<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Situational Reference Model Mining</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jana-Rebecca Rehse</string-name>
          <email>Jana-Rebecca.Rehse@iwi.dfki.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Systems (IWi) at the German Center for Arti cial Intelligence (DFKI GmbH) and Saarland University Campus D3 2</institution>
          ,
          <addr-line>Saarbruecken</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>28</fpage>
      <lpage>36</lpage>
      <abstract>
        <p>Reference models can be considered as special conceptual models that serve to be reused for the design of other conceptual models. Due to an ongoing need for high-quality reference models, reference model mining, i.e. the (semi-)automatic derivation of reference models from a set of existing process models, has recently gained the attention of researchers. The presented dissertation project addresses the concept of Situational Reference Model Mining, i.e. the idea that mined reference models, although based on the same input data, are intended for di erent use cases and thus have to meet di erent requirements. These requirements determine the reference model character and thus the technique that is best suited for mining it. The dissertation's major objective is to design, elaborate, and validate a method for Situational Reference Model Mining, which provides reference modelers with a clear guideline on how to use automated reference model mining techniques to their advantage.</p>
      </abstract>
      <kwd-group>
        <kwd>Inductive reference modeling</kwd>
        <kwd>Reference model mining</kwd>
        <kwd>Reference model design principles</kwd>
        <kwd>Context-aware process design</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Reference models can be considered as special conceptual models that serve to be
reused for the design of other conceptual models [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. They provide a template for
process models in a certain industry and thus facilitate a resource-e cient
implementation of the respective process and its adaption to the individual needs
of an organization. This way, companies may bene t from best practices and
industry-speci c experience. The use of reference models is associated with a
higher quality of processes and process models, as it simpli es internal
communications by introducing a common terminology and considerably reduces the
resources required for Business Process Management (BPM) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Leveraging the multiple bene ts of reference modeling in both research and
practice depends on the widespread availability of high-quality reference models.
Generally accepted and widely used reference models exist only for a few
industries, such as the IT Infrastructure Library (ITIL) for IT service management or
1This section is based on previous work presented in [1{3] and has been adapted.
the Supply Chain Operations Reference Model (SCOR) for supply chain
management, eliciting an ongoing need for reference model construction methods.</p>
      <p>Reference models may be constructed both deductively and inductively.
Deductive methods or \top-down" approaches employ generally accepted theories
and principles. Models are constructed on a theoretical base and gradually
substantiated along the way. In contrast, inductive or \bottom-up" development of
reference models makes use of real-world data such as existing process models
or execution logs. It focuses on similarities and commonalities within the input
data and abstracts from a model's individual features. As is it possible to
automate the inductive derivation of a potential reference model from a collection of
existing process models (Reference Model Mining), inductive reference modeling
may contribute to the trend of combining BPM with arti cial intelligence (AI)2.</p>
      <p>
        Until a few years ago, although inductive development was generally
acknowledged, the literature on methods for reference model development was dominated
by deductive approaches. This is interesting, as many existing reference models
were at least partially developed inductively [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Recently, however, there have
been some research activities regarding inductive reference modeling. Methods
have been proposed to (semi-)automatically derive reference models from both
instance level data in the form of process logs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and type-level data, i.e. process
models [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. They make use of a multitude of existing computational techniques,
such as subgraph isomorphism [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], genetic algorithms [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], or heuristic
approximations of the graph edit distance [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        When applying reference model mining (RMM), i.e. (semi-)automatic
inductive reference model development, it becomes evident that the reference model
content and character are signi cantly in uenced by the choice of mining
technique and its parametrization. Di erent mining techniques yield di erent models,
even when applied to the same set of input models. Meanwhile, given a
reuseoriented understanding of reference models, the requirements to the reference
model are determined by the situational context it will be used in, similar to the
adaptation of software developments methods in Situational Method Engineering
(SME) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. It will hence increase an inductively developed reference model's
usefulness and situational suitability, if the mining technique is determined by the
circumstances of its intended reuse. We call this concept \Situational Reference
Model Mining" (S-RMM), i.e. extending RMM towards consciously considering
the situational context when designing and using a reference model (cf. Fig. 1).
