<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Multi-perspective path semantics in process mining based on causal process knowledge</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lukas Pfahlsberger</string-name>
          <email>lukas.pfahlsberger@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christofer Rubensson</string-name>
          <email>christofer.rubensson@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Steven Knoblich</string-name>
          <email>steven.knoblich@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maxim Vidgof</string-name>
          <email>maxim.vidgof@wu.ac.at</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jan Mendling</string-name>
          <email>jan.mendling@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Humboldt-Universität zu Berlin (HU Berlin)</institution>
          ,
          <addr-line>Rudower Chaussee 25, 12489 Berlin-Adlershof</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Wirtschaftsuniversität Wien (WU)</institution>
          ,
          <addr-line>Welthandelsplatz 1, 1020 Wien</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Process mining allows process analysts to investigate business processes with the help of algorithms and event log data. To better identify and understand ineficiencies in discovered process models, various visualization techniques have been proposed to enhance these models with further information, such as displaying the duration of execution time between activities using sequential color schemes or integrating statistical metrics into the model through textual annotations. However, it remains a challenge for analysts to identify interesting behavioral patterns in directly follows graphs. Consequently, this may lead process analysts to draw incorrect conclusions or be unable to identify the root causes for answering their analytical questions. This paper proposes a novel set of path semantics based on causal knowledge. We further examine how several combined path semantics, referred to as pattern types, may provide analysts with additional information on the underlying behavior. By examining an order-to-cash process in the real world, we demonstrate the usefulness and additional benefits of these path semantics for process analysts.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Process mining</kwd>
        <kwd>visual analytics</kwd>
        <kwd>path semantics</kwd>
        <kwd>causal process knowledge</kwd>
        <kwd>directly follows</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Over the last two decades, a plethora of diferent techniques, methods, and approaches for
visually representing business processes discovered from event-log data has been developed
to support analysts in making better and faster decisions [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, an essential part of
these proposed process representations hardly difers in the semantic meaning of the visual
components. In particular, the semantics of the paths are almost without exception limited to a
single meaning, namely, a directly follows relationship.
      </p>
      <p>
        In this paper, we propose our vision for multi-perspective path semantics. To this end, we
integrate causal process knowledge [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] that allows diferentiating between eight diferent path
semantics. Furthermore, we abstract the individual path semantics into distinguishable pattern
types that are categorized into allowed and prohibited behavior. This allows linking pattern
types directly to generic use cases for process analysis. Thereby, analysts can identify and
discover interesting behavior that indicates problems in visual process representations more
precisely.
      </p>
      <p>
        We contribute to the field of visual analytics for process mining by proposing
multiperspective path semantics based on causal process knowledge. Our approach improves the
precision and speed of the process analysis due to a linkage between the meaning of the paths
and suitable use cases. Previous studies have presented visualization frameworks for process
mining [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] that investigate the efectiveness of diferent ways of representing process mining
outcomes. However, these works often neglect the aspect of path semantics and instead focus
on alternative visual forms of aggregating, clustering, or sorting the process data. We further
contribute to the integration of prior domain-specific knowledge into existing process discovery
techniques [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4, 5, 6, 7</xref>
        ]. We thereby show that prior knowledge can not only help to improve the
structural aspects of the model (e.g., by reducing complexity) but also the visual representation
of its elements, such as paths.
      </p>
      <p>The remainder of the paper is structured as follows. Section 2 presents the theoretical
background focusing on visual analytics, graph types in process mining, with a focus on arc
semantics, and causal process knowledge. Section 3 introduces our vision for multi-perspective
path semantics. Section 4 derives pattern types based on distinct combinations of path semantics
on a process instance level. Section 5 links the pattern types to use cases, thus evaluating our
vision for multi-perspective path semantics based on a real-world order-to-cash process. Section
6 points out implications for future research and limitations. Finally, Section 7 concludes this
paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>In this section, we discuss three distinct areas of research. First, we briefly introduce the topic
of visualization and how it is utilized for analytical purposes. Second, we introduce previous
works on the semantics of arcs in process models. Finally, we define causal process knowledge
and explore its applications in process mining.</p>
      <sec id="sec-2-1">
        <title>2.1. Visualization &amp; visual analytics</title>
        <p>
          Visualization can be seen as the process of converting data into graphical representations [8,
p. 3], enabling the derivation of insights otherwise dificult to discern from raw data sets.
Visual analytics is a multidisciplinary field that employs visualization techniques for graphically
representing knowledge and enhancing analytical reasoning [9, p. 4]. Many visualization
techniques are available to accomplish this objective (cf., [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ]).
        </p>
        <p>
          Visual analytics relies on active interaction between users and data [9, p. 4], making human
judgment a crucial component. Munzner’s nested model [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], a design and validation framework
for visualizations, emphasizes a human-centered approach with a four-layer design process. The
framework takes the domain problem and its intended user as a starting point. This is followed
by translating the problem into a computer science context, designing the visualization, and
ifnally creating its rendering mechanism. McKenna et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] extend the nested model [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]
with the overlapping activities understand, ideate, make, and deploy that further emphasize
the user-centric motivation and their design outcomes for each step in the process. In another
framework, Moere and Purchase [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] define roles with domain-specific needs for visualizations,
which could facilitate the quality of the design solutions when met. These roles comprise the
visualization studies (researchers), with the aim for utility and soundness; the visualization
practice (businesses), with the need for market-oriented solutions; and the visualization exploration
(artists), who strive to create visually appealing yet workable designs [14, pp. 366-368]. Lastly,
Moody [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] developed the Physics of Notations, a theory comprising a set of design
principles to support the creation and validation of cognitively efective visualizations in software
engineering. An example principle is the Principle of Semiotic Clarity that ascribes designers
to ensure a one-to-one relationship between graphical symbols and the semantic construct
they represent [15, pp. 762-763]. Failure to adhere to this principle may result in inefective
visualizations, such as a symbol deficit whenever a semantic is not represented by any symbol or
a symbol redundancy whenever multiple symbols refer to the same semantic [15, pp. 762-763].
