<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Using Process Mining to Analyze and Improve Process Flexibility -Position Paper</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Wil</forename><surname>Van Der Aalst</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<postBox>P.O. Box 513</postBox>
									<postCode>5600 MB</postCode>
									<settlement>Eindhoven</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Queensland University of Technology</orgName>
								<address>
									<addrLine>126 Margaret Street</addrLine>
									<postCode>QLD, 4000</postCode>
									<settlement>Brisbane</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Christian</forename><surname>Günther</surname></persName>
							<email>c.w.gunther@tm.tue.nl</email>
							<affiliation key="aff0">
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<postBox>P.O. Box 513</postBox>
									<postCode>5600 MB</postCode>
									<settlement>Eindhoven</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Recker</surname></persName>
							<email>j.recker@qut.edu.au</email>
							<affiliation key="aff1">
								<orgName type="institution">Queensland University of Technology</orgName>
								<address>
									<addrLine>126 Margaret Street</addrLine>
									<postCode>QLD, 4000</postCode>
									<settlement>Brisbane</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manfred</forename><surname>Reichert</surname></persName>
							<email>m.u.reichert@ewi.utwente.nl</email>
							<affiliation key="aff2">
								<orgName type="institution">University of Twente</orgName>
								<address>
									<postBox>P.O. Box 217</postBox>
									<postCode>7500 AE</postCode>
									<settlement>Enschede</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Using Process Mining to Analyze and Improve Process Flexibility -Position Paper</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2D64803C2D6D5BC2DBD8CE4A307FEE12</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:32+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Contemporary information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Workflow management systems are typically considered as too restrictive while groupware applications (e.g., e-mail) tend to offer hardly any process support or control at all. Therefore, we consider adaptive process management systems that allow for run-time changes at both process type and process instance level (e.g., a system like ADEPT). Assuming that these process changes are recorded explicitly, we discuss how this information can be used as input for process mining. So far, process mining has only be applied to operational processes, i.e., knowledge is extracted from event logs (process discovery), or event logs are compared with some a-priori model (conformance checking). In this paper, we propose to apply process mining to change logs, i.e., we not only analyze the operational processes but also the adaptations made at the process type or process instance level. Using such analysis, we envisage to be able to better support flexibility by understanding when and why process changes become necessary.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The notion of flexibility has emerged as a pivotal research topic in Business Process Management (BPM) over the last years <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>. It denotes an essential requirement for maintaining a close "fit" between real-word business processes and the workflows as supported by Process Management Systems (PMSs) <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>, the current generation of which is known under the label of Process-Aware Information Systems (PAIS) <ref type="bibr" target="#b6">[7]</ref>. Due to continuous and often unprecedented changes in their business environments <ref type="bibr" target="#b7">[8]</ref>, the alignment of business processes to PMSs requires continuous attention. The notion of flexibility plays a central role in this context as not only business processes need to be designed for flexibility but also their supporting systems. In general, flexibility denotes the ability to yield to change without loss of identity <ref type="bibr" target="#b8">[9]</ref>. Business process flexibility is the capability to react to external changes by modifying only those parts of a process that need to be changed and keeping other parts stable, viz., the ability to change the process without completely replacing it <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3]</ref>. Process flexibility can be classified according to three dimensions: where does change occur (abstraction level of change), what is being changed (subject of change), and how is it changed (properties of change) <ref type="bibr" target="#b9">[10]</ref>.</p><p>Recently, many efforts have been undertaken to make process management systems more flexible and several approaches for "adaptive" process management have emerged <ref type="bibr" target="#b10">[11]</ref>, most of which relate to some aspects of flexibility described in <ref type="bibr" target="#b9">[10]</ref>. The basic idea behind them is to enable dynamic changes of different process aspects (e.g., control flow, organizational, functional, and informational perspectives) and at different process levels (e.g., instance and type level). For example, ad-hoc changes conducted at the process instance level (e.g., to add or shift steps) allow to flexibly adapt single process instances to exceptional or changing situations <ref type="bibr" target="#b11">[12]</ref>. As a positive side-effect we obtain much more meaningful process logs when compared to existing PMSs.