<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Astria Hijriani</string-name>
          <email>astria.hijriani@unist.ac.kr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Industrial Engineering, Ulsan National Institute of Science and Technology</institution>
          ,
          <addr-line>44919 Ulsan</addr-line>
          ,
          <country country="KR">Korea</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <fpage>58</fpage>
      <lpage>64</lpage>
      <abstract>
        <p>Integrating Artificial Intelligence (AI) technology in Process Mining is perceived as an inevitable catalyst that will improve the quality of the process analyses in Business Process Management (BPM). However, the uptake of AI in BPM and process mining in real-world organizations are still minimal. In this context, maturity models are often seen as a way for organizations to quantify their achievements in implementing new technology. This research will develop a maturity model to measure AI implementation in process mining initiatives and the methods to guide organizations in growing their capabilities. In particular, the model will explore the critical points in implementing AI in the process mining cycle and how AI may become a critical success factor that will provide business benefits. This paper briefly describes the methodology we will adopt and the preliminary results of this research.</p>
      </abstract>
      <kwd-group>
        <kwd>AI implementation</kwd>
        <kwd>maturity model</kwd>
        <kwd>process mining</kwd>
        <kwd>business process management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Process mining is vital in enabling data-driven analysis in BPM. BPM allows process owners
to visualize business flows and analyze business process performance. Process flows can be
used to analyze operations according to business strategy, improve processes, assess business
process performance, and identify obstacles that interfere with business eficiency.</p>
      <p>
        With the rapid advancement of AI in various fields, there is also a significant opportunity
for AI infusion in process mining to reduce costs or provide a better user experience[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. One
of the most extensive support that AI can give in process mining is the predictive analysis
capability [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. This allows decision-makers to anticipate what could happen in the future
execution of a process based on historical data captured in event logs. From the top management
or managerial decision-making standpoint, these capabilities are supposed to benefit the business
perspective more. At the operational level, it makes it possible for more resource allocation or
optimization.
      </p>
      <p>
        At the same time, integrating AI in process mining can provide a leap in the quality of
information needed for decision-making by process owners. As with other ways of improving
business processes, integrating AI tools in Process Mining also comes with risks. In their
analysis of risks in BPM, Zur Muehlen &amp; Ho [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] generally identify the following risks for a BPM
CEUR
planner: a) a mismatch of techniques used in the diferent phases of the process life cycle, b) a
lack of clarity on who is responsible for the individual steps or their results and c) a mismatch
of process design, automation, and evaluation objectives (i.e., goal mismatch).
      </p>
      <p>When applying AI in process mining, various challenges will be faced from a management
standpoint, including the readiness of the organization to start or accept the new challenge of
applying AI. Assessing this readiness requires methods and tools to evaluate an organization’s
capability and guide the change management plan to improve AI adoption in process mining.
In short, the notion of a ”maturity model” fit the organization needs in this context. A maturity
model will represent the progressions in a particular focus area and the required steps to increase
an organization’s capabilities in such a focus area.</p>
      <p>In this Ph.D. project, we focus on developing maturity models and the related tooling for AI
adoption in process mining. First, we aim to use the literature review to understand the current
maturity model in BPM, AI, and process mining. This literature review will also help to identify
the artifact’s (i.e., the AI in process mining maturity model) requirements. Then, the design
and development stage will have several iterations. Each iteration will involve demonstration,
interviews, and discussion with experts and practitioners. After having developed the maturity
model, we will also develop and validate additional tools for using the model in the real world.
The models and tools developed in this Ph.D. project will also be communicated to the parties
expected to benefit from using them.</p>
      <p>The following section discusses an overview of the research methodology adopted in this
project and its implementation. The last section discusses the results achieved thus far in the
project and opens issues for the future.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Methodology and Implementation</title>
      <p>
        The proposed research approach, depicted in Figure 1, is based on the steps from the design
science research methodology for developing maturity models and the related methods [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">5, 6, 7, 8</xref>
        ].
