<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Process Mining as a Strategy of Inquiry: Understanding Design Interventions and the Development of Business Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bastian Wurm</string-name>
          <email>bastian.wurm@wu.ac.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Vienna University of Economics and Business</institution>
          ,
          <addr-line>Welthandelsplatz 1, 1020 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Process (re-)design and improvement are important aspects of the Business Process Management (BPM) life-cycle. Yet, there is little empirical evidence on how design interventions materialize in actual process execution, leading to repeated failure of such initiatives. In this dissertation I use the emerging a ordances of process mining algorithms to address this important limitation. In particular, I devise a method that combines process mining and grounded theory to study processual phenomena. Consequently, this method is applied to investigate change in business processes. This thesis contributes to the body of knowledge in BPM and bordering disciplines by demonstrating how process mining can be used as a method to study processual phenomena. Further this research sheds light on the impact of design interventions on actual process execution and vica versa.</p>
      </abstract>
      <kwd-group>
        <kwd>Process Mining Methods Computational-intensive Theory Development Stability and Change Process Design Business Process Management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Business processes and organizational routines can both be described as
"structured set of action". While both phenomena deal with how work is being
executed in organizations, there is little empirical evidence on how their design
and redesign in uences actual execution and vice versa. Thus, when processes
and routines are (re-)designed, companies stick to guidelines that are based on
experience, at best.</p>
      <p>
        As a consequence, this limited understanding of how design interventions
materialize in process execution has led to repeated failure of such initiatives
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and the questioning of the role of artifacts in achieving process change [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>In my dissertation I want to address this limitation by investigating the
research question: How does change in business processes take place?</p>
      <p>
        I aim to answer this research question using a combination of traditional
grounded theory methodology and traditional computational theory
development [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. On the one hand, I will use process mining algorithms [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] to identify
process variants [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and evolutionary drifts in business processes [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. On the
other hand, I will employ grounded theory methodology [
        <xref ref-type="bibr" rid="ref19 ref21">19, 21</xref>
        ] to complement
the computational theory development process and make sense of the data by
considering context information derived in interviews. With this work I expect to
identify motors of change in business processes [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] that will be used to explain
how process change takes place.
      </p>
      <p>
        The remainder of this Ph.D. research proposal is structured as follows. In
the next section, I present an initial draft of the method I want to employ for
analyzing business processes, i.e. a combination of automated and manual theory
development [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In particular, I elaborate on the di erent types of data I plan
to use and how I intend to interpret them. Additionally, I show how process
mining algorithms can be used to detect change in business processes. Finally, I
provide a brief summary and outline the expected contribution of this work.
2
      </p>
      <p>
        Process Mining as a Strategy of Inquiry for Processual
Phenomena
In this dissertation I suggest the complementary use of traditional grounded
theory methodology [
        <xref ref-type="bibr" rid="ref20 ref7">7, 20</xref>
        ] and computational theory development [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In a recent
article, Berente and associates [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] outlined the advantages of such
computationallyintensive theory development approaches that make use of the opportunities that
the ubiquity of digital trace-data provides.
2.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Data and Sense-making</title>
      <p>For this research, three types of data will be used: Trace-data in form of
logles, qualitative interview data, and data on process documentation, i.e. process
models, process guidelines and other documentation materials. Table 1 gives and
overview over the di erent types of data employed, how they will be analyzed,
and what kind of information each of them provides for theory generation.</p>
      <p>
        First, trace-data will be analyzed using process mining techniques. Employing
variant analysis [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and drift detection [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] allows to compare di erent process
variants and understand how a process evolves over time. At this stage, the main
goal is to derive a descriptive overview of the relevant processes.
      </p>
      <p>
        Second, process documentation, i.e. process models, process guidelines, and
the like, are examined. Here, the main questions are of a teleological and
normative nature. I.e., I want to collect information about the goals of a process
and how the process should be performed according to its designated design. For
example, di erent goals of a business process can be considered [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        Third, qualitative interviews with process experts and process managers
provide contextual knowledge. The interviews will be interpreted using the grounded
theory method [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], relying on a lexicon [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] from BPM and routines research. This
knowledge further enriches the insights gained in the prior stages. In this stage,
I focus in particular on explanations about why the process is executed as it is
the case and why certain changes in the process occurred.
