<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Autonomous Business Process Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Achiya Elyasaf</string-name>
          <email>achiya@bgu.ac.il</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Metzger</string-name>
          <email>andreas.metzger@paluno.uni-due.de</email>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sebastian Sardina</string-name>
          <email>sebastian.sardina@rmit.edu.au</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arik Senderovich</string-name>
          <email>sariks@yorku.ca</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Estefanía Serral Asensio</string-name>
          <email>estefania.serral@kuleuven.be</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Niek Tax</string-name>
          <email>niek@meta.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Autonomous Business Process Systems (ABPS), Self-Modifying Processes, Adaptation, Evolution</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev</institution>
          ,
          <country country="IL">Israel</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Meta</institution>
          ,
          <addr-line>London</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Research Centre for Information Systems Engineering (LIRIS), KU Leuven</institution>
          ,
          <country country="BE">Belgium</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>School of Computing Technologies, RMIT University</institution>
          ,
          <addr-line>Melbourne</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>School of Information Technology, York University</institution>
          ,
          <addr-line>Toronto</addr-line>
          ,
          <country country="CA">Canada</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Autonomous business process systems (ABPS) operate with minimal human intervention while modifying themselves over time. Being 'self-modifying' thereby becomes an intrinsic characteristic that enables a process to become autonomous. In this paper, we define what it means to be self-modifying in autonomous business process systems (ABPS) and outline key characteristics of such capability, including (1) the diferentiation between two types of modifications, namely adaptation and evolution, (2) the levels of granularity in which a modification can be carried out, and (3) the reasons why a possible modification may be triggered. After presenting a motivating example, we characterize the goals for advancing self-modifying capabilities in ABPSs, and identify open research challenges, particularly around governance, uncertainty, and continuous learning. This work aims to structure the problem space of self-modification in ABPSs and provide a conceptual foundation for future research and development.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In an increasingly dynamic and complex digital landscape, business processes (BPs) are expected to
operate with minimal human intervention while modifying their own structure and behavior to meet
changing goals, new environment conditions, or novel constraints [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. We refer to such systems as
autonomous business process systems (ABPSs). An core capability of ABPSs is self-modification.
      </p>
      <p>The notion of ABPSs was elaborated during the 2025 AutoBiz Dagstuhl seminar.1 The main goal
of this seminar was to compile a research agenda toward the realization of ABPSs. Jointly with the
seminar participants, we discussed and developed core concepts, challenges, and research directions.
Specifically, after a series of stimulating talks by experts, participants split into working groups to further
discuss individual topics of the research agenda, including “framed autonomy”, “self-modification”,
“conversational actionability”, and “explainability”. The results of these breakout-groups were presented
to all seminar participants, and their feedback was used to improve the findings. This paper reports on
key findings concerning the topic of “self-modification”.
(N. Tax)
LGOBE https://achiya.elyasaf.net/ (A.</p>
      <p>Elyasaf); https://www.paluno.uni-due.de/en/team/andreas-metzger/ (A. Metzger);
https://ssardina.github.io/ (S. Sardina); https://www.ariksenderovich.com/ (A. Senderovich);</p>
      <p>CEUR</p>
      <p>ceur-ws.org</p>
      <p>
        Fundamentally, self-modifications in ABPSs may be classified into [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]:
• Adaptation, which refers to short-term, instance-specific modifications that allow the system to
handle unforeseen conditions typically without altering the underlying process schema. These
modifications are often triggered in real-time and involve localized decisions. The goal is to ensure
continuity and resilience without impacting the design of future process instances. Examples
for adaptations include altering the running workflow (such as rerouting, skipping tasks, or
requesting human intervention), reallocating resources, and integrating new data sources or
services at runtime for a specific (set of) process instance(s).
• Evolution, which represents a long-term modification of the process logic and/or model itself that
therefore afects all future instances of the process. These modifications are typically informed
by patterns observed over time, whether through repeated failures, performance bottlenecks,
or shifts in business strategy. Evolution is deliberate and designed to improve future process
executions, often requiring model redesign, policy updates, or system reconfiguration. Examples
for evolution include revising and redesigning the decision logic and underlying BP models.
      </p>
      <p>
        Without self-adaptation and self-evolution capabilities, ABPSs risk stagnation, brittleness, and
reduced responsiveness in volatile environments. These limitations can compromise process autonomy.
