{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T22:58:57Z","timestamp":1760482737109,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026097"},{"type":"electronic","value":"9783030026103"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02610-3_9","type":"book-chapter","created":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T11:41:17Z","timestamp":1539776477000},"page":"153-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Shadow Testing for Business Process Improvement"],"prefix":"10.1007","author":[{"given":"Suhrid","family":"Satyal","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Weber","sequence":"additional","affiliation":[]},{"given":"Hye-young","family":"Paik","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Di Ciccio","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"key":"9_CR1","series-title":"International Handbooks on Information Systems","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-45100-3_15","volume-title":"Handbook on Business Process Management 1","author":"WMP van der Aalst","year":"2015","unstructured":"van der Aalst, W.M.P.: Business process simulation survival guide. In: vom Brocke, J., Rosemann, M. (eds.) Handbook on Business Process Management 1. IHIS, pp. 337\u2013370. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-642-45100-3_15"},{"key":"9_CR2","series-title":"SEI Series in Software Engineering","volume-title":"DevOps - A Software Architect\u2019s Perspective","author":"L Bass","year":"2015","unstructured":"Bass, L., Weber, I., Zhu, L.: DevOps - A Software Architect\u2019s Perspective. SEI Series in Software Engineering. Addison-Wesley, Boston (2015)"},{"key":"9_CR3","first-page":"1","volume":"17","author":"D Chiu","year":"1989","unstructured":"Chiu, D., Jain, R.: Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Comput. Netw. 17, 1\u201314 (1989)","journal-title":"Comput. Netw."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Crook, T., Frasca, B., Kohavi, R., Longbotham, R.: Seven pitfalls to avoid when running controlled experiments on the web. In: KDD, pp. 1105\u20131114 (2009)","DOI":"10.1145\/1557019.1557139"},{"key":"9_CR5","volume-title":"Process Innovation: Reengineering Work Through Information Technology","author":"TH Davenport","year":"1993","unstructured":"Davenport, T.H.: Process Innovation: Reengineering Work Through Information Technology. Harvard Business Press, Boston (1993)"},{"key":"9_CR6","unstructured":"Denery, D.G., Erzberger, H.: The center-TRACON automation system: simulation and field testing (1995)"},{"key":"9_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2018","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management, 2nd edn. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-56509-4","edition":"2"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-38827-9_7","volume-title":"Design Science at the Intersection of Physical and Virtual Design","author":"T Falk","year":"2013","unstructured":"Falk, T., Griesberger, P., Leist, S.: Patterns as an artifact for business process improvement - insights from a case study. In: vom Brocke, J., Hekkala, R., Ram, S., Rossi, M. (eds.) DESRIST 2013. LNCS, vol. 7939, pp. 88\u2013104. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38827-9_7"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIC.2013.25","volume":"17","author":"DG Feitelson","year":"2013","unstructured":"Feitelson, D.G., Frachtenberg, E., Beck, K.L.: Development and deployment at Facebook. IEEE Internet Comput. 17(4), 8\u201317 (2013)","journal-title":"IEEE Internet Comput."},{"key":"9_CR10","volume-title":"Reengineering the Corporation: A Manifesto for Business Revolution","author":"M Hammer","year":"1993","unstructured":"Hammer, M., Champy, J.: Reengineering the Corporation: A Manifesto for Business Revolution. HarperCollins, New York (1993)"},{"key":"9_CR11","volume-title":"Breakthrough Business Results With MVT: A Fast, Cost-Free \u201cSecret Weapon\" for Boosting Sales, Cutting Expenses, and Improving Any Business Process","author":"CW Holland","year":"2005","unstructured":"Holland, C.W.: Breakthrough Business Results With MVT: A Fast, Cost-Free \u201cSecret Weapon\" for Boosting Sales, Cutting Expenses, and Improving Any Business Process. Wiley, Hoboken (2005)"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.2307\/249742","volume":"21","author":"WJ Kettinger","year":"1997","unstructured":"Kettinger, W.J., Teng, J.T.C., Guha, S.: Business process change: a study of methodologies, techniques, and tools. MIS Q. 21(1), 55\u201398 (1997)","journal-title":"MIS Q."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Kevic, K., Murphy, B., Williams, L.A., Beckmann, J.: Characterizing experimentation in continuous deployment: a case study on bing. In: ICSE-SEIP, pp. 123\u2013132. IEEE Press (2017)","DOI":"10.1109\/ICSE-SEIP.2017.19"},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10618-008-0114-1","volume":"18","author":"R Kohavi","year":"2009","unstructured":"Kohavi, R., Longbotham, R., Sommerfield, D., Henne, R.M.: Controlled experiments on the web: survey and practical guide. Data Min. Knowl. Discov. 18(1), 140\u2013181 (2009)","journal-title":"Data Min. Knowl. Discov."},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.omega.2004.04.012","volume":"33","author":"HA Reijers","year":"2005","unstructured":"Reijers, H.A., Mansar, S.L.: Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics. Omega 33(4), 283\u2013306 (2005)","journal-title":"Omega"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2015.04.004","volume":"54","author":"A Rogge-Solti","year":"2015","unstructured":"Rogge-Solti, A., Weske, M.: Prediction of business process durations using non-Markovian stochastic Petri nets. Inf. Syst. 54, 1\u201314 (2015)","journal-title":"Inf. Syst."},{"issue":"9","key":"9_CR17","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1016\/j.datak.2009.02.014","volume":"68","author":"A Rozinat","year":"2009","unstructured":"Rozinat, A., Wynn, M.T., van der Aalst, W.M.P., ter Hofstede, A.H.M., Fidge, C.J.: Workflow simulation for operational decision support. Data Knowl. Eng. 68(9), 834\u2013850 (2009)","journal-title":"Data Knowl. Eng."},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-65000-5_7","volume-title":"Business Process Management","author":"S Satyal","year":"2017","unstructured":"Satyal, S., Weber, I., Paik, H., Di Ciccio, C., Mendling, J.: AB-BPM: performance-driven instance routing for business process improvement. In: Carmona, J., Engels, G., Kumar, A. (eds.) BPM 2017. LNCS, vol. 10445, pp. 113\u2013129. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65000-5_7"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-91563-0_2","volume-title":"Advanced Information Systems Engineering","author":"S Satyal","year":"2018","unstructured":"Satyal, S., Weber, I., Paik, H., Di Ciccio, C., Mendling, J.: AB testing for process versions with contextual multi-armed bandit algorithms. In: Krogstie, J., Reijers, H.A. (eds.) CAiSE 2018. LNCS, vol. 10816, pp. 19\u201334. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91563-0_2"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Satyal, S., Weber, I., Paik, H., Di Ciccio, C., Mendling, J.: Business process improvement with the AB-BPM methodology. Inf. Syst. (2018)","DOI":"10.1007\/978-3-030-02610-3_9"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Schermann, G., Cito, J., Leitner, P., Zdun, U., Gall, H.C.: We\u2019re doing it live: a multi-method empirical study on continuous experimentation. Inf. Softw. Technol. (2018)","DOI":"10.1016\/j.infsof.2018.02.010"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems. OTM 2018 Conferences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02610-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:42:36Z","timestamp":1710232956000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02610-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030026097","9783030026103"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02610-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"18 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom system developed for OTM","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"173","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}