<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Multi-perspective path semantics in process mining based on causal process knowledge</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Lukas</forename><surname>Pfahlsberger</surname></persName>
							<email>lukas.pfahlsberger@hu-berlin.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Humboldt-Universität zu Berlin (HU Berlin)</orgName>
								<address>
									<addrLine>Rudower Chaussee 25</addrLine>
									<postCode>12489</postCode>
									<settlement>Berlin-Adlershof</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Christoffer</forename><surname>Rubensson</surname></persName>
							<email>christoffer.rubensson@hu-berlin.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Humboldt-Universität zu Berlin (HU Berlin)</orgName>
								<address>
									<addrLine>Rudower Chaussee 25</addrLine>
									<postCode>12489</postCode>
									<settlement>Berlin-Adlershof</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Steven</forename><surname>Knoblich</surname></persName>
							<email>steven.knoblich@hu-berlin.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Humboldt-Universität zu Berlin (HU Berlin)</orgName>
								<address>
									<addrLine>Rudower Chaussee 25</addrLine>
									<postCode>12489</postCode>
									<settlement>Berlin-Adlershof</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maxim</forename><surname>Vidgof</surname></persName>
							<email>maxim.vidgof@wu.ac.at</email>
							<affiliation key="aff1">
								<orgName type="department">Wirtschaftsuniversität Wien (WU)</orgName>
								<address>
									<addrLine>Welthandelsplatz 1</addrLine>
									<postCode>1020</postCode>
									<settlement>Wien</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Mendling</surname></persName>
							<email>jan.mendling@hu-berlin.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Humboldt-Universität zu Berlin (HU Berlin)</orgName>
								<address>
									<addrLine>Rudower Chaussee 25</addrLine>
									<postCode>12489</postCode>
									<settlement>Berlin-Adlershof</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Multi-perspective path semantics in process mining based on causal process knowledge</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E5D423886D56D609DD5B904A24AFB340</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process mining, visual analytics, path semantics, causal process knowledge, directly follows J. Mendling) 0000-0002-1367-9441 (L. Pfahlsberger)</term>
					<term>0009-0004-4940-5866 (C. Rubensson)</term>
					<term>0009-0002-8509-7042 (S. Knoblich)</term>
					<term>0000-0003-2394-2247 (M. Vidgof)</term>
					<term>0000-0002-7260-524X (J. Mendling)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Process mining allows process analysts to investigate business processes with the help of algorithms and event log data. To better identify and understand inefficiencies in discovered process models, various visualization techniques have been proposed to enhance these models with further information, such as displaying the duration of execution time between activities using sequential color schemes or integrating statistical metrics into the model through textual annotations. However, it remains a challenge for analysts to identify interesting behavioral patterns in directly follows graphs. Consequently, this may lead process analysts to draw incorrect conclusions or be unable to identify the root causes for answering their analytical questions. This paper proposes a novel set of path semantics based on causal knowledge. We further examine how several combined path semantics, referred to as pattern types, may provide analysts with additional information on the underlying behavior. By examining an order-to-cash process in the real world, we demonstrate the usefulness and additional benefits of these path semantics for process analysts.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Over the last two decades, a plethora of different techniques, methods, and approaches for visually representing business processes discovered from event-log data has been developed to support analysts in making better and faster decisions <ref type="bibr" target="#b0">[1]</ref>. However, an essential part of these proposed process representations hardly differs in the semantic meaning of the visual components. In particular, the semantics of the paths are almost without exception limited to a single meaning, namely, a directly follows relationship.</p><p>In this paper, we propose our vision for multi-perspective path semantics. To this end, we integrate causal process knowledge <ref type="bibr" target="#b1">[2]</ref> that allows differentiating between eight different path semantics. Furthermore, we abstract the individual path semantics into distinguishable pattern types that are categorized into allowed and prohibited behavior. This allows linking pattern types directly to generic use cases for process analysis. Thereby, analysts can identify and discover interesting behavior that indicates problems in visual process representations more precisely.</p><p>We contribute to the field of visual analytics for process mining by proposing multiperspective path semantics based on causal process knowledge. Our approach improves the precision and speed of the process analysis due to a linkage between the meaning of the paths and suitable use cases. Previous studies have presented visualization frameworks for process mining <ref type="bibr" target="#b2">[3]</ref> that investigate the effectiveness of different ways of representing process mining outcomes. However, these works often neglect the aspect of path semantics and instead focus on alternative visual forms of aggregating, clustering, or sorting the process data. We further contribute to the integration of prior domain-specific knowledge into existing process discovery techniques <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>. We thereby show that prior knowledge can not only help to improve the structural aspects of the model (e.g., by reducing complexity) but also the visual representation of its elements, such as paths.</p><p>The remainder of the paper is structured as follows. Section 2 presents the theoretical background focusing on visual analytics, graph types in process mining, with a focus on arc semantics, and causal process knowledge. Section 3 introduces our vision for multi-perspective path semantics. Section 4 derives pattern types based on distinct combinations of path semantics on a process instance level. Section 5 links the pattern types to use cases, thus evaluating our vision for multi-perspective path semantics based on a real-world order-to-cash process. Section 6 points out implications for future research and limitations. Finally, Section 7 concludes this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>In this section, we discuss three distinct areas of research. First, we briefly introduce the topic of visualization and how it is utilized for analytical purposes. Second, we introduce previous works on the semantics of arcs in process models. Finally, we define causal process knowledge and explore its applications in process mining.