{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:17:17Z","timestamp":1776104237992,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031161025","type":"print"},{"value":"9783031161032","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16103-2_7","type":"book-chapter","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T21:05:56Z","timestamp":1662498356000},"page":"57-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Reference Data Model for\u00a0Process-Related User Interaction Logs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4263-8438","authenticated-orcid":false,"given":"Luka","family":"Abb","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5707-6944","authenticated-orcid":false,"given":"Jana-Rebecca","family":"Rehse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"7_CR1","unstructured":"Abb, L., Bormann, C., van der Aa, H., Rehse, J.R.: Trace clustering for user behavior mining. In: European Conference on Information Systems, AIS (2022)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-91431-8_5","volume-title":"Service-Oriented Computing","author":"S Agostinelli","year":"2021","unstructured":"Agostinelli, S., Leotta, F., Marrella, A.: Interactive segmentation of user interface logs. In: Hacid, H., Kao, O., Mecella, M., Moha, N., Paik, H. (eds.) ICSOC 2021. LNCS, vol. 13121, pp. 65\u201380. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91431-8_5"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-91431-8_5","volume-title":"Service-Oriented Computing","author":"S Agostinelli","year":"2021","unstructured":"Agostinelli, S., Leotta, F., Marrella, A.: Interactive segmentation of user interface logs. In: Hacid, H., Kao, O., Mecella, M., Moha, N., Paik, H. (eds.) ICSOC 2021. LNCS, vol. 13121, pp. 65\u201380. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91431-8_5"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Agostinelli, S., Marrella, A., Mecella, M.: Automated segmentation of user interface logs. In: Robotic Process Automation, pp. 201\u2013222. De Gruyter Oldenbourg (2021)","DOI":"10.1