</p><p>Referring to the abstraction level of change, adaptive PMSs such as ADEPT <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref> offer flexibility at both process type level and process instance level <ref type="bibr" target="#b3">[4]</ref>. However, so far adaptive PMSs have not addressed the fundamental questions what we can learn from this additional information and how we can derive optimized process models from it. Process mining techniques <ref type="bibr" target="#b13">[14]</ref> offer promising perspectives in this context, but have focused on the analysis of pure execution logs (i.e., a behavioral and operational perspective) so far.</p><p>This position papers seeks to discuss approaches for the intelligent mining of flexible processes. This involves three problems: First, we have to determine which information about ad-hoc process deviations should be logged to achieve optimal mining results. Second, we have to develop advanced mining techniques which utilize execution and change logs. Third, we have to integrate these techniques with existing adaptive PMSs in order to provide full process life cycle support.</p><p>Section 2 introduces the state-of-the art of process mining. Section 3 then discusses the research problem of providing integrated support of flexible processes and process mining techniques. Therein we will propose and briefly elaborate on four dedicated research problems that need to be approached. Section 4 closes this paper by proving some outlook to future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Process Mining</head><p>Process-aware information systems, such as WfM, ERP, CRM and B2B systems, need to be configured based on process models specifying the order in which process steps are to be executed <ref type="bibr" target="#b14">[15]</ref>. Creating such models is a complex and time-consuming task for which different approaches exist. The most traditional BPMDS'06 one is to analyze and design the processes explicitly making use of a business process modeling tool. However, this approach has often resulted in discrepancies between the actual business processes and the ones as perceived by designers <ref type="bibr" target="#b15">[16]</ref>; therefore, very often, the initial design of a process model is incomplete, subjective, and at a too high level.</p><p>Instead of starting with an explicit process design, process mining aims at extracting process knowledge from "process execution logs". Process mining techniques such as the alpha algorithm <ref type="bibr" target="#b13">[14]</ref> typically assume that it is possible to sequentially record events such that -each event refers to an activity (i.e., a well-defined step in the process) and -each event refers to a case (i.e., a process instance).</p><p>Moreover, there are other techniques using additional information such as -the performer, also referred to as originator of the event (i.e., the person/resource executing or initiating the activity), -the timestamp of the event, or -data elements recorded with the event (e.g., the size of an order).</p><p>This information can be used to automatically construct process models. For example, the alpha algorithm <ref type="bibr" target="#b13">[14]</ref> can construct a Petri net model describing the behavior observed in the log. The Multi-Phase Mining approach <ref type="bibr" target="#b16">[17]</ref> can be used to construct an Event Process Chain (EPC) based on similar information. In the meantime there are mature tools such as the ProM framework (cf. Figure <ref type="figure" target="#fig_0">1</ref>) to construct different types of models based on real process executions <ref type="bibr" target="#b17">[18]</ref>.</p><p>However, process mining research so far has mainly focused on issues related to control flow mining, i.e., a behavioral and operational perspective. Different algorithms and advanced mining techniques have been developed and implemented in this context (e.g., making use of inductive learning techniques or genetic algorithms). Tackled problems include concurrency and loop backs in process executions, but also issues related to the handling of noise (e.g., exceptions). Furthermore, some initial work regarding the mining of other model perspectives (e.g., organizational and informational perspectives) has been conducted <ref type="bibr" target="#b18">[19]</ref>. For example, work on the mining case handling systems puts more emphasis informational perspective while social network mining techniques focus on the organizational perspective.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> shows a screenshot of ProM. ProM <ref type="bibr" target="#b17">[18]</ref> offers a wide variety of process mining techniques and also supports multiple types of models, e.g., it is possible to extract a process model represented in terms of an EPC, then convert this to a Petri net for analysis purposes (e.g., verification or simulation), and then translate the model to YAWL <ref type="bibr" target="#b19">[20]</ref> such that the YAWL engine can immediately execute the discovered models. ProM also allows for the analysis of all perspectives, e.g., discovering social networks, building decision trees, conformance checking, etc. However, thus far, not specific extensions have been developed to mine for changes. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Using Process Mining for Improving Process Flexibility: A Research Statement</head><p>Obviously, the practical benefit of process mining depends on the content and the quality of the available log data. In WfMS, for example, respective execution logs can only reflect situations the WfMS is able to handle. Particularly, if the WfMS does not support process instance changes it needs to be bypassed in exceptional situations (e.g., by executing unplanned process activities outside the scope of the WfMS). Consequently, the WfMS is unaware of the applied deviations and thus unable to log (let alone analyze) information about them. This missing traceability limits the benefit of current process mining and delta analysis approaches significantly. But how is the situation if we apply current process mining techniques to flexible or adaptive processes? Since the execution logs of flexible processes reflect parts of the applied instance changes we get at least more meaningful results. For example, for deleted process steps no related event will be recorded in the process execution log. By contrast, the execution of a newly inserted step will be reflected in the execution log (at least if this step was started or finished). Though the mining of respective execution logs is already more promising (when compared with rigid process executions) we cannot achieve optimal results as long as we ignore the available knowledge about the reasons and the context of a change. As a consequence, current process mining techniques are only able to capture the reactive part of process flexibility but not the stimulus for change. Furthermore, existing mining approaches mainly consider the control flow perspective, whereas ad-hoc changes often constitute a mix of control and data flow adaptations (as well as adaptations of other process aspects) to preserve correctness.</p><p>In order to achieve integrated support for flexible processes and process mining techniques, several problems have to be addressed. In essence, we see three main challenges:</p><p>1. We have to find a way to effectively discover knowledge about process instance changes. 2. We have to find a way to effectively use knowledge about process instance changes. 3. We have to find a way to effectively learn from knowledge about process instance changes.</p><p>In order to be able to ultimately design process mining techniques for adaptive processes, first of all, we must better understand which kind of information is needed within the process execution logs. This triggers the first research question.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Problem 1 What information about process changes is needed to achieve optimal mining results?</head><p>When designing advanced mining techniques for flexible, adaptive processes one fundamental question is what type of information about changes needs to be recorded in order to achieve optimal results. Minimally, a change log should keep syntactical information about the kind and the context of the applied changes (e.g., the type and position of a dynamically inserted process activity). While this already helps to incorporate change knowledge into the mining process, it is by far not sufficient to handle more complex scenarios. One challenging problem is to enrich change logs with semantical information, i.e., context information (e.g., about the reasons for a change). For example, assume that in a patient treatment process an unplanned lab test is dynamically added for a considerable number of process instances. Then the respective log entries should reflect information about the semantical context of these changes (e.g., that insertions have been mainly applied for patients that are older than 60 years and who suffer from diabetes) in order to derive optimal process model adaptations (e.g., to embed the activity to be inserted in a conditional branching with respective transition conditions when bringing this change up to the process type level). Many challenging issues arise, e.g., how to gather the semantical information, how to represent it in the logs, how to make it efficiently accessible, etc.</p><p>There are more challenges related to Problem 1. For instance, how can such context information best be structured and described in change logs? What process changes require what type of context information? How do you treat noise in change logs?</p><p>Anticipating a solution to these and other related questions triggers the question of how process mining can be adapted to consider this additional data. Existing techniques are mainly limited to the control flow perspective, hence, Problem 2 arises:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Problem 2 How to apply mining techniques to learn from flexible processes?</head><p>A solution to this problem needs to be based on the combined analysis of process models, related execution logs and change logs. Syntactical information contained in change logs allows us to deduce adapted versions of the initial process models, and to categorize changes based on their structural effect on the process. From the combination of all versions of the process models and their respective execution logs, a process mining algorithm can detect bottlenecks and malfunctions. These problems can then be traced back to change operations that have potentially caused them, and thus provide means for the evaluation of changes. Context information from change logs will provide semantic information about the drivers of process changes, and can potentially be used to categorize these changes in a meaningful manner. The result of such process mining technique should be a categorized set of abstract changes, indicating those that have led to execution problems.</p><p>Whether or not existing process mining techniques can be adapted or extended, the mining of process change logs poses additional challenges that have to be tackled. First, mining techniques should examine change operations from all process-relevant perspectives (e.g., control flow, organizational, etc.). This is a precondition for achieving a comprehensive solution, which is able to capture the nature of changes adequately. Second, process mining procedures should consider the semantics of the applied change operations (e.g., add, delete or shift process steps) when comparing instance changes, determining their degree of overlap, etc. Third, semantical information about the context of a change should be taken into consideration as far as possible (cf. Problem 1). Fourth, we have to cope with variations regarding change definitions. Note that ad-hoc changes applied to a collection of process instances of the same type are usually performed by different users. Even if two ad-hoc changes deal with the same basic situation there can be variations regarding their definition, e.g., with respect to the level of granularity or the parameterization of the changes (e.g. the position an activity is added to). Depending on their level of experience users may perceive or perform a certain task in different ways. In a hospital, for example, junior physicians tend to document their work in a more fine-grained way when compared to senior physicians. By considering such factors as well, we could obtain different variants of the same process model, which leads to Problem 3:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Problem 3 How to support the reuse of ad-hoc changes?