2.2
      </p>
      <p>
        Process Mining Techniques for Detecting Patterns of Stability
and Change
Process mining is usually used for process discovery, conformance checking, and
enhancement [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, more and more algorithms are developed that can be
used to compare di erent variants of the same process [
        <xref ref-type="bibr" rid="ref11 ref13">11, 13</xref>
        ] or detect changes
in processes over time [
        <xref ref-type="bibr" rid="ref10 ref12">10, 12</xref>
        ]. Both of these types of algorithms are fundamental
when it comes to detecting and understanding change in business processes.
      </p>
      <p>
        Figure 2 presents an example for (concept) drift [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Instead of analyzing
the whole log, the log is broken down in multiple parts, each of which is analyzed
individually. For this reason, it is essential to detect the change point (tc), i.e.
the point in time when the change takes place, and accordingly divide the log- le
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Based on this procedure, di erences between di erent process versions can
be mapped out.
      </p>
      <p>
        Drifts, i.e. changes, in processes can either take place gradually or suddenly
[
        <xref ref-type="bibr" rid="ref14 ref4">4, 14</xref>
        ]. Sudden drifts are major changes that emerge at a particular point in
time. They can be an indicator for major changes in the design of the business
process, e.g. when a newly designed process version is introduced. Gradual drifts
are small changes that appear over a stretched period of time [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. They suggest
a slight alteration to the process behavior. This change in process execution can
be attributed to smaller design changes or to changes that can be attributed
to process participants. In fact, gradual drifts can be a hint for the presence of
positive deviance [
        <xref ref-type="bibr" rid="ref15 ref17">15, 17</xref>
        ].
2.3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Contextualization of derived Patterns</title>
      <p>The presented algorithms give an example how process mining can enable
insights about how change and stability in business processes occur. However,
process mining alone can only determine that changes took place. Why changes
occur, the exact dynamics behind these changes, and the motivation for these
changes currently remain a black box. Together with interviews and process
guidelines/ documentation, a sense-making process can take place that
contextualizes the detected patterns and gives reason to not only that changes happened,
but provide additional knowledge how and why certain changes came about.
3</p>
      <p>Expected Contribution
In this Ph.D. research proposal, I outlined the research background and design
of my doctoral dissertation. I presented a synthesis of process mining techniques,
qualitative interviews, and supplementary document analysis I want to employ.
This combination of computational and traditional techniques for inductive
theory development will be used in order to inductively generate theory that
explains patterns of stability and change in business processes.</p>
      <p>
        The contribution of this Ph.D. twofold. First, the devised method can be
used to study organizational processes. By iterating between trace-data and
qualitative data analysis, researchers can zoom in and out [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] on investigated
patterns; they can study patterns of actions as observed through process mining
and enrich this information by qualitative deep-dive. Second, the identi cation
of motors of change [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] in business processes sheds light on the impact of process
design on process execution and vica versa. Having those motors identi ed, future
studies can investigate further conditions for each motor to occur and the exact
mechanics how each motor operates. Consequently, guidelines can be speci ed
that help to support (re-)design initiatives.
      </p>
      <p>This work is relevant for practice as well. Practitioners can use the identi ed
motors of change to anticipate how changes in process design a ect changes
in process execution and the underlying routines. This enables management to
proactively accompany business process change initiatives.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adriansyah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Medeiros</surname>
            ,
            <given-names>A.K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arcieri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <year>Baier</year>
          ...and
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Process mining manifesto</article-title>
          .
          <source>In: Proceedings of the 9th International Conference on Business Process Management (BPM</source>
          <year>2011</year>
          ), pp.
          <volume>169</volume>
          {
          <issue>194</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dustdar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Process mining put into context</article-title>
          .
          <source>IEEE Internet Computing</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <volume>82</volume>
          {
          <fpage>86</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Berente</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seidel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Safadi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Data-Driven Computationally-Intensive Theory Development</article-title>
          .