Design science research is a methodology developed in the field of information systems (IS), to
solve practical problems by designing and developing artifacts [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
      </p>
      <p>We envision this Ph.D. project will have six phases, from a problem definition to the
communication process of research results. The research results are expected to contribute knowledge
that can be used by companies and process mining technology providers to measure the success
rate of AI implementation in process mining and provide motivation and instructions for further
improvement. The following section will describe every step to get the final model.</p>
      <sec id="sec-2-1">
        <title>2.1. Problem Definition</title>
        <p>
          A rigorous and structured method is particularly beneficial for the literature review stage
in information systems research [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. In this step, we will define the research motivation
through problem awareness, survey the literature to identify the state of the art of the various
maturity models and compare it. The stages of the literature review will follow the guidelines
of Kitchenham&amp; Charters [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ] to structure the review. Potential keywords for searching in
scientific databases are the combinations of the terms ”AI maturity”,”AI in process mining”,”IS
maturity model”, and ”business process management”.
        </p>
        <p>Based on the results, we will analyze the existing approach, find the scope, see the problem
that emerged from previous development, and future suggestions for the research goal. This
stage will construct relevant information needed for the next scene.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Define the Objective of a Solution</title>
        <p>The basic knowledge from the previous stage will help define the solution and its requirement.
We will conduct semi-structured interviews and data analysis to enrich the ”construct” definition
from the practitioner’s side. Some artifacts identified in this stage include the maturity model
and method for assessment and improvement.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Design and Development</title>
        <p>
          The steps in this stage are taken to get the model will adopt design science research, which
performs several iterations to get the appropriate model. Each iteration will define focus area,
domain, capability, levels, assessment questions and instruments, dependency, also improvement
actions [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Iterations can be carried out on a smaller scope to minimize the existence of
essential points that are not measurable if they are directly applied to process mining. One
design choice in this direction is to consider a first iteration focused on predictive process
monitoring [
          <xref ref-type="bibr" rid="ref13 ref2">2, 13</xref>
          ] as a field of process monitoring where AI is more often adopted. This stage
will carry the initial model result to get feedback from the demonstration and evaluation stages
and refine the artifacts.
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Demonstration</title>
        <p>The next step after getting the initial model of the artifacts is to get the feedback from the
demonstration in diferent study case scopes and semi-structured interviews with practitioners
and/or academic experts. This feedback may give additional requirements for the artifact,
complete the model and method, and fulfill the cycle of design science research. At this stage, it
is also necessary to determine the right strategy to introduce the artifacts to the respondents.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Evaluation</title>
        <p>The evaluation stage carried out on the maturity model is expected to benefit the problem
definition. Models and methods must be evaluated in real-life observations. The observations
will show the extent to which the model is genuinely applicable and relevant to the needs of its
users. The repair iteration process can be repeated for the user guide if the adjustment needs
are found.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Communication</title>
        <p>Automation acceleration in process mining will leverage the BPM cycle to the next level. It will
make a business-critical application for the most eficient and transparent processes by showing
the model, tools, and guidance. Lessons learned from the previous stages for AI implementation
in process mining will define the continuity in design science research, whether the cycle will be
repeated or released in reports or publications. The final model will contribute to the business
process management implementation by paying attention to digitizing the latest technology
with AI.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions: Achieved Results and Open Issues</title>
      <p>The preliminary literature review used related keywords regarding maturity models in AI,
process mining, IS capability, and BPM. The results from the literature review are used to
compare the existing maturity models. The comparison and analysis become input for the
second stage, which defines solution objectives.</p>
      <p>
        Although many BPM maturity models (BPM MM) have been developed [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref18 ref19">14, 15, 16, 17, 18, 19</xref>
        ] to
measure the readiness or capability of organizations to achieve success in BPM initiatives, these
models generally touch on the dimensions at the organizational level. The Object Management
Group (OMG) has also released highly detailed maturity levels for BPM, with levels of detail
that is challenging for organizations to implement eficiently [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        The models have several grouping: fixed-level or staged, focus area-based approaches, or
one-size-fits-all. One of the popular oncomings from the current BPM MM is the capability
maturity model (CMM), developed by the Software Engineering Institute at Carnegie Melon
University [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. It defines five maturities levels: initial, repeatable, defined, managed, and
optimizing. Focus area-based approach was explained by van Steenburgen et al., and Bekkers et
al. described the situational assessment method as one-size-fits-all [
        <xref ref-type="bibr" rid="ref12 ref21">21, 12</xref>
        ]. Van Looy et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
estimate that more than 150 business process maturity models address one or more BPM areas.
