<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Using Process Mining to Analyze and Improve Process Flexibility - Position Paper -</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Wil van der Aalst</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian GuÄnther</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jan Recker</string-name>
          <email>j.recker@qut.edu.au</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manfred Reichert</string-name>
          <email>m.u.reichert@ewi.utwente.nl</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology P.</institution>
          <addr-line>O. Box 513, 5600 MB Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Queensland University of Technology 126</institution>
          <addr-line>Margaret Street, Brisbane QLD 4000</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Twente P.</institution>
          <addr-line>O. Box 217, 7500 AE Enschede</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>168</fpage>
      <lpage>177</lpage>
      <abstract>
        <p>Contemporary information systems struggle with the requirement to provide °exibility and process support while still enforcing some degree of control. Work°ow management systems are typically considered as too restrictive while groupware applications (e.g., e-mail) tend to o®er hardly any process support or control at all. Therefore, we consider adaptive process management systems that allow for run-time changes at both process type and process instance level (e.g., a system like ADEPT). Assuming that these process changes are recorded explicitly, we discuss how this information can be used as input for process mining. So far, process mining has only be applied to operational processes, i.e., knowledge is extracted from event logs (process discovery), or event logs are compared with some a-priori model (conformance checking). In this paper, we propose to apply process mining to change logs, i.e., we not only analyze the operational processes but also the adaptations made at the process type or process instance level. Using such analysis, we envisage to be able to better support °exibility by understanding when and why process changes become necessary.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The notion of °exibility has emerged as a pivotal research topic in Business
Process Management (BPM) over the last years [1{4]. It denotes an essential
requirement for maintaining a close \¯t" between real{word business processes
and the work°ows as supported by Process Management Systems (PMSs) [
        <xref ref-type="bibr" rid="ref5 ref6">5,
6</xref>
        ], the current generation of which is known under the label of Process-Aware
Information Systems (PAIS) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Due to continuous and often unprecedented
changes in their business environments [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the alignment of business processes to
PMSs requires continuous attention. The notion of °exibility plays a central role
in this context as not only business processes need to be designed for °exibility
but also their supporting systems. In general, °exibility denotes the ability to
yield to change without loss of identity [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Business process °exibility is the
capability to react to external changes by modifying only those parts of a process
that need to be changed and keeping other parts stable, viz., the ability to
change the process without completely replacing it [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        ]. Process °exibility can
be classi¯ed according to three dimensions: where does change occur (abstraction
level of change), what is being changed (subject of change), and how is it changed
(properties of change) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Recently, many e®orts have been undertaken to make process management
systems more °exible and several approaches for \adaptive" process management
have emerged [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], most of which relate to some aspects of °exibility described
in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The basic idea behind them is to enable dynamic changes of di®erent
process aspects (e.g., control °ow, organizational, functional, and informational
perspectives) and at di®erent process levels (e.g., instance and type level). For
example, ad-hoc changes conducted at the process instance level (e.g., to add
or shift steps) allow to °exibly adapt single process instances to exceptional or
changing situations [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. As a positive side-e®ect we obtain much more
meaningful process logs when compared to existing PMSs.
      </p>
      <p>
        Referring to the abstraction level of change, adaptive PMSs such as ADEPT
[
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ] o®er °exibility at both process type level and process instance level [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
However, so far adaptive PMSs have not addressed the fundamental questions
what we can learn from this additional information and how we can derive
optimized process models from it. Process mining techniques [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] o®er promising
perspectives in this context, but have focused on the analysis of pure execution
logs (i.e., a behavioral and operational perspective) so far.
      </p>
      <p>This position papers seeks to discuss approaches for the intelligent mining
of °exible processes. This involves three problems: First, we have to determine
which information about ad-hoc process deviations should be logged to achieve
optimal mining results. Second, we have to develop advanced mining techniques
which utilize execution and change logs. Third, we have to integrate these
techniques with existing adaptive PMSs in order to provide full process life cycle
support.</p>
      <p>Section 2 introduces the state-of-the art of process mining. Section 3 then
discusses the research problem of providing integrated support of °exible processes
and process mining techniques. Therein we will propose and brie°y elaborate on
four dedicated research problems that need to be approached. Section 4 closes
this paper by proving some outlook to future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Process Mining</title>
      <p>
        Process-aware information systems, such as WfM, ERP, CRM and B2B systems,
need to be con¯gured based on process models specifying the order in which
process steps are to be executed [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Creating such models is a complex and
time-consuming task for which di®erent approaches exist. The most traditional
one is to analyze and design the processes explicitly making use of a business
process modeling tool. However, this approach has often resulted in discrepancies
between the actual business processes and the ones as perceived by designers
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]; therefore, very often, the initial design of a process model is incomplete,
subjective, and at a too high level.
