<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>EMAIL: stephan.kuehnel@wiwi.uni-halle.de
ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>EconBPC:  A  Tool  for  Activity‐based  Monetary  Assessment  and  Visualization  of  Security  and  Compliance  Measures  in  Business  Processes  </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stephan Kuehnel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Sackmann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johannes Damarowsky</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Boehmer</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Martin Luther University Halle-Wittenberg</institution>
          ,
          <addr-line>Universitaetsring 3, 06108 Halle (Saale)</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>   In this paper, we present the four-stage concept, implementation, application, and 2-stage evaluation of the tool EconBPC. EconBPC is a software artifact that emerged from a design science research initiative on the use of extensible event streams (XES). It was created to take a first step towards an automated activity-based monetary assessment of security and compliance measures in business processes and their addressee-oriented representation in a compliance view. For this purpose, EconBPC provides users with annotation features for XES and compliance processes, enables the storage of annotated log files, and the comparison of expenses for security and compliance activities with costs from associated regulatory breaches.  </p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>
        In the discipline of business informatics, business process compliance (BPC) addresses identifying,
formalizing, implementing, checking, analyzing, and optimizing the adherence to business-relevant
requirements before, during, or after executing business processes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Due to the steadily increasing
number of security and compliance requirements, e.g., the cross-sectoral provisions of the European
Union's General Data Protection Regulation (EU GDPR), KRITIS for operators of critical
infrastructures, or the second Payment Services Directive (PSD2) for banks, ensuring BPC has
manifested itself not only as a complex technical challenge, but also as a cost-intensive task [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ].
      </p>
      <p>
        For example, current legislation on the protection of personal data requires the consideration of
economic criteria when introducing compliance and security measures in business processes.
Accordingly, Article 32 (1) EU GDPR defines that technical and organizational measures must be taken
for the security of processing of personal data that ensure an adequate level of protection in relation to
the respective risk and considering implementation costs. In contrast, a breach of Article 32 (1) EU
GDPR may result in fines of up to 20 million euro or 4% of the total annual global turnover of the
previous year (see Article 83 EU GDPR on "general conditions for imposing administrative fines"). In
academia and especially in practice, the need for approaches and tools is communicated which no longer
focus only on technical feasibility, but rather address economic aspects in ensuring BPC [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4–6</xref>
        ].
      </p>
      <p>
        However, the economic assessment of BPC is a complex task for process owners, especially when
data from large log files have to be analyzed. Studies from the field of decision making theory suggest
the use of software artifacts to support such complex tasks in order to enable a reduction of the cognitive
effort for the end user [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ], e.g., by enabling special security and compliance views on business
processes or by increasingly automating necessary calculations in large process models [
        <xref ref-type="bibr" rid="ref6 ref9">6,9</xref>
        ]. Currently,
and to the best of our knowledge, neither are available, tools that explicitly visualize security and
compliance measures of business processes in a separate view and tools that can economically assess
and analyze these measures taking into account monetary cost and benefit aspects.
      </p>
      <p>Consequently, the goal of our paper is to demonstrate the tool EconBPC, which, based on annotated
extensible event streams (XES), takes a first step towards an automated monetary assessment of BPC
and, moreover, can generate its own compliance view. The remainder of the paper is structured as
follows. Chapter 2 shows the four-step concept of EconBPC, followed by the presentation of the
software architecture and implementation in chapter 3. Chapter 4 illustrates a short application example
and highlights the maturity of the artifact in a brief summary of the two-stage evaluation. The paper
closes with some concluding remarks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Concept of EconBPC </title>
      <p>
        The economic principle is based at its core on an input-output relation that can be specified by
quantitative parameters for a wide variety of domains, and thus also for BPC. The assessment of
process-based security and compliance measures with regard to this relation, i.e. the economic
assessment of security and compliance activities or activity sequences in business processes2, therefore
builds upon a graph-theoretical distinction between business activities and compliance activities.
Consequently, we define a business process as a 3-tuple , where
represents a set of nodes in that follow common execution semantics. represents a set of
edges between nodes, i.e. a control flow, thus constitutes a connected process graph. To simplify,
we assume to be a set of purely business-related and to be a set of purely compliance-related
activities. represents a set of coordination nodes and the function assigns a coordination kind to
each coordinating node of , i.e.: . In
this sense, a compliance activity is not defined as an activity that itself complies with rules, such as the
processing of customer data in a customer account, but as an activity that is carried out for the purpose
of compliance, such as pseudonymisation of customer data in accordance with Article 4 (5) EU GDPR.
