<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Process Orientation in the Agencia Digital de Andalucia</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Juan Ojeda-Perez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elena Sauci-Sanchez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Juan Francisco Fernandez-Ramos</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Agencia Digital de Andalucía</institution>
          ,
          <addr-line>Sevilla</addr-line>
          ,
          <country>España</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents the process-oriented digital transformation within the Agencia Digital de Andalucía, focusing on the standardization of ITIL-aligned processes and the challenges and dificulties of implementing a centralized ICT management model in a complex public sector environment. Focuses on the deployment management and change enablement processes and presents detailed lessons learned as a valuable contribution. The Andalusian Digital Agency (ADA) is a body of the Andalusian Regional Government. Its digital services are addressed to citizenship and mission focussed on the digitalization of the andalusian society and public administration. The resources managed or influenced by the ADA are extensive and diverse. They include improvements to digital infrastructures, as well as specialized networks such as the Health Emergency Network. ADA manages significant corporate systems for citizen engagement and internal administration, including Junta de Andalucia website with more than 50 millions visits annually, the virtual ofice of the public administration (VEAJA) which registered more than 1.140.000 submmissions in 2023 [1] and the Digitization of many sector-specific services in key areas, reflecting the large volume of technological resources under its scope of action.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Public administration</kwd>
        <kwd>ITIL</kwd>
        <kwd>digital transformation</kwd>
        <kwd>BPMN</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>1.1. The digital transformation</title>
        <p>
          ADA is conducting a meaningful internal digital transformation process [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] that covers many aspects
of the organization and technological management of the Andalusian Regional Government.
        </p>
        <p>These processes integrate information and communication technology competence with the aim of
consolidating a shared vision among its diferent organisms and efectively managing the increasing
demand for digital services. ADA works to make uniform and converge the diferent technological
solutions, as well as the methodologies and functions in use, in order to improve turnaround times,
minimizing costs, time and efort in the implementation of the technological solutions.</p>
        <p>The new organization has migrated from a distributed information technology (IT) model to a
centralized one with the aim of improving services, reducing costs, and unifying technological management.
This shift involves reorganizing resources, redefining access, and transforming the development models
of each ministry into a single, unified system - facing challenges such as increased risk in the event of
failures, staf adaptation, concern of union and political constraints. Centralization can cause service
interruptions and requires balancing eficiency with respect to local particularities. In addition, it
involves integrating complex legacy systems, ensuring cyber-security, managing hidden costs, and
carefully planning to avoid cost overruns and failures. Standardization extends beyond infrastructure;
it demands transforming processes, organizational culture, and legislation, ensuring a clear vision and
objectives, always focused on improving citizen services. Therefore, it is essential to map and redesign
processes, manage exceptions efectively, and secure political support in order to build a more eficient,
agile, and citizen-focused public administration.</p>
        <p>Although IT centralization may aim for uniformity and greater control in Public Administration,
the risks associated with the legal framework, organizational resistance, citizen impact, and technical
complexity are especially significant and require exceptional planning, communication, and change
management to have any real chance of success.</p>
        <p>
          The paper is structured as follows. Section 1 summarizes the digital transformation of ADA and
explains the complexity of changes in the regional government. Section 2 provides details on a key
process, deployment management, following the lifecycle of BPM proposed by Marlon Dumas et al.[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
Section 3 presents the challenges and dificulties encountered in implementing the culture of process in
the organization. Finally, Section 5 sums up the conclusions drawn, limitations, and future work.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. The experience in Tourism, Culture and Sports domains</title>
      <p>The business process management lifecycle emphasizes that managing business processes is not a
one-time project, but a continuous efort aimed at improving organizational performance. This lifecycle
typically consists of six phases:
1. Process identification. This initial phase involves understanding an organization’s business
processes, defining their limits, and identifying key processes that are strategically important or
require improvement.
2. Process discovery. Once identified, processes need to be documented and understood in
detail. This phase involves gathering information on how processes are currently executed and
representing them using process modeling languages.
3. Process analysis. After modeling, processes are analyzed to identify weaknesses, bottleneck,
ineficiencies, and nonvalue-adding activities. This phase can involve both qualitative analysis
(e.g., interviews, workshops, checklists) and quantitative analysis (e.g., simulations, performance
metrics) to understand the root causes of problems.