      </p>
      <p>
        Instead of starting with an explicit process design, process mining aims at
extracting process knowledge from \process execution logs". Process mining
techniques such as the alpha algorithm [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] typically assume that it is possible to
sequentially record events such that
{ each event refers to an activity (i.e., a well-de¯ned step in the process) and
{ each event refers to a case (i.e., a process instance).
      </p>
      <p>
        Moreover, there are other techniques using additional information such as
{ the performer, also referred to as originator of the event (i.e., the
person/resource executing or initiating the activity),
{ the timestamp of the event, or
{ data elements recorded with the event (e.g., the size of an order).
This information can be used to automatically construct process models. For
example, the alpha algorithm [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] can construct a Petri net model describing
the behavior observed in the log. The Multi-Phase Mining approach [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] can be
used to construct an Event Process Chain (EPC) based on similar information. In
the meantime there are mature tools such as the ProM framework (cf. Figure 1)
to construct di®erent types of models based on real process executions [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        However, process mining research so far has mainly focused on issues related
to control °ow mining, i.e., a behavioral and operational perspective. Di®erent
algorithms and advanced mining techniques have been developed and
implemented in this context (e.g., making use of inductive learning techniques or
genetic algorithms). Tackled problems include concurrency and loop backs in
process executions, but also issues related to the handling of noise (e.g.,
exceptions). Furthermore, some initial work regarding the mining of other model
perspectives (e.g., organizational and informational perspectives) has been
conducted [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. For example, work on the mining case handling systems puts more
emphasis informational perspective while social network mining techniques focus
on the organizational perspective.
      </p>
      <p>
        Figure 1 shows a screenshot of ProM. ProM [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] o®ers a wide variety of
process mining techniques and also supports multiple types of models, e.g., it
is possible to extract a process model represented in terms of an EPC, then
convert this to a Petri net for analysis purposes (e.g., veri¯cation or
simulation), and then translate the model to YAWL [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] such that the YAWL engine
can immediately execute the discovered models. ProM also allows for the
analysis of all perspectives, e.g., discovering social networks, building decision trees,
conformance checking, etc. However, thus far, not speci¯c extensions have been
developed to mine for changes.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Using Process Mining for Improving Process</title>
    </sec>
    <sec id="sec-4">
      <title>Flexibility: A Research Statement</title>
      <p>Obviously, the practical bene¯t of process mining depends on the content and
the quality of the available log data. In WfMS, for example, respective execution
logs can only re°ect situations the WfMS is able to handle. Particularly, if the
WfMS does not support process instance changes it needs to be bypassed in
exceptional situations (e.g., by executing unplanned process activities outside
the scope of the WfMS). Consequently, the WfMS is unaware of the applied
deviations and thus unable to log (let alone analyze) information about them.
This missing traceability limits the bene¯t of current process mining and delta
analysis approaches signi¯cantly.</p>
      <p>But how is the situation if we apply current process mining techniques to
°exible or adaptive processes? Since the execution logs of °exible processes re°ect
parts of the applied instance changes we get at least more meaningful results. For
example, for deleted process steps no related event will be recorded in the process
execution log. By contrast, the execution of a newly inserted step will be re°ected
in the execution log (at least if this step was started or ¯nished). Though the
mining of respective execution logs is already more promising (when compared
with rigid process executions) we cannot achieve optimal results as long as we
ignore the available knowledge about the reasons and the context of a change. As
a consequence, current process mining techniques are only able to capture the
reactive part of process °exibility but not the stimulus for change. Furthermore,
existing mining approaches mainly consider the control °ow perspective, whereas
ad-hoc changes often constitute a mix of control and data °ow adaptations (as
well as adaptations of other process aspects) to preserve correctness.</p>
      <p>In order to achieve integrated support for °exible processes and process
mining techniques, several problems have to be addressed. In essence, we see three
main challenges:
1. We have to ¯nd a way to e®ectively discover knowledge about process
instance changes.