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Visualization &amp; visual analytics</head><p>Visualization can be seen as the process of converting data into graphical representations <ref type="bibr">[8, p. 3]</ref>, enabling the derivation of insights otherwise difficult to discern from raw data sets. Visual analytics is a multidisciplinary field that employs visualization techniques for graphically representing knowledge and enhancing analytical reasoning <ref type="bibr">[9, p. 4]</ref>. Many visualization techniques are available to accomplish this objective (cf., <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>).</p><p>Visual analytics relies on active interaction between users and data <ref type="bibr">[9, p. 4]</ref>, making human judgment a crucial component. Munzner's nested model <ref type="bibr" target="#b11">[12]</ref>, a design and validation framework for visualizations, emphasizes a human-centered approach with a four-layer design process. The framework takes the domain problem and its intended user as a starting point. This is followed by translating the problem into a computer science context, designing the visualization, and finally creating its rendering mechanism. McKenna et al. <ref type="bibr" target="#b12">[13]</ref> extend the nested model <ref type="bibr" target="#b11">[12]</ref> with the overlapping activities understand, ideate, make, and deploy that further emphasize the user-centric motivation and their design outcomes for each step in the process. In another framework, Moere and Purchase <ref type="bibr" target="#b13">[14]</ref> define roles with domain-specific needs for visualizations, which could facilitate the quality of the design solutions when met. These roles comprise the visualization studies (researchers), with the aim for utility and soundness; the visualization practice (businesses), with the need for market-oriented solutions; and the visualization exploration (artists), who strive to create visually appealing yet workable designs <ref type="bibr">[14, pp. 366-368]</ref>. Lastly, Moody <ref type="bibr" target="#b14">[15]</ref> developed the Physics of Notations, a theory comprising a set of design principles to support the creation and validation of cognitively effective visualizations in software engineering. An example principle is the Principle of Semiotic Clarity that ascribes designers to ensure a one-to-one relationship between graphical symbols and the semantic construct they represent <ref type="bibr">[15, pp. 762-763]</ref>. Failure to adhere to this principle may result in ineffective visualizations, such as a symbol deficit whenever a semantic is not represented by any symbol or a symbol redundancy whenever multiple symbols refer to the same semantic <ref type="bibr">[15, pp. 762-763]</ref>.</p><p>The process of visualizing the data involves a range of dimensions to consider (cf., <ref type="bibr" target="#b14">[15]</ref>). While we only provide a few examples, one aspect involves using geometrical objects to depict data, such as glyphs in different shapes <ref type="bibr" target="#b7">[8]</ref>. A well-known depiction of data in statistics is the boxplot (e.g., <ref type="bibr">[16, pp. 45-46]</ref>), in which numerical data is grouped into a single box with extending lines (whiskers) to indicate, i.a., data variability. In process science, a standard for visualizing processes is the Business Process Model and Notation (BPMN) standard<ref type="foot" target="#foot_0">1</ref> , which, i.a., uses boxes, rhombuses, and arrows to, respectively, depict activities, gateways (decision points), and sequence flow between activities. Another aspect to consider is color, or color mapping, which can be used to map data to certain attributes <ref type="bibr">[8, p.5]</ref>. Despite appearing trivial, color in visualization is a highly complex topic as it is closely linked to human perception through various channels, such as color properties (e.g., hue and saturation), color combinations, and geometrical patterns (e.g., <ref type="bibr" target="#b16">[17]</ref>). Brewer <ref type="bibr" target="#b17">[18]</ref> makes an important contribution that provides insights and guidelines on color mapping based on data types and human perception, further demonstrating the topic's complexity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Arc semantics in process models</head><p>Some of the existing process modeling languages already provide arcs with different semantics. However, the purpose and concepts behind such differentiation is not the same across languages. On the other hand, some languages do not distinguish between different arc semantics. In directly-follows graphs <ref type="bibr" target="#b0">[1]</ref>, for instance, there is only a single type of arc connecting two activities. Its arc semantics simply considers observed events that follow the path between the two activities. These arcs can store additional information (e.g., the number of instances following the arc) or durations of transitions. In BPMN, there are two kinds of arcs, namely, control flow and message flow. The semantics of the former is that a process instance transitions from one activity to another. The semantics of the message flow is that a message from an external pool (e.g., sent from an external party such as an organization) is received by an activity or event in another pool or vice versa <ref type="bibr" target="#b18">[19]</ref>.</p><p>To the best of our knowledge, Petri nets have the largest variety of arc semantics. While the primary purpose of arcs in Petri nets is to represent the movement of the tokens between places and transitions, the exact semantics may differ. First, there are differences in terms of whether and how many tokens are moved. Traditionally, one token moves along the arc when it is consumed or produced by a transition. However, there are also read arcs <ref type="bibr" target="#b19">[20]</ref> requiring tokens to be present in a place for a connected transition to fire but not consuming or producing the tokens. There are inhibitor arcs <ref type="bibr" target="#b20">[21]</ref> that, on the contrary, prevent an otherwise enabled transition to fire if there are tokens in a specified place. Weighted arcs <ref type="bibr" target="#b21">[22]</ref> specify exactly how many tokens are consumed or produced by a transaction, allowing more than one token to be moved along an arc. Finally, reset arcs <ref type="bibr" target="#b22">[23]</ref> remove all tokens from respective places when a transition fires.</p><p>Furthermore, the type of tokens being moved can also differ. Colored Petri nets <ref type="bibr" target="#b23">[24]</ref> allow distinguishing between different types of objects or object instances by assigning colors to tokens. For the places, one can then define different capacities for tokens of different colors. The firing semantics of the transitions can also depend on the color. Finally, the arcs ultimately specify the colors of tokens to be consumed or produced.