Given that compliance activities have already been implemented in a business process to protect against
a compliance risk and that the risk is associated with a specific damage value, compliance activities can
be assessed economically. For this purpose, each compliance activity is specified in terms of costs and
reliability (for a detailed description of the assessment approach and a calculation example, see [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]).
      </p>
      <p>
        With the standard for XES, the IEEE Task Force on Process Mining has published an XML-based
standard for log files that defines a generally accepted format for the exchange of log data between
information systems and for the provision of data for analysis tools [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The XES standard can be
extended by extensions and already offers a number of standard ones, such as the cost extension [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
but also specific ones, such as our extension "econbpc" (see https://bit.ly/2GI8U0E), which can
distinguish activities into compliance-related and business-related, or specify activities by reliabilities.
      </p>
      <p>The conceptual approach of EconBPC is shown in Figure 1 and includes four steps.
(1.1) Annotation and complexity reduction
(1.2) Graphical reconstruction of compliance process
Process log file</p>
      <p>Compliance</p>
      <p>log file
     </p>
      <p>…
(3) Assessment of compliance process patterns</p>
      <p>       
(4) Assessment aggregation
(2) Mining of compliance process patterns
   </p>
      <p> 
 
 </p>
      <p> 
Compliance process</p>
      <p>
        (1.1) Annotation and complexity reduction of log files. Given a process log file, we start with the
first step. The flexible character of the XES standard opens up the possibility of annotating log files,
i.e., enriching them with additional data [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This means, for example, that additional data can be stored
in log files that further specify the activities performed (so-called events) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. If the available log file
2 For ease of understanding, security and compliance measures are hereinafter summarized under the term compliance measures; the same
applies to compliance activities, -processes, -patterns and -log files.
does not yet contain data about the event type (business/compliance event), costs, or reliabilities of
compliance events, these must be annotated. This is followed by a complexity reduction. All events that
are not of the "compliance" type are removed from the log file. The resulting so-called "compliance log
file" thus only contains the data required for the monetary assessment of BPC, which increases the
calculation efficiency of the procedure.
      </p>
      <p>(1.2) Graphical reconstruction of compliance process. Although the approach does not require a
graphical process reconstruction, the compliance process can be visualized based on the compliance
log file. Such a visualization provides an overview of the compliance activities and can be used as a
basis for presenting calculation results graphically in a way appropriate to the target audience, e.g.,
implemented via compliance activity annotations of costs or reliabilities for compliance officers.</p>
      <p>
        (2) Mining of compliance process patterns. Each executed instance of a business process consists
of a finite set of events and is referred to as a trace according to the XES standard [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. A compliance
log file contains only compliance traces, i.e. the executed instances of a compliance process. First, the
event sequences of all compliance traces are analyzed and a list of all those sequences that differ in their
sequence is created. Each entry in this list is a unique tuple that represents one of a finite number of
pathways through a compliance process and is referred to as a compliance process pattern. For example,
if two compliance traces do not differ, neither in the set of their events nor in their sequence, they are
based on the same compliance process pattern. Second, the relative frequency of occurrence is
determined for each pattern. If, for example, a compliance log file contains data from a total of three
compliance traces and two of them do neither differ in their quantity of events nor in their sequence,
then the relative frequency of occurrence of the underlying compliance process pattern is 66. %.
      </p>
      <p>
        (3) Assessment of compliance process patterns. Using our computational approach originating from
prior work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we determine the costs and reliabilities of the compliance process patterns3. Since
compliance process patterns are derived from the traces of a business process and the control flow of a
trace always has either a parallel or sequential character, only the computational rules for sequence,
parallel split, and synchronization patterns need to be considered for assessment.
      </p>
      <p>
        (4) Assessment aggregation. As part of the assessment aggregation, expected costs and expected
reliabilities of the entire compliance process are calculated. For this purpose, we use the costs and
reliabilities of the compliance process patterns and weight them with the frequencies of occurrence
determined in step (2). At the highest level of aggregation, the expected costs of the compliance process
can be compared with its benefits, which can be represented in terms of the monetary damage prevented,
e.g., by avoiding regulatory breaches [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Software Architecture and Implementation </title>
      <p>
        Design principles were used as a conceptual foundation for the implementation of the approach.
Their derivation and the development of the software artifact build on the four steps presented in chapter
2. Design principles are understood as instructions or proposals for software artifacts that can serve to
solve design problems and can be a conceptual precursor to artifact implementation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Owing to space
limitations, we refer to a previous study for the derivation of these principles (see: [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]).