Some technology providers [
        <xref ref-type="bibr" rid="ref23 ref24 ref25">23, 24, 25</xref>
        ] also released maturity levels for BPM and informative
articles to classify each level’s achievements. However, several literature review papers mention
that the assessment process for the maturity model was not well defined [
        <xref ref-type="bibr" rid="ref26 ref27 ref28">26, 27, 28</xref>
        ].
      </p>
      <p>
        Machine learning and deep learning drive all the spotlight on the massive implementation
of AI in various fields. Maturity models have been developed to measure AI implementation
in companies. The A-AIMM [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] is an Artificial Intelligence Maturity Model for the Auditing
Process, PriMa-X [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] assesses prescriptive maintenance by machine learning. Schreckenberg
&amp; Morof [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] looks at the maturity level of elements using the example of demand forecast.
These usually apply to specific case studies [
        <xref ref-type="bibr" rid="ref32 ref33">32, 33</xref>
        ] or only focus on the latest technology
innovation, such as big data, security, data analysis [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ], and infrastructure for AI [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. This
rapid AI implementation will also accelerate challenges in its adoption in BPM, especially in
process mining. Therefore the need for the model and methods that help the organization assess
the readiness and give guidance to achieve better capabilities will also leverage.
      </p>
      <p>
        As far as the maturity model development is concerned, the first iteration of it will focus on
predictive process monitoring [
        <xref ref-type="bibr" rid="ref13 ref2 ref3">2, 13, 3</xref>
        ]. This is the process mining task where most
implementations of AI (mainly machine learning) can be found. The initiate model uses a focus area-based
approach to make it more flexible when assessing or determining improvement actions. We
have identified a set of dimensions for the maturity of predictive process monitoring initiatives.
Specifically, we have defined separate dimensions for the management and technology domains,
respectively. The next stage requires an expert review to ensure that these dimensions and the
associated levels are appropriate and understandable by the practitioners and academic experts.
We will employ discussion and semi-structured interviews when approaching the experts.
      </p>
      <p>In this initial phase of the research, we have realized that there are several challenges regarding
the definition and evaluation of maturity models for AI in process mining, such as:
• Both BPM and AI maturity models in the literature describe the maturity levels but
do not provide prescriptive guidance regarding how organizations can improve their
current levels. This can be part of more general guidelines for the people in charge of
administering the maturity level assessment and improvement.
• Implementing predictive process monitoring, let alone more complex AI tools, in process
mining by organizations will deal with data disclosures. This will pose some challenges
for the model and methods demonstration and evaluation. For instance, defining and
interpreting a balanced capability level in real-world organizations’ study cases may be
challenging.
• Higher maturity of AI adoption in process mining is supposed to improve an organization’s
decision-making capabilities in the BPM life cycle. The need for maturity models in this
area will surge as an essential business requirement for real-world companies. In that
case, various cultures and stages of an organization’s current business model can be
challenging in determining its artifacts content and acceptance indicators at each decision
step in design research science.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Jan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ishakian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Muthusamy</surname>
          </string-name>
          ,
          <article-title>Ai trust in business processes: the need for processaware explanations</article-title>
          ,
          <source>in: Proceedings of the AAAI Conference on Artificial Intelligence</source>
          , volume
          <volume>34</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>13403</fpage>
          -
          <lpage>13404</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Santoso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Felderer</surname>
          </string-name>
          ,
          <article-title>Specification-driven predictive business process monitoring</article-title>
          ,
          <source>Software and Systems Modeling</source>
          <volume>19</volume>
          (
          <year>2020</year>
          )
          <fpage>1307</fpage>
          -
          <lpage>1343</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>W.</given-names>
            <surname>Kratsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Manderscheid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Röglinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Seyfried</surname>
          </string-name>
          ,
          <article-title>Machine learning in business process monitoring: a comparison of deep learning and classical approaches used for outcome prediction</article-title>
          ,
          <source>Business &amp; Information Systems Engineering</source>
          <volume>63</volume>
          (
          <year>2021</year>
          )
          <fpage>261</fpage>
          -
          <lpage>276</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>z. Muehlen</surname>
          </string-name>
          , D. T.-Y. Ho,
          <article-title>Risk management in the bpm lifecycle</article-title>
          ,
          <source>in: International Conference on Business Process Management</source>
          , Springer,
          <year>2005</year>
          , pp.
