{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:43:38Z","timestamp":1770536618496,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030985806","type":"print"},{"value":"9783030985813","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T00:00:00Z","timestamp":1648080000000},"content-version":"vor","delay-in-days":82,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Process mining is a research domain that enables businesses to analyse and improve their processes by extracting insights from event logs. While determining the root causes of, for example, a negative case outcome can provide valuable insights for business users, only limited research has been conducted to uncover true causal relations within the process mining field. Therefore, this paper proposes AITIA-PM, a novel technique to measure cause-effect relations in event logs based on causality theory. The AITIA-PM algorithm employs probabilistic temporal logic to formally yet flexibly define hypotheses and then automatically tests them for causal relations from data. We demonstrate this by applying AITIA-PM on a real-life dataset. The case study shows that, after a well-thought-out hypotheses definition and information extraction, the AITIA-PM algorithm can be applied on rich event logs, expanding the possibilities of meaningful root cause analysis in a process mining context.<\/jats:p>","DOI":"10.1007\/978-3-030-98581-3_6","type":"book-chapter","created":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T18:03:23Z","timestamp":1648058603000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Root Cause Analysis in Process Mining with Probabilistic Temporal Logic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1793-4227","authenticated-orcid":false,"given":"Greg","family":"Van Houdt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4735-0609","authenticated-orcid":false,"given":"Beno\u00eet","family":"Depaire","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3279-3853","authenticated-orcid":false,"given":"Niels","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,24]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining: Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining: Data Science in Action. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"issue":"9","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bozorgi, Z.D., Teinemaa, I., Dumas, M., La Rosa, M., Polyvyanyy, A.: Process mining meets causal machine learning: discovering causal rules from event logs. In: 2020 2nd International Conference on Process Mining (ICPM), pp. 129\u2013136 (2020)","DOI":"10.1109\/ICPM49681.2020.00028"},{"key":"6_CR4","unstructured":"Buijs, J.: Receipt phase of an environmental permit application process (\u2018WABO\u2019), CoSeLoG project. Eindhoven University of Technology (2014). https:\/\/data.4tu.nl\/articles\/dataset\/Receipt_phase_of_an_environmental_permit_application_process_WABO_CoSeLoG_project\/12709127"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"B\u00f6hmer, K., Rinderle-Ma, S.: Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Inf. Syst. 90 (2020). Advances in Information Systems Engineering Best Papers of CAiSE 2018","DOI":"10.1016\/j.is.2019.101438"},{"key":"6_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99414-7","volume-title":"Conformance Checking","author":"J Carmona","year":"2018","unstructured":"Carmona, J., van Dongen, B., Solti, A., Weidlich, M.: Conformance Checking. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99414-7"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.compind.2018.03.022","volume":"99","author":"P Delias","year":"2018","unstructured":"Delias, P., Lagopoulos, A., Tsoumakas, G., Grigori, D.: Using multi-target feature evaluation to discover factors that affect business process behavior. Comput. Ind. 99, 253\u2013261 (2018)","journal-title":"Comput. Ind."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.compind.2015.02.009","volume":"70","author":"DR Ferreira","year":"2015","unstructured":"Ferreira, D.R., Vasilyev, E.: Using logical decision trees to discover the cause of process delays from event logs. Comput. Ind. 70, 194\u2013207 (2015)","journal-title":"Comput. Ind."},{"issue":"1\u20132","key":"6_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0304-4076(88)90045-0","volume":"39","author":"CW Granger","year":"1988","unstructured":"Granger, C.W.: Some recent development in a concept of causality. J. Econom. 39(1\u20132), 199\u2013211 (1988)","journal-title":"J. Econom."},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-16313-0_19","volume-title":"Databases in Networked Information Systems","author":"N Gupta","year":"2015","unstructured":"Gupta, N., Anand, K., Sureka, A.: Pariket: mining business process logs for root cause analysis of anomalous incidents. In: Chu, W., Kikuchi, S., Bhalla, S. (eds.) DNIS 2015. LNCS, vol. 8999, pp. 244\u2013263. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16313-0_19"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-59536-8_12","volume-title":"Advanced Information Systems Engineering","author":"BFA Hompes","year":"2017","unstructured":"Hompes, B.F.A., Maaradji, A., La Rosa, M., Dumas, M., Buijs, J.C.A.M., van der Aalst, W.M.P.: Discovering causal factors explaining business process performance variation. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 177\u2013192. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_12"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Hume, D.: A Treatise of Human Nature (1739)","DOI":"10.1093\/oseo\/instance.00046221"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139207799","volume-title":"Causality, Probability, and Time","author":"S Kleinberg","year":"2012","unstructured":"Kleinberg, S.: Causality, Probability, and Time. Cambridge University Press, Cambridge (2012)"},{"key":"6_CR14","unstructured":"Kleinberg, S., Kolm, P.N., Mishra, B.: Investigating causal relationships in stock returns with temporal logic based methods (2010)"},{"issue":"2","key":"6_CR15","first-page":"86","volume":"8","author":"M Maziarz","year":"2015","unstructured":"Maziarz, M.: A review of the granger-causality fallacy. J. Philos. Econ. Reflections Econ. Soc. Issues 8(2), 86\u2013105 (2015)","journal-title":"J. Philos. Econ. Reflections Econ. Soc. Issues"},{"key":"6_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-26643-1_6","volume-title":"Business Process Management Forum","author":"T Narendra","year":"2019","unstructured":"Narendra, T., Agarwal, P., Gupta, M., Dechu, S.: Counterfactual reasoning for process optimization using structural causal models. In: Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.) BPM 2019. LNBIP, vol. 360, pp. 91\u2013106. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26643-1_6"},{"key":"6_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-66498-5_12","volume-title":"Business Process Management Workshops","author":"MS Qafari","year":"2020","unstructured":"Qafari, M.S., van der Aalst, W.: Root cause analysis in process mining using structural equation models. In: Del R\u00edo Ortega, A., Leopold, H., Santoro, F.M. (eds.) BPM 2020. LNBIP, vol. 397, pp. 155\u2013167. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66498-5_12"},{"key":"6_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-030-79108-7_7","volume-title":"Intelligent Information Systems","author":"MS Qafari","year":"2021","unstructured":"Qafari, M.S., van der Aalst, W.M.P.: Case level counterfactual reasoning in process mining. In: Nurcan, S., Korthaus, A. (eds.) CAiSE 2021. LNBIP, vol. 424, pp. 55\u201363. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79108-7_7"},{"key":"6_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-59336-4_17","volume-title":"Business Information Systems","author":"M Fani Sani","year":"2017","unstructured":"Fani Sani, M., van der Aalst, W., Bolt, A., Garc\u00eda-Algarra, J.: Subgroup discovery in process mining. In: Abramowicz, W. (ed.) BIS 2017. LNBIP, vol. 288, pp. 237\u2013252. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59336-4_17"},{"issue":"12","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1093\/bioinformatics\/btn209","volume":"24","author":"K Strimmer","year":"2008","unstructured":"Strimmer, K.: fdrtool: a versatile R package for estimating local and tail area-based false discovery rates. Bioinformatics 24(12), 1461\u20131462 (2008)","journal-title":"Bioinformatics"},{"issue":"4","key":"6_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1093\/bjps\/24.4.409","volume":"24","author":"P Suppes","year":"1973","unstructured":"Suppes, P.: A probabilistic theory of causality. Br. J. Philos. Sci. 24(4), 409\u2013410 (1973)","journal-title":"Br. J. Philos. Sci."},{"key":"6_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-36285-9_18","volume-title":"Business Process Management Workshops","author":"S Suriadi","year":"2013","unstructured":"Suriadi, S., Ouyang, C., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Root cause analysis with enriched process logs. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 174\u2013186. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36285-9_18"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Vasilyev, E., Ferreira, D.R., Iijima, J.: Using inductive reasoning to find the cause of process delays. In: 2013 IEEE 15th Conference on Business Informatics, pp. 242\u2013249. IEEE (2013)","DOI":"10.1109\/CBI.2013.41"},{"key":"6_CR24","volume-title":"Dictionary of Statistics & Methodology: A Nontechnical Guide for the Social Sciences","author":"WP Vogt","year":"2011","unstructured":"Vogt, W.P., Johnson, B.: Dictionary of Statistics & Methodology: A Nontechnical Guide for the Social Sciences. Sage, Thousand Oaks (2011)"}],"container-title":["Lecture Notes in Business Information Processing","Process Mining Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98581-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T18:05:19Z","timestamp":1648058719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98581-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030985806","9783030985813"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98581-3_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Process Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eindhoven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpm2021a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpmconference.org\/2021\/category\/calls\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The proceedings also include one survey paper on the results of the XES 2.9 Workshop.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}