Therefore, understanding and engineering self-modifying capabilities is essential for advancing the
design, implementation, and governance of ABPSs. The need for BPM systems to be flexible and modify
themselves in response to changes has long been recognized in the BPM community [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">3, 2, 4</xref>
        ]. Various
works study the adaptation [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5, 6, 7, 8, 9, 10</xref>
        ], and evolution of BPs [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
        ].
      </p>
      <p>The contributions of this paper are conceptual and are as follows:
• We define the notion of self-modification in autonomous business process systems (ABPSs),
distinguishing between two key types: adaptation and evolution.
• We identify and organize the core dimensions, goals, and triggers of self-modification, thereby
structuring the problem space.
• We outline key research challenges – particularly around governance, uncertainty, and continuous
learning – that must be addressed to advance self-modifying ABPSs.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Running Example: Automated Warehouse</title>
      <p>To ground our exploration of self-modifying ABPSs, we begin with a running example inspired by
real-world operations at a large company’s automated warehouses. These warehouses deploy fleets of
robots to retrieve and transport shelves (pods) to human pickers, coordinating complex logistics across
a dynamic, high-throughput environment.</p>
      <p>Suppose a robot malfunctions during the Christmas holiday season, one of the busiest times of the
year. Nearby robots quickly reroute their paths to avoid the blocked aisle, and the pending order
is reassigned to a functioning robot. Human workers on the floor receive updated instructions via
handheld devices, ensuring minimal disruption to order fulfillment. This represents a short-term,
operational-level modification (i.e., an adaptation) that addresses the immediate issue without altering
the overall process model.</p>
      <p>However, the system does not stop there. It logs the failure event and flags it for review. Upon
inspection, engineers discover a pattern: similar failures tend to occur after approximately 1,000 picks.
In response, a new maintenance rule is introduced, mandating preemptive inspection after every 900
operations. This is a tactical, mid-term modification (i.e., an evolution) – a refinement of the rules and
policies guiding robot operations, aimed at reducing future risk.</p>
      <p>This illustrates a spectrum of ABPS modifications – ranging from instance-specific adaptations to
model-level evolution afecting all future instances – captured and enacted with varying degrees of
automation.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Types of Modifications in ABPs</title>
      <p>
        Modifications in ABPSs can be classified along several dimensions:
D1: Adaptation vs. Evolution. We introduced this central dimension already in Section 1, referring
to adaptations as short-term, instance-specific modifications, and evolution as the long-term,
multiinstance modification of the process logic and/or model itself [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The concept of adaptation in ABPSs strongly connects to work of the software engineering community
on self-adaptive software systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Here, the MAPE-K loop has established itself as a widely adopted
conceptual model [
        <xref ref-type="bibr" rid="ref16">16, 17</xref>
        ]. This model is depicted in Fig. 1.
      </p>
      <p>
        The self-adaptation logic is structured into four main conceptual activities (MAPE) that leverage a
common knowledge base (K). The knowledge base includes adaptation goals (requirements), adaptation
strategies, or adaptation rules. The four activities are concerned with monitoring the system and
the system’s environment via sensors, analyzing the monitoring data to determine the need for an
adaptation, planning adaptation actions, and executing these adaptation actions via actuators, thereby
modifying the system at run time [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        The concept of evolution in ABPSs, in contrast, focuses on systematic, long-term modifications that
afect the process model and logic across multiple future instances. It is closely related to work on
software and process evolution [
        <xref ref-type="bibr" rid="ref14">18, 14</xref>
        ]. Rather than responding to immediate runtime conditions,
evolution is driven by aggregated insights from monitoring and analysis over time – such as recurring
performance issues, changes in strategic direction, or compliance updates. These insights are used to
deliberately revise the process design, typically through a structured approach involving assessment
of existing process outcomes, planning of structural or behavioral improvements, implementation
of these changes in the model, and validation to ensure conformance with long-term goals. While
adaptation enables resilience and responsiveness, evolution ensures strategic alignment, sustainability,
and long-term optimization of ABPSs.