          <fpage>454</fpage>
          -
          <lpage>466</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Knackstedt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pöppelbuß</surname>
          </string-name>
          ,
          <article-title>Developing maturity models for it management</article-title>
          ,
          <source>Business &amp; Information Systems Engineering</source>
          <volume>1</volume>
          (
          <year>2009</year>
          )
          <fpage>213</fpage>
          -
          <lpage>222</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pefers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tuunanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Rothenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <article-title>A design science research methodology for information systems research</article-title>
          ,
          <source>Journal of management information systems 24</source>
          (
          <year>2007</year>
          )
          <fpage>45</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gregor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Hevner</surname>
          </string-name>
          ,
          <article-title>Positioning and presenting design science research for maximum impact</article-title>
          ,
          <source>MIS quarterly</source>
          (
          <year>2013</year>
          )
          <fpage>337</fpage>
          -
          <lpage>355</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dresch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Lacerda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A. V.</given-names>
            <surname>Antunes</surname>
          </string-name>
          , Design science research,
          <source>in: Design science research</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Bandara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Furtmueller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Gorbacheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Miskon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Beekhuyzen</surname>
          </string-name>
          ,
          <article-title>Achieving rigor in literature reviews: Insights from qualitative data analysis and tool-support</article-title>
          ,
          <source>Communications of the Association for Information systems 37</source>
          (
          <year>2015</year>
          )
          <article-title>8</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kitchenham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Charters</surname>
          </string-name>
          ,
          <article-title>Guidelines for performing systematic literature reviews in software engineering (</article-title>
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Kitchenham</surname>
          </string-name>
          ,
          <article-title>Systematic review in software engineering: where we are and where we should be going</article-title>
          ,
          <source>in: Proceedings of the 2nd international workshop on Evidential assessment of software technologies</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. van Steenbergen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brinkkemper</surname>
          </string-name>
          , I. van de Weerd, W. Bekkers,
          <article-title>Improving is functions step by step: the use of focus area maturity models</article-title>
          ,
          <source>Scandinavian Journal of Information Systems</source>
          <volume>25</volume>
          (
          <year>2013</year>
          )
          <article-title>2</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Comuzzi</surname>
          </string-name>
          ,
          <article-title>Stability metrics for enhancing the evaluation of outcome-based business process predictive monitoring</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>133461</fpage>
          -
          <lpage>133471</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rohlof</surname>
          </string-name>
          ,
          <article-title>Process management maturity assessment</article-title>
          ,
          <source>AMCIS 2009 Proceedings</source>
          (
          <year>2009</year>
          )
          <fpage>631</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rosemann</surname>
          </string-name>
          , T. De Bruin,
          <string-name>
            <given-names>T.</given-names>
            <surname>Huefner</surname>
          </string-name>
          ,
          <article-title>A model for business process management maturity</article-title>
          ,
          <source>ACIS 2004 Proceedings</source>
          (
          <year>2004</year>
          )
          <article-title>6</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rosemann</surname>
          </string-name>
          , T. De Bruin,
          <article-title>Towards a business process management maturity model</article-title>
          ,
          <source>in: ECIS 2005 proceedings of the thirteenth European conference on information systems, Verlag and the London School of Economics</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Curtis</surname>
          </string-name>
          , T. Gardiner,
          <article-title>Business process maturity model (bpmm) version 1</article-title>
          .0,
          <string-name>
            <surname>Fecha</surname>
            <given-names>de</given-names>
          </string-name>
          <source>consulta 4</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <article-title>An overview of the business process maturity model (bpmm), Advances in web and network technologies, and information management (</article-title>
          <year>2007</year>
          )
          <fpage>384</fpage>
          -
          <lpage>395</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>R. M. Saco</surname>
          </string-name>
          ,
          <article-title>Maturity models</article-title>
          .,
          <source>Industrial Management</source>
          <volume>50</volume>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>M. C. Paulk</surname>
            ,
            <given-names>C. V.</given-names>
          </string-name>
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          <string-name>
            <surname>Garcia</surname>
            ,
            <given-names>M. B.</given-names>
          </string-name>
          <string-name>
            <surname>Chrissis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Bush</surname>
          </string-name>
          ,
          <article-title>Key practices of the capability maturity model</article-title>
          ,
          <source>Version</source>
          <volume>1</volume>
          .1,
          <string-name>
            <surname>Technical</surname>
            <given-names>Report</given-names>
