<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>ProMiSE: Process Mining Support for End-Users</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesca Zerbato</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lisa Zimmermann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hagen Völzer</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Barbara Weber</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Computer Science, University of St.Gallen</institution>
          ,
          <addr-line>St.Gallen</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Project Information Project Name: Process Mining Support for End-Users (ProMiSE); Funding Agency: Swiss National Science Foundation (SNSF); URL: https://data.snf.ch/grants/grant/197032; Running Period: 01.11.2020 - 31.10.2024; Applicant: Barbara Weber (University of St. Gallen); Participants: Francesca Zerbato, Lisa Zimmermann, Hagen Völzer; Project Partners: Andrea Burattin (Technical University of Denmark), Tijs Slaats (University of Copenhagen), Pnina Sofer, University of Haifa</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the past decade, process mining has gained momentum in academia and the industry, as it supports organizations in deriving insights from event data recorded from process executions. The increasing adoption of process mining in practice entails supporting process analysts in their work. Indeed, their analysis includes many exploratory tasks that require them to rely on their experience to interpret the data and steer the analysis. This knowledge-intensive nature of process mining can be challenging for less experienced analysts and calls for methodological and operational guidance tailored to their needs. In this paper, we present ProMiSE, a project funded by the Swiss National Science Foundation that embraces this novel direction in process mining research. The first goal of the project is to improve our understanding of how analysts work in practice, i.e., the process of process mining. Then, methodological guidance and software-based support are developed to assist novice analysts during their analysis. The results obtained in the first two years of ProMiSE have helped to build a solid empirical basis on process mining, laying the foundation for the development of user-centered support, which we will realize in the coming years with the help of our project partners and international collaborators.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Process of Process Mining</kwd>
        <kwd>User Behavior Analysis</kwd>
        <kwd>Process Mining Guidance</kwd>
        <kwd>Software Support</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process mining is a flourishing discipline rooted in workflow mining [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and in the discovery
of software development and maintenance processes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It blends concepts from machine
learning, data mining, and business process management (BPM) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Process mining enables
the automated analysis of event data recorded by an IT system that supports the execution of a
(business) process. The goal of the analysis is to discover, visualize, improve, or automate the
process. Over the years, process mining has grown in many directions, leading to the emergence
of many open-source and commercial tools and increasing adoption by organizations.
      </p>
      <p>
        However, despite its success in academia and industry, research on process mining has mainly
advanced from a technical perspective, favoring the development of algorithms and tools over
guidance for individual users [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], particularly process analysts. As a result, many analytical
tasks still lack methodological and operational support [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        While this lack of support manifests itself at various stages of a process mining project [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ],
it becomes particularly critical for the analysis phase and, above all, for exploratory analysis
tasks. Indeed, the knowledge-intensive character of process mining analysis requires analysts to
explore the data and find their way through the many possible techniques that can be applied to
it [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Due to its emergent nature, such an exploratory process cannot be fully specified before
it has happened [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], making it hard to guide process analysts and, in particular, non-expert
users such as novice analysts.
      </p>
      <p>With our project, Process Mining Support for End-Users (ProMiSE) 1, we aim to close this gap
by contributing to a better understanding of how process analysts do their work in practice and
by providing methodological guidance and software-based support to assist novice analysts.</p>
      <p>This broad project goal can be split into two research objectives (ROs).</p>
      <p>
        • The first objective is to understand how analysts do process mining in practice,
i.e., how they act and think in the process of process mining (RO1). To achieve this, we
analyze the behavior of individual process mining users in a comprehensive manner. In
detail, we use a rich source of multi-modal data, including interaction and verbal data, to
investigate the work practices of analysts with diferent levels of expertise. This approach
strengthens a new line of research in process mining [
        <xref ref-type="bibr" rid="ref5 ref9">5, 9</xref>
        ], borrowing from neighboring
ifelds such as visual analytics [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and data-driven requirements engineering [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], which
already focus on the analysis of user behavior.