</head><p>Current systems do not provide any knowledge about previously applied process instance changes when a new ad-hoc deviation becomes necessary; viz., users have to define each ad-hoc change from scratch. This does not only lead to high efforts and lower user acceptance, but also to greater variability of change definitions and more noise (cf. Problem 1). The enrichment of process change logs with semantical information (cf. Problem 1) provides promising perspectives regarding the "reuse" of changes. In particular, we can apply semantical information together with other change data to build up case bases where each ad-hoc change is represented as a particular case. When a user wants to devi-BPMDS'06 ate from a pre-modeled process in exceptional or unanticipated situations, he or she can make use of this process knowledge. Thereby, the system should allow either to define a new process instance change (i.e., to create a new case), or, if a similar situation has happened before, to reuse a previously defined ad-hoc change. A solution to this problem could substantially benefit from existing work on case-based reasoning. For example, YAWL supports the dynamic selection of "worklets" using ripple-down rules <ref type="bibr" target="#b20">[21]</ref>. This selection could be guided by casebased reasoning. Note that an actor-driven reuse of cases also results in valuable information about the ad-hoc changes (e.g., How often was the respective change applied? How did users rate the respective case?), which can be considered by the mining algorithms to be developed as well.</p><p>Important challenges arise from the creation and management of such a case base. The cases need to be organized along the defined, flexible process models, their different versions, and the related process instances. We see an opportunity to derive a meaningful structure for such case bases from the aforementioned classification of process flexibility <ref type="bibr" target="#b9">[10]</ref>. Furthermore, powerful interfaces for updating and querying case bases are needed. Among other requirements this calls for sophisticated algorithms for arguing about the similarity of ad-hoc changes, the similarity of the exceptions that triggered the change, the similarity of the change context, etc.</p><p>Problem 4 How can an architecture be provided in which solutions for the aforementioned problems can be implemented?</p><p>When providing adequate solutions for Problems 1-3 powerful concepts for the effective use of existing knowledge about process instance changes will evolve. Together these concepts make up a framework that enables the reuse of process knowledge when introducing new ad-hoc changes. It will provide techniques for learning from the process instance changes and for deriving optimized process models out of them. However, the practical implementation of these concepts in a coherent architecture, let alone an integration with existing PMS frameworks such as ADEPT <ref type="bibr" target="#b11">[12]</ref> or ProM <ref type="bibr" target="#b17">[18]</ref> is far from trivial. As an example consider the maintenance of the case bases mentioned above. When bringing process optimizations to the process type level, a solution to Problems 1-3 would already support the migration of running process instances to a new process model version. However, not only process models evolve over time, but also the case bases related to them, and consequently, cases have to be migrated to new process model versions as well. In particular, the new case base version should only keep semantic information that still is relevant for process instances of the newly created process model (and for changes of them). Similar to these issues, there are various challenges related to the design of a coherent, integrated architecture providing adaptive process mining of flexible business processes. This paper reported on the role that process mining can play in providing comprehensive support for flexible business processes. We briefly examined current state-of-the art of process mining approaches in light of the need for providing support for flexible (i.e., changing) processes. We investigated how adaptive PMSs can be engineered to maintain flexibility in business processes via advanced process mining. Such a proposal incorporates several research challenges, some of which we outlined and discussed briefly.</p><p>Our line of argumentation rests on the observation that business process flexibility is closely linked to, if not restrained by, the supporting PMS. We argue therefore adaptability to flexible processes and changes within these processes must be regarded a compulsory design principle for PMSs. More specifically, we argue that the engineering of adaptive PMSs is dependent on the provision of syntactic and semantic context information in the form of change logs. This context knowledge will enable future PMS architectures to discover, use and learn from process changes in an intelligent manner, and will thus make them adaptive to flexible processes.