      </p>
      <p>
        Figure 2 shows the architecture of EconBPC4 as a UML component diagram. The architecture model
provides the basis for implementing EconBPC in R as a Shiny application. The import interface for log
files enables the import of XES. The compliance data importer is an import interface for compliance
data relevant to assessment, such as costs and reliabilities. The interface enables the annotation of log
files with quantitative data of input and output factors of process-based compliance measures required
for the calculation of monetary input-output ratios. The graph generator is used to reconstruct a business
process graph from the log file (process discovery), which is output in the "process view" user interface.
Based on an event filter, which is used to reduce the complexity of the annotated log file, the graph
generator also enables the modular representation of compliance activities and activity sequences in the
"compliance view" user interface. The path analyzer identifies the compliance process patterns,
3 In the description of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the compliance process patterns are referred to as "paths". More details of the assessment approach have been
omitted due to space restrictions. For a more detailed description, see [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
4 The R application EconBPC can be downloaded at the web address https://bit.ly/3OHN2Uh. A user guide and a screencast are available at
https://bit.ly/2oXZtop and at https://bit.ly/2xwM2wW.
determines their relative frequencies of occurrence and sends a list of results to the assessment and
analysis engine. Based on this, the engine enables: (1) the economic assessment of compliance process
patterns and compliance processes, (2) the identification of inefficient compliance activities and
compliance process patterns, and (3) the economic comparison of alternative compliance
activities/processes. The aggregated valuation results are presented in the economic view user interface
and can finally be used for decision support.
      </p>
      <p>&lt;&lt; component &gt;&gt; shiny application
&lt;&lt; component &gt;&gt;
log file importer</p>
      <p>event-related compliance data
&lt;&lt; component &gt;&gt;
compliance data importer
compliance data</p>
      <p>&lt;&lt; device &gt;&gt; shiny server (linux)
event
log
path list
&lt;&lt; component &gt;&gt;
graph generator
&lt;&lt; component &gt;&gt;
path analyzer
&lt;&lt; component &gt;&gt;
assessment and analysis engine
compliance
map
process
map
analysis results
node
component / module
provided interface
&lt;&lt; user interface &gt;&gt;</p>
      <p>compliance view
&lt;&lt; user interface &gt;&gt;</p>
      <p>process view
&lt;&lt; user interface &gt;&gt;</p>
      <p>economic view
requested interface
Figure 2: Software architecture of EconBPC represented as a UML component diagram </p>
    </sec>
    <sec id="sec-4">
      <title>4. Application Example and Maturity  </title>
      <p>For demonstration purposes, EconBPC was tested with an artificial XES dataset publicly provided
by Eindhoven University of Technology and included with the EconBPC download files. This is an
anonymized dataset containing 105 synthetic instances of a credit application process. Since the dataset
does not contain a specification of compliance events, the log file was annotated using the compliance
data importer (see figure 3 (a)). "B1", "B2", "D", and "E" were specified as events of the compliance
type and annotated with costs of $2000, $300, $5000, and $400, and reliabilities of 99%, 95%, 83%,
and 100%, respectively. In addition, a fictitious compliance requirement was stored in EconBPC, the
violation of which is accompanied by a fine of 30,000€.</p>
      <p>compliance 
process 
patterns
aggregated
results
log file 
importer
log file  /  activity</p>
      <p>
        annotation
(a) Screenshot of the log file/compliance data importer as well as the log file 
annotation feature
(b) Screenshot of the cost‐annotated compliance process 
and calculation results
Figure 3: Screenshots of the EconBPC tool in the application example 
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). Second, the tool was tested by 12 experts from the field of IT governance, risk, and compliance
in think-aloud sessions on case studies. The procedure of the think-aloud sessions followed a consistent
pattern, initiated by 1) the provision of information about the software artifact and the tasks to be
performed, 2) the systematic protocoling of the verbalized thoughts of the subjects, and 3) an analysis
of the protocols. Positive expressions were marked with a "+", expressed potential improvements were
marked with an "o", and each was assigned to the design principles. A discussion of both evaluations
and related data can also be found in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Closing Remarks </title>
      <p>This paper has introduced the EconBPC tool, briefly highlighting its four-stage concept, its software
architecture, its implementation as an R application, and its two-stage evaluation. By using XES,
EconBPC offers the possibility to automatically visualize security and compliance measures of business
processes in an addressee-oriented way and to assess them economically based on activities. Among
many limitations stimulating future research, such as the subjectivity of the underlying conceptual and
architectural design or the focus of the assessment on purely monetary values, great potential also lies
in the transfer to real-world practice. As part of the project “Process-based Economic Evaluation and
Selection of IT Security Measures” (ProBITS), which is funded by the Federal Ministry of Education
and Research, we are already working on incorporating non-monetary values into the underlying
calculation models, while still keeping the assessment simple enough to be scalable to different
company sizes. However, testing in real case studies is still pending.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ramezani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mattheis</surname>
          </string-name>
          ,
          <source>Separating Compliance Management and Business Process Management, Business Process Management Workshops</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>459</fpage>
          -
          <lpage>464</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sadiq</surname>
          </string-name>
          , G. Governatori, Managing Regulatory Compliance in Business Processes,
          <source>in: Handbook on Business Process Management 2</source>
          , Springer Berlin Heidelberg,
          <year>2015</year>
          , pp.