2. We have to ¯nd a way to e®ectively use knowledge about process instance
changes.
3. We have to ¯nd a way to e®ectively learn from knowledge about process
instance changes.</p>
      <p>In order to be able to ultimately design process mining techniques for adaptive
processes, ¯rst of all, we must better understand which kind of information is
needed within the process execution logs. This triggers the ¯rst research question.
Problem 1 What information about process changes is needed to achieve
optimal mining results?</p>
      <p>When designing advanced mining techniques for °exible, adaptive processes
one fundamental question is what type of information about changes needs to be
recorded in order to achieve optimal results. Minimally, a change log should keep
syntactical information about the kind and the context of the applied changes
(e.g., the type and position of a dynamically inserted process activity). While
this already helps to incorporate change knowledge into the mining process, it is
by far not su±cient to handle more complex scenarios. One challenging problem
is to enrich change logs with semantical information, i.e., context information
(e.g., about the reasons for a change). For example, assume that in a patient
treatment process an unplanned lab test is dynamically added for a
considerable number of process instances. Then the respective log entries should re°ect
information about the semantical context of these changes (e.g., that insertions
have been mainly applied for patients that are older than 60 years and who
su®er from diabetes) in order to derive optimal process model adaptations (e.g.,
to embed the activity to be inserted in a conditional branching with respective
transition conditions when bringing this change up to the process type level).
Many challenging issues arise, e.g., how to gather the semantical information,
how to represent it in the logs, how to make it e±ciently accessible, etc.</p>
      <p>There are more challenges related to Problem 1. For instance, how can such
context information best be structured and described in change logs? What
process changes require what type of context information? How do you treat
noise in change logs?</p>
      <p>Anticipating a solution to these and other related questions triggers the
question of how process mining can be adapted to consider this additional data.
Existing techniques are mainly limited to the control °ow perspective, hence,
Problem 2 arises:
Problem 2 How to apply mining techniques to learn from °exible processes?</p>
      <p>A solution to this problem needs to be based on the combined analysis of
process models, related execution logs and change logs. Syntactical information
contained in change logs allows us to deduce adapted versions of the initial
process models, and to categorize changes based on their structural e®ect on the
process. From the combination of all versions of the process models and their
respective execution logs, a process mining algorithm can detect bottlenecks
and malfunctions. These problems can then be traced back to change operations
that have potentially caused them, and thus provide means for the evaluation of
changes. Context information from change logs will provide semantic information
about the drivers of process changes, and can potentially be used to categorize
these changes in a meaningful manner. The result of such process mining
technique should be a categorized set of abstract changes, indicating those that have
led to execution problems.</p>
      <p>Whether or not existing process mining techniques can be adapted or
extended, the mining of process change logs poses additional challenges that have
to be tackled. First, mining techniques should examine change operations from
all process-relevant perspectives (e.g., control °ow, organizational, etc.). This is
a precondition for achieving a comprehensive solution, which is able to capture
the nature of changes adequately. Second, process mining procedures should
consider the semantics of the applied change operations (e.g., add, delete or
shift process steps) when comparing instance changes, determining their degree
of overlap, etc. Third, semantical information about the context of a change
should be taken into consideration as far as possible (cf. Problem 1). Fourth,
we have to cope with variations regarding change de¯nitions. Note that ad-hoc
changes applied to a collection of process instances of the same type are usually
performed by di®erent users. Even if two ad-hoc changes deal with the same
basic situation there can be variations regarding their de¯nition, e.g., with respect
to the level of granularity or the parameterization of the changes (e.g. the
position an activity is added to). Depending on their level of experience users may
perceive or perform a certain task in di®erent ways. In a hospital, for example,
junior physicians tend to document their work in a more ¯ne-grained way when
compared to senior physicians. By considering such factors as well, we could
obtain di®erent variants of the same process model, which leads to Problem 3:
Problem 3 How to support the reuse of ad-hoc changes?</p>
      <p>
        Current systems do not provide any knowledge about previously applied
process instance changes when a new ad-hoc deviation becomes necessary; viz.,
users have to de¯ne each ad-hoc change from scratch. This does not only lead to
high e®orts and lower user acceptance, but also to greater variability of change
de¯nitions and more noise (cf. Problem 1). The enrichment of process change
logs with semantical information (cf. Problem 1) provides promising
perspectives regarding the \reuse" of changes. In particular, we can apply semantical
information together with other change data to build up case bases where each
ad-hoc change is represented as a particular case. When a user wants to
deviate from a pre-modeled process in exceptional or unanticipated situations, he or
she can make use of this process knowledge. Thereby, the system should allow
either to de¯ne a new process instance change (i.e., to create a new case), or,
if a similar situation has happened before, to reuse a previously de¯ned ad-hoc
change. A solution to this problem could substantially bene¯t from existing work
on case-based reasoning. For example, YAWL supports the dynamic selection of
\worklets" using ripple-down rules [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. This selection could be guided by
casebased reasoning. Note that an actor-driven reuse of cases also results in valuable
information about the ad-hoc changes (e.g., How often was the respective change
applied? How did users rate the respective case?), which can be considered by
the mining algorithms to be developed as well.