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Causal process knowledge in process mining</head><p>As a forefather of the philosophy of causation, Hume <ref type="bibr" target="#b24">[25]</ref> noted that all knowledge comes from experience and that it is based on associations between perceived events. Waldmann <ref type="bibr" target="#b25">[26]</ref> adopted this idea in his work on knowledge-based causal induction, indicating causal directionality as the fundamental factor for determining how statistical correlations are understood. The term causation can be further differentiated by Pearl's <ref type="bibr" target="#b26">[27]</ref> three-level causal hierarchy highlighting the role of causal knowledge in helping to associate, intervene, or counterargue.</p><p>Regarding causal knowledge concerning business processes, experts with years of acquired domain-specific experience represent a valuable resource for process improvement. Experience provides process experts with a precise understanding of causal relationships between individual activities of business processes. For instance, a process owner of an order-to-cash process might readily understand that a customer order eventually leads to an invoice being created. Intuitively, it is clear to the process owner that, oppositely, an invoice followed by the customer order would contradict the causal logic of the process <ref type="bibr" target="#b1">[2]</ref>.</p><p>In the process mining research field, most discovery algorithms do not leverage causal process knowledge <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>. Instead, they consider data as the "single source of truths" to behaviors while overlooking domain-specific reasons. In an experimental setting, Rembert et al. <ref type="bibr" target="#b3">[4]</ref> develop and test a process discovery algorithm that integrates prior knowledge. The results indicate that prior knowledge increases the robustness against noise, subsequently reducing the likelihood of measurement and ordering errors, particularly for processes with a higher degree of infrequent behavior. Similarly, Diamantini et al. <ref type="bibr" target="#b4">[5]</ref> exploit knowledge in complex domains with highly variable processes as a means to repair event logs and produce more realistic models. Waibel et al. <ref type="bibr" target="#b1">[2]</ref> use a causal template that helps process analysts integrate a causal order into discovering the process structures with a focus on control-flow. Compared to approaches that do not integrate domain knowledge, the approach by <ref type="bibr" target="#b1">[2]</ref> generates much simpler models with higher conformance to the defined causality by reducing the number of self-loops and spurious arcs. Lu et al. <ref type="bibr" target="#b5">[6]</ref> propose a semi-automated approach to detecting log patterns in process discovery, using human reasoning to evaluate, modify, and extend pattern types.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Multi-perspective path semantics</head><p>In this section, we present our vision of multi-perspective path semantics. To this end, we develop eight path semantics through visual characteristics related to shape and color. The semantics differ based on whether the path indicates desired or undesired behavior, observed or unobserved behavior, and its flow direction. The semantics of the conformance path relates to a combination of desired and observed behavior. On the one hand, desired behavior connects to the causal process knowledge, which the analyst predefines as a working hypothesis. By that, analysts presuppose, based on their own expertise, that within the very specific context, the process is supposed to flow through this particular path. It is implicitly assumed that process behavior not flowing through this path is understood as a deviation or at least as an unexpected behavior. On the other hand, the conformance path additionally incorporates the observed behavior that is recorded in the data source. Hence, the semantics of the conformance path can be considered both an actually observed behavior in the source data and a desired behavior, as intended by the analyst.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Conformance path</head><p>The visual representation takes the form of an arrow with a solid gray line connected to a filled arrowhead. The structure of this path runs angularly and has no curvatures. The intention behind the visualization is to convey the impression of desired behavior that is not explicitly prominent. The semantics of the hypothetical path relates to an unobserved yet desired behavior. This means that the causal process knowledge allows the process to flow through this particular path with no record in the data confirming this behavior. If a hypothetical path occurs, this always implies that there is at least one other path option over which the process can flow as well. For instance, this can be attributable to the causal process knowledge allowing for the parallel execution of two activities with a time offset or a passage in the process that allows for an arbitrary choice of follow-up options.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Hypothetical path</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Refinement</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conformance behavior type</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Rework</head><p>The visual representation takes the form of an arrow with a gray dashed line connected to a filled arrowhead with an identical angular course. The visualization is supposed to convey the indefinite characteristics of a non-conforming behavior.  The semantics of the omitted path also relates to unobserved yet desired behavior.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Omitted path</head><p>As opposed to the hypothetical path, here, the intended sequence flow is considered mandatory, but with no data recorded that confirms its execution. If an omitted path occurs, it can be concluded that certain process activities have been skipped unintentionally or that the order of activities has been reversed.</p><p>The visual representation takes the form of an arrow with a gray dashed line connected to an unfilled (empty) arrowhead. It also runs in an angular course. The unfilled arrowhead should give the impression that the path is mandatory, thus its exaggerated appearance. The semantics of the allowed shortcut path relates to desired and observed behavior. Therefore, the causal process knowledge indicates that the process is allowed to skip one or more process activities without following up on them at later points, and the data recorded indicates that this, in fact, happened. If this path appears in the model, a hypothetical path can be linked to it because a circuitous route via the activities skipped, in reality, would also have been possible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Allowed shortcut path</head><p>The visual representation takes the form of an arrow with a solid gray line connected to a filled arrowhead. The structural appearance, again, follows an angular course with the intention to convey expected and desired behavior. However, this path can often be recognized as flowing in parallel to the direction of other conformance paths. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Prohibited shortcut path</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Prohibited</head><p>The semantics of the prohibited shortcut path relates to undesired yet observed behavior. In this case, the causal process knowledge explicitly does not allow the process to jump over a specific activity but is recorded in the data. Here, at least one omitted path can be linked to the prohibited shortcut path because other activities not intended to be executed were left out and not followed up on.</p><p>The visual representation takes the form of an arrow with a solid red line connected to a filled arrowhead. In this case, as opposed to the allowed shortcut, it has a curvilinear course. Here, contrast is to be conveyed in relation to the allowed shortcut path, which indicates an undesirable behavior through the round and less structured-appearing course. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">Allowed backjump path mance behavior type</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Rework</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Prohibited</head><p>The semantics of the allowed backjump path relates to observed and desired behavior. The causal process knowledge indicates that the process can jump back to already executed process activities. Once an allowed backjump occurs, there are multiple follow-up options leading to an increased level of complexity. The visual representation takes the form of an arrow with a solid gray line connected to a filled arrowhead. Thereby, the path runs in an angular course in the opposite direction of other conformance paths. Even though backjumps in processes may be negatively conjugated, this path semantics emphasizes the acceptance to repeat an activity already executed before.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7.">Prohibited backjump path</head><p>The semantics of the prohibited backjump path relates to observed yet undesired behavior. In this case, the causal process knowledge restricts the process from not returning to a previously performed activity despite the recorded data indicating otherwise. With these paths, a large variety of follow-up options becomes possible, which usually leads to higher degrees of complexity.</p><p>The visual representation takes the form of an arrow with a solid red line connected to a filled arrowhead with a curvilinear course. In most cases, this path runs in the opposite direction of other conformance paths, indicating an undesired behavior.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8.">Skip-reverse path</head><p>The semantics of the skip-reverse path relates to observed yet undesired behavior, which inevitably occurs in combination. This means that the recorded behavior indicates that the process activities were executed in an order that the causal process knowledge forbids. This triggers at least one path that skips a considered follow-up activity and at least one reverse path that continues where another activity was left out. However, even though all intended process activities were executed, the order of activity execution was incorrect. If this path is shown in the model, an omitted path can always be linked to a pair of reverse and skipped paths.</p><p>The visual representation takes the form of an arrow with a solid red line connected to a filled arrowhead with a curvilinear course. Together with the inseparably connected path to the follow-up activity and the omitted path between the activities in the original order, the path semantics intends to create a complex-appearing and slightly chaotic impression that conveys that something is not going as desired.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Pattern types</head><p>This section briefly demonstrates how the context, meaning various arrangements of different path semantics, may emphasize an underlying behavior that is otherwise hard to distinguish when examining one single path semantics in isolation. We refer to these path semantics ensembles as patterns or pattern types on a process instance level. An example of this is the allowed backjump path, which could denote a wrong-order execution of events if it is proceeded by a hypothetical path rather than when proceeded by a conformance path.</p><p>We identify eight possible patterns, all listed in Table <ref type="table">1</ref>. The patterns are divided into two categories, allowed and prohibited, whether they include allowed or prohibited path semantics. Each pattern is given a name for easy recognition of an underlying behavior. We also exemplify the patterns from the perspective of an order-to-cash process.</p><p>To further enhance understandability, we define a pattern as a sequence of directly follows relations x𝑎 1 Ñ 𝑎 2 ... Ñ 𝑎 𝑛 y that is part of a process instance, where 𝑎 1 ...𝑎 𝑛 are activities of the</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>An overview of some possible pattern types that result from a unique set of path semantics. The numbers indicate the execution order, with "1" denoting the first execution. Rework Correction Disarray Negligence same sequence with different activity types so that 𝑎 1 ‰ ... ‰ 𝑎 𝑛 holds. The timestamps of two activities in a directly follows relation 𝑎 1 Ñ 𝑎 2 must be different so that 𝑡p𝑎 1 q ă 𝑡p𝑎 2 q holds. If an activity (type) 𝑎 1 is executed twice in the instance, the timestamps must be different so that 𝑡p𝑎 1 q ă 𝑡p𝑎 1 1 q holds. The arrow symbol Ñ denotes a directly follows relations between two activities 𝑎 1 and 𝑎 2 in a pattern, which is further assigned a letter to indicate its path semantics as either a backjump path Ñ 𝐵 , a shortcut path Ñ 𝑆 , a conformance path Ñ 𝐶 , a hypothetical path Ñ 𝐻 , or an omitted path Ñ 𝑂 . A crossed-out arrow Û emphasizes a prohibited path. Note that we do not differentiate between designed and executed sequences since the path semantics imply it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Path combinations</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Backjump</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Allowed pattern types</head><p>The allowed pattern types comprise path combinations, which are allowed by design. These include: refinement, adjustment, reorder, and simplification.</p><p>Refinement is characterized by a backjump path that follows and is followed by two identical conformance paths leading to the emerging sequence x𝑎 1 Ñ 𝐶 𝑎 2 Ñ 𝐵 𝑎 1 Ñ 𝐶 𝑎 2 y. Since the same directly follows relations 𝑎 1 Ñ 𝐶 𝑎 2 is executed twice, this pattern indicates a revising behavior (e.g., when a customer proofreads an order detail before purchase).</p><p>Adjustment is characterized by a conformance path followed by a backjump path, which sequentially is followed by a shortcut path, leading to the emerging sequence:</p><formula xml:id="formula_0">x𝑎 1 Ñ 𝐶 𝑎 2 Ñ 𝐵 𝑎 1 Ñ 𝑆 𝑎 3 y.</formula><p>Here, only the first activity 𝑎 1 is executed twice (cf., refinement), thus indicating a re-routing of an intended activity sequence (e.g., when a customer cancels a requested credit card payment and, instead, decides to pay in installments).</p><p>Reorder is characterized by a backjump path that follows a hypothetical path, which sequentially is followed by a shortcut path leading to the emerging sequence: x𝑎 1 Ñ 𝐻 𝑎 2 Ñ 𝐵 𝑎 1 Ñ 𝑆 𝑎 3 y. This means that the intended activity sequence is executed in reverse (e.g., when an order foresees a purchase-for-delivery procedure when, in fact, customers purchase items (through bill) after delivery).