{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:59:08Z","timestamp":1743130748258,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030374525"},{"type":"electronic","value":"9783030374532"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37453-2_26","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T23:03:04Z","timestamp":1578006184000},"page":"317-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mining Personal Service Processes: The Social Perspective"],"prefix":"10.1007","author":[{"given":"Birger","family":"Lantow","sequence":"first","affiliation":[]},{"given":"Julian","family":"Schmitt","sequence":"additional","affiliation":[]},{"given":"Fabienne","family":"Lambusch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"26_CR1","first-page":"241","volume-title":"Dienstorientierte IT-Systeme f\u00fcr hochflexible Gesch\u00e4ftsprozesse","author":"M Kurz","year":"2011","unstructured":"Kurz, M., Herrmann, C.: Adaptive Case Management \u2013 Anwendung des Business Process Management 2.0-Konzepts auf schwach strukturierte Gesch\u00e4ftsprozesse. In: Sinz, E.J., Bartmann, D., Bodendorf, F., Ferstl, O.K. (eds.) Dienstorientierte IT-Systeme f\u00fcr hochflexible Gesch\u00e4ftsprozesse, pp. 241\u2013265. University of Bamberg Press, Bamberg (2011)"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-531-19580-3_1","volume-title":"Personenbezogene Dienstleistungen im Kontext komplexer Wertsch\u00f6pfung","author":"D Bieber","year":"2014","unstructured":"Bieber, D., Geiger, M.: Personenbezogene Dienstleistungen in komplexen Dienstleistungssystemen \u2013 eine erste Ann\u00e4herung. In: Bieber, D., Geiger, M. (eds.) Personenbezogene Dienstleistungen im Kontext komplexer Wertsch\u00f6pfung, pp. 9\u201349. Springer, Wiesbaden (2014). https:\/\/doi.org\/10.1007\/978-3-531-19580-3_1"},{"key":"26_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/588586","volume":"18","author":"P Halmos","year":"1967","unstructured":"Halmos, P.: The personal service society. Br. J. Sociol. 18, 13\u201328 (1967). https:\/\/doi.org\/10.2307\/588586","journal-title":"Br. J. Sociol."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Motahari-Nezhad, H.R., Swenson, K.D.: Adaptive case management: overview and research challenges. In: Conference on Business Informatics, Wien, pp. 264\u2013269 (2013)","DOI":"10.1109\/CBI.2013.44"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-658-07448-7_11","volume-title":"Kundenintegration und Leistungslehre","author":"S Flie\u00df","year":"2015","unstructured":"Flie\u00df, S., Dyck, S., Schmelter, M., Volkers, M.J.D.: Kundenaktivit\u00e4ten in Dienstleistungsprozessen \u2013 die Sicht der Konsumenten. In: Flie\u00df, S., Haase, M., Jacob, F., Ehret, M. (eds.) Kundenintegration und Leistungslehre, pp. 181\u2013204. Springer, Wiesbaden (2015). https:\/\/doi.org\/10.1007\/978-3-658-07448-7_11"},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s00766-009-0080-1","volume":"14","author":"M Ivarsson","year":"2009","unstructured":"Ivarsson, M., et al.: Technology transfer decision support in requirements engineering research: a systematic review of REj. Requirements Eng. 14(3), 155\u2013175 (2009)","journal-title":"Requirements Eng."},{"issue":"2","key":"26_CR8","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.aei.2006.05.002","volume":"21","author":"WMP van der Aalst","year":"2006","unstructured":"van der Aalst, W.M.P.: Exploring the CSCW spectrum using process mining. Adv. Eng. Inform. 21(2), 191\u2013199 (2006)","journal-title":"Adv. Eng. Inform."},{"issue":"6","key":"26_CR9","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., et al.: Discovering social networks from event logs. Comput. Support. Coop. Work 14(6), 549\u2013593 (2005)","journal-title":"Comput. Support. Coop. Work"},{"key":"26_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-28108-2_11","volume-title":"Business Process Management Workshops","author":"DR Ferreira","year":"2012","unstructured":"Ferreira, D.R., Alves, C.: Discovering user communities in large event logs. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 123\u2013134. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_11"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ssci.2018.07.006","volume":"111","author":"Z He","year":"2019","unstructured":"He, Z., et al.: A process mining approach to improve emergency rescue processes of fatal gas explosion accidents in Chinese coal mines. Saf. Sci. 111, 154\u2013166 (2019)","journal-title":"Saf. Sci."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Kamal, I.M., et al.: Identifying key resources in a social network using f-PageRank. In: IEEE 24th International Conference on Web Services (2017)","DOI":"10.1109\/ICWS.2017.45"},{"issue":"5","key":"26_CR13","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","volume":"32","author":"WMP van der Aalst","year":"2006","unstructured":"van der Aalst, W.M.P., et al.: Business process mining: an industrial application. Inf. Syst. 32(5), 713\u2013732 (2006)","journal-title":"Inf. Syst."},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-20370-6_4","volume-title":"Web Information Systems Engineering \u2013 WISE 2014 Workshops","author":"K Slaninov\u00e1","year":"2015","unstructured":"Slaninov\u00e1, K., Vym\u011btal, D., Martinovi\u010d, J.: Analysis of event logs: behavioral graphs. In: Benatallah, B., et al. (eds.) WISE 2014. LNCS, vol. 9051, pp. 42\u201356. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20370-6_4"},{"issue":"1","key":"26_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10844-017-0451-x","volume":"50","author":"A Appice","year":"2017","unstructured":"Appice, A.: Towards mining the organizational structure of a dynamic event scenario. J. Intell. Inf. Syst. 50(1), 165\u2013193 (2017)","journal-title":"J. Intell. Inf. Syst."},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-98648-7_20","volume-title":"Business Process Management","author":"J Yang","year":"2018","unstructured":"Yang, J., Ouyang, C., Pan, M., Yu, Y., ter Hofstede, A.H.M.: Finding the \u201cLiberos\u201d: discover organizational models with overlaps. In: Weske, M., Montali, M., Weber, I., vom Brocke, J. (eds.) BPM 2018. LNCS, vol. 11080, pp. 339\u2013355. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98648-7_20"},{"issue":"1","key":"26_CR17","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1002\/kpm.1591","volume":"26","author":"J Lee","year":"2018","unstructured":"Lee, J., et al.: Dynamic human resource selection for business process exceptions. Knowl. Process Manage. J. Corp. Transform. 26(1), 23\u201331 (2018)","journal-title":"Knowl. Process Manage. J. Corp. Transform."},{"key":"26_CR18","unstructured":"Matzner, M., et al.: Process mining approaches to detect organizational properties in cyber-physical systems. In: ECIS 2014 Proceedings (2014)"},{"key":"26_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-24849-8_1","volume-title":"The Practice of Enterprise Modeling","author":"WMP Aalst","year":"2011","unstructured":"Aalst, W.M.P.: Intra- and inter-organizational process mining: discovering processes within and between organizations. In: Johannesson, P., Krogstie, J., Opdahl, A.L. (eds.) PoEM 2011. LNBIP, vol. 92, pp. 1\u201311. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24849-8_1"},{"key":"26_CR20","unstructured":"Creemers, M., et al.: Social mining as a knowledge management solution. In: CEUR Workshop Proceedings, vol. 1612 (2016)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Liu, T., et al.: A closed-loop workflow management technique based on process mining. In: 15th International Conference on Mechatronics and Machine Vision in Practice, Auckland, New Zealand (2008)","DOI":"10.1109\/MMVIP.2008.4749573"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Accorsi, R., et al.: On the exploitation of process mining for security audits: the process discovery case. In: 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal (2013)","DOI":"10.1145\/2480362.2480634"},{"key":"26_CR23","unstructured":"Sanchez-Cisneros, D., Gali, F.A.: UEM-UC3M: an ontology-based named entity recognition system for biomedical texts. In: Second Joint Conference on Lexical and Computational Semantics (*SEM), Volume 2: Seventh International Workshop on Semantic Evaluation (SemEval 2013), 2(SemEval), pp. 622\u2013627 (2013)"},{"key":"26_CR24","doi-asserted-by":"publisher","DOI":"10.2200\/S00416ED1V01Y201204HLT016","volume-title":"Sentiment Analysis and Opinion Mining","author":"B Liu","year":"2012","unstructured":"Liu, B.: Sentiment Analysis and Opinion Mining. Morgan and Claypool Publishers, San Rafael (2012)"},{"key":"26_CR25","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-319-05476-6_37","volume-title":"Intelligent Information and Database Systems","author":"K Bakhtiyari","year":"2014","unstructured":"Bakhtiyari, K., Taghavi, M., Husain, H.: Implementation of emotional-aware computer systems using typical input devices. In: Nguyen, N.T., Attachoo, B., Trawi\u0144ski, B., Somboonviwat, K. (eds.) ACIIDS 2014. LNCS (LNAI), vol. 8397, pp. 364\u2013374. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05476-6_37"},{"key":"26_CR27","unstructured":"Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: 29th Annual CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York (2011). ISBN 978-1-4503-0267-8"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Lee, P.M., Tsui, W.H., Hsiao, T.C.: The influence of emotion on keyboard typing: an experimental study using auditory stimuli. PLoS ONE 10(6) (2015). ISSN 1932-6203","DOI":"10.1371\/journal.pone.0129056"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Lv, H.R., Lin, Z.L., Yin, W.J., Dong, J.: Emotion recognition based on pressure sensor keyboards. In: IEEE International Conference on Multimedia and Expo, 2008, pp. 1089\u20131092. IEEE Service Center, Piscataway (2008). ISBN 978-1-4244-2571-6","DOI":"10.1109\/ICME.2008.4607628"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37453-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:11:27Z","timestamp":1735863087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-37453-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374525","9783030374532"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37453-2_26","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2019.ai.wu.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 13 papers were published from the BPM forum and 60 from the BPM Workshops","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}