      </p>
      <p>Designing a method for S-RMM and understanding the in uencing factors
behind it is the main objective of the presented dissertation project titled
\Situational Reference Model Mining | Conceptual Design and Selected
Applications", which is conducted at the Institute of Information Systems at Saarland
University, under the supervision of Prof. Dr. Peter Loos. It started in October
2015 and is planned to be completed in 2020. Some preliminary results and cited
publications were already achieved during the author's time as research assistant
at the same institute (April 2011 until October 2015).</p>
      <p>2Cf. the keynote speech \Intelligent Continuous Improvement, When BPM Meets
AI" by Miguel Valdes at BPM 2017
Reference
Model
Design
Requirements
Choice of
Technique</p>
      <p>Design</p>
      <p>Principle
Individual
Models
Target
Models</p>
      <p>
        Research Method and Research Questions
As the main objective of the project is the design of an artifact (a method
for S-RMM), it follows the design science research paradigm (DSR), originally
coined by Hevner et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. More speci cally, it applies the design science
methodology by Wieringa [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], which describes design science as the \design
and investigation of artifacts in context". According to its template for design
questions [12, p.16], the overall goal of the dissertation is the following:
Improve availability and suitability of reference models
by introducing a method for reference model mining
that considers the situational context
in order to facilitate reference model development and usage.
      </p>
      <p>This goal shall be reached by answering the following four research questions.
The rst two questions are knowledge questions, determined to gather
knowledge on the reference modeling process. The second two questions are design
questions, asking for new artifacts to improve the reference modeling process.
1. Which contextual factors in uence reference model design?
2. Which techniques exist for reference model mining and which contextual
factors in uence their choice and applicability?
3. How can reference model mining techniques be matched with situational
contexts to produce applicable reference models?
4. How can reference model mining be applied in a given application case,
considering situational contextual factors?</p>
      <p>The rst question addresses the contextual factors that in uence reference
modeling. It is an open descriptive empirical research question, meant to
observe reference modeling in real-world scenarios, gathering knowledge about the
context of the artifact to be designed without the need for explanations. In
contrast, the second question is an open explanatory empirical knowledge question
with the goal to identify existing RMM techniques and to determine their
potentials and limitations. We want to know under which situational circumstances a
certain technique may and may not produce an applicable and well-suited
reference model. Because these circumstances may apply to multiple techniques,
they should be conclusively explained by the technique's properties.
Treatment Implementation</p>
      <p>Treatment Validation
How does this artifact
contribute to stakeholder goals?</p>
      <p>Problem Investigation
What must be improved? Why?
Treatment Design
Which artifact could solve the
problem?</p>
      <p>The third question joins the existing artifacts (i.e. the RMM techniques)
with the context by designing a method to match an existing technique with a
situational context, such that the produced reference models are applicable and
useful for their intended purpose. Therefore, the results from the previous two
questions need to be related to each other through some intermediary concept.
This concept and the matching method are then used in the fourth question,
which nally addresses the overall goal of the dissertation project, as sketched
by the template above. It is set out to design a comprehensive method for
SRMM, ranging from the identi cation of a need for a new reference model to its
application and validation in a concrete use case.</p>
      <p>
        Knowledge questions and design questions are answered by means of di erent
research methods, following Wieringa's design cycle [12, p.27 .] in Fig. 2 and
Frank's pluralistic conception of research methods in IS research [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Problem investigation concerns learning more about the problem context, including
stakeholder goals, conceptual problem frameworks, and related phenomena. In
our case, this means an in-depth analysis of the context factors that determine
a reference model's applicability and usefulness. Therefore, we will perform
literature reviews and conduct interviews with expert modelers. Treatment design
consists of de ning requirements for the artifact and designing it accordingly.