• The second objective is to develop and evaluate methodological guidance and
software-based support to assist novice analysts during the analysis (RO2). The
developed guidance and support will build upon the results of RO1. First, we aim to develop
guidelines to support novice analysts. The envisioned guidelines aim to complement the
high-level support provided by existing methodologies [
        <xref ref-type="bibr" rid="ref11 ref6">6, 11</xref>
        ] with practical advice for
specific aspects of the analysis phase, such as analysis tactics or mitigation strategies for
everyday challenges. In addition, we plan to support the user during the analysis, bearing
in mind that the unstructured and emergent nature of process mining analysis might not
be suitable for approaches that prescribe or enforce behavior. Thus, we will develop and
evaluate software tools and artifacts to support process analysts in specific tasks.
Relevance to Information Systems Engineering Research ProMiSE is relevant to
information systems engineering in several ways. Firstly, the research in this project follows
the principles of design science research [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and user-centered design [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], where the design
of the support is informed by an in-depth analysis of user behavior data and then evaluated
with end-users. Secondly, process mining can be seen as a strand of data-driven requirements
engineering [
        <xref ref-type="bibr" rid="ref10 ref14">10, 14</xref>
        ]. Traditionally, process mining identifies improvement and automation
op1Grant information about ProMiSE: https://data.snf.ch/grants/grant/197032
portunities for business processes supported by information systems. However, process mining
is not restricted to business processes but can also be applied to manufacturing, healthcare, and
other types of processes. Thirdly, the project itself can be seen as a case study in data-driven
engineering. The status-quo in process mining is comparable to other knowledge-intensive
work: A variety of automated tool functions exist but those are used in an exploratory and
unstructured way. How can then empirical evidence about the use of tool functions help to
engineer the next generation of tool support? In this regard, we hope to transfer learnings from
the project to engineer the support for knowledge-intensive work in other areas.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Work Packages and Outputs</title>
      <p>The work of ProMiSE is organized into four main work packages (WPs) which relate to the two
research objectives of the project as sketched in Fig. 1.</p>
      <p>RO1 focuses on understanding user behavior based on data collected from users engaging in
process mining analysis (WP1), which we analyze based on specific research questions (WP2).
Study Design and Data Collection (WP1). The data collection is organized into a series of
observational studies aimed to collect diferent kinds of behavioral data from process mining
users with varying levels of experience and expertise. On the one hand, we aim to collect
data about the analysis process in the tools, such as screen recordings and interaction logs, to
learn from the usage of widely used process mining tools and artifacts (implicit feedback). On
the other hand, we aim to collect verbal data from think-aloud and interviews to learn about
the thinking processes of analysts, including their reflections on the analysis process and the
perceived challenges (explicit feedback). By combining diferent data modalities, we aim to
create a unique dataset that includes both interaction and verbal data. The latter serves to
OUTPUT
Patterns,
Strategies,
Challenges</p>
      <p>OUTPUT
Validated
Support</p>
      <sec id="sec-2-1">
        <title>RO1: UNDERSTAND</title>
        <p>WP1: Data Collection</p>
        <p>Process Mining</p>
        <p>Analyst (End-User)</p>
      </sec>
      <sec id="sec-2-2">
        <title>RO2: SUPPORT</title>
        <p>Methodological</p>
        <p>Guidance</p>
        <p>Software-based</p>
        <p>Support
analyzes</p>
        <p>User</p>
        <p>Behavior
Tools, Questions, Data
Event Logs, …</p>
        <p>Behavior
Patterns</p>
        <p>Analysis
Strategies</p>
        <p>Challenges
WP3: Development of Support</p>
        <p>WP4: Evaluation of Support
contextualize the user interactions and ease the explanation of the observed behavior.</p>
        <p>The intended output of WP1 is a collection of multi-modal data capturing the process of
process mining both in terms of low-level interactions with process mining software and
higher-level thinking processes of the analysts.</p>
        <p>Data Analysis (WP2). In WP2, we study the collected data from various viewpoints to
understand user behavior guided by the following research questions.</p>
        <p>
          • “What are recurring patterns of behavior in process mining?” We analyze interaction
traces at varying levels of abstraction and from diferent perspectives. Examples of such
perspectives can be the expertise of the analyst and the tool used, but also specific phases
of the analysis, such as data exploration. Analysts tend to reapply the same work practices
to diferent datasets [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], suggesting that common analysis patterns as well as diferent
working modes exist, which are dictated by the analyst’s expertise or the context.