      </p>
      <p>
        D2: Task vs. Flow vs. Process. Another critical dimension concerns what is modified . Drawing
from the business process redesign literature [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], we distinguish between:
• Task-level modifications , which modify how individual tasks are performed or configured (e.g.,
modifying a task’s duration, logic, input/output data, or resource assignment).
• Control Flow-level modifications , which adjust the control flow or routing of tasks (e.g.,
rerouting orders or skipping tasks).
• Process-level modifications , which alter the structure or central resources of the entire process
(e.g., introducing new roles, shifting coordination logic, or replacing subsystems).
      </p>
      <p>Note that these levels often interact. For instance, rerouting in the warehouse involves flow-level
change, while a new rule for reassigning malfunctioning robots might afect task performance, and
revising the robot maintenance schedule constitutes a process-level change.</p>
      <p>This dimension provides additional granularity for analyzing the scope and impact of a modification.
It also afects the complexity of implementation: task-level changes can often be handled locally, while
process-level changes typically require coordination and propagation across components.
D3: Reactive vs. Proactive. Another important distinction concerns the trigger of the modification.
Reactive modifications occur in response to specific events or failures, such as a robot malfunction
triggering rerouting. Proactive modifications, on the other hand, are initiated based on forecasts or
insights derived from predictive analytics. Examples include predictive and prescriptive business process
monitoring [19, 20]; e.g., scheduling preventive maintenance based on predicted failure likelihood or
preventing robots from entering certain aisles at load times.</p>
      <p>D4: Human-Driven vs. Autonomous. Modifictions may be either 1) human-driven, where users
detect, decide, and implement modifications; or 2) autonomous, where the system identifies issues and
enacts modifications on its own. In our running example, the creation of the new maintenance rule
might be initially human-driven, but an autonomous ABPS could eventually learn such patterns and
implement similar modifications independently.</p>
      <p>D5: Planned vs. Emergent. Planned modifications stem from deliberate, top-down redesign, such
as rolling out a new maintenance policy across sites. Emergent modifications arise bottom-up, realized
as patterns learned from ongoing process adaptations (e.g., see [19]) or eventual model evolutions. An
ABPS that generalizes from local failure logs to propose global improvements exemplifies this emergent
capability.</p>
      <p>Characterizing the running example according to the described dimensions. All the key dimensions
of modifications play out in the warehouse scenario. When robots reroute around a malfunctioning
unit, the system performs a short-term, instance-level adjustment – an adaptation. No process model
is modified; the system reacts in real time to maintain flow. By contrast, introducing a maintenance
rule after repeated failures illustrates evolution – a deliberate, model-level change based on aggregated
insights.</p>
      <p>Rerouting is reactive when triggered by a specific event. However, it can also be proactive if it is
triggered in advanced using predictive monitoring: it anticipates issues and acts in advance. Both forms
of change can coexist, occurring within the same process window.</p>
      <p>Initially, engineers manually define the maintenance policy – making it human-driven and planned.
But an advanced ABPS could learn the same pattern, propose the rule, and apply it autonomously. If the
rule itself later evolves based on outcomes through, e.g., reinforcement learning, the change becomes
emergent – bottom-up and data-driven.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Toward Self-modifying ABPSs</title>
      <p>Today’s business process systems typically operate at an augmented level of autonomy, where intelligent
components assist human workers but do not independently drive process execution or change. To
move toward truly autonomous business process systems (ABPSs), we propose a structured roadmap of
autonomy levels, inspired by the SAE J3016 standard for driving automation [21]. While Sheridan’s
Levels of Automation [22] ofers an alternative, they focus on isolated task automation rather than
holistic process-level behavior, making them less suitable for ABPSs.</p>
      <p>We define autonomy levels as follows:
• Level 0: No Automation – Execution and orchestration of all tasks are fully manual.
• Level 1: Process Assistance – The system provides recommendations or highlights anomalies
to human workers (e.g., predictive monitoring [23]).