          <fpage>265</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sackmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kittel</surname>
          </string-name>
          ,
          <article-title>Flexible Workflows and Compliance: A Solvable Contradiction?!, in: BPM - driving innovation in a digital world</article-title>
          , Springer, Cham,
          <year>2015</year>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>258</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>An analysis of economic impact on IoT under GDPR, in: "ICT convergence technologies leading the fourth industrial revolution"</article-title>
          , Jeju,
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          , Piscataway, NJ,
          <year>2017</year>
          , pp.
          <fpage>879</fpage>
          -
          <lpage>881</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Mustapha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.T.</given-names>
            <surname>Arogundade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Misra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Damasevicius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Maskeliunas</surname>
          </string-name>
          ,
          <article-title>A systematic literature review on compliance requirements management of business processes</article-title>
          ,
          <source>International Journal of System Assurance Engineering and Management</source>
          <volume>11</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>561</fpage>
          -
          <lpage>576</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Adams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.J.</given-names>
            <surname>Davern</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <article-title>On the Role of Process Mining in Business Process Compliance</article-title>
          ,
          <source>SSRN Journal</source>
          (
          <year>2022</year>
          ). https://doi.org/10.2139/ssrn.4081558.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Benbasat,</given-names>
          </string-name>
          <article-title>Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness</article-title>
          ,
          <source>MIS Quarterly 33</source>
          (
          <year>2009</year>
          ), pp.
          <fpage>293</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Meth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mueller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Maedche</surname>
          </string-name>
          ,
          <article-title>Designing a Requirement Mining System</article-title>
          ,
          <source>JAIS 16</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>799</fpage>
          -
          <lpage>837</lpage>
          . https://doi.org/10.17705/1jais.
          <fpage>00408</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.J.</given-names>
            <surname>Varela-Vaca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Parody</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.M.</given-names>
            <surname>Gasca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.T.</given-names>
            <surname>Gomez-Lopez</surname>
          </string-name>
          ,
          <article-title>Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models</article-title>
          ,
          <source>IEEE Access 7</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>26448</fpage>
          -
          <lpage>26465</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2019</year>
          .
          <volume>2901408</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kuehnel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zasada</surname>
          </string-name>
          ,
          <article-title>An Approach Toward the Economic Assessment of Business Process Compliance</article-title>
          , in: Advances in Conceptual Modeling,
          <string-name>
            <surname>ER</surname>
          </string-name>
          <year>2018</year>
          , Proceedings, Springer Cham,
          <year>2018</year>
          , LNCS vol
          <volume>11158</volume>
          . pp.
          <fpage>228</fpage>
          -
          <lpage>238</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.W.</given-names>
            <surname>Günther</surname>
          </string-name>
          , E. Verbeek,
          <source>XES Standard Definition 2</source>
          .0, second ed.,
          <source>Eindhoven</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          , W.Z. Low, t. A.
          <string-name>
            <surname>H.M. Hofstede</surname>
            ,
            <given-names>W.E.</given-names>
          </string-name>
          <string-name>
            <surname>Nauta</surname>
          </string-name>
          ,
          <article-title>A framework for cost-aware process management</article-title>
          :
          <source>Journal of Universal Computer Science</source>
          <volume>20</volume>
          ,
          <year>2014</year>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>430</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kühnel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Trang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lindner</surname>
          </string-name>
          , Conceptualization, Design, and
          <article-title>Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance</article-title>
          , in: Conceptual Modeling,
          <string-name>
            <surname>ER</surname>
          </string-name>
          <year>2019</year>
          , Proceedings, Springer Cham,
          <year>2019</year>
          , LNCS vol
          <volume>11788</volume>
          ., pp.
          <fpage>378</fpage>
          -
          <lpage>386</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>