          <source>Information Systems Research</source>
          <volume>30</volume>
          (
          <issue>1</issue>
          ), iii{viii (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bose</surname>
            ,
            <given-names>R.P.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Der Aalst</surname>
            ,
            <given-names>W.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zliobaite</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pechenizkiy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Handling concept drift in process mining</article-title>
          .
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Arti cial Intelligence and Lecture Notes in Bioinformatics) 6741 LNCS</source>
          ,
          <volume>391</volume>
          {
          <fpage>405</fpage>
          (
          <year>2011</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -21640-430
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. vom Brocke, J.,
          <string-name>
            <surname>Mendling</surname>
          </string-name>
          , J.:
          <source>Business Process Management Cases</source>
          . Springer International Publishing (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -58307-5
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. vom Brocke, J.,
          <string-name>
            <surname>Zelt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmiedel</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>On the role of context in Business Process Management</article-title>
          .
          <source>International Journal of Information Management</source>
          <volume>36</volume>
          (
          <issue>3</issue>
          ),
          <volume>486</volume>
          {
          <fpage>495</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Charmaz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Grounded Theory</article-title>
          . In: Smith,
          <string-name>
            <given-names>J.A.</given-names>
            ,
            <surname>Harre</surname>
          </string-name>
          , R., van Langenhove,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.) Rethinking Methods in Psychology, pp.
          <volume>27</volume>
          {
          <fpage>49</fpage>
          .
          <string-name>
            <surname>Sage Publications</surname>
          </string-name>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dzerosk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langley</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Todorovski</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Computational Discovery of Scienti c Knowledge</article-title>
          . In: Dzerosk,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Todorovski</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <article-title>Computational Discovery of Scienti c Knowledge: Introduction, Techniques, and Applications in Environmental and Life Sciences</article-title>
          , pp.
          <volume>1</volume>
          {
          <fpage>14</fpage>
          . Springerl-Verlag Berlin Heidelberg, Berlin, Heidelberg (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gaskin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berente</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyytinen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yoo</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Toward Generalizable Sociomaterial Inquiry: A Computational Approach for Zooming In and Out of Sociomaterial Routines</article-title>
          .
          <source>Management Information Systems Quarterly</source>
          <volume>38</volume>
          (
          <issue>3</issue>
          ),
          <volume>849</volume>
          {
          <fpage>871</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Hompes</surname>
            ,
            <given-names>B.F.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buijs</surname>
            ,
            <given-names>J.C.A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dixit</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buurman</surname>
          </string-name>
          , J.:
          <article-title>Detecting change in processes using comparative trace clustering</article-title>
          .
          <source>In: Proceedings of the 5th International Symposium on Datadriven Process Discovery and Analysis (SIMPDA</source>
          <year>2015</year>
          ). pp.
          <volume>95</volume>
          {
          <issue>108</issue>
          (
          <year>2015</year>
          ), http://www.processmining.org/ media/blogs/pub2015/paper7.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hompes</surname>
            ,
            <given-names>B.F.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buijs</surname>
            , J., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dixit</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buurman</surname>
          </string-name>
          , J.:
          <article-title>Discovering Deviating Cases and Process Variants Using Trace Clustering</article-title>
          .
          <source>In: 27th Benelux Conference on Arti cial Intelligence (BNAIC)</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lavanya</surname>
            ,
            <given-names>M.U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Talluri</surname>
            ,
            <given-names>M.S.K.</given-names>
          </string-name>
          :
          <article-title>Dealing with Concept Drifts in Process Mining Using Event Logs</article-title>
          .
          <source>IEEE Transactions on Neural Networks and Learning</source>
          Systems pp.
          <volume>1</volume>
          {
          <issue>18</issue>
          (
          <year>2013</year>
          ). https://doi.org/10.1109/TNNLS.
          <year>2013</year>
          .
          <volume>2278313</volume>
          , http://www.ijecs.in/issue/v4- i7/85%5Cnijecs.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Luengo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sepulveda</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Applying clustering in process mining to nd di erent versions of a business process that changes over time</article-title>
          .
          <source>In: Lecture Notes in Business Information Processing</source>
          . pp.