1. Detect changes in the operating environment (e.g., concept drift detection [25, 26, 27]).
2. Decide whether the detected changes require adaptation or evolution.
3. Select an appropriate modification strategy based on goals, context, and system history.
4. Learn from prior adaptations and generalize from successful strategies.
5. Communicate and explain its decisions, rationale, and uncertainty to human stakeholders.</p>
      <p>The extent and nature of these capabilities depend on the object of modification (task, flow, or
process) as presented in Table 4. For instance, at Level 1, task-level modifications might involve
recommending better parameter configurations; at Level 3, the system may autonomously reassign or
skip tasks. Similarly, flow-level autonomy ranges from highlighting bottlenecks (Level 1) to real-time
rerouting (Level 3), while process-level autonomy progresses from alerting on coordination issues to
full reconfiguration of goals, roles, or policies.</p>
      <p>For example, in a warehouse scenario, task-level changes may involve altering how picking or
navigation tasks are performed; flow-level changes may include rerouting due to blocked paths; and
process-level autonomy could entail adjusting global maintenance policies. Thus, progressing
toward Level 3 autonomy requires integrating sensing, reasoning, learning, and communication across
abstraction levels, while minimizing reliance on human oversight.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Challenges in Enabling Autonomous Modifications</title>
      <p>In this section, we discuss three challenges related to governance and human oversight, continual
learning for adaptation management, and uncertainty quantification and communication.</p>
      <sec id="sec-5-1">
        <title>Challenge 1: Governance, Oversight, and Human Interaction. For ABPSs to operate safely and</title>
        <p>efectively, governance and human interaction must be built into their design. A key question is when
to refrain from automation and return control to a human process worker, e.g., in scenarios where the
agent has insuficient confidence and is at risk of making mistakes. This is particularly relevant in
ambiguous or high-risk situations. Research in AI planning, runtime monitoring may help establish
thresholds or confidence bounds beyond which a process must escalate to human decision-makers.
Techniques from the ML literature on prediction with reject option [28] (sometimes called “learning to
defer”) may also be explored as a solution direction.</p>
        <p>Similarly, determining when and how a user should validate a proposed process or policy modification
requires a framework for explainable adaptation, where the system presents justifications for its
modifications. Solution directions may include methods from the field of explainable AI (XAI) [ 29], or
justifications may be provided in alternative forms such as simulations of expected outcomes.</p>
        <p>Another major issue is aligning the goals of an ABPs with those of its human operators and
organizational stakeholders. Multi-objective optimization techniques [30] can assist in balancing trade-ofs
between performance, cost, compliance, and user satisfaction while maintaining logical constraints
defined in the process model. However, optimizing across conflicting objectives remains a hard problem,
especially when human values or non-quantifiable criteria are involved.</p>
        <p>Quality assurance in fully autonomous scenarios introduces its own challenges. Without humans
routinely checking outcomes, ABPSs must develop internal mechanisms for evaluating whether an
adaptation “worked.” Here, ML-based anomaly detection, performance baselining, and causal reasoning
can help detect regressions or misbehavior. Formal methods for verification and validation of modifying
process logic or agent policies also present a relevant research direction here. LLMs could also be used
for generating justifications or summaries of decisions for human audits or by providing labels for
downstream evaluation – an emerging area sometimes called LLM-as-a-judge [31].</p>
        <p>Solutions to the quality assurance problem could use human input purely for evaluation and quality
assurance, even in scenarios where the execution is fully automated. Human input is costly, and hence
a challenge is to make this cost-eficient. E.g., through methods like active testing [ 32].</p>
        <p>Finally, understanding what data is needed to make ABPSs reliable is a key frontier – systems must
know whether they have “enough” context to act or whether to defer or collect more information.</p>
        <p>Core Research Questions:
• When should control shift between autonomous processes and humans in ABPSs?
• How can user validation be incorporated into real-time adaptation without bottle-necking
autonomy of ABPSs?
• How can ABPSs optimize multiple objectives while remaining within formal and ethical
constraints?
• How can ABPSs evaluate the success or failure of modifications when human validation is
unavailable?
• What are the data quality and coverage thresholds for safe, autonomous decision-making in</p>
        <p>ABPSs?</p>
      </sec>
      <sec id="sec-5-2">
        <title>Challenge 2: Continuous Learning and Adaptation Management. A defining feature of self</title>
        <p>
          modifying ABPSs is their ability to learn from experience and improve process behavior over time.
To support this, the system must continuously record the adaptations it makes – whether reactive or
proactive – and assess their impact both locally (per instance) and globally (across instances). Capturing
this meta-knowledge creates a feedback loop where successful modifications reinforce future decisions
and inefective ones are pruned. AI planning and reinforcement learning techniques (while balancing
exploration and exploitation; e.g., see [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]) are promising approaches to structuring such learning loops,
especially when enriched by causal modeling of intervention outcomes.