• “Can we identify common approaches to process mining tasks?” We analyze verbal and
interaction data to find out whether there are common strategies that analysts employ.
This includes how analysts typically start, how they use diferent analysis artifacts, and
which factors they take into account to steer their analysis.
• “What are common challenges arising during the analysis?” We identify challenges faced
by analysts during the analysis by looking into verbal data. This direction is motivated
by work on technical and organizational challenges [
          <xref ref-type="bibr" rid="ref15 ref3">3, 15</xref>
          ], which we aim to integrate.
        </p>
        <p>
          To achieve RO1, ProMiSE will combine the knowledge gained on behavioral patterns, analysis
strategies, and challenges. The insights gained with RO1 will inform the development of
guidance and support (WP3), which we will then evaluate with novice analysts (WP4) (cf. Fig. 1).
Development (WP3) and Evaluation (WP4) of Support. WP3 focuses on developing
methodological guidance and software-based support for novice analysts in a similar vein to
work done on the process of process modeling [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The envisioned support encompasses
guidelines inspired by “efective” analysis strategies but also novel visualizations for process
mining results, as well as mechanisms to support analysts in keeping track of their analysis
for reproducibility purposes. Moreover, we aim to support analysts with recommendations
based on the operational knowledge of expert users, providing hints on how to execute analysis
tasks including where to start from, how to develop questions, and how to overcome common
challenges. Then, in WP4, we aim to iteratively evaluate the support developed in WP3 with
novice analysts, i.e., our end-users.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results and Ongoing Work</title>
      <p>As of spring 2023, ProMiSE has reached the halfway point of its duration, and crucial milestones
have been achieved. Below we summarize the results obtained and report on ongoing work.
3.1. Understanding how Analysts do Process Mining in Practice
Study Design and Data Collection. The first eforts of the project focused on the design
and execution of a study targeting process mining analysts (cf. WP 1). For the study, participants
were tasked with answering an analysis question by analyzing a provided event log using a
process mining tool of choice. During the task, we collected diferent sources of behavioral
data, including (i) the interaction traces of the analysts working in the process mining tools
captured via screen recordings, (ii) their reasoning processes captured via think-aloud, and (iii)
the application logs of the process mining tools, if available. Also, we tracked (iv) the (final)
answers to the question posed in the task and complemented all the gathered information with
(v) retrospective interviews. While (i)-(iv) concern mainly the task planned for the study, (v)
enriches the collected data with insights coming from the general work practices of the analysts.
The design of the study was first tested in a pilot study with 12 participants. Based on the
lessons learned from the pilot, we refined our design, and in the summer of 2021, we conducted a
large-scale data collection involving 41 analysts with varying levels of experience and expertise.
This rich multi-modal data collection formed a solid empirical basis for our analysis.
Exploration Patterns, Analysis Strategies, and Challenges. The analysis of the data
collected from both studies allowed us to contribute to RO1 in several ways.</p>
      <p>
        From the interaction traces collected in the pilot study, we derived insights into analysis
patterns and strategies of exploratory process mining [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Supported by qualitative and visual
analysis, we discovered diferent behavior patterns based on time spent by analysts on high-level
activities executed in process mining tools and their order. The patterns were complemented
by exploration goals and strategies derived from the interviews. Our findings revealed that
although process analysts share some goals with data scientists [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], their exploration strategies
depend on the characteristics of the studied process, making process mining analysis a promising
area to explore further.
      </p>
      <p>
        Based on the analysis of interview data collected in the second study, we addressed the
research questions about strategies and challenges. In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], we characterized common strategies
of the analysis phase [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and examined factors afecting their use in practice. We grouped the
discovered strategies into four groups. The first group includes strategies often used at the
beginning of the analysis to understand the problem, the data, and the domain. A second group
of strategies supports the analysis planning, e.g., by prioritizing analysis directions based on
the foreseen value of the findings. Then, in the third group, we identified strategies to execute
the analysis by applying process mining techniques within tools, e.g., testing hypotheses. The
last group of strategies covered the verification and validation of the results. Our work also
shed light on factors that influence the application of the strategies. For example, we discovered
that the presence or absence of an analysis question, the availability of stakeholders, and the
analyst’s role within their team influence whether and how specific strategies are applied.