</p><p>In this paper we did not discuss legal, ethical, and social issues related to process mining. Clearly, event logs can be used to systematically measure the performance of employees. When providing flexibility on the one hand and monitoring deviations on the other hand, workers may feel threatened by the system. Moreover, in some countries there are legal restrictions, e.g., the Dutch Personal Data Protection Act ("Wet Bescherming Persoonsgegevens") which is based on a directive from the European Union <ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref>. Clearly these issues need to be addressed carefully. However, there are many ways to deal with these issues, e.g., explicit employee approval. Moreover, tools such as ProMimport allow for the automatic "anonymization" of data.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Screenshot of ProM.</figDesc><graphic coords="4,138.11,116.08,338.99,202.15" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">BPMDS'06</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Masking flexibility behind rigidity: Notes on how much flexibility people are willing to cope with</title>
		<author>
			<persName><forename type="first">I</forename><surname>Bider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CAiSE05 Workshops</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Castro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Teniente</surname></persName>
		</editor>
		<meeting><address><addrLine>Porto, Portugal, FEUP</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="7" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Proceedings of the 5th Workshop on Business Process Modeling, Development and Support (BPMDS&apos;04)</title>
				<editor>
			<persName><forename type="first">I</forename><surname>Bider</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Regev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</editor>
		<meeting>the 5th Workshop on Business Process Modeling, Development and Support (BPMDS&apos;04)<address><addrLine>Latvia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
		<respStmt>
			<orgName>Riga Technical University</orgName>
		</respStmt>
	</monogr>
	<note>of Caise&apos;04 Workshops</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On the Notion of Flexibility in Business Processes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the CAiSE&apos;05 Workshops</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Castro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Teniente</surname></persName>
		</editor>
		<meeting>the CAiSE&apos;05 Workshops<address><addrLine>Porto, Portugal</addrLine></address></meeting>
		<imprint>
			<publisher>FEUP</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="35" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Taxonomy of flexibility in business processes</title>
		<author>
			<persName><forename type="first">G</forename><surname>Regev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schmidt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Input BPMDS&apos;06 workshop</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Business Alignment: Using Process Mining as a Tool for Delta Analysis and Conformance Testing</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Requirements Engineering Journal</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="198" to="211" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Information Technology Alignment or &quot;Fit&quot; in Highly Turbulent Environments: the Concept of Flexibility</title>
		<author>
			<persName><forename type="first">K</forename><surname>Knoll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Jarvenpaa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Personnel Research Conference on Reinventing IS</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Ross</surname></persName>
		</editor>
		<meeting><address><addrLine>Alexandria, Virginia</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="1994">1994</date>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Process Aware Information Systems: Bridging People and Software Through Process Technology</title>
		<editor>Dumas, M., van der Aalst, W.M.P., ter Hofstede, A.H.M.</editor>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Wiley Publishing</publisher>
			<pubPlace>Hoboken, New Jersey</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Quinn</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1992">1992</date>
			<publisher>Free Press</publisher>
			<pubPlace>New York, New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A Regulation-Based View on Business Process and Supporting System Flexibility</title>
		<author>
			<persName><forename type="first">G</forename><surname>Regev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Wegmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the CAiSE05 Workshops</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Castro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Teniente</surname></persName>
		</editor>
		<meeting>the CAiSE05 Workshops<address><addrLine>Porto, Portugal</addrLine></address></meeting>
		<imprint>
			<publisher>FEUP</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="91" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Taxonomy of Flexibility in Business Processes</title>
		<author>
			<persName><forename type="first">G</forename><surname>Regev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schmidt</surname></persName>
		</author>
		<ptr target="http://lamswww.epfl.ch/conference/bpmds06/taxbpflex" />
	</analytic>
	<monogr>