        </p>
        <p>Evaluating generalization in system behavior poses a second challenge. It is not enough for an
adaptation to work well in one instance; the ABPSs must infer under what conditions it will work again.
This raises questions around how process context is encoded and how confidence in the modification is
calibrated. For instance, if a task is repeatedly skipped under certain workload conditions, the system
may learn a policy for skipping it when similar signals appear – but must be careful not to overgeneralize.
Formal guarantees and empirical validation frameworks are needed to ensure safe generalization. This
problem intersects with interpretability and trust, as human stakeholders may require explanations for
the shifts in system behavior.</p>
        <p>Finally, long-running processes or high-volume ABPSs face constraints of bounded memory and
context. The system cannot retain or process each event ever observed. Hence, it must learn to construct
and maintain bounded knowledge representations: compressed summaries, predictive state abstractions,
or fixed-size windows of relevant execution history. Techniques from stream reasoning, process mining
over sliding windows, and transformer-based sequence models may ofer solutions. Designing an
ABPS that knows which parts of its history to remember, forget, or query becomes a core challenge for
sustainable, real-time continuous learning.</p>
        <p>Core Research Questions:
• How can ABPSs continuously record adaptations and assess their efectiveness over time?
• What metrics and techniques enable an ABPS to safely generalize learned behavior across varying
contexts?
• How can an ABPs maintain bounded knowledge representations for long-running or
highfrequency processes?
Challenge 3: Modeling and Measuring Uncertainty. ABPSs must operate under both aleatoric
(inherent randomness) and epistemic (lack of knowledge) uncertainty [33]. Addressing these
uncertaingties requires both awareness and expressiveness. Aleatoric uncertainty can be modeled through
probabilistic distributions over process durations, outcomes, or resources. Epistemic uncertainty,
however, often requires exploration or targeted sensing to reduce ambiguity. Knowing which type of
uncertainty is present afects which mitigation strategies are appropriate – whether to gather more data
or to hedge decisions probabilistically. Techniques from probabilistic modeling, Bayesian inference,
and fuzzy logic are key for representing and reasoning about uncertainty in process execution.</p>
        <p>
          Quantifying uncertainty involves both qualitative and quantitative measures. In some domains,
thresholds or confidence levels may be set by human experts (qualitative), while in others, Bayesian
models or statistical metrics (quantitative) provide actionable measures. As an example, reliability
estimates for proactive adaptation may be derived from ensembles of prediction models [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. ABPSs
must combine these forms of knowledge, learning from past executions when quantitative models are
feasible, while falling back on qualitative heuristics when data is sparse or ambiguous. Hybrid methods
that integrate fuzzy logic or ensemble learning could further improve uncertainty modeling in domains
with imprecise information.
        </p>
        <p>Quantifying uncertainty strongly connects to both challenges 1 and 2. For challenge 1, deciding
when to defer the decision-making back to a human operator is a classic task where most solutions
involve uncertainty quantification [ 28]. Regarding challenge 2, it is well known from the literature
on uncertainty quantification and active learning that accurate estimates of specifically the epistemic
uncertainty are a prerequisite to learn and adapt policies to new environments in a data-eficient
way [33, 34, 35].</p>
        <p>A final challenge is communicating uncertainty efectively to human stakeholders. Especially in
semi-autonomous systems, operators must understand not only what the system plans to do, but also
how confident it is in that choice. As pointed out by Miller “probabilities probably don’t matter” [ 36].
This means uncertainty quantification should be augmented with explainable AI (XAI) techniques
(e.g., [37]). Visualized confidence intervals, and natural language generation via LLMs may help bridge
this gap (e.g., as done for adaptive software systems [ 38]). Additionally, representing the impact of
uncertainty on downstream outcomes – such as potential delays, risks, or degraded service quality –
will help human decision-makers intervene appropriately.</p>
        <p>Core Research Questions:</p>
        <p>• How can ABPs diferentiate between epistemic and aleatoric uncertainty during execution?