</p><p>Simplification is characterized by a shortcut path that skips a sequence of hypothetical paths, such that the following pattern occurs: x𝑎 1 pÑ 𝐻 ... Ñ 𝐻 𝑎 𝑛 , Ñ 𝑆 𝑎 𝑛`1 qy. This pattern suggests redundancies in the process design (e.g., when customers use an autofill function to fill out their demographic details before purchase).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Prohibited pattern types</head><p>The prohibited pattern types are analogous to the allowed patterns but contain at least one prohibited path, thus indicating violations of an intended process design. These include: rework, correction, disarray, and negligence.</p><p>Rework is the analog to refinement yet with prohibited paths, such that the following pattern emerges:</p><formula xml:id="formula_1">x𝑎 1 Ñ 𝐶 𝑎 2 Û 𝐵 𝑎 1 Ñ 𝐶 𝑎 2 y.</formula><p>Here, a refining behavior is instead a source of frustration or an unnecessary emendation (e.g., when a customer has to re-purchase an order after discovering the purchase of the wrong items).</p><p>Correction is the analog to adjustment yet with prohibited paths, such that the following pattern emerges: x𝑎 1 Ñ 𝐶 𝑎 2 Û 𝐵 𝑎 1 Û 𝑆 𝑎 3 y. In comparison, whereas an adjustment may improve a process towards a better outcome, in correction, an avoidable mistake is adjusted to prevent harm (e.g., when a customer must be contacted after they were able to purchase an order with a suspended credit card successfully).</p><p>Disarray is the analog to reorder yet with prohibited paths, such that the following pattern emerges:</p><formula xml:id="formula_2">x𝑎 1 Ñ 𝑂 𝑎 2 Û 𝐵 𝑎 1 Û 𝑆 𝑎 3 y.</formula><p>Here, a rearrangement of (strict) protocol procedure is executed (e.g., when an order is marked as successful before verification).</p><p>Negligence is the analog to simplification yet with prohibited paths, such that the following pattern emerges: x𝑎 1 pÑ 𝑂 ... Ñ 𝑂 𝑎 𝑛 , Û 𝑆 𝑎 𝑛`1 qy. Here, the complete skipping of an intended activity sequence is considered wrong rather than as an improvement (e.g., when a customer is warranted a replacement item after a filed complaint without the warranty not being properly inspected by the company).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Use cases</head><p>Allowed patterns reflect expected behavior and give insights into how well a process is adopted. Prohibited patterns are more complex. In this section, we focus on prohibited pattern types as we expect more business value from their analysis. Therefore, we articulate three assumptions and review the pattern according to four performance dimensions relevant to business processes. In the second part of this section, we examine what a technical solution can look like and explain the business impacts that can be derived from a specific process instance of an order-to-cash process. We then further apply heuristics to improve the process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Assumptions</head><p>Previous research addresses the speed of technical development and its adoption in business, which leads to the clear call to action of transferring new developments in real-life use cases <ref type="bibr" target="#b27">[28]</ref>. Some concepts are highly adopted in business, such as the Balanced Scorecard with its four Legend: Ò Ò high positive impact, Ò medium positive impact, l no impact, Ó medium negative impact, Ó Ó high negative impact perspectives financial, customer, learning, and growth as well as internal business process <ref type="bibr" target="#b28">[29]</ref> <ref type="foot" target="#foot_2">2</ref> . The latter, namely the internal business process perspective, can be measured by the four performance dimensions of the devil's quadrangle, namely, (1) time, (2) cost, (3) quality, and (4) flexibility <ref type="bibr" target="#b18">[19]</ref>. We apply this to emphasize that the improvement of one or multiple perspectives results in less performance of at least one other perspective <ref type="bibr" target="#b18">[19]</ref>. For this paper, we review only the prohibited pattern types of Section 4 and the impact on the four performance dimensions with three assumptions, knowing that under realistic conditions, there are cases that will not fulfill them. We use the following assumption:</p><p>1. With increasing complexity due to path variants and activity numbers, the average process instance duration increases 2. Every activity has a cost, mainly labor costs, resulting in a negative financial impact per executed activity. 3. Every activity adds value and, therefore, enhances the quality of the process outcome, resulting in better quality the more (planned) activities are performed.</p><p>Based on these assumptions, the impact on process performance is summarized in Table <ref type="table" target="#tab_0">2</ref>. As no impact on flexibility is identified, we do not address this perspective.</p><p>• The rework pattern repeats two events and adds two connections, resulting in a high negative impact on cost. The quality is benefiting from the rework, as it repairs an error. • The correction pattern repeats one event and adds one additional connection, resulting in a medium negative impact on time and costs. The quality is benefiting as an unexpected result is prohibited. • The disarray pattern impacts time and cost under respecting the assumption, but a medium negative impact on quality as the sequence of events is not followed. • The negligence pattern is skipping one event and having one connection less, resulting in a positive effect on costs and time. On the other hand, as an event is skipped, a high negative effect on quality is expected.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Example</head><p>To illustrate the added value of multi-perspective path semantics for business process analysis, we showcase its application using a real-world example of an order-to-cash process observed at a German mid-sized company. To visualize this process, we use a tool of Noreja<ref type="foot" target="#foot_3">3</ref> . This order-tocash process starts with placing a customer order, which is followed by the preparation and shipping of digital or physical goods or services and ends with financial processing, including the posting of an invoice and receiving of cash. This first extract of a process instance in Figure <ref type="figure" target="#fig_8">1</ref> represents the pattern type disarray <ref type="foot" target="#foot_4">4</ref> . After the event Create Delivery Note (left of Figure <ref type="figure" target="#fig_8">1</ref>), the process continues with Receive Payment, skipping the actually desired follow-up activity Post Invoice. This leads to an undesired order of the events Post Invoice and Receive Payment that contradicts the causal process knowledge. Due to the particular semantics of the paths and their highlighting in red, process analysts can now directly identify this pattern in order to derive actions. The omitted paths indicate the desired process relations. In this case, the pattern indicates that the organization takes a financial risk, as matching the payment against the actual invoice is not secured. In this example, the payment terms for each customer