          <volume>153</volume>
          {
          <fpage>158</fpage>
          . No.
          <issue>PART 1</issue>
          (
          <year>2012</year>
          ). https://doi.org/10.1007/978- 3-
          <fpage>642</fpage>
          -28108-215
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Maaradji</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ostovar</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Detecting sudden and gradual drifts in business processes from execution traces</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>29</volume>
          (
          <issue>10</issue>
          ),
          <volume>2140</volume>
          {
          <fpage>2154</fpage>
          (
          <year>2017</year>
          ). https://doi.org/10.1109/TKDE.
          <year>2017</year>
          .2720601
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mertens</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Recker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kummer</surname>
            ,
            <given-names>T.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohlborn</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Viaene</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Constructive deviance as a driver for performance in retail</article-title>
          .
          <source>Journal of Retailing and Consumer Services</source>
          <volume>30</volume>
          ,
          <issue>193</issue>
          {
          <fpage>203</fpage>
          (
          <year>2016</year>
          ). https://doi.org/10.1016/j.jretconser.
          <year>2016</year>
          .
          <volume>01</volume>
          .021, http://dx.doi.org/10.1016/j.jretconser.
          <year>2016</year>
          .
          <volume>01</volume>
          .021
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Pentland</surname>
            ,
            <given-names>B.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feldman</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Designing routines: On the folly of designing artifacts, while hoping for patterns of action</article-title>
          .
          <source>Information and Organization</source>
          <volume>18</volume>
          (
          <issue>4</issue>
          ),
          <volume>235</volume>
          {
          <fpage>250</fpage>
          (
          <year>2008</year>
          ). https://doi.org/10.1016/j.infoandorg.
          <year>2008</year>
          .
          <volume>08</volume>
          .001, http://dx.doi.org/10.1016/j.infoandorg.
          <year>2008</year>
          .
          <volume>08</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Recker</surname>
          </string-name>
          , J.:
          <article-title>Evidence-Based Business Process Management: Using Digital Opportunities to Drive Organizational Innovation</article-title>
          (
          <year>January 2015</year>
          ),
          <volume>129</volume>
          {
          <fpage>143</fpage>
          (
          <year>2015</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -14430-69; http : ==link:springer:
          <source>com=10:1007=978 3 319 14430 6 9</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Understanding Business Process Change Failure: An Actor-Network Perspective</article-title>
          .
          <source>Journal of Management Information Systems</source>
          <volume>23</volume>
          (
          <issue>1</issue>
          ),
          <volume>51</volume>
          {
          <fpage>86</fpage>
          (
          <year>2006</year>
          ). https://doi.org/10.2753/mis0742-
          <fpage>1222230102</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Seidel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Recker</surname>
          </string-name>
          , J.:
          <article-title>Using Grounded Theory for studying business process management phenomena</article-title>
          .
          <source>In: Proceedings of the 17th European Conference on Information Systems. Verona</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Strauss</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corbin</surname>
          </string-name>
          , J.:
          <article-title>Grounded theory methodology</article-title>
          .
          <source>In: Handbook of qualitative research</source>
          , pp.
          <volume>273</volume>
          {
          <issue>285</issue>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Urquhart</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myers</surname>
          </string-name>
          , M.D.:
          <article-title>Putting the 'theory' back into grounded theory: Guidelines for grounded theory studies in information systems</article-title>
          .
          <source>Information Systems Journal</source>
          <volume>20</volume>
          ,
          <volume>357</volume>
          {
          <fpage>381</fpage>
          (
          <year>2010</year>
          ). https://doi.org/10.1111/j.1365-
          <fpage>2575</fpage>
          .
          <year>2009</year>
          .
          <volume>00328</volume>
          .x
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. van de Ven,
          <string-name>
            <given-names>A.H.</given-names>
            ,
            <surname>Poole</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.S.</surname>
          </string-name>
          :
          <article-title>Explaining Development and Change in Organizations</article-title>
          .
          <source>The Academy of Management Review</source>
          <volume>20</volume>
          (
          <issue>3</issue>
          ),
          <volume>510</volume>
          {
          <fpage>540</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>