      </p>
      <p>
        Important challenges arise from the creation and management of such a case
base. The cases need to be organized along the de¯ned, °exible process models,
their di®erent versions, and the related process instances. We see an
opportunity to derive a meaningful structure for such case bases from the aforementioned
classi¯cation of process °exibility [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Furthermore, powerful interfaces for
updating and querying case bases are needed. Among other requirements this calls
for sophisticated algorithms for arguing about the similarity of ad-hoc changes,
the similarity of the exceptions that triggered the change, the similarity of the
change context, etc.
      </p>
      <p>Problem 4 How can an architecture be provided in which solutions for the
aforementioned problems can be implemented?</p>
      <p>
        When providing adequate solutions for Problems 1{3 powerful concepts for
the e®ective use of existing knowledge about process instance changes will evolve.
Together these concepts make up a framework that enables the reuse of process
knowledge when introducing new ad-hoc changes. It will provide techniques for
learning from the process instance changes and for deriving optimized process
models out of them. However, the practical implementation of these concepts in
a coherent architecture, let alone an integration with existing PMS frameworks
such as ADEPT [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] or ProM [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] is far from trivial. As an example consider
the maintenance of the case bases mentioned above. When bringing process
optimizations to the process type level, a solution to Problems 1-3 would already
support the migration of running process instances to a new process model
version. However, not only process models evolve over time, but also the case bases
related to them, and consequently, cases have to be migrated to new process
model versions as well. In particular, the new case base version should only keep
semantic information that still is relevant for process instances of the newly
created process model (and for changes of them). Similar to these issues, there are
various challenges related to the design of a coherent, integrated architecture
providing adaptive process mining of °exible business processes.
4
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>This paper reported on the role that process mining can play in providing
comprehensive support for °exible business processes. We brie°y examined current
state-of-the art of process mining approaches in light of the need for
providing support for °exible (i.e., changing) processes. We investigated how adaptive
PMSs can be engineered to maintain °exibility in business processes via
advanced process mining. Such a proposal incorporates several research challenges,
some of which we outlined and discussed brie°y.</p>
      <p>Our line of argumentation rests on the observation that business process
°exibility is closely linked to, if not restrained by, the supporting PMS. We argue
therefore that adaptability to °exible processes and changes within these
processes must be regarded a compulsory design principle for PMSs. More
specifically, we argue that the engineering of adaptive PMSs is dependent on the
provision of syntactic and semantic context information in the form of change
logs. This context knowledge will enable future PMS architectures to discover,
use and learn from process changes in an intelligent manner, and will thus make
them adaptive to °exible processes.</p>
      <p>In this paper we did not discuss legal, ethical, and social issues related to
process mining. Clearly, event logs can be used to systematically measure the
performance of employees. When providing °exibility on the one hand and
monitoring deviations on the other hand, workers may feel threatened by the system.