        </p>
        <p>
          The process of visualizing the data involves a range of dimensions to consider (cf., [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]).
While we only provide a few examples, one aspect involves using geometrical objects to depict
data, such as glyphs in diferent shapes [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. A well-known depiction of data in statistics is
the boxplot (e.g., [16, pp. 45-46]), in which numerical data is grouped into a single box with
extending lines (whiskers) to indicate, i.a., data variability. In process science, a standard for
visualizing processes is the Business Process Model and Notation (BPMN) standard1, which, i.a.,
uses boxes, rhombuses, and arrows to, respectively, depict activities, gateways (decision points),
and sequence flow between activities. Another aspect to consider is color, or color mapping,
which can be used to map data to certain attributes [8, p.5]. Despite appearing trivial, color
in visualization is a highly complex topic as it is closely linked to human perception through
various channels, such as color properties (e.g., hue and saturation), color combinations, and
geometrical patterns (e.g., [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]). Brewer [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] makes an important contribution that provides
insights and guidelines on color mapping based on data types and human perception, further
demonstrating the topic’s complexity.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Arc semantics in process models</title>
        <p>
          Some of the existing process modeling languages already provide arcs with diferent semantics.
However, the purpose and concepts behind such diferentiation is not the same across languages.
On the other hand, some languages do not distinguish between diferent arc semantics. In
directly-follows graphs [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], for instance, there is only a single type of arc connecting two
activities. Its arc semantics simply considers observed events that follow the path between
the two activities. These arcs can store additional information (e.g., the number of instances
following the arc) or durations of transitions. In BPMN, there are two kinds of arcs, namely,
control flow and message flow . The semantics of the former is that a process instance transitions
        </p>
        <sec id="sec-2-2-1">
          <title>1https://www.bpmn.org (Last accessed: 2023-12-10)</title>
          <p>
            from one activity to another. The semantics of the message flow is that a message from an
external pool (e.g., sent from an external party such as an organization) is received by an activity
or event in another pool or vice versa [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ].
          </p>
          <p>
            To the best of our knowledge, Petri nets have the largest variety of arc semantics. While
the primary purpose of arcs in Petri nets is to represent the movement of the tokens between
places and transitions, the exact semantics may difer. First, there are diferences in terms of
whether and how many tokens are moved. Traditionally, one token moves along the arc when
it is consumed or produced by a transition. However, there are also read arcs [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] requiring
tokens to be present in a place for a connected transition to fire but not consuming or producing
the tokens. There are inhibitor arcs [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ] that, on the contrary, prevent an otherwise enabled
transition to fire if there are tokens in a specified place. Weighted arcs [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ] specify exactly how
many tokens are consumed or produced by a transaction, allowing more than one token to be
moved along an arc. Finally, reset arcs [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ] remove all tokens from respective places when a
transition fires.
          </p>
          <p>
            Furthermore, the type of tokens being moved can also difer. Colored Petri nets [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ] allow
distinguishing between diferent types of objects or object instances by assigning colors to
tokens. For the places, one can then define diferent capacities for tokens of diferent colors.
The firing semantics of the transitions can also depend on the color. Finally, the arcs ultimately
specify the colors of tokens to be consumed or produced.
          </p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Causal process knowledge in process mining</title>
        <p>As a forefather of the philosophy of causation, Hume [25] noted that all knowledge comes from
experience and that it is based on associations between perceived events. Waldmann [26] adopted
this idea in his work on knowledge-based causal induction, indicating causal directionality as
the fundamental factor for determining how statistical correlations are understood. The term
causation can be further diferentiated by Pearl’s [ 27] three-level causal hierarchy highlighting
the role of causal knowledge in helping to associate, intervene, or counterargue.</p>
        <p>
          Regarding causal knowledge concerning business processes, experts with years of acquired
domain-specific experience represent a valuable resource for process improvement. Experience
provides process experts with a precise understanding of causal relationships between individual
activities of business processes. For instance, a process owner of an order-to-cash process might
readily understand that a customer order eventually leads to an invoice being created. Intuitively,
it is clear to the process owner that, oppositely, an invoice followed by the customer order
would contradict the causal logic of the process [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          In the process mining research field, most discovery algorithms do not leverage causal process
knowledge [
          <xref ref-type="bibr" rid="ref2 ref4">2, 4</xref>
          ]. Instead, they consider data as the “single source of truths” to behaviors while
overlooking domain-specific reasons. In an experimental setting, Rembert et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] develop and
test a process discovery algorithm that integrates prior knowledge. The results indicate that
prior knowledge increases the robustness against noise, subsequently reducing the likelihood of
measurement and ordering errors, particularly for processes with a higher degree of infrequent
behavior. Similarly, Diamantini et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] exploit knowledge in complex domains with highly
variable processes as a means to repair event logs and produce more realistic models. Waibel et
al. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] use a causal template that helps process analysts integrate a causal order into discovering
        </p>
        <p>
          Path Conformance behavior type
tchomebipnartiooncsessAllsowterductures withProahibfiteodcus on control-flow. Compared to approaches that do not
iSnkitp-eregverrsae/te doma2in knowledge, th2e approach by [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] generates much simpler models with higher
Backjump
cCoonnforfmoanrcmeance t1,3o the defined cau1s,3ality by reducing the number of self-loops and spurious arcs.
Lu et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]Repfirneompenot se a semi-auRetwoomrkated approach to detecting log patterns in process discovery,
using human r2easoning to eval2uate, modify, and extend pattern types.