Challenges and object of modification. Like in Section 3, extent and relevance of the
aforementioned challenges depend on the object of modification (task, flow, or process), which is presented in
Table 5.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion and Outlook</title>
      <p>In this paper, we have laid the conceptual groundwork for understanding and engineering self-modifying
capabilities in autonomous business process systems (ABPSs). We defined what it means for an ABPS
to self-modify, distinguishing between the short-term reactivity of adaptation and the long-term
reconfiguration of evolution, and introduced a structured framework for levels of business process
autonomy. We further mapped these autonomy levels across the diferent objects of modification – task,
lfow, and process – and connected them to system goals and capabilities.</p>
      <p>As ABPSs strive toward higher levels of autonomy, we identified three core research challenges
that must be addressed to enable safe, intelligent, and human-aware self-modification: (1) establishing
robust governance mechanisms and human oversight; (2) managing continuous learning to support
sustainable and generalizable adaptations; and (3) modeling and communicating uncertainty in ways
that foster trust and informed decision-making.</p>
      <p>Together, these challenges highlight a critical insight: autonomy is not simply about replacing
humans but about redesigning systems that can responsibly decide when to act, when to adapt, and
when to defer. The path forward requires integrating techniques from AI planning, machine learning,
explainable AI, adaptive software systems, causal inference, process mining, and human-computer
interaction into coherent architectures that balance autonomy with accountability.</p>
      <p>We envision ABPSs of the future not as black-box automation engines but as collaborative agents
capable of engaging with their environments and human counterparts in a transparent, contextual, and
goal-aligned manner. To that end, we encourage the community to build benchmarks, share evaluation
frameworks, and develop modular toolkits that bring us closer to truly self-modifying, trustworthy, and
adaptive business processes.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used OpenAI Deep Research and Google Gemini to:
Complement our manual literature analysis of related work, Grammar and spelling check, Paraphrase
and reword, Improve writing style. After using these tools, the authors reviewed and edited the content
as needed and take full responsibility for the publication’s content.
M. Shaw, Engineering self-adaptive systems through feedback loops, in: Software engineering for
self-adaptive systems, Springer, 2009, pp. 48–70.
[17] A. Computing, et al., An architectural blueprint for autonomic computing, IBM White Paper 31
(2006) 1–6.
[18] M. M. Lehman, J. F. Ramil, P. D. Wernick, D. E. Perry, W. M. Turski, Metrics and laws of software
evolution – the nineties view, in: Proceedings of the Fourth International Software Metrics
Symposium (METRICS ’97), IEEE Computer Society, 1997, pp. 20–32. URL: https://doi.org/10.1109/
METRIC.1997.637156. doi:10.1109/METRIC.1997.637156.
[19] A. Metzger, T. Kley, A. Rothweiler, K. Pohl, Automatically reconciling the trade-of between
prediction accuracy and earliness in prescriptive business process monitoring, Inf. Syst. 118 (2023)
102254. URL: https://doi.org/10.1016/j.is.2023.102254. doi:10.1016/J.IS.2023.102254.
[20] Z. D. Bozorgi, I. Teinemaa, M. Dumas, M. L. Rosa, A. Polyvyanyy, Prescriptive process monitoring
based on causal efect estimation, Inf. Syst. 116 (2023) 102198. URL: https://doi.org/10.1016/j.is.
2023.102198. doi:10.1016/J.IS.2023.102198.
[21] SAE International, Taxonomy and Definitions for Driving Automation Systems for On-Road Motor</p>
      <p>Vehicles, SAE Recommended Practice J3016, 2021.
[22] T. B. Sheridan, Adaptive automation, level of automation, allocation authority, supervisory control,
and adaptive control: Distinctions and modes of adaptation, IEEE Transactions on Systems, Man,
and Cybernetics-Part A: Systems and Humans 41 (2011) 662–667.
[23] A. E. Márquez-Chamorro, M. Resinas, A. Ruiz-Cortés, Predictive monitoring of business processes:
a survey, IEEE Transactions on Services Computing 11 (2017) 962–977.
[24] H. Vu, N. Klievtsova, H. Leopold, S. Rinderle-Ma, T. Kampik, Agentic business process management:
Practitioner perspectives on agent governance in business processes, 2025. URL: https://arxiv.org/
abs/2504.03693. arXiv:2504.03693.