      </p>
      <p>
        Besides strategies, we discovered common challenges experienced by process analysts while
they engage in process mining projects [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In total, we identified 23 challenges, including
issues such as keeping the focus of the analysis, formulating questions to guide the analysis, not
having suficient analysis experience, or struggling to draw conclusions from analysis results.
These findings helped us identify the actual support needs of analysts and provide detailed
insights, such as situations in which the challenges occur and how they afect an analysis. The
obtained insights already hint towards potential solutions. As a first step towards support,
we will develop guidance to circumvent common challenges. By learning from experts who
encountered challenges in their past experience and successfully overcame them, we plan to
derive mitigation strategies, which novice analysts can also apply.
      </p>
      <p>
        Last but not least, towards achieving RO1, we are currently analyzing the interaction data.
Following a qualitative coding approach [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], we have coded all the data from multiple perspectives
and have started applying quantitative methods to mine recurring patterns of behavior.
3.2. Towards Developing Support for Process Analysts
The data collection and analysis conducted in the context of RO1 laid the groundwork for the
development of support, allowing us not only to derive preliminary results in this direction but
also to identify areas where support is still lacking (cf. RO2).
      </p>
      <p>
        Question Development in Process Mining. One area is the development of questions to
guide process mining analysis. Inspired by the discovered challenges [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and the fact that
questions are a critical factor for applying analysis strategies [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], we focused on providing
support for question development. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], we derived recommendations from practice aimed at
supporting process analysts in developing analysis questions or dealing with the lack thereof. To
further support question development, we are currently working on gathering process mining
questions from literature and user surveys. We envision that the categorization of questions and
their link to analysis techniques could support analysts in identifying and formulating relevant
questions and devising a plan to answer them with the help of tools, such as done in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Mining of Multi-Granular Activities. Another challenge we identified concerns how to
chose a proper granularity level for representing activities in logs [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ]. This fundamental
problem emerged from the exploratory analysis of the interaction traces. In this setting, it is
hard to foresee what is the most appropriate granularity level of process activities that can
yield meaningful patterns. Analysts would benefit from exploring activities at diferent levels of
granularity in the same analysis without having to fix one during preprocessing, as often done
for event logs. Further advancements in this directions are planned, as a successful solution to
the granularity problem in process mining would not only have far-reaching implications for
the process of process mining but also for the integration of process mining with task mining
as well as the analysis of human behavioral data and process data in the context of IoT.
Analytic Provenance and Data Awareness. A third problem area identified from our
studies is that process analysts often lose awareness of their current data selection and struggle
to track how the current analysis step relates to previous steps, previous results, and the goals of
the analysis. We have analyzed this problem and proposed tool support to address it [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. The
tool design that we have proposed aims at increasing the transparency and rigor of exploratory
process mining as a basis for its stepwise maturation. In this work, we have also provided an
initial evaluation concerning the feasibility of some aspects of the design.
Interactive Modeling. From our study, we have learned that process analysis is often about
generating and testing hypotheses based on patterns from visualizations. But patterns can also
be found through easy-to-read textual abstractions such as rules. We are currently developing
and evaluating tool support for generating novel visualizations and rules for process outcome
analysis. Process outcome analysis is a critical use case in process mining that allows one to
explain the distribution of final or intermediate process outcomes. Such explanations are a basis
for process improvements, e.g., increasing the share of “good” outcomes of the process. In this
work, we leverage and extend Sankey diagrams and interpretable machine learning techniques.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion and Outlook</title>
      <p>With this paper, we have provided an overview of the main research activities of ProMiSE.