Therefore, we will translate the knowledge from the rst stage into concrete
requirements, before the main artifact (the method) is designed. In the treatment
validation stage, the artifact is tested in its context. In our case, this validation
will be conducted by applying the method for inductively developing a reference
model for a to-be-de ned use case, using observational case studies as well as
single-case mechanism experiments along with qualitative research methods.
3
      </p>
    </sec>
    <sec id="sec-2">
      <title>State of the Art and Related Solutions3</title>
      <p>
        The concept of situational reference model construction based on design
principles is not new, but has yet only been elaborated for deductive reference model
development [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Inductive reference model development has only recently gained
attention in research, so there is little methodological seminal work. We presented
rst ideas towards S-RMM in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where the choice of an appropriate mining
technique is discussed. In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], we illustrate concrete challenges of inductive
refer3This section is based on previous work presented in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and has been extended.
ence modeling according to a seven-stage framework. A number of contributions
describe concrete RMM techniques, but do not take on a methodological
perspective, re ecting on the ways of model construction and the requirements of
speci c use cases. A rst overview on existing techniques is given in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Since
then, we have identi ed a few additional the contributions, such as [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        The term \context" can be de ned as \any information that can be used to
characterize the situation of an entity" [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The idea of adapting an artifact, such
as a method or a model, to t the speci c context in which it is used, originated
in the software engineering domain, where a rigid one-size- ts-all methodology
for software development is not only unattainable but also ine cient [10, p.5].
Their explanations and formalizations of the terms \situation" and \context"
can be adapted to the BPM domain [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Regarding business processes, the
context describes the \environment in which a business process artefact is used"
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], formalized in terms of a \minimum set of variables containing all relevant
information that impact the design and execution of a business process" [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
Similar to reference modeling, context is also considered in process mining
research to achieve better and more speci c results (e.g. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]).
      </p>
      <p>S-RMM is innovative in the way that it combines the domain of reference
modeling with the idea to adapt an artifact to the context in which it is used, as
coined by SME, and techniques to derive a process model from collected real-life
data, as in process mining. Giving a manual procedure model for inductive
reference modeling based on RMM techniques, S-RMM goes beyond SME, because it
does not directly in uence the artifact itself (the model), but instead adapts the
method used for deriving it. It di ers from process mining, as both process
models and execution logs are considered potential data sources. To our knowledge,
no comparable approaches or solutions exist in state-of-the-art literature.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Contributions4</title>
      <p>
        Whereas most of the author's contributions have so far addressed research
question 2 (e.g [
        <xref ref-type="bibr" rid="ref14 ref2 ref21">2, 21, 14</xref>
        ]), the main contribution to S-RMM is made in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where
a rst answer is given to questions 3 and 4. With a reuse-oriented
conceptualization of reference models, their main purpose is to serve as an orientation in
the design of new business process models. In this context, we decipher two
general design processes [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Deriving an individual model from a reference model
is known as \Design With Reuse" (DWR), i.e. an existing model is used as a
blueprint o ering guidance to the process model designer by giving suggestions
for both content and design of the individual model. On the other hand, \Design
For Reuse" (DFR) describes the process of constructing a (reference) model for
the purpose of being reused, i.e. composing model parts and domain knowledge,
such that they achieve a certain degree of universality.
      </p>
      <p>
        Considering a model construction process, there exist several di erent
techniques for deriving a conceptual model from another one. These so-called design
4This section is based on previous work presented in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and has been adapted.
      </p>
      <p>Determine
Situational Context</p>
      <p>Determine Target
Model Design</p>
      <p>Principle
Design For Reuse
Design With Reuse</p>
      <p>Choose Mining</p>
      <p>Technique</p>
      <p>Choose
Input Models</p>
      <p>Mine</p>
      <p>Reference Model</p>
      <p>Adapt
Reference Model</p>
      <p>Design
Target Models</p>
      <p>
        Evaluate
Target Models
principles describe how the content of the original model is adopted, adapted,
and extended in order to create a new model. Five design principles are described
in the literature [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Each con guration, instantiation, specialization,
aggregation, and analogy may be used in the context of reference modeling and applied
to both DFR and DWR. However, not every design principle may be applied to
every reference model, nor may every intended target model be derived by any
design principle. Instead, the choice of model design principle depends on the
situational circumstances, i.e. the requirements posed to the target model and
the construction process itself. These factors also determine the character and
the choice of an appropriate reference model for a certain application context.