[25] F. Hinder, V. Vaquet, B. Hammer, One or two things we know about concept drift—a survey
on monitoring in evolving environments. part a: detecting concept drift, Frontiers in Artificial
Intelligence 7 (2024) 1330257.
[26] J. Lu, A. Liu, F. Dong, F. Gu, J. Gama, G. Zhang, Learning under concept drift: A review, IEEE
transactions on knowledge and data engineering 31 (2018) 2346–2363.
[27] D. M. V. Sato, S. C. De Freitas, J. P. Barddal, E. E. Scalabrin, A survey on concept drift in process
mining, ACM Computing Surveys (CSUR) 54 (2021) 1–38.
[28] K. Hendrickx, L. Perini, D. Van der Plas, W. Meert, J. Davis, Machine learning with a reject option:</p>
      <p>A survey, Machine Learning 113 (2024) 3073–3110.
[29] R. Dwivedi, D. Dave, H. Naik, S. Singhal, R. Omer, P. Patel, B. Qian, Z. Wen, T. Shah, G. Morgan,
et al., Explainable ai (xai): Core ideas, techniques, and solutions, ACM Computing Surveys 55
(2023) 1–33.
[30] R. T. Marler, J. S. Arora, Survey of multi-objective optimization methods for engineering, Structural
and multidisciplinary optimization 26 (2004) 369–395.
[31] L. Zheng, W.-L. Chiang, Y. Sheng, S. Zhuang, Z. Wu, Y. Zhuang, Z. Lin, Z. Li, D. Li, E. Xing,
et al., Judging llm-as-a-judge with mt-bench and chatbot arena, Advances in Neural Information
Processing Systems 36 (2023) 46595–46623.
[32] J. Kossen, S. Farquhar, Y. Gal, T. Rainforth, Active testing: Sample-eficient model evaluation, in:</p>
      <p>International Conference on Machine Learning, PMLR, 2021, pp. 5753–5763.
[33] E. Hüllermeier, W. Waegeman, Aleatoric and epistemic uncertainty in machine learning: An
introduction to concepts and methods, Machine learning 110 (2021) 457–506.
[34] V.-L. Nguyen, M. H. Shaker, E. Hüllermeier, How to measure uncertainty in uncertainty sampling
for active learning, Machine Learning 111 (2022) 89–122.
[35] A. Tharwat, W. Schenck, A survey on active learning: State-of-the-art, practical challenges and
research directions, Mathematics 11 (2023) 820.
[36] T. Miller, Explanation in artificial intelligence: Insights from the social sciences, Artif. Intell. 267
(2019) 1–38. URL: https://doi.org/10.1016/j.artint.2018.07.007. doi:10.1016/J.ARTINT.2018.07.
007.
[37] D. Watson, J. O’Hara, N. Tax, R. Mudd, I. Guy, Explaining predictive uncertainty with information
theoretic shapley values, Advances in Neural Information Processing Systems 36 (2023) 7330–7350.
[38] A. Metzger, J. Laufer, F. Feit, K. Pohl, A user study on explainable online reinforcement learning
for adaptive systems, ACM Trans. Auton. Adapt. Syst. 19 (2024) 15:1–15:44. URL: https://doi.org/
10.1145/3666005. doi:10.1145/3666005.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fournier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Limonad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-R.</given-names>
            <surname>Rehse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Accorsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , et al.,
          <article-title>Ai-augmented business process management systems: a research manifesto</article-title>
          ,
          <source>ACM Transactions on Management Information Systems</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Enabling flexibility in process-aware information systems: challenges, methods, technologies</article-title>
          , volume
          <volume>54</volume>
          , Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <article-title>The adept project: a decade of research and development for robust and flexible process support: Challenges and achievements</article-title>
          ,
          <source>Computer Science-Research and Development</source>
          <volume>23</volume>
          (
          <year>2009</year>
          )
          <fpage>81</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Jennings</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Faratin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , T. J.