Moreover, in some countries there are legal restrictions, e.g., the Dutch Personal
Data Protection Act (\Wet Bescherming Persoonsgegevens") which is based on
a directive from the European Union [22{24]. Clearly these issues need to be
addressed carefully. However, there are many ways to deal with these issues,
e.g., explicit employee approval. Moreover, tools such as ProMimport allow for
the automatic \anonymization" of data.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bider</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Masking °exibility behind rigidity: Notes on how much °exibility people are willing to cope with</article-title>
          . In Castro, J.,
          <string-name>
            <surname>Teniente</surname>
            , E., eds.: CAiSE05 Workshops, Porto, Portugal,
            <given-names>FEUP</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <volume>7</volume>
          {
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bider</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Regev</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , So®er, P., eds.
          <source>: Proceedings of the 5th Workshop on Business Process Modeling, Development and Support (BPMDS'04). Volume 2 of Caise'04 Workshops</source>
          . Riga Technical University, Latvia (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. So®er, P.:
          <article-title>On the Notion of Flexibility in Business Processes</article-title>
          . In Castro, J.,
          <string-name>
            <surname>Teniente</surname>
          </string-name>
          , E., eds.
          <source>: Proceedings of the CAiSE'05 Workshops</source>
          . Vol.
          <volume>1</volume>
          . FEUP, Porto, Portugal (
          <year>2005</year>
          )
          <volume>35</volume>
          {
          <fpage>42</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Regev</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , So®er,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Schmidt</surname>
          </string-name>
          , R.:
          <article-title>Taxonomy of °exibility in business processes</article-title>
          .
          <source>(Input BPMDS'06 workshop)</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          : Business Alignment:
          <article-title>Using Process Mining as a Tool for Delta Analysis</article-title>
          and
          <string-name>
            <given-names>Conformance</given-names>
            <surname>Testing</surname>
          </string-name>
          .
          <source>Requirements Engineering Journal</source>
          <volume>10</volume>
          (
          <year>2005</year>
          )
          <volume>198</volume>
          {
          <fpage>211</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Knoll</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarvenpaa</surname>
            ,
            <given-names>S.L.</given-names>
          </string-name>
          :
          <article-title>Information Technology Alignment or \Fit" in Highly Turbulent Environments: the Concept of Flexibility</article-title>
          . In Ross, J.W., ed.: Computer Personnel Research Conference on Reinventing IS. ACM Press, Alexandria, Virginia (
          <year>1994</year>
          )
          <volume>1</volume>
          {
          <fpage>14</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dumas</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
          </string-name>
          , A.H.M., eds.:
          <source>Process Aware Information Systems: Bridging People and Software Through Process Technology</source>
          . Wiley Publishing, Hoboken, New Jersey (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Quinn</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          :
          <article-title>Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry</article-title>
          . Free Press, New York, New York (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Regev</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wegmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Regulation-Based View on Business Process and Supporting System Flexibility</article-title>
          . In Castro, J.,
          <string-name>
            <surname>Teniente</surname>
          </string-name>
          , E., eds.
          <source>: Proceedings of the CAiSE05 Workshops</source>
          . Vol.
          <volume>1</volume>
          . FEUP, Porto, Portugal (
          <year>2005</year>
          )
          <volume>91</volume>
          {
          <fpage>98</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Regev</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , So®er,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Schmidt</surname>
          </string-name>
          , R.:
          <article-title>Taxonomy of Flexibility in Business Processes</article-title>
          . Input to the 7th Workshop BPMDS'06, http://lamswww.ep°.ch/conference/bpmds06/taxbp°ex. (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Rinderle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Correctness Criteria For Dynamic Changes in Work°ow Systems: A Survey</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          <volume>50</volume>
          (
          <year>2004</year>
          )
          <volume>9</volume>
          {
          <fpage>34</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>ADEPT°ex Supporting Dynamic Changes of Work°ows Without Loosing Control</article-title>
          .