      </p>
      <p>The main idea behind our method for S-RMM is to match RMM techniques
with applicable contexts by means of selecting appropriate design principles for
the construction of both target and reference models. Depending on the
situational circumstances and the target model requirements, a certain design
principle is applied to derive the target model from the reference model. This design
principle poses certain restrictions and requirements to the reference model
design, which is mainly in uenced by the choice of technique that was used to
mine the reference model. Hence, the choice of mining technique is ultimately
determined by the situational context of the reference model application.</p>
      <p>Research question 4 is addressed by the rst conceptual design for a
procedure model for S-RMM, shown in Fig. 3. It constitutes the main artifact to
be delivered in the dissertation. It is designed around the conceptualization of
S-RMM in Fig. 1 and describes a generic execution process of an S-RMM
application. Of the ten steps, seven belong to DFR and focus on the reference model
construction (i.e. the actual mining), whereas three belong to DWR and are
concerned with the target model construction (i.e. the reference model application).</p>
      <p>The procedure model starts with de ning the situational context, which
determines the target model design principle in the second step. As stated below,
this step is not yet conclusively elaborated and requires a lot of additional
research. In the third step, the reference model requirements are de ned, which
are partly determined by the used principle and partly by the context itself. The
reference model design principle is derived from these requirements, with the
help of additional methods and artifacts, as explained below. For certain
combinations of target model and reference model principle, several mining techniques
are available; their choice may depend on additional factors. The input
models can only be nally selected after the mining technique, as some techniques
pose additional requirements to their input data. Afterwards, the model can be
mined, concluding the DFR process. In the DWR process, the model is manually
or automatically adapted, before the target models can be derived and evaluated
regarding their purpose.</p>
      <p>
        To provide a guideline for applying the procedure model and to answer
research question 3, we analyzed existing mining techniques regarding their
underlying principles and requirements (cf. Table 1). For each target model design
principle, we suggest corresponding reference model design principles and, for
each pair, a example of a suitable mining technique. A more detailed version of
this table, classifying many state-of-the-art techniques can be found in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Although the to-be-designed artifacts are roughly sketched in the previous
sections, there are numerous steps to be conducted in order to complete the research
activities that are required to satisfactorily answer the posed research questions.
Readers will notice that the above procedure model was designed without
performing an in-depth requirements analysis rst. This analysis will be built on
an identi cation of relevant context factors, which will be identi ed by means
of a literature analysis of inductive reference modeling case studies and seminal
works on reference modeling. The goal is an integrated and conclusive model of
in uential context factors for reference model development. This model will then
be validated and enhanced with expert interviews and provide a comprehensive
answer to research question 1. From that, we can derive requirements, which can
be used to adapt and re ne the procedure model.
      </p>
      <p>
        To conclusively answer research question 2, it is necessary to update the
literature analysis from [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], in order to capture the newest developments in the
eld of RMM techniques. In addition, there needs to be an extensive literature
review for the identi cation of techniques that are not explicitly set out for
RMM, but could be used for that purpose, e.g. from the eld of process mining.