4. Process redesign. Based on the analysis, new and improved ways of executing processes are
designed. This can involve various redesign techniques, such as eliminating unnecessary steps,
resequencing activities, automating tasks, or changing organizational roles. The goal is to achieve
specific improvement objectives, such as reduced costs, faster cycle times, or better quality.
5. Process implementation. In this phase, the redesigned processes are put into practice. This
can involve changes in information technology systems (for example: implementing a Business
Process Management System-BPMNS, organizational structures, job descriptions, and training
for employees).
6. Process monitoring and control. Once implemented, processes need to be continuously
monitored to ensure that they are performing as expected and to identify new opportunities for
improvement.</p>
      <sec id="sec-2-1">
        <title>2.1. Process Identification</title>
        <p>
          In order to provide guidance for the efective management of information technology services (ITS),
several standards and process models related to Information Technology Service Management (ITSM)
have emerged [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ]. In recent years, organizations have invested heavily in IT and digital transformation
to improve service quality and stakeholder value. Successfully generating value from these initiatives
requires strong IT management, making IT Service Management (ITSM) a key approach to operational
and strategic benefits.[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] . ITIL has been accepted in the industry as the facto standard for ITSM [
          <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
          ].
        </p>
        <p>Focusing on our daily work in the areas of tourism, culture, and sports, we have aligned our processes
with ITIL v4.</p>
        <p>In ITIL v4 there is a main change in the way to structure how to manage services versus previous
versions such as ITIL v3. The main diference is the path from thinking in process to thinking in
practices.A process is a part of a practice, while a practice is a flexible and complete approach
to achive an objective, that may include many processes.From now on both term practice and
process will be used in the same way, although they are diferent. In our context these diferences are
not relevant.</p>
        <p>
          ITIL framework does not suggest an implementation order for their processes. This decision
constitutes the first challenge that an organization must overcome when starting an ITIL implementation[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
Depending on the organization, the maturity level of the processes varies greatly, and we conducted an
evaluation to determine which processes needed to be addressed first.
        </p>
        <p>We center on Deployment management Practice, that is responsible for deploying the deliveries into
production and establishing the efective use of the service in order to deliver value to the customer and
allow the transfer of service operations. It is illustrated in 1. This practice works closely with change
enablement practice,illustrated in ??, because deployments are a controlled way to introduce changes,
and with configuration management, to maintain updated information technology infrastructure.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Process Discovery</title>
        <p>There are three actors in our Deployment management practice:
• Development provider. They create the new version of software that must be deploy
• QA Development Provider. They analyze the code to ensure the quality of the development is
correct and the Quality Assurance Rules are fulfilled
• Project Management Ofice. They analyze the code to ensure the deployment is correct.</p>
        <p>The developer provider registers a delivery request and characterizes the software version and
the parameters that conform the delivery. After that, the quality assurance ofice analyzes the code
according to the quality assurance rules and creates a request for change to deploy the new version. If
the deploymnet is correct, the project management ofice analyzes the deployment to verify the validity
of it.</p>
        <p>The Change enablement practice usually is invoked by other practices or it can be the resulting from
other practice such as Service Catalog Management, Incident management, etc. This practice has been one
of the most challenging to implement, as it requires diferent teams to start adopting a process-oriented
culture and modify their operations to gradually adapt to a new way of working. Ongoing support
and a guide on how to document actions have been necessary to foster a new process-based working
culture. It is now starting to show results, one of the most notable being a reduction in response times
for handling security cyber incidents, which unfortunately occur more often than we would like.</p>
        <p>The operation of Change enablement practice is as follows:
• Development project manager. He or she orchestrates the execution of the request for change.
• Project management ofice. Afterwards, they review the request for change and ask the change
authority to give them the authorization to carry out the change.
• Change Authority : It is a person, a virtual group, an automated workflow, or a CAB-like body,
depending on the situation. It is flexible and adapts to the type, risk, and impact of changes.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Process Analysis</title>
        <p>As we mentioned, the change enablement practice requires that diferent equipments start to adopt
a process oriented culture and change their operation to get used gradually to a new way of work.