order are highly different and optimized by the sales department in terms of discounts, overdue fines, etc. The lack of invoice-payment matching, therefore, causes significant problems. When receiving the payment before the invoice, the potential of overpayment or underpayment is given, resulting in lower customer satisfaction and more inaccurate financial planning. Over the last decades, several redesign methodologies have been developed to improve process performance, including redesign heuristics <ref type="bibr" target="#b18">[19]</ref>. One of these heuristics is the case-base work that removes the processing of cases in batches or at specific points in time (e.g., every Monday). With handling individual cases, the time between two events can be shortened. Applying this heuristic on the event post invoice can significantly reduce the time from creating the delivery note to the invoice posting and reduce the risk of receiving payment with an invoice reference. Applying this heuristic will, under assumption 2, result in additional costs, as the invoice posting will happen more frequently. Another heuristic that can solve the downside of the case-based work is the activity automation. Automating the posting of the invoice and executing this event directly after the creation of the delivery note will reduce the time between these events and the costs for the posting.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Limitations and future research</head><p>This paper presents multi-path semantics for process mining, pattern types, and possible applications. This research stream is novel and promising, yet covering it entirely in one study is infeasible. We acknowledge the limitations of our paper and use them to outline directions for future research.</p><p>First, we must note the limitations of the scope of our paper. We explicitly exclude so-called change activities <ref type="foot" target="#foot_5">5</ref> . In addition, as the primary goal of this paper is to highlight the necessity for multi-path semantics rather than to provide an exhaustive list, we note that other semantics, including domain-specific ones, may be defined by future extensions. The same applies to the patterns presented in this paper. While we identified some critical patterns using the proposed multi-path semantics, additional patterns might also be observed, especially if new path semantics are added.</p><p>Second, it must be noted that in this paper, we are only considering possible path semantics for single cases. However, new challenges will arise as we try to raise the level of abstraction (e.g., to a variant or even process level). Aggregating cases with paths of different semantics between the same activities or aggregating path patterns is a non-trivial task. For instance, if, in one case, activities 𝑎 1 and 𝑎 2 are connected via a conforming path. In another case, the same activities are only connected via an omitted path. Then, it remains unclear which semantics (and which visual representation) should be chosen when aggregating on a process level.</p><p>Third, while we do provide some visual descriptions of the paths with different semantics, it must be noted that these descriptions should be treated as preliminary proposals for visualization rather than fixed recommendations or guidelines. We explicitly leave the specific visualization (e.g., a more differentiated coloring of paths) out of the scope of this paper. We also note that further visual additions can be made (e.g., additional icons near the arc ends) for improved visual differentiation and reduced cognitive load. Ultimately, we highlight that a user evaluation is required to validate the visualization approach.</p><p>In future work, we plan to tackle the identified limitations. First, empirical research is needed to evaluate both the relevance of the proposed path semantics in practice as well as the suitability of various visualization approaches. Second, further path semantics and pattern types can be obtained using both empirical and explorative studies. Finally, the impact of the observed paths on flexibility -the fourth dimension of process performance -is yet to be studied.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>In this paper, we envisioned a foundation for multi-perspective path semantics in process mining. First, we presented eight distinct path semantics that can be derived by integrating causal process knowledge. Second, we defined pattern types as unique sets of path semantics on a process instance level to provide additional meaning about underlying behaviors. We demonstrated the benefits of our approach by exemplifying the semantics in a use-case scenario, examining various pattern types according to their business values using the devil's quadrangle.</p><p>In addition, we gave some example visualizations from an existing process mining system. Our work facilitates the interpretability and applicability of process mining outcomes by providing a more fine-grained view of path semantics. By linking causal process knowledge to visual elements, we further contribute by extending the graphical capabilities of process models. In combination, both aspects facilitate the fast and purposeful acquisition of process-related insights for analysts. In this way, our objective is to inspire future research to challenge the still prevailing representational bias <ref type="bibr" target="#b29">[30]</ref> in process mining, which oftentimes distorts the true nature of the underlying process.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Reorder</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Correction</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Visual representation of the pattern type disarray in a single process instance of an order-tocash process</figDesc><graphic coords="12,89.29,84.19,416.69,147.22" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2</head><label>2</label><figDesc>Impact of prohibited pattern types on the performance perspectives time, cost, and quality</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>Performance Perspective</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Time</cell><cell>Cost</cell><cell>Quality</cell></row><row><cell></cell><cell>Rework</cell><cell>Ó Ó</cell><cell>Ó Ó</cell><cell>Ò</cell></row><row><cell>Pattern</cell><cell>Correction Disarray</cell><cell>Ó l</cell><cell>l l</cell><cell>Ò Ó</cell></row><row><cell></cell><cell>Negligence</cell><cell>Ò</cell><cell>Ò</cell><cell>Ó Ó</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://www.bpmn.org (Last accessed:</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2023" xml:id="foot_1">-12-10)   </note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">https://www.bain.com/insights/management-tools-and-trends-2023/ (Last accessed: 2023-12-10)</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_3">https://noreja.com (Last accessed: 2023-12-10)</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_4">The blue symbols of the events themselves are not part of our proposed concept and therefore not explained.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_5">Change activities cannot be sorted into the causal logic of a process, as they may appear randomly due to unplanned occurrences. In an order-to-cash process, this takes the form of cancellations or price/quantity changes.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported by the Einstein Foundation Berlin [grant number EPP-2019-524, 2022] and Deutsche Forschungsgemeinschaft [grant number ME 3711/2-1].</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Process Mining -Data Science in Action</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-49851-4</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