      </p>
      <p>Our analysis of matching existing RMM techniques with accepted design
principles for reference models in Tab. 1 is a preliminary sketch of a
conclusive answer to research question 3. It needs to be complemented by additional
principles such as modi cation, elimination, or union, potentially by means of a
structuring framework. The RMM techniques identi ed in the previous research
question need to be matched the the individual principles. Most importantly,
there needs to be some matching procedure between the context factors from
the rst question to the design principles, and then, the RMM techniques.</p>
      <p>The procedure model in Fig. 3 is the framework for an answer to research
question 4. Not only does it require an in-depth analysis of posed requirements
and an according adaptation and re nement, it also has to be substantiated by
concrete operationalizations of the individual stages. At this point, it is unclear
how the stages should be executed. To complete the design cycle, the procedure
model is supposed to be evaluated in practical case studies, where it is used to
inductively develop a reference model for a certain context. These case studies
have yet to be determined, planned, and executed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Rehse</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Towards Situational Reference Model Mining - Main Idea</surname>
            ,
            <given-names>Procedure</given-names>
          </string-name>
          <string-name>
            <surname>Model</surname>
          </string-name>
          &amp;
          <article-title>Case Study</article-title>
          . In: Leimeister,
          <string-name>
            <given-names>J.M.</given-names>
            ,
            <surname>Brenner</surname>
          </string-name>
          , W. (eds.)
          <source>Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik. Internationale Tagung Wirtschaftsinformatik (WI-2017), February 12-15</source>
          , St. Gallen, Switzerland.
          <source>AIS</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rehse</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An execution-semantic approach to inductive reference models development</article-title>
          .
          <source>In: 24th European Conference for Information Systems (ECIS). European Conference on Information Systems (ECIS-16)</source>
          , June 12-15, Istanbul, Turkey.
          <source>Association for Information Systems (AIS)</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rehse</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A graph-theoretic method for the inductive development of reference process models</article-title>
          .
          <source>Software &amp; Systems Modeling</source>
          <volume>16</volume>
          (
          <issue>3</issue>
          ),
          <volume>833</volume>
          {
          <fpage>873</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. vom Brocke, J.:
          <article-title>Design principles for reference modeling: Reusing information models by means of aggregation, specialisation, instantiation, and analogy</article-title>
          . In: Fettke,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Loos</surname>
          </string-name>
          , P. (eds.)
          <article-title>Reference Modeling for Business Systems Analysis</article-title>
          , pp.
          <volume>47</volume>
          {
          <fpage>75</fpage>
          . Idea Group Publishing,
          <string-name>
            <surname>Hershey</surname>
          </string-name>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>Perspectives on reference modeling</article-title>
          . In: Fettke,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Loos</surname>
          </string-name>
          , P. (eds.)
          <article-title>Reference modeling for business systems analysis</article-title>
          , pp.
          <volume>1</volume>
          {
          <fpage>20</fpage>
          . Idea Group Publishing, Hershey, PA (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gottschalk</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jansen-Vullers</surname>
            ,
            <given-names>M.H.</given-names>
          </string-name>
          :
          <article-title>Mining reference process models and their con gurations</article-title>
          . In: Meersman,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Tari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Herrero</surname>
          </string-name>
          , P. (eds.)
          <article-title>On the Move to Meaningful Internet Systems: OTM 2008 Workshops, OTM Confederated International Workshops</article-title>
          and Posters, Monterrey, Mexico, November 9-
          <issue>14</issue>
          ,
          <year>2008</year>
          . Lecture Notes in Computer Science, vol.
          <volume>5333</volume>
          , pp.
          <volume>263</volume>
          {
          <fpage>272</fpage>
          . Springer Berlin Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wombacher</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining business process variants: Challenges, scenarios, algorithms</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          <volume>70</volume>
          (
          <issue>5</issue>
          ),
          <volume>409</volume>
          {
          <fpage>434</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Yahya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bae</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bae</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Generating valid reference business process model using genetic algorithm</article-title>
          .
          <source>International Journal of Innovative Computing, Information and Control</source>
          <volume>8</volume>
          (
          <issue>2</issue>
          ),
          <volume>1463</volume>
          {
          <fpage>1477</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ardalani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Houy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Towards a minimal cost of change approach for inductive reference model development</article-title>
          .
          <source>In: Proceedings of the 21st European Conference on Information Systems. European Conference on Information Systems (ECIS-13)</source>
          , 21st, June 5-8, Utrecht, Netherlands. vol. Paper 127.