Continuous support and a guide on how to document the actions were necessary to promote a new
culture based on processes.</p>
        <p>We need to improve the deployment management practice because the number of development
providers’ deliveries per month were insuficient. It became necessary to identify bottlenecks since this
was causing problems in terms of financial billing and visibility of the work being carried out.After
addressing this process, we needed to have traceability of all changes and improve coordination between
the diferent organizational areas. For this reason, the implementation of the Change enablement practice
was undertaken.</p>
        <p>It is very important to define the figure of a process/practice manager to take responsibility of the
assurance that the process works without problems.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Process redesign</title>
        <p>We conducted iterative monitoring to progressively improve the working relationship with providers.
We needed to ensure that providers fulfill their Service Level Agreements (SLA).</p>
        <p>After many iterations, it was observed that monthly deployment grew and there was a reduction of
response time of development providers.</p>
        <p>Another aspect that we must improve is to introduce the concept of package and unit delivery in
order to better manage when we have a delivery of a complex information system. In Deployment
management practice we have diferent concepts:</p>
        <p>• delivery: Set of configuration elements, new or updated that are tested to deploy jointly in a
production environment.
• unit delivery: Part of the service or infrastructure included in a delivery according to the
operation delivery rules.</p>
        <p>• delivery package : It is a package of delivery units.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Process Implementation</title>
        <p>It is important to note that having a tool that supports the implementation of this process represents a
significant step forward in embedding a process culture within the organization.</p>
        <p>
          Redmine, illustrated in 3, is used for the implementation of the process. Redmine is a web-based
project management information system that includes a complete set of tools to collaborate on projects.
The system allows you to run several projects simultaneously, track their status, manage project steps,
tasks, priorities, and flexibly assign roles to participants [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The processes are projects, and for each
process, we create some track types adapted to the process. In figure 3, we can see diferent track types:
"RFC-Request for Change", "OCS-Ordeo of Software Change" and so on.
        </p>
        <p>However, a diferent tool is already planned for future adoption. Given that process modeling was
conducted using BPMN, the selection of a diferent tool presents only a minor issue, making the
transition seamless.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Process Monitoring</title>
        <p>The service level management practice in ITIL v4 aims to define, negotiate, monitor, and improve server
level agreements to ensure that IT services meet the expectations and needs of the business. We are
getting quantitative temporal metrics using a test tool that monitors SLAs in real time (LCW-SLA),
illustrated in 4</p>
        <p>
          LCW-SLA, illustrated in 4 is a tool for real-time monitoring of SLA based on the Lucid Chain model,
providing a structured approach to describing service chains. LCW-SLA ofers a specialized user
interface, enabling users to eficiently monitor SLA compliance. Supports service chains in diferent
tools: iTop[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] and Redmine, delivering detailed visualizations, advanced filtering options, and insightful
analytics. The tool identifies SLA violations, pinpoints responsible teams, and tracks historical SLA
performance trends. Additionally, LCW-SLA seamlessly integrates via the REST API with various ITSM
tools, allowing for easy configuration and setup.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Challenges and dificulties</title>
      <p>The challenges encountered in process implementation are the following.</p>
      <p>1. Resistance to change: Perhaps employees reject changes, but they afect their routines and
comfort zones. It is necessary to manage this resistance through communication, training, and
active participation. To share knowledge, we have a common place for information and invite
the other departments to change how to produce knowledge. Wikis are another tool for sharing
this knowledge.
2. Dificulty integrating areas: Processes, such as change management, require more
collaboration between diferent departments, which can cause coordination challenges. We guide other
departments on how to use our tool in order to obtain quick wins for all.
3. Lack of metrics and indicators: Without KPIs to measure the efectiveness and eficiency of
processes, it becomes impossible to assess results and justify improvements. We are starting to
get metrics in the processes that we are maturing.
