names>
            <surname>Niks</surname>
          </string-name>
          , Rabobank,
          <string-name>
            <given-names>The</given-names>
            <surname>Netherlands</surname>
          </string-name>
          and
          <string-name>
            <surname>O&amp;I Management Consultants</surname>
          </string-name>
          ,
          <article-title>The Netherlands</article-title>
          .
          <source>Accelerate DMAIC using Process Mining Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper5.pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>J.</given-names>
            <surname>Hansen</surname>
          </string-name>
          , ChangeGroup, Denmark.
          <source>Analyzing Volvo IT Belgium's Incident and Problem Management Data Using Automated Business Process Discovery Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper6.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>J.</given-names>
            <surname>Hevia</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Saint-Pierre</surname>
          </string-name>
          , Ponti cia Universidad Catolica de Chile, Chile.
          <source>Analyzing Volvo Information with Process Mining Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/ Vol-
          <volume>1052</volume>
          /paper7.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>C. J. Kang</surname>
            ,
            <given-names>Y.S.</given-names>
          </string-name>
          <string-name>
            <surname>Kang</surname>
            ,
            <given-names>Y.S.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Noh</surname>
            ,
            <given-names>H.C.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>W.C.</given-names>
          </string-name>
          <string-name>
            <surname>Lim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
            and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Hong</surname>
          </string-name>
          , Myongji University, Korea.
          <source>Process Mining-based Understanding and Analysis of Volvo IT's Incident and Problem Management Processes Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper8.pdf
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>J. Martens</surname>
          </string-name>
          , Capgemini,
          <source>The Netherlands. Professional Use of Process Mining for Analyzing Business Processes Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/ Vol-
          <volume>1052</volume>
          /paper9.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Paszkiewicz</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Picard</surname>
          </string-name>
          , Poznan University of Economics, Poland.
          <article-title>Analysis of the Volvo IT Incident and Problem Handling Processes using Process Mining and Social Network Analysis Proc</article-title>
          .
          <source>of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/ Vol-
          <volume>1052</volume>
          /paper10.pdf
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>S.</given-names>
            <surname>Radhakrishnan</surname>
          </string-name>
          and G. Anantha, SolutioNXT Inc.,
          <source>US. Process Improvement Focused Analysis of VINST IT Support Logs Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/ Vol-
          <volume>1052</volume>
          /paper11.pdf
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. P. Van den Spiegel, L. Dieltjens and
          <string-name>
            <given-names>L.</given-names>
            <surname>Blevi</surname>
          </string-name>
          , KPMG Advisory,
          <source>Belgium. Applied Process Mining Techniques for Incident and Problem Management Proc. of 3rd BPI Challenge BPIC'13</source>
          , Beijing, China,
          <year>August 26</year>
          ,
          <year>2013</year>
          , CEUR-WS.org, online http://www.CEUR-WS.org/Vol-
          <volume>1052</volume>
          /paper3.pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>