          </string-name>
          , Carnegie-Mellon
          <source>Univ Pittsburgh Pa Software Engineering Inst</source>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W.</given-names>
            <surname>Bekkers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Spruit</surname>
          </string-name>
          , I. van de Weerd, R. van Vliet,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mahieu</surname>
          </string-name>
          , et al.,
          <article-title>A situational assessment method for software product management</article-title>
          ,
          <source>in: Proceedings of the 18th European Conference on Information Systems (ECIS2010)</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>A. Van Looy</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. De Backer</surname>
            , G. Poels,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Snoeck, Choosing the right business process maturity model</article-title>
          ,
          <source>Information &amp; Management</source>
          <volume>50</volume>
          (
          <year>2013</year>
          )
          <fpage>466</fpage>
          -
          <lpage>488</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>D.</given-names>
            <surname>Laney</surname>
          </string-name>
          ,
          <source>Gartner's Enterprise Information Management Maturity Model</source>
          ,
          <source>Technical Report, Technical Report. Gartner</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Reinkemeyer</surname>
          </string-name>
          , Process Mining in Action: Principles,
          <string-name>
            <given-names>Use</given-names>
            <surname>Cases</surname>
          </string-name>
          and Outlook, Springer Nature,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Akkiraju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sinha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mahmud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gundecha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Schumacher,</surname>
          </string-name>
          <article-title>Characterizing machine learning processes: A maturity framework</article-title>
          ,
          <source>in: International Conference on Business Process Management</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tarhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Turetken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ilisulu</surname>
          </string-name>
          ,
          <article-title>Business process maturity assessment: state of the art and key characteristics</article-title>
          ,
          <source>in: 2015 41st Euromicro Conference on Software Engineering and Advanced Applications</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>430</fpage>
          -
          <lpage>437</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tarhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Turetken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <article-title>Business process maturity models: A systematic literature review</article-title>
          ,
          <source>Information and Software Technology</source>
          <volume>75</volume>
          (
          <year>2016</year>
          )
          <fpage>122</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.</given-names>
            <surname>Szelągowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Berniak-Woźny</surname>
          </string-name>
          ,
          <article-title>How to improve the assessment of bpm maturity in the era of digital transformation</article-title>
          ,
          <source>Information Systems and e-Business Management</source>
          <volume>20</volume>
          (
          <year>2022</year>
          )
          <fpage>171</fpage>
          -
          <lpage>198</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Fukas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rebstadt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Remark</surname>
          </string-name>
          , O. Thomas,
          <article-title>Developing an artificial intelligence maturity model for auditing</article-title>
          ,
          <source>in: 29th European Conference on Information Systems Research Papers</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>T.</given-names>
            <surname>Nemeth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ansari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Sihn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Haslhofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schindler</surname>
          </string-name>
          ,
          <article-title>Prima-x: A reference model for realizing prescriptive maintenance and assessing its maturity enhanced by machine learning</article-title>
          ,
          <source>Procedia CIRP 72</source>
          (
          <year>2018</year>
          )
          <fpage>1039</fpage>
          -
          <lpage>1044</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>F.</given-names>
            <surname>Schreckenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. U.</given-names>
            <surname>Morof</surname>
          </string-name>
          ,
          <article-title>Developing a maturity-based workflow for the implementation of ml-applications using the example of a demand forecast</article-title>
          ,
          <source>Procedia Manufacturing</source>
          <volume>54</volume>
          (
          <year>2021</year>
          )
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>Establishment of a maturity model to assess the development of industrial ai in smart manufacturing</article-title>
          ,
          <source>Journal of Enterprise Information Management</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>O.</given-names>
            <surname>Klisenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Serral Asensio</surname>
          </string-name>
          ,
          <article-title>Towards a maturity model for iot adoption by b2c companies</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <fpage>982</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>G.</given-names>
            <surname>Korsten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Aysolmaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Turetken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Edel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ozkan</surname>
          </string-name>
          ,
          <article-title>Ada-cmm: A capability maturity model for advanced data analytics</article-title>
          ,
          <source>in: Proceedings of the 55th Hawaii International Conference on System Sciences</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>266</fpage>
          -
          <lpage>275</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>