        </p>
        <p>31 13
3. Multi(V-arpiatioen)rspectiveCorrection</p>
        <p>Adjustment path semantics
Skip-reverse/ 2 2
IBnacktjuhmpis section, we present our vision of multi-perspective path semantics. To this end, we
dHCyoepnvofothremeltaiconaclpe/ eight13path semantics1 3through visual characteristics related to shape and color. The
semantics dRiefeorrdebrased on wheDthisaerrraythe path indicates desired or undesired behavior, observed or
uShnorotcubt served b1ehavior, and its flo1w direction.</p>
        <p>Hypothetical/
Omitted
3.1. ConfSoimrplificataionnce pathNegligence
m</p>
        <p>(Sloppiness)</p>
        <p>The semantics of the conformance path relates to a combination of desired and
AllowCedonformance behaviorPtryohpieobitbedserved behavior. On the one hand, desired behavior connects to the causal
2 p2rocess knowledge, which the analyst predefines as a working hypothesis. By that,
1,3 1a,3nalysts presuppose, based on their own expertise, that within the very specific
Refinement context, thReewporkrocess is supposed to flow through this particular path. It is implicitly assumed
2 that process2 behavior not flowing through this path is understood as a deviation or at least as
31 an unexpect13ed behavior. On the other hand, the conformance path additionally incorporates the
Adjustment observed bCeorhreactvionior that is recorded in the data source. Hence, the semantics of the conformance
(Variation) path can be considered both an actually observed behavior in the source data and a desired
2 behavior, as2 intended by the analyst.</p>
        <p>Reord13er iflbleedhTihanredrovtwihsDeuihs1a3aevrralaiysdrue.apTlrhiezesaestnitortunactiitsounrtoetoacfoktnehsviesthypeathtfhoerrimumnposrfaeansnsgiuaolrnarroolwyfdawensditirhheadassbnoeolhicdauvgrirvoaaryttuhlriaentse.iscTonhneontienectxetpenldtiicotiotnlya
1 prominent.1
Simplification 3.2. HypNeogligtehnceetical path
(Sloppiness)</p>
        <p>The semantics of the hypothetical path relates to an unobserved yet desired behavior.</p>
        <p>This means that the causal process knowledge allows the process to flow through this
particular path with no record in the data confirming this behavior. If a hypothetical
path occurs, this always implies that there is at least one other path option over
which the process can flow as well. For instance, this can be attributable to the causal process
knowledge allowing for the parallel execution of two activities with a time ofset or a passage
in the process that allows for an arbitrary choice of follow-up options.</p>
        <p>The visual representation takes the form of an arrow with a gray dashed line connected to a
iflled arrowhead with an identical angular course. The visualization is supposed to convey the
indefinite characteristics of a non-conforming behavior.</p>
        <p>Skip-reverse/ 2 2</p>
        <p>Backjump
AllowCedonformaCHnyocpneofotbhrmeethaicnaacvle/iorPtryohpiRebieteodrd13er Dis1a3rray</p>
        <p>12,3 SHOhympoirottttechudettical/ 12,3 1 1
Refinement 3Re.w3o.rk O
2 S2implificatiomnitted pa(NSteloghpligpeinnecses)
13 13 The semantics of the omitted path also relates to unobserved yet desired behavior.
Adjustment Correction As opposed to the hypothetical path, here, the intended sequence flow is considered
(Variation) mandatory, but with no data recorded that confirms its execution. If an omitted
2 2 path occurs, it can be concluded that certain process activities have been skipped
Reord13er Duuis1ann3rrTifilanlyhetdeenv(etiismounpaatlylrl)eypaorrerrostewhnahttaettahioden.oIttradakelesrsootrhfueancfstoiirvnmitaioensfaahnnagsaurblraeorewncowrueivrthseera.seTgdrh.aeyudnafilslhededarlirnoewchoenandecstheodutlod an
g1ive the impression that the path is mandatory, thus its exaggerated appearance.</p>
      </sec>
      <sec id="sec-2-4">
        <title>N3eg.li4ge.nceAllowed shortcut path</title>
        <p>(Sloppiness)</p>
        <p>The semantics of the allowed shortcut path relates to desired and observed behavior.
Therefore, the causal process knowledge indicates that the process is allowed to
skip one or more process activities without following up on them at later points,
and the data recorded indicates that this, in fact, happened. If this path appears in
the model, a hypothetical path can be linked to it because a circuitous route via the activities
skipped, in reality, would also have been possible.</p>
        <p>The visual representation takes the form of an arrow with a solid gray line connected to a
iflled arrowhead. The structural appearance, again, follows an angular course with the intention
to convey expected and desired behavior. However, this path can often be recognized as flowing
in parallel to the direction of other conformance paths.</p>
      </sec>
      <sec id="sec-2-5">
        <title>3.5. Prohibited shortcut path</title>
        <p>The semantics of the prohibited shortcut path relates to undesired yet observed
behavior. In this case, the causal process knowledge explicitly does not allow the
process to jump over a specific activity but is recorded in the data. Here, at least one
omitted path can be linked to the prohibited shortcut path because other activities
not intended to be executed were left out and not followed up on.</p>
        <p>The visual representation takes the form of an arrow with a solid red line connected to a
iflled arrowhead. In this case, as opposed to the allowed shortcut, it has a curvilinear course.
Here, contrast is to be conveyed in relation to the allowed shortcut path, which indicates an
undesirable behavior through the round and less structured-appearing course.</p>
      </sec>
      <sec id="sec-2-6">
        <title>3.6. Allowed backjump path</title>
        <p>The semantics of the allowed backjump path relates to observed and desired behavior.