4. Complexity in managing cultural change: Changing habits and mindsets requires a solid and
sustained change management plan over time. That is, from our point of view, the cornerstone of
our work. In change management, we guide other departments on how to model an instance of
the process for some situations in order to learn how to do it in practice in the future.</p>
      <p>The dificulties in standardizing processes stem primarily from the situation that existed before the
unification and consolidation eforts began. The starting situation in which the ADA aims to transform
is the main source of these dificulties. Before eforts to homogenize and standardize, the system
operations of the ADA constituent bodies exhibited the following characteristics, which represent the
challenges to overcome.</p>
      <p>• Each body had its own infrastructure and system architectures, resulting from the need to
integrate, standardize, and consolidate infrastructure and services.
• Each entity had its own unique IT operational processes, stemming from the need for
standardization.
• Unique IT operational processes were present in each organization, highlighting the need for
standardization.
• In-house development standards were used, tailored to specific needs, priorities, and budgets,
arising from the need to create and publish general standards for new developments.
• There was an absence of a standardized service catalog, prompting the action to define and pilot
an initial service catalog and a single one for the workstation.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Related work</title>
      <p>
        LCW-SLA represents an extension of two following papers: The first focuses on the formalization and
modeling of service chains [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], while the second addresses the practical aspects of configuring ITSM
tools for their support and management, particularly with respect to SLA compliance. It is advisable to
cite the article related to the challenges faced by providers when composing digital service chains that
require deep integration of operational information systems across organizations. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. This article
aims to further advance the detailed monitoring of SLAs by incorporating additional validations and
constraints into the model. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
      </p>
      <p>
        The business process compliant ensures that the business processes of an organization are designed
and executed according to the regulations and internal policies that govern the company.[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] presents
a Business Process Compliance Management System, that supports compliance management in several
phases of the BPM lifecycle. STATUS is a mashup-based framework to verify compliance with the
business process, addressing limitations of existing approaches that often focus on specific rules, phases,
or systems. The framework enables flexible rule specification through reusable mashup components,
which support both design-time and run-time compliance verification[16].
      </p>
      <p>Another way to monitor closely the process compliant is through process event logs that record
information about the execution of the activities of a business process. Process mining techniques use
these event logs to discover, analyze, and optimize the business process.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and Future Work</title>
      <p>Implementing processes within an organization involves overcoming significant cultural, organizational,
and technical barriers and tools are key to making it a reality.</p>
      <p>Our future research will implement ITIL practices with BMC Helix migrating our current
implementation. The organization goal is to delete the remaining ITSM tools so that we have only a unique ITSM
Tool.</p>
      <p>Another main line of future work is to apply STATUS in real scenarios related to the General Data
Protection Regulation and NIS 2: Directive of the European Union.</p>
      <p>Another research line is applying process mining techniques to analyze and optimize business
processes, such as grants to citizens, using the results of the ISA Group in [17].</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors declare that generative AI tools, specifically ChatGPT, were used during the preparation of
this paper for language editing and improvement of expression only. The AI was not used to generate
original content, research results, or analysis. All substantive ideas and conclusions are the result of the
authors’ own work.</p>
      <p>The authors have reviewed and verified all content to ensure accuracy and originality and take full
responsibility for the integrity of the manuscript.
[16] Á. Bernal, F. Montero, C. Cabanillas, P. Fernández, M. Resinas, Status: A low-code business process
compliance management system (2024).
[17] M. Salas-Urbano, C. Capitán-Agudo, C. Cabanillas, M. Resinas, Lovizql: a query language for
visualizing and analyzing business processes from event logs, in: International Conference on
Service-Oriented Computing, Springer, 2023, pp. 13–28.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Agencia</given-names>
            <surname>Digital de Andalucía</surname>
          </string-name>
          , Informe de la agencia digital de andalucía,
          <year>2023</year>
          . URL: https://www.juntadeandalucia.es/organismos/ada/estructura/transparencia/ planificacion-evaluacion-estadistica/planes/detalle/553285.html,
          <source>consulted may 29</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ebert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. H. C.</given-names>
            <surname>Duarte</surname>
          </string-name>
          ,
          <article-title>Digital transformation</article-title>
          .,
          <source>IEEE Softw</source>
          .
          <volume>35</volume>
          (
          <year>2018</year>
          )
          <fpage>16</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          , et al.,
          <source>Fundamentals of business process management</source>
          , volume
          <volume>1</volume>
          , Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Gómez</surname>
          </string-name>
          , R. V.