While the project is planned to run for approximately two more years, significant milestones
have been achieved and disseminated to the research community. So far, the project has focused
on understanding the process of process mining, putting a particular emphasis on the analysis
phase. Through this efort, the team in St. Gallen has worked closely with project partners and
collaborators to identify typical analysis challenges and strategies as well as problem areas that
might benefit from the development of support in the short term.</p>
      <p>
        In the coming months, we will complement the qualitative insights obtained with the
quantitative insights into behavior patterns. While doing so, we will look deeper at the granularity
of process activities and work towards supporting multi-granular analysis. Moreover, we will
focus on translating the findings into support for the areas identified above. For software-based
support, we will follow at least two lines of work: (i) increase provenance and data awareness for
the process analyst to reach higher maturity in exploratory process mining [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], and (ii) create
support for process outcome analysis as described above. We also plan to extend tool support
for variant analysis, one of the most frequently used functions in existing tools. Upon project
completion, we will to share the results and anonymized data with the research community.
Funding. This work is funded by the Swiss National Science Foundation under grant no. 200021_197032.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. Van der Aalst</surname>
            ,
            <given-names>B. F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Herbst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Maruster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Schimm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Weijters</surname>
          </string-name>
          ,
          <article-title>Workflow mining: A survey of issues and approaches</article-title>
          ,
          <source>Data Knowl Eng</source>
          <volume>47</volume>
          (
          <year>2003</year>
          )
          <fpage>237</fpage>
          -
          <lpage>267</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Cook</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <article-title>Discovering models of software processes from event-based data</article-title>
          ,
          <source>ACM Trans. Softw. Eng. Methodol</source>
          .
          <volume>7</volume>
          (
          <year>1998</year>
          )
          <fpage>215</fpage>
          -
          <lpage>249</lpage>
          . doi:
          <volume>10</volume>
          .1145/287000.287001.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>W. M. Van Der Aalst</surname>
          </string-name>
          , et al.,
          <article-title>Process mining manifesto</article-title>
          ,
          <source>in: Business Process Management Workshops</source>
          , Springer,
          <year>2011</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>194</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -28108-2_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>R'bigui, The state-of-the-art of business process mining challenges</article-title>
          ,
          <source>Int. J. Bus. Process. Integration Manag</source>
          .
          <volume>8</volume>
          (
          <year>2017</year>
          )
          <fpage>285</fpage>
          -
          <lpage>303</lpage>
          . doi:
          <volume>10</volume>
          .1504/IJBPIM.
          <year>2017</year>
          .
          <volume>10009731</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Klinkmüller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Müller</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Weber</surname>
          </string-name>
          ,
          <article-title>Mining process mining practices: An exploratory characterization of information needs in process analytics</article-title>
          ,
          <source>in: Int. Conf. on Business Process Management (BPM)</source>
          , Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>322</fpage>
          -
          <lpage>337</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -26619-6_
          <fpage>21</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Emamjome</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H.</surname>
          </string-name>
          <article-title>ter</article-title>
          <string-name>
            <surname>Hofstede</surname>
          </string-name>
          ,
          <article-title>A case study lens on process mining in practice</article-title>
          ,
          <source>in: On the Move to Meaningful Internet Systems: OTM 2019 Conferences</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>145</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Wongsuphasawat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Heer</surname>
          </string-name>
          , Goals, process, and
          <article-title>challenges of exploratory data analysis: An interview study</article-title>
          , arXiv preprint arXiv:
          <year>1911</year>
          .
          <volume>00568</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <source>Enabling Flexibility in Process-Aware Information Systems: Challenges</source>
          , Methods, Technologies, Springer, Berlin, Heidelberg,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Capitán-Agudo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Salas-Urbano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cabanillas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Resinas</surname>
          </string-name>
          ,
          <article-title>Analyzing how process mining reports answer time performance questions</article-title>
          ,
          <source>in: Int. Conf. on Business Process Management (BPM)</source>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>250</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -16103-2\_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Maalej</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nayebi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Johann</surname>
          </string-name>
          , G. Ruhe,
          <article-title>Toward data-driven requirements engineering</article-title>
          ,
          <source>IEEE Software 33</source>
          (
          <year>2015</year>
          )
          <fpage>48</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .1109/MS.
          <year>2015</year>
          .