          <source>Journal of Intelligent Information Systems</source>
          <volume>10</volume>
          (
          <year>1998</year>
          )
          <volume>93</volume>
          {
          <fpage>129</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rinderle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wild</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Integrating Process Learning and Process Evolution A Semantics Based Approach</article-title>
          . In van der Aalst,
          <string-name>
            <given-names>W.M.P.</given-names>
            ,
            <surname>Benatallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Casati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Curbera</surname>
          </string-name>
          , F., eds.:
          <source>Business Process Management: 3rd International Conference BPM 2005. Volume 3649 of Lecture Notes in Computer Science</source>
          . Springer, Nancy, France (
          <year>2005</year>
          )
          <volume>252</volume>
          {
          <fpage>267</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            ,
            <given-names>A.J.M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maruster</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Work°ow Mining: Discovering Process Models from Event Logs</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>16</volume>
          (
          <year>2004</year>
          )
          <volume>1128</volume>
          {
          <fpage>1142</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.P., van Hee,
          <string-name>
            <surname>K.M.:</surname>
          </string-name>
          <article-title>Work°ow Management: Models, Methods, and Systems</article-title>
          . MIT Press, Cambridge, Massachusets (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.P.,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herbst</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maruster</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schimm</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            ,
            <given-names>A.J.M.M.:</given-names>
          </string-name>
          <article-title>Work°ow Mining: A Survey of Issues and Approaches</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          <volume>47</volume>
          (
          <year>2003</year>
          )
          <volume>237</volume>
          {
          <fpage>267</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. van Dongen,
          <string-name>
            <given-names>B.F.</given-names>
            ,
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.P.
          <article-title>: Multi-phase Process Mining: Building Instance Graphs</article-title>
          . In Atzeni, P.,
          <string-name>
            <surname>Chu</surname>
            ,
            <given-names>W.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ling</surname>
          </string-name>
          , T.W., eds.:
          <source>Conceptual Modeling ER 2004: 23rd International Conference on Conceptual Modeling. Volume 3288 of Lecture Notes in Computer Science</source>
          . Springer, Shanghai, China (
          <year>2004</year>
          )
          <volume>362</volume>
          {
          <fpage>376</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. van Dongen,
          <string-name>
            <given-names>B.F.</given-names>
            ,
            <surname>Alves de Medeiros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.K.</given-names>
            ,
            <surname>Verbeek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Weijters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.J.M.M.</given-names>
            ,
            <surname>van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P.</surname>
          </string-name>
          :
          <article-title>The ProM framework: A New Era in Process Mining Tool Support</article-title>
          . In Ciardo, G.,
          <string-name>
            <surname>Darondeau</surname>
          </string-name>
          , P., eds.
          <source>: Applications and Theory of Petri Nets 2005. Volume 3536 of Lecture Notes in Computer Science</source>
          . Springer, Berlin, Germany et al. (
          <year>2005</year>
          )
          <volume>444</volume>
          {
          <fpage>454</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Mining Social Networks: Uncovering Interaction Patterns in Business Processes</article-title>
          . In Desel, J.,
          <string-name>
            <surname>Pernici</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
          </string-name>
          , M., eds.: Business Process Management:
          <source>Second International Conference BPM 2004. Volume 3080 of Lecture Notes in Computer Science</source>
          . Springer, Potsdam, Germany (
          <year>2004</year>
          )
          <volume>244</volume>
          {
          <fpage>260</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A.H.M.:</given-names>
          </string-name>
          <article-title>YAWL: Yet Another Work°ow Language</article-title>
          .
          <source>Information Systems</source>
          <volume>30</volume>
          (
          <year>2005</year>
          )
          <volume>245</volume>
          {
          <fpage>275</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Edmond</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Facilitating Flexibility and Dynamic Exception Handling in Work°ows</article-title>
          . In Belo,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Eder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Pastor</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          , Falcao e Cunha, J., eds.
          <source>: Proceedings of the CAiSE'05 Forum</source>
          ,
          <string-name>
            <surname>FEUP</surname>
          </string-name>
          , Porto, Portugal (
          <year>2005</year>
          )
          <volume>45</volume>
          {
          <fpage>50</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. CBP:
          <article-title>College Bescherming persoonsgegevens (Dutch Data Protection Authority)</article-title>
          . http://www.cbpweb.nl/index.htm (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Hulsman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ippel</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Personeelsinformatiesystemen: De Wet Persoonsregistraties toegepast, Registratiekamer, The
          <string-name>
            <surname>Hague</surname>
          </string-name>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Sauerwein</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linnemann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Guidelines for Personal Data Processors: Personal Data Protection Act, Ministry of Justice, The Hague (</article-title>
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>