The causal process knowledge indicates that the process can jump back to already
executed process activities. Once an allowed backjump occurs, there are multiple
follow-up options leading to an increased level of complexity.</p>
        <p>The visual representation takes the form of an arrow with a solid gray line connected to a
iflled arrowhead. Thereby, the path runs in an angular course in the opposite direction of other
conformance paths. Even though backjumps in processes may be negatively conjugated, this
path semantics emphasizes the acceptance to repeat an activity already executed before.</p>
      </sec>
      <sec id="sec-2-7">
        <title>3.7. Prohibited backjump path</title>
        <p>The semantics of the prohibited backjump path relates to observed yet undesired
behavior. In this case, the causal process knowledge restricts the process from not
returning to a previously performed activity despite the recorded data indicating
otherwise. With these paths, a large variety of follow-up options becomes possible,
which usually leads to higher degrees of complexity.</p>
        <p>The visual representation takes the form of an arrow with a solid red line connected to a filled
arrowhead with a curvilinear course. In most cases, this path runs in the opposite direction of
other conformance paths, indicating an undesired behavior.</p>
      </sec>
      <sec id="sec-2-8">
        <title>3.8. Skip-reverse path</title>
        <p>The semantics of the skip-reverse path relates to observed yet undesired behavior,
which inevitably occurs in combination. This means that the recorded behavior
indicates that the process activities were executed in an order that the causal process
knowledge forbids. This triggers at least one path that skips a considered follow-up
activity and at least one reverse path that continues where another activity was left out. However,
even though all intended process activities were executed, the order of activity execution was
incorrect. If this path is shown in the model, an omitted path can always be linked to a pair of
reverse and skipped paths.</p>
        <p>The visual representation takes the form of an arrow with a solid red line connected to a
iflled arrowhead with a curvilinear course. Together with the inseparably connected path to the
follow-up activity and the omitted path between the activities in the original order, the path
semantics intends to create a complex-appearing and slightly chaotic impression that conveys
that something is not going as desired.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Pattern types</title>
      <p>This section briefly demonstrates how the context, meaning various arrangements of diferent
path semantics, may emphasize an underlying behavior that is otherwise hard to distinguish
when examining one single path semantics in isolation. We refer to these path semantics
ensembles as patterns or pattern types on a process instance level. An example of this is the
allowed backjump path, which could denote a wrong-order execution of events if it is proceeded
by a hypothetical path rather than when proceeded by a conformance path.</p>
      <p>We identify eight possible patterns, all listed in Table 1. The patterns are divided into two
categories, allowed and prohibited, whether they include allowed or prohibited path semantics.
Each pattern is given a name for easy recognition of an underlying behavior. We also exemplify
the patterns from the perspective of an order-to-cash process.</p>
      <p>To further enhance understandability, we define a pattern as a sequence of directly follows
relations x1 Ñ 2... Ñ y that is part of a process instance, where 1... are activities of the
Path
combinations</p>
      <p>Allowed Prohibited</p>
      <p>Skip-reverse/ 2 2
cPoamthbinatioPnasth AllowCedonformaBCCnaococnenkfofjbuormmermhapanacvneiocerPtrbyoehphieRbaietvefiidno1er,3 mtyepnet Re1w,3 ork 1,3 2 1,3
cPoamthbcPSinokaaimtpht-ibroeinnvseartsieo/nsAllowCedoAnlATilofnoawn1dr2C,be3moidoclvaneBSCanefkaotoc1ricnepekrvf-omjruitebremmhvaeweapnhernscaceoceBSCvee/okaxofioibmcnpeskrfeP-obcjoruhterriuymmomnvahpetapaRvireeintbsieiocoieotfpee/nirnPndo1se22t,r3oyosmhpsreideib2nbRiettAleereldl,foinwpw1e22,e3amdittethnetr"n1"tydpeenRsoett1(Aw22,hV3idonaajrurgkitsa132tPtrmioreRoenshen)iu1wbt2,3ilotetrdkfrom a u1,n3iquCeo1r32rs2e1e,c3ttioonf pa21t,3h sem2a31,3n1tics. 2Th2e nu m3b1 ers
oAVnBSCH)BSCnfderaloPtkalkayotojfouriitricprcnnpnipwRyosmakko1f31f--e22C,oohtpej3jrtertumuimeherSBCHariBCd1ooewbmm22mm,vev3nkaenayonoeieetotapapicpnicnc)ennpfrcrnrnkokosftsdfe-atkooccjejretruluehere/rm/b/mmmmveeetaapapihrcnnnsaacccelvee/e/iR(ARobVdeerePajofhurtirnrRCiyosaad1113e22h,p32tveo3teRm(ARimi1eoi1rwVbr223,o3rdeeenieaeotrjoPfne)nuricrtnritrdtkPPAsaRCtyod113ei223tothpereoma1lim,oin1ole3r1rwb223,t3oreneSBHCSHOiheothn)ewnkahyoymcridticpopkntpbtiecikoroft-oottijrttdecuoehnhtrudmmeveemte2ttpadiirccnsaabceSBCHSHOlle///kahyoiymicpponnpikCoroft-ottDRjarttecuehh3roBudiRCmmtveees1tRneittSaeopaaRf(Ai3i1rcoc112Vn1rrw1ifi,223s,e,c3damea33rrcnaoenaellojowke//u3/rp1erycrriDjssaldk1m13tioum23tfiteiRC1omiisc11,rom3rnaaeoaeekn312tn1rrwn23),pni3SrroR2(A22taecoVintdmeycerajkoturpi1riosald131BSHCSHOi2223tfntemikaihyoymcoriBcpopnapenikoroft-t3nott)ajrittecuoehhrtudmmcnveeCt1Aekt1tap,Cii3rcco3nj3sdaacueonlle//j/1m1rfu11,,33or(NDspeSrtieCcm/sl1mo1gSao22t3Sp3l2R1rr1i3aihgrpreiomeaeneionno1yc2n222np1,c13errt3tclid1eitso32fe(NDeticsnScrh)ieCuasl1o1gtaoet3iplo21rri32grprnf3aeeii2n2ycnr2et1csHi1,so3etsny)epxoe3t3c11BhD2u2R1ae1,13tie3tcsiio3okac(NDrSjnarieudsl1rl.o1ga3m3/1aep1l2riOgrpyr2a22pei21nmy2n3ecsiest)t1e3d12 21 3 Hy3p12So11121iNtmh3Se3ephgtloilic1ifrg2ait2cecl/aun2Ottcimeonitt1e1d 3
SHOehyomoprCidro1ttt23oteechSHO2u1rdr3erhytmetpoiccirotattttecilho/udenttical/ SimDp1isl1ifaS3ic2riarmasaatDipy3pao1cnilnsim1tfaii3a1c12vrearcqaittitysoiăievneqistuy2ipne(n11tacyqedp(NhiSew3erol)o1geilpl1citdgpht1eisnl(Nny.eSdicessleTio1fsgfeo)pelhirgplx2eeelineonneaccwtseursasr)tcoertdweivltaiswttyiyoimcnteybpion1elstÑÑhsoeditn2ehsnamttoautnescste1ba,1‰etdhdie.ri.fee.tric‰metnleytsfstoaohmlltoohplwads1tssm.rTuephslate1tbtiqeoimăndesifesbptraeemnt2wqtpeshsoeoonltfdhttsaww.tIoof
1 1 3 1 aacst1eivitihtieers a1baacnkdjum2ipnpaapthatÑtern ,, awshhicohrticsuftuprtahtehr Ñassi,ganecdonafloertmtearntoceinpdaitchatÑeits, paahthypsoemthaentitcicasl
imDpilsifaicraratiyon pNaetghligeÑnce , or an omitted path Ñ. A crossed-out arrow Û emphasizes a prohibited path. Note
tion Negligte(hSnclaoetppwineessd)o not diferentiate between designed and executed sequences since the path semantics
1 (Sloppiinmespsl)y it.