          <volume>153</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. L. Van Eck</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>S. J.</given-names>
          </string-name>
          <string-name>
            <surname>Leemans</surname>
            ,
            <given-names>W. M. Van der Aalst</given-names>
          </string-name>
          ,
          <article-title>PM2: A process mining project methodology</article-title>
          ,
          <source>in: Int. Conf. on Advanced Information Systems Engineering (CAiSE)</source>
          , volume
          <volume>9097</volume>
          <source>of LNCS</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>313</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -19069-3_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wieringa</surname>
          </string-name>
          ,
          <article-title>Design science methodology for information systems</article-title>
          and software engineering, Springer,
          <year>2014</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -43839-8.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <article-title>User engineering principles for interactive systems</article-title>
          , in: Fall Joint Computer Conference (AFIPS),
          <year>1972</year>
          , pp.
          <fpage>523</fpage>
          -
          <lpage>532</lpage>
          . doi:
          <volume>10</volume>
          .1145/1479064.1479159.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.</given-names>
            <surname>Franch</surname>
          </string-name>
          ,
          <article-title>Data-driven requirements engineering: A guided tour</article-title>
          ,
          <source>in: Int. Conf. on Evaluation of Novel Approaches to Software Engineering (ENASE)</source>
          , volume
          <volume>1375</volume>
          <source>of CCIS</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>105</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -70006-5\_4.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Martin</surname>
          </string-name>
          , et al.,
          <article-title>Opportunities and challenges for process mining in organisations: Results of a Delphi study</article-title>
          ,
          <source>Bus. Inf. Syst. Eng</source>
          .
          <volume>63</volume>
          (
          <year>2021</year>
          ).
          <source>doi:10.1007/s12599-021-00720-0.</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pinggera</surname>
          </string-name>
          , et al.,
          <article-title>Styles in business process modeling: an exploration and a model</article-title>
          ,
          <source>Softw Syst Model</source>
          <volume>14</volume>
          (
          <year>2015</year>
          )
          <fpage>1055</fpage>
          -
          <lpage>1080</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10270-013-0349-1.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Initial insights into exploratory process mining practices</article-title>
          ,
          <source>in: Int. Conf. on Business Process Management (BPM Forum)</source>
          , volume
          <volume>427</volume>
          <source>of LNBIP</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>145</fpage>
          -
          <lpage>161</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -85440-9\_9.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Process mining practices: Evidence from interviews</article-title>
          ,
          <source>in: Int. Conf. on Business Process Management (BPM)</source>
          , LNCS, Springer,
          <year>2022</year>
          , pp.
          <fpage>268</fpage>
          -
          <lpage>285</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>031</fpage>
          -16103-2\_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Process mining challenges perceived by analysts: An interview study</article-title>
          ,
          <source>in: Enterprise, Business-Process and Information Systems Modeling (BPMDS)</source>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -07475-2\_1.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J.</given-names>
            <surname>Saldaña</surname>
          </string-name>
          ,
          <article-title>The coding manual for qualitative researchers</article-title>
          ,
          <source>Sage</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Koorn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Beerepoot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <article-title>On the origin of questions in process mining projects</article-title>
          ,
          <source>in: Int. Conf. on Enterprise Design</source>
          , Operations, and
          <string-name>
            <surname>Computing</surname>
          </string-name>
          (EDOC), Springer,
          <year>2022</year>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>181</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -17604-3\_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>L.</given-names>
            <surname>Barbieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Madeira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Stroeh</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>A natural language querying interface for process mining</article-title>
          ,
          <source>J Intell Inf Syst</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10844-022-00759-9.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Seiger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Federico</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Burattin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Granularity in process mining: Can we ifx it?</article-title>
          , in: BPM Problems to Solve Before We Die, volume
          <volume>2938</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>I.</given-names>
            <surname>Beerepoot</surname>
          </string-name>
          , et al.,
          <article-title>The biggest business process management problems to solve before we die</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>146</volume>
          (
          <year>2023</year>
          )
          <article-title>103837</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.compind.
          <year>2022</year>
          .
          <volume>103837</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zerbato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Burattin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Völzer</surname>
          </string-name>
          , E. Boscaini,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nelson Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Supporting provenance and data awareness in exploratory process mining</article-title>
          ,
          <source>in: Int. Conf. on Advanced Information Systems Engineering (CAiSE)</source>
          ,
          <year>2023</year>
          .
          <article-title>Accepted for publication</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>