	<note>Second Edition</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Causal process mining from relational databases with domain knowledge</title>
		<author>
			<persName><forename type="first">P</forename><surname>Waibel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pfahlsberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Revoredo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<idno>CoRR abs/2202.08314</idno>
		<ptr target="https://arxiv.org/abs/2202.08314" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A survey of approaches for event sequence analysis and visualization</title>
		<author>
			<persName><forename type="first">A</forename><surname>Yeshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.is.2023.102283</idno>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">120</biblScope>
			<biblScope unit="page">102283</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Process discovery using prior knowledge</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Rembert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Omokpo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mazzoleni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Goodwin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-45005-1_23</idno>
	</analytic>
	<monogr>
		<title level="m">Service-Oriented Computing -11th International Conference, ICSOC 2013</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Basu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Pautasso</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Fu</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">December 2-5, 2013. 2013</date>
			<biblScope unit="volume">8274</biblScope>
			<biblScope unit="page" from="328" to="342" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Building instance graphs for highly variable processes</title>
		<author>
			<persName><forename type="first">C</forename><surname>Diamantini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Genga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Potena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="page" from="101" to="118" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Semi-supervised log pattern detection and exploration using event concurrence and contextual information</title>
		<author>
			<persName><forename type="first">X</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fahland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Suriadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Wynn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H M</forename><surname>Ter Hofstede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OTM Conferences</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">10573</biblScope>
			<biblScope unit="page" from="154" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Process discovery from dependence-complete event logs</title>
		<author>
			<persName><forename type="first">W</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jacobsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Ma</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSC.2015.2426181</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Serv. Comput</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="714" to="727" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">1 -Overview of visualization</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">J</forename><surname>Schroeder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Martin</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-012387582-2/50003-4</idno>
	</analytic>
	<monogr>
		<title level="m">Visualization Handbook</title>
				<editor>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Hansen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><forename type="middle">R</forename><surname>Johnson</surname></persName>
		</editor>
		<meeting><address><addrLine>Burlington</addrLine></address></meeting>
		<imprint>
			<publisher>Butterworth-Heinemann</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="3" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Illuminating the Path: The Research and Development Agenda for Visual Analytics</title>
	</analytic>
	<monogr>
		<title level="m">National Visualization and Analytics Center</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Thomas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Cook</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">From visual data exploration to visual data mining: A survey</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C F</forename><surname>De Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Levkowitz</surname></persName>
		</author>
		<idno type="DOI">10.1109/TVCG.2003.1207445</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Vis. Comput. Graph</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="378" to="394" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Visual analytics: A comprehensive overview</title>
		<author>
			<persName><forename type="first">W</forename><surname>Cui</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2019.2923736</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="81555" to="81573" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A nested model for visualization design and validation</title>
		<author>
			<persName><forename type="first">T</forename><surname>Munzner</surname></persName>
		</author>
		<idno type="DOI">10.1109/TVCG.2009.111</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Vis. Comput. Graph</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="921" to="928" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Design activity framework for visualization design</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mckenna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mazur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Agutter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Meyer</surname></persName>
		</author>
		<idno type="DOI">10.1109/TVCG.2014.2346331</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Vis. Comput. Graph</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="2191" to="2200" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On the role of design in information visualization</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Moere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Purchase</surname></persName>
		</author>