2
2
2</p>
      <sec id="sec-3-1">
        <title>4.1. Allowed pattern types</title>
        <p>The allowed pattern types comprise path combinations, which are allowed by design. These
include: refinement , adjustment, reorder, and simplification .</p>
        <p>Refinement is characterized by a backjump path that follows and is followed by two identical
conformance paths leading to the emerging sequence x1 Ñ 2 Ñ 1 Ñ 2y. Since the
same directly follows relations 1 Ñ 2 is executed twice, this pattern indicates a revising
behavior (e.g., when a customer proofreads an order detail before purchase).</p>
        <p>Adjustment is characterized by a conformance path followed by a backjump path, which
sequentially is followed by a shortcut path, leading to the emerging sequence: x1 Ñ 2 Ñ
1 Ñ 3y. Here, only the first activity 1 is executed twice (cf., refinement ), thus indicating a
re-routing of an intended activity sequence (e.g., when a customer cancels a requested credit
card payment and, instead, decides to pay in installments).</p>
        <p>Reorder is characterized by a backjump path that follows a hypothetical path, which
sequentially is followed by a shortcut path leading to the emerging sequence: x1 Ñ 2 Ñ 1 Ñ
3y. This means that the intended activity sequence is executed in reverse (e.g., when an order
foresees a purchase-for-delivery procedure when, in fact, customers purchase items (through
bill) after delivery).</p>
        <p>Simplification is characterized by a shortcut path that skips a sequence of hypothetical paths,
such that the following pattern occurs: x1pÑ ... Ñ , Ñ `1qy. This pattern suggests
redundancies in the process design (e.g., when customers use an autofill function to fill out their
demographic details before purchase).</p>
      </sec>
      <sec id="sec-3-2">
        <title>4.2. Prohibited pattern types</title>
        <p>The prohibited pattern types are analogous to the allowed patterns but contain at least one
prohibited path, thus indicating violations of an intended process design. These include: rework,
correction, disarray, and negligence.</p>
        <p>Rework is the analog to refinement yet with prohibited paths, such that the following pattern
emerges: x1 Ñ 2 Û 1 Ñ 2y. Here, a refining behavior is instead a source of
frustration or an unnecessary emendation (e.g., when a customer has to re-purchase an order
after discovering the purchase of the wrong items).</p>
        <p>Correction is the analog to adjustment yet with prohibited paths, such that the following
pattern emerges: x1 Ñ 2 Û 1 Û 3y. In comparison, whereas an adjustment may
improve a process towards a better outcome, in correction, an avoidable mistake is adjusted to
prevent harm (e.g., when a customer must be contacted after they were able to purchase an
order with a suspended credit card successfully).</p>
        <p>Disarray is the analog to reorder yet with prohibited paths, such that the following pattern
emerges: x1 Ñ 2 Û 1 Û 3y. Here, a rearrangement of (strict) protocol procedure is
executed (e.g., when an order is marked as successful before verification).</p>
        <p>Negligence is the analog to simplification yet with prohibited paths, such that the following
pattern emerges: x1pÑ ... Ñ , Û `1qy. Here, the complete skipping of an intended
activity sequence is considered wrong rather than as an improvement (e.g., when a customer is
warranted a replacement item after a filed complaint without the warranty not being properly
inspected by the company).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Use cases</title>
      <p>Allowed patterns reflect expected behavior and give insights into how well a process is adopted.
Prohibited patterns are more complex. In this section, we focus on prohibited pattern types as
we expect more business value from their analysis. Therefore, we articulate three assumptions
and review the pattern according to four performance dimensions relevant to business processes.
In the second part of this section, we examine what a technical solution can look like and explain
the business impacts that can be derived from a specific process instance of an order-to-cash
process. We then further apply heuristics to improve the process.</p>
      <sec id="sec-4-1">
        <title>5.1. Assumptions</title>
        <p>
          Previous research addresses the speed of technical development and its adoption in business,
which leads to the clear call to action of transferring new developments in real-life use cases [28].
Some concepts are highly adopted in business, such as the Balanced Scorecard with its four
perspectives financial, customer, learning, and growth as well as internal business process [ 29]2.