          <string-name>
            <surname>Norman</surname>
          </string-name>
          , P. O'brien, M. E. Wiegand,
          <article-title>Agent-based business process management</article-title>
          ,
          <source>International Journal of Cooperative Information Systems</source>
          <volume>5</volume>
          (
          <year>1996</year>
          )
          <fpage>105</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Jander</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Braubach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pokahr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lamersdorf</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-J. Wack</surname>
          </string-name>
          ,
          <article-title>Goal-oriented processes with GPMN</article-title>
          ,
          <source>International Journal on Artificial Intelligence Tools</source>
          <volume>20</volume>
          (
          <year>2011</year>
          )
          <fpage>1021</fpage>
          -
          <lpage>1041</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Greenwood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ghizzioli</surname>
          </string-name>
          ,
          <article-title>Goal-oriented autonomic business process modelling and execution</article-title>
          , in: Multiagent Systems, IntechOpen,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sabatucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lodato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lopes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cossentino</surname>
          </string-name>
          ,
          <article-title>Towards self-adaptation and evolution in business process</article-title>
          ., in: Aibp@ ai* ia,
          <year>2013</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Serral</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. De Smedt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Snoeck</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Vanthienen</surname>
          </string-name>
          ,
          <article-title>Context-adaptive petri nets: Supporting adaptation for the execution context</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>42</volume>
          (
          <year>2015</year>
          )
          <fpage>9307</fpage>
          -
          <lpage>9317</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Metzger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Palm</surname>
          </string-name>
          ,
          <article-title>Triggering proactive business process adaptations via online reinforcement learning</article-title>
          , in: D.
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Ghidini</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Becker</surname>
          </string-name>
          , M. Dumas (Eds.),
          <source>Business Process Management - 18th International Conference, BPM</source>
          <year>2020</year>
          , Seville, Spain,
          <source>September 13-18</source>
          ,
          <year>2020</year>
          , Proceedings, volume
          <volume>12168</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>290</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -58666-9_
          <fpage>16</fpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          - 58666- 9\_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Palm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Metzger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pohl</surname>
          </string-name>
          ,
          <article-title>Online reinforcement learning for self-adaptive information systems</article-title>
          , in: S.
          <string-name>
            <surname>Dustdar</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Salinesi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rieu</surname>
          </string-name>
          , V. Pant (Eds.),
          <source>Advanced Information Systems</source>
          Engineering - 32nd International Conference, CAiSE
          <year>2020</year>
          , Grenoble, France, June 8-12,
          <year>2020</year>
          , Proceedings, volume
          <volume>12127</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>184</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -49435-3_
          <fpage>11</fpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          - 49435- 3\_
          <fpage>11</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Erdogan</surname>
          </string-name>
          ,
          <article-title>A knowledge-intensive adaptive business process management framework</article-title>
          ,
          <source>Inf. Syst</source>
          .
          <volume>95</volume>
          (
          <year>2021</year>
          )
          <article-title>101639</article-title>
          . doi:
          <volume>10</volume>
          .1016/J.IS.
          <year>2020</year>
          .
          <volume>101639</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Serral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Valderas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pelechano</surname>
          </string-name>
          ,
          <article-title>Addressing the evolution of automated user behaviour patterns by runtime model interpretation</article-title>
          ,
          <source>Software &amp; Systems Modeling</source>
          <volume>14</volume>
          (
          <year>2015</year>
          )
          <fpage>1387</fpage>
          -
          <lpage>1420</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E.</given-names>
            <surname>Serral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Valderas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pelechano</surname>
          </string-name>
          ,
          <article-title>Supporting runtime system evolution to adapt to user behaviour</article-title>
          ,
          <source>in: Advanced Information Systems Engineering: 22nd International Conference, CAiSE</source>
          <year>2010</year>
          , Hammamet, Tunisia, June 7-9,
          <year>2010</year>
          . Proceedings 22, Springer,
          <year>2010</year>
          , pp.
          <fpage>378</fpage>
          -
          <lpage>392</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <article-title>Process design and redesign</article-title>
          ,
          <source>Process-Aware Information Systems: Bridging People and Software through Process Technology</source>
          (
          <year>2005</year>
          )
          <fpage>205</fpage>
          -
          <lpage>234</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Weyns</surname>
          </string-name>
          ,
          <article-title>An introduction to self-adaptive systems: A contemporary software engineering perspective</article-title>
          , John Wiley &amp; Sons,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Brun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Di Marzo Serugendo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gacek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Giese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kienle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Litoiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Müller</surname>
          </string-name>
          , M. Pezzè,
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>