          <string-name>
            <surname>O'Connor</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Meyendriesch</surname>
          </string-name>
          ,
          <article-title>Itsdm: A methodology for it services design</article-title>
          ,
          <source>in: Engineering and Management of Data Centers</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R. V. O</given-names>
            <surname>'Connor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Raisinghani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Gelman</surname>
          </string-name>
          ,
          <article-title>An extensive review of it service design in seven international itsm processes frameworks: Part ii</article-title>
          ,
          <source>International Journal of Information Technologies and Systems Approach</source>
          <volume>8</volume>
          (
          <year>2015</year>
          )
          <fpage>69</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>D. MacLean</surname>
          </string-name>
          , R. Titah,
          <article-title>Implementation and impacts of it service management in the it function</article-title>
          ,
          <source>International Journal of Information Management</source>
          <volume>70</volume>
          (
          <year>2023</year>
          )
          <fpage>102628</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Mesquida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Amengual</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Calvo-Manzano</surname>
          </string-name>
          ,
          <article-title>It service management process improvement based on iso/iec 15504: A systematic review</article-title>
          ,
          <source>Information and Software Technology</source>
          <volume>54</volume>
          (
          <year>2012</year>
          )
          <fpage>239</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Iden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Eikebrokk</surname>
          </string-name>
          ,
          <article-title>Implementing it service management: A systematic literature review</article-title>
          ,
          <source>International journal of information management 33</source>
          (
          <year>2013</year>
          )
          <fpage>512</fpage>
          -
          <lpage>523</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Pollard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cater-Steel</surname>
          </string-name>
          ,
          <article-title>Justifications, strategies, and critical success factors in successful itil implementations in us and australian companies: an exploratory study</article-title>
          ,
          <source>Information systems management 26</source>
          (
          <year>2009</year>
          )
          <fpage>164</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Redmine</surname>
          </string-name>
          , Redmine,
          <year>2025</year>
          . URL: https://www.redmine.org/,
          <source>consulted may 29</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Combodo</surname>
          </string-name>
          , itop,
          <year>2025</year>
          . URL: https://www.itophub.io,
          <source>last accessed: July 6</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ojeda-Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fernández</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ruiz-Cortés</surname>
          </string-name>
          , Hacia un modelo de cadena de servicios, Actas de las XVII Jornadas de Ciencia e Ingeniería de Servicios (JCIS
          <year>2022</year>
          )
          <article-title>(</article-title>
          <year>2022</year>
          ). URL: https://biblioteca. sistedes.es/entities/art%C3%ADculo/
          <fpage>73895357</fpage>
          -d55b-
          <fpage>4186</fpage>
          -8a23-02a2b934e1cc.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Engel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ruiz-Cortes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Megahed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ojeda-Perez</surname>
          </string-name>
          ,
          <article-title>Sla-aware operational eficiency in ai-enabled service chains: challenges ahead</article-title>
          ,
          <source>Information Systems and e-Business Management</source>
          <volume>20</volume>
          (
          <year>2022</year>
          )
          <fpage>199</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Núñez Arenas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ojeda-Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fernández</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ruiz-Cortés</surname>
          </string-name>
          ,
          <article-title>A first aproach to the configuration of itsm tools to support digital service chains</article-title>
          , Actas de las XVIII Jornadas de Ciencia e Ingeniería de Servicios (JCIS
          <year>2023</year>
          )
          <article-title>(</article-title>
          <year>2023</year>
          ). URL: https://biblioteca.sistedes.es/entities/art%C3%ADculo/ df25ceb4-9574
          <string-name>
            <surname>-</surname>
          </string-name>
          473c-b991
          <article-title>-86556766db7b.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cabanillas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Resinas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ruiz-Cortés</surname>
          </string-name>
          ,
          <article-title>A mashup-based framework for business process compliance checking</article-title>
          ,
          <source>IEEE Transactions on Services Computing</source>
          <volume>15</volume>
          (
          <year>2020</year>
          )
          <fpage>1564</fpage>
          -
          <lpage>1577</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>