The latter, namely the internal business process perspective, can be measured by the four
performance dimensions of the devil’s quadrangle, namely, (1) time, (2) cost, (3) quality, and (4)
lfexibility [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. We apply this to emphasize that the improvement of one or multiple perspectives
results in less performance of at least one other perspective [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. For this paper, we review only
the prohibited pattern types of Section 4 and the impact on the four performance dimensions
with three assumptions, knowing that under realistic conditions, there are cases that will not
fulfill them. We use the following assumption:
1. With increasing complexity due to path variants and activity numbers, the average process
instance duration increases
2. Every activity has a cost, mainly labor costs, resulting in a negative financial impact per
executed activity.
3. Every activity adds value and, therefore, enhances the quality of the process outcome,
resulting in better quality the more (planned) activities are performed.
        </p>
        <p>Based on these assumptions, the impact on process performance is summarized in Table 2.
As no impact on flexibility is identified, we do not address this perspective.</p>
        <p>• The rework pattern repeats two events and adds two connections, resulting in a high
negative impact on cost. The quality is benefiting from the rework, as it repairs an error.
• The correction pattern repeats one event and adds one additional connection, resulting in
a medium negative impact on time and costs. The quality is benetfiing as an unexpected
result is prohibited.
• The disarray pattern impacts time and cost under respecting the assumption, but a medium
negative impact on quality as the sequence of events is not followed.
• The negligence pattern is skipping one event and having one connection less, resulting
in a positive efect on costs and time. On the other hand, as an event is skipped, a high
negative efect on quality is expected.
2https://www.bain.com/insights/management-tools-and-trends-2023/ (Last accessed: 2023-12-10)</p>
      </sec>
      <sec id="sec-4-2">
        <title>5.2. Example</title>
        <p>To illustrate the added value of multi-perspective path semantics for business process analysis,
we showcase its application using a real-world example of an order-to-cash process observed at
a German mid-sized company. To visualize this process, we use a tool of Noreja3. This
order-tocash process starts with placing a customer order, which is followed by the preparation and
shipping of digital or physical goods or services and ends with financial processing, including
the posting of an invoice and receiving of cash. This first extract of a process instance in Figure
1 represents the pattern type disarray4. After the event Create Delivery Note (left of Figure 1),
the process continues with Receive Payment, skipping the actually desired follow-up activity
Post Invoice. This leads to an undesired order of the events Post Invoice and Receive Payment
that contradicts the causal process knowledge. Due to the particular semantics of the paths
and their highlighting in red, process analysts can now directly identify this pattern in order to
derive actions. The omitted paths indicate the desired process relations. In this case, the pattern
indicates that the organization takes a financial risk, as matching the payment against the actual
invoice is not secured. In this example, the payment terms for each customer order are highly
diferent and optimized by the sales department in terms of discounts, overdue fines, etc. The
lack of invoice-payment matching, therefore, causes significant problems. When receiving the
payment before the invoice, the potential of overpayment or underpayment is given, resulting
in lower customer satisfaction and more inaccurate financial planning.</p>
        <p>
          Over the last decades, several redesign methodologies have been developed to improve process
performance, including redesign heuristics [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. One of these heuristics is the case-base work
that removes the processing of cases in batches or at specific points in time (e.g., every Monday).
With handling individual cases, the time between two events can be shortened. Applying this
heuristic on the event post invoice can significantly reduce the time from creating the delivery
note to the invoice posting and reduce the risk of receiving payment with an invoice reference.
Applying this heuristic will, under assumption 2, result in additional costs, as the invoice posting
will happen more frequently. Another heuristic that can solve the downside of the case-based
work is the activity automation. Automating the posting of the invoice and executing this event
directly after the creation of the delivery note will reduce the time between these events and
the costs for the posting.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Limitations and future research</title>
      <p>This paper presents multi-path semantics for process mining, pattern types, and possible
applications. This research stream is novel and promising, yet covering it entirely in one study
is infeasible. We acknowledge the limitations of our paper and use them to outline directions
for future research.</p>
      <p>First, we must note the limitations of the scope of our paper. We explicitly exclude so-called
change activities5. In addition, as the primary goal of this paper is to highlight the necessity for</p>
      <sec id="sec-5-1">
        <title>3https://noreja.com (Last accessed: 2023-12-10)</title>
        <p>4The blue symbols of the events themselves are not part of our proposed concept and therefore not explained.
5Change activities cannot be sorted into the causal logic of a process, as they may appear randomly due to unplanned
occurrences. In an order-to-cash process, this takes the form of cancellations or price/quantity changes.
multi-path semantics rather than to provide an exhaustive list, we note that other semantics,
including domain-specific ones, may be defined by future extensions. The same applies to
the patterns presented in this paper. While we identified some critical patterns using the
proposed multi-path semantics, additional patterns might also be observed, especially if new
path semantics are added.</p>
        <p>Second, it must be noted that in this paper, we are only considering possible path semantics
for single cases. However, new challenges will arise as we try to raise the level of abstraction
(e.g., to a variant or even process level). Aggregating cases with paths of diferent semantics
between the same activities or aggregating path patterns is a non-trivial task. For instance, if,
in one case, activities 1 and 2 are connected via a conforming path. In another case, the same
activities are only connected via an omitted path. Then, it remains unclear which semantics
(and which visual representation) should be chosen when aggregating on a process level.</p>
        <p>Third, while we do provide some visual descriptions of the paths with diferent semantics, it
must be noted that these descriptions should be treated as preliminary proposals for visualization
rather than fixed recommendations or guidelines. We explicitly leave the specific visualization
(e.g., a more diferentiated coloring of paths) out of the scope of this paper. We also note that
further visual additions can be made (e.g., additional icons near the arc ends) for improved
visual diferentiation and reduced cognitive load. Ultimately, we highlight that a user evaluation
is required to validate the visualization approach.</p>
        <p>In future work, we plan to tackle the identified limitations. First, empirical research is needed
to evaluate both the relevance of the proposed path semantics in practice as well as the suitability
of various visualization approaches. Second, further path semantics and pattern types can be
obtained using both empirical and explorative studies. Finally, the impact of the observed paths
on flexibility – the fourth dimension of process performance – is yet to be studied.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>7. Conclusion</title>
      <p>In this paper, we envisioned a foundation for multi-perspective path semantics in process
mining. First, we presented eight distinct path semantics that can be derived by integrating
causal process knowledge. Second, we defined pattern types as unique sets of path semantics
on a process instance level to provide additional meaning about underlying behaviors. We
demonstrated the benefits of our approach by exemplifying the semantics in a use-case scenario,
examining various pattern types according to their business values using the devil’s quadrangle.