		<idno type="DOI">10.1177/1473871611415996</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Vis</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="356" to="371" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The &quot;physics&quot; of notations: Toward a scientific basis for constructing visual notations in software engineering</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Moody</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSE.2009.67</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Software Eng</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="756" to="779" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Backhaus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Erichson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gensler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Weiber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Weiber</surname></persName>
		</author>
		<title level="m">Multivariate Analysis: An Application-Oriented Introduction</title>
				<meeting><address><addrLine>Wiesbaden, Wiesbaden</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Gabler</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note>1 ed</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Affective color in visualization</title>
		<author>
			<persName><forename type="first">L</forename><surname>Bartram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Patra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Stone</surname></persName>
		</author>
		<idno type="DOI">10.1145/3025453.3026041</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</title>
				<meeting>the 2017 CHI Conference on Human Factors in Computing Systems<address><addrLine>Denver, CO, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2017">May 06-11, 2017. 2017</date>
			<biblScope unit="page" from="1364" to="1374" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Chapter 7 -Color use guidelines for mapping and visualization</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Brewer</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-08-042415-6.50014-4</idno>
	</analytic>
	<monogr>
		<title level="j">Modern Cartography Series</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="123" to="147" />
			<date type="published" when="1994">1994</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<title level="m">Fundamentals of Business Process Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Unfolding and finite prefix for nets with read arcs</title>
		<author>
			<persName><forename type="first">W</forename><surname>Vogler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Semenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yakovlev</surname></persName>
		</author>
		<idno type="DOI">10.1007/BFb0055644</idno>
	</analytic>
	<monogr>
		<title level="m">CONCUR &apos;98: Concurrency Theory, 9th International Conference</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">D</forename><surname>Sangiorgi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Simone</surname></persName>
		</editor>
		<meeting><address><addrLine>Nice, France</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">September 8-11, 1998. 1998</date>
			<biblScope unit="volume">1466</biblScope>
			<biblScope unit="page" from="501" to="516" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Petri net language</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H T</forename><surname>Hack</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1976">1976</date>
			<pubPlace>USA</pubPlace>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Petri Nets: An Introduction</title>
		<author>
			<persName><forename type="first">W</forename><surname>Reisig</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-69968-9</idno>
	</analytic>
	<monogr>
		<title level="s">EATCS Monographs on Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<date type="published" when="1985">1985</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Some decision problems related to the reachability problem for petri nets</title>
		<author>
			<persName><forename type="first">T</forename><surname>Araki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kasami</surname></persName>
		</author>
		<idno type="DOI">10.1016/0304-3975(76)90067-0</idno>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="85" to="104" />
			<date type="published" when="1976">1976</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Coloured petri nets and the invariant-method</title>
		<author>
			<persName><forename type="first">K</forename><surname>Jensen</surname></persName>
		</author>
		<idno type="DOI">10.1016/0304-3975(81)90049-9</idno>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="317" to="336" />
			<date type="published" when="1981">1981</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">An Enquiry Concerning Human Understanding</title>
		<author>
			<persName><forename type="first">D</forename><surname>Hume</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1977">1977</date>
			<publisher>Hackett Publishing Company</publisher>
			<pubPlace>Indianapolis, IN</pubPlace>
		</imprint>
	</monogr>
	<note>Original work published 1748</note>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Knowledge-based causal induction</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Waldmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Psychology of Learning and Motivation</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="47" to="88" />
			<date type="published" when="1996">1996</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">The seven tools of causal inference, with reflections on machine learning</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pearl</surname></persName>
		</author>
		<idno type="DOI">10.1145/3241036</idno>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="54" to="60" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Call for papers</title>
		<author>
			<persName><forename type="first">J</forename><surname>Brocke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business &amp; Information Systems Engineering</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="185" to="187" />
			<date type="published" when="2020">2021. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">The Balanced Scorecard: Translating strategy into action</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Kaplan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Norton</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>Harvard Business School Press</publisher>
			<pubPlace>Brighton, MA 02135</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Towards improving the representational bias of process mining</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C A M</forename><surname>Buijs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-34044-4_3</idno>
	</analytic>
	<monogr>
		<title level="m">Data-Driven Process Discovery and Analysis -First International Symposium, SIMPDA 2011</title>
		<title level="s">Lecture Notes in Business Information Processing</title>
		<editor>
			<persName><forename type="first">K</forename><surname>Aberer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Damiani</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><forename type="middle">S</forename><surname>Dillon</surname></persName>
		</editor>
		<meeting><address><addrLine>Campione d&apos;Italia, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011-07-01">June 29 -July 1, 2011. 2012</date>
			<biblScope unit="volume">116</biblScope>
			<biblScope unit="page" from="39" to="54" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