		<title level="m">Input to the 7th Workshop BPMDS&apos;06</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Correctness Criteria For Dynamic Changes in Workflow Systems: A Survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="9" to="34" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">ADEPTflex Supporting Dynamic Changes of Workflows Without Loosing Control</title>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Intelligent Information Systems</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="93" to="129" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Integrating Process Learning and Process Evolution A Semantics Based Approach</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wild</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management: 3rd International Conference BPM 2005</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Benatallah</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Casati</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Curbera</surname></persName>
		</editor>
		<meeting><address><addrLine>Nancy, France</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3649</biblScope>
			<biblScope unit="page" from="252" to="267" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Workflow Mining: Discovering Process Models from Event Logs</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M M</forename><surname>Weijters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maruster</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="1128" to="1142" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Workflow Management: Models, Methods, and Systems</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Van Hee</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>MIT Press</publisher>
			<pubPlace>Cambridge, Massachusets</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Workflow Mining: A Survey of Issues and Approaches</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Herbst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maruster</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schimm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M M</forename><surname>Weijters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data &amp; Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="237" to="267" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Multi-phase Process Mining: Building Instance Graphs</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conceptual Modeling ER 2004: 23rd International Conference on Conceptual Modeling</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Atzeni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Chu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Lu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Zhou</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><forename type="middle">W</forename><surname>Ling</surname></persName>
		</editor>
		<meeting><address><addrLine>Shanghai, China</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3288</biblScope>
			<biblScope unit="page" from="362" to="376" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The ProM framework: A New Era in Process Mining Tool Support</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Alves De Medeiros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Verbeek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M M</forename><surname>Weijters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Applications and Theory of Petri Nets</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>et al.</editor>
		<meeting><address><addrLine>Berlin, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005. 2005</date>
			<biblScope unit="volume">3536</biblScope>
			<biblScope unit="page" from="444" to="454" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Mining Social Networks: Uncovering Interaction Patterns in Business Processes</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management: Second International Conference BPM 2004</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Desel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Pernici</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</editor>
		<meeting><address><addrLine>Potsdam, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3080</biblScope>
			<biblScope unit="page" from="244" to="260" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">YAWL: Yet Another Workflow Language</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H M</forename><surname>Ter Hofstede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="245" to="275" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Facilitating Flexibility and Dynamic Exception Handling in Workflows</title>
		<author>
			<persName><forename type="first">M</forename><surname>Adams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hofstede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Edmond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the CAiSE&apos;05 Forum</title>
				<editor>
			<persName><forename type="first">O</forename><surname>Belo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Eder</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Pastor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Falcao E Cunha</surname></persName>
		</editor>
		<meeting>the CAiSE&apos;05 Forum<address><addrLine>FEUP, Porto, Portugal</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="45" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="http://www.cbpweb.nl/index.htm" />
		<title level="m">CBP: College Bescherming persoonsgegevens</title>
				<imprint>
			<publisher>Dutch Data Protection Authority</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Hulsman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ippel</surname></persName>
		</author>
		<title level="m">Personeelsinformatiesystemen: De Wet Persoonsregistraties toegepast</title>
				<meeting><address><addrLine>The Hague</addrLine></address></meeting>
		<imprint>
			<publisher>Registratiekamer</publisher>
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Sauerwein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Linnemann</surname></persName>
		</author>
		<title level="m">Guidelines for Personal Data Processors: Personal Data Protection Act</title>
				<meeting><address><addrLine>The Hague</addrLine></address></meeting>
		<imprint>
			<publisher>Ministry of Justice</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