In addition, we gave some example visualizations from an existing process mining system. Our
work facilitates the interpretability and applicability of process mining outcomes by providing
a more fine-grained view of path semantics. By linking causal process knowledge to visual
elements, we further contribute by extending the graphical capabilities of process models.
In combination, both aspects facilitate the fast and purposeful acquisition of process-related
insights for analysts. In this way, our objective is to inspire future research to challenge the
still prevailing representational bias [30] in process mining, which oftentimes distorts the true
nature of the underlying process.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This work was supported by the Einstein Foundation Berlin [grant number EPP-2019-524, 2022]
and Deutsche Forschungsgemeinschaft [grant number ME 3711/2-1].
[25] D. Hume, An Enquiry Concerning Human Understanding, Hackett Publishing Company,</p>
      <p>Indianapolis, IN, 1977. Original work published 1748.
[26] M. R. Waldmann, Knowledge-based causal induction, in: Psychology of Learning and</p>
      <p>Motivation, volume 34, Elsevier, 1996, pp. 47–88.
[27] J. Pearl, The seven tools of causal inference, with reflections on machine learning, Commun.</p>
      <p>ACM 62 (2019) 54–60. doi:10.1145/3241036.
[28] J. vom Brocke, M. Jans, J. Mendling, H. A. Reijers, Call for papers, Issue 5/2021, Business
&amp; Information Systems Engineering 62 (2020) 185–187.
[29] R. S. Kaplan, D. P. Norton, The Balanced Scorecard: Translating strategy into action,</p>
      <p>Harvard Business School Press, Brighton, MA 02135, 1996.
[30] W. M. P. van der Aalst, J. C. A. M. Buijs, B. F. van Dongen, Towards improving the
representational bias of process mining, in: K. Aberer, E. Damiani, T. S. Dillon (Eds.),
Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA
2011, Campione d’Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers, volume 116 of
Lecture Notes in Business Information Processing, Springer, 2012, pp. 39–54. doi:10.1007/
978-3-642-34044-4\_3.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <source>Process Mining - Data Science in Action, Second Edition</source>
          , Springer,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -49851-4.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Waibel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pfahlsberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Revoredo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <article-title>Causal process mining from relational databases with domain knowledge</article-title>
          ,
          <source>CoRR abs/2202</source>
          .08314 (
          <year>2022</year>
          ). URL: https://arxiv.org/ abs/2202.08314.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yeshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <article-title>A survey of approaches for event sequence analysis and visualization</article-title>
          ,
          <source>Information Systems</source>
          <volume>120</volume>
          (
          <year>2024</year>
          )
          <article-title>102283</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.is.
          <year>2023</year>
          .
          <volume>102283</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Rembert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Omokpo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mazzoleni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Goodwin</surname>
          </string-name>
          ,
          <article-title>Process discovery using prior knowledge</article-title>
          , in: S. Basu,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pautasso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , X. Fu (Eds.),
          <source>Service-Oriented Computing - 11th International Conference, ICSOC 2013</source>
          , Berlin, Germany, December 2-
          <issue>5</issue>
          ,
          <year>2013</year>
          , Proceedings, volume
          <volume>8274</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2013</year>
          , pp.
          <fpage>328</fpage>
          -
          <lpage>342</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -45005-1\_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Diamantini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Genga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Potena</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Building instance graphs for highly variable processes</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>59</volume>
          (
          <year>2016</year>
          )
          <fpage>101</fpage>
          -
          <lpage>118</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suriadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. M. ter Hofstede</surname>
            ,
            <given-names>W. M. P. van der Aalst</given-names>
          </string-name>
          ,
          <article-title>Semi-supervised log pattern detection and exploration using event concurrence and contextual information</article-title>
          ,
          <source>in: OTM Conferences (1)</source>
          , volume
          <volume>10573</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2017</year>
          , pp.
          <fpage>154</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jacobsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <article-title>Process discovery from dependence-complete event logs</article-title>
          ,
          <source>IEEE Trans. Serv. Comput</source>
          .
          <volume>9</volume>
          (
          <year>2016</year>
          )
          <fpage>714</fpage>
          -
          <lpage>727</lpage>
          . doi:
          <volume>10</volume>
          .1109/TSC.
          <year>2015</year>
          .
          <volume>2426181</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. M. Martin</surname>
          </string-name>
          ,
          <fpage>1</fpage>
          - Overview of visualization, in: C. D.
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>C. R.</given-names>
          </string-name>
          <string-name>
            <surname>Johnson</surname>
          </string-name>
          (Eds.),
          <string-name>
            <surname>Visualization</surname>
            <given-names>Handbook</given-names>
          </string-name>
          , Butterworth-Heinemann, Burlington,
          <year>2005</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-012387582-2/
          <fpage>50003</fpage>
          -4.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Thomas</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>A</article-title>
          .
          <string-name>
            <surname>Cook</surname>
          </string-name>
          (Eds.),
          <source>Illuminating the Path: The Research and Development Agenda for Visual Analytics, National Visualization and Analytics Center</source>
          ,
          <year>2005</year>
          . ISBN:
          <fpage>0</fpage>
          -
          <lpage>7695</lpage>
          -2323-4.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M. C. F. de Oliveira</surname>
          </string-name>
          , H. Levkowitz,
          <article-title>From visual data exploration to visual data mining: A survey</article-title>
          ,
          <source>IEEE Trans. Vis. Comput. Graph</source>
          .