          <string-name>
            <surname>AIS</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Henderson-Sellers</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ralyte</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agerfalk</surname>
            ,
            <given-names>P.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Situational method engineering. Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>March</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS quarterly 28(1)</source>
          ,
          <volume>75</volume>
          {
          <fpage>105</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Wieringa</surname>
          </string-name>
          , R.J.:
          <source>Design Science Methodology for Information Systems and Software Engineering</source>
          . Springer Berlin Heidelberg (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Frank</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Towards a pluralistic conception of research methods in information systems research</article-title>
          .
          <source>ICB-Research Report No. 7</source>
          ,
          <string-name>
            <surname>Institut</surname>
            <given-names>fu</given-names>
          </string-name>
          
          <article-title>r Informatik und Wirtschaftsinformatik (ICB) der Universitat Duisburg-Essen (</article-title>
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Rehse</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hake</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Inductive reference model development: Recent results and current challenges</article-title>
          . In: Mayr,
          <string-name>
            <given-names>H.C.</given-names>
            ,
            <surname>Pinzger</surname>
          </string-name>
          , M. (eds.)
          <source>INFORMATIK</source>
          <year>2016</year>
          (LNI Volume P-
          <volume>259</volume>
          ). pp.
          <volume>739</volume>
          {
          <fpage>752</fpage>
          . Lecture Notes in Informatics, Gesellschaft fur Informatik (GI),
          <source>Bonn</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Leng</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Granular computing{based development of service process reference models in social manufacturing contexts</article-title>
          .
          <source>Concurrent Engineering</source>
          <volume>25</volume>
          (
          <issue>2</issue>
          ),
          <volume>95</volume>
          {
          <fpage>107</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Understanding and using context. Personal and ubiquitous computing 5(1), 4{7 (</article-title>
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kornyshova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deneckere</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Claudepierre</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Contextualization of method components</article-title>
          .
          <source>In: Fourth International Conference on Research Challenges in Information Science (RCIS)</source>
          . pp.
          <volume>235</volume>
          {
          <fpage>246</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Born</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirchner</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Muller,
          <string-name>
            <surname>J.P.</surname>
          </string-name>
          :
          <article-title>Context-driven business process modeling</article-title>
          .
          <source>In: The 1st International Workshop on Managing Data with Mobile Devices (MDMD</source>
          <year>2009</year>
          ), Milan, Italy. pp.
          <volume>6</volume>
          {
          <issue>10</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rosemann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Recker</surname>
          </string-name>
          , J.:
          <article-title>Context-aware process design: Exploring the extrinsic drivers for process exibility</article-title>
          .
          <source>In: The 18th International Conference on Advanced Information Systems Engineering. Proceedings of Workshops and Doctoral Consortium</source>
          . pp.
          <volume>149</volume>
          {
          <fpage>158</fpage>
          . Namur University Press (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bose</surname>
            ,
            <given-names>R.P.J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Mining context-dependent and interactive business process maps using execution patterns</article-title>
          . In: zur Muehlen,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.) Business Process Management Workshops:
          <article-title>BPM 2010 International Workshops</article-title>
          and
          <string-name>
            <given-names>Education</given-names>
            <surname>Track</surname>
          </string-name>
          , Hoboken, NJ, USA, September
          <volume>13</volume>
          -
          <issue>15</issue>
          ,
          <year>2010</year>
          , Revised Selected Papers. pp.
          <volume>109</volume>
          {
          <fpage>121</fpage>
          . Springer Berlin Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Rehse</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Eine Untersuchung der Potentiale automatisierter Abstraktionsansatze fur Geschaftsprozessmodelle im Hinblick auf die induktive Entwicklung von Referenzprozessmodellen</article-title>
          . In: Alt,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Franczyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 11th International Conference on Wirtschaftsinformatik. Internationale Tagung Wirtschaftsinformatik. Internationale Tagung Wirtschaftsinformatik (WI2013)</source>
          ,
          <source>February 27 - March 1</source>
          , Leipzig, Germany (
          <year>2013</year>
          ), (In German)
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>