          <volume>9</volume>
          (
          <year>2003</year>
          )
          <fpage>378</fpage>
          -
          <lpage>394</lpage>
          . doi:
          <volume>10</volume>
          .1109/TVCG.
          <year>2003</year>
          .
          <volume>1207445</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>W.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <article-title>Visual analytics: A comprehensive overview</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>81555</fpage>
          -
          <lpage>81573</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2923736</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Munzner</surname>
          </string-name>
          ,
          <article-title>A nested model for visualization design and validation</article-title>
          ,
          <source>IEEE Trans. Vis. Comput. Graph</source>
          .
          <volume>15</volume>
          (
          <year>2009</year>
          )
          <fpage>921</fpage>
          -
          <lpage>928</lpage>
          . doi:
          <volume>10</volume>
          .1109/TVCG.
          <year>2009</year>
          .
          <volume>111</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>McKenna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Agutter</surname>
          </string-name>
          , M. D. Meyer,
          <article-title>Design activity framework for visualization design</article-title>
          ,
          <source>IEEE Trans. Vis. Comput. Graph</source>
          .
          <volume>20</volume>
          (
          <year>2014</year>
          )
          <fpage>2191</fpage>
          -
          <lpage>2200</lpage>
          . doi:
          <volume>10</volume>
          .1109/TVCG.
          <year>2014</year>
          .
          <volume>2346331</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Moere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Purchase</surname>
          </string-name>
          ,
          <article-title>On the role of design in information visualization</article-title>
          ,
          <source>Inf. Vis</source>
          .
          <volume>10</volume>
          (
          <year>2011</year>
          )
          <fpage>356</fpage>
          -
          <lpage>371</lpage>
          . doi:
          <volume>10</volume>
          .1177/1473871611415996.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>D</surname>
          </string-name>
          . L. Moody, The “physics
          <article-title>" of notations: Toward a scientific basis for constructing visual notations in software engineering</article-title>
          ,
          <source>IEEE Trans. Software Eng</source>
          .
          <volume>35</volume>
          (
          <year>2009</year>
          )
          <fpage>756</fpage>
          -
          <lpage>779</lpage>
          . doi:
          <volume>10</volume>
          .1109/TSE.
          <year>2009</year>
          .
          <volume>67</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>K.</given-names>
            <surname>Backhaus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Erichson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gensler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Weiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Weiber</surname>
          </string-name>
          ,
          <source>Multivariate Analysis: An Application-Oriented Introduction</source>
          , 1 ed., Springer Gabler Wiesbaden, Wiesbaden,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bartram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Patra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Stone</surname>
          </string-name>
          ,
          <article-title>Afective color in visualization</article-title>
          ,
          <source>in: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</source>
          , Denver, CO, USA, May
          <volume>06</volume>
          -11,
          <year>2017</year>
          , ACM,
          <year>2017</year>
          , pp.
          <fpage>1364</fpage>
          -
          <lpage>1374</lpage>
          . doi:
          <volume>10</volume>
          .1145/3025453.3026041.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>A. Brewer, Chapter 7 - Color use guidelines for mapping and visualization</article-title>
          , in: Modern Cartography Series, volume
          <volume>2</volume>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>1994</year>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>147</lpage>
          . doi:
          <volume>10</volume>
          .1016/ B978-0
          <source>-08-042415-6</source>
          .
          <fpage>50014</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          , Fundamentals of Business Process Management, Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W.</given-names>
            <surname>Vogler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Semenov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yakovlev</surname>
          </string-name>
          ,
          <article-title>Unfolding and finite prefix for nets with read arcs</article-title>
          , in: D.
          <string-name>
            <surname>Sangiorgi</surname>
          </string-name>
          , R. de Simone (Eds.), CONCUR '98:
          <string-name>
            <surname>Concurrency</surname>
            <given-names>Theory</given-names>
          </string-name>
          , 9th International Conference, Nice, France, September 8-
          <issue>11</issue>
          ,
          <year>1998</year>
          , Proceedings, volume
          <volume>1466</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>1998</year>
          , pp.
          <fpage>501</fpage>
          -
          <lpage>516</lpage>
          . doi:
          <volume>10</volume>
          .1007/BFb0055644.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>M. H. T. Hack</surname>
          </string-name>
          ,
          <article-title>Petri net language</article-title>
          ,
          <source>Technical Report, USA</source>
          ,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>W.</given-names>
            <surname>Reisig</surname>
          </string-name>
          ,
          <source>Petri Nets: An Introduction</source>
          , volume
          <volume>4</volume>
          <source>of EATCS Monographs on Theoretical Computer Science</source>
          , Springer,
          <year>1985</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -69968-9.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T.</given-names>
            <surname>Araki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kasami</surname>
          </string-name>
          ,
          <article-title>Some decision problems related to the reachability problem for petri nets</article-title>
          ,
          <source>Theor. Comput. Sci. 3</source>
          (
          <year>1976</year>
          )
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0304</fpage>
          -
          <lpage>3975</lpage>
          (
          <issue>76</issue>
          )
          <fpage>90067</fpage>
          -
          <lpage>0</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>K.</given-names>
            <surname>Jensen</surname>
          </string-name>
          ,
          <article-title>Coloured petri nets and the invariant-method</article-title>
          ,
          <source>Theor. Comput. Sci</source>
          .
          <volume>14</volume>
          (
          <year>1981</year>
          )
          <fpage>317</fpage>
          -
          <lpage>336</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0304</fpage>
          -
          <lpage>3975</lpage>
          (
          <issue>81</issue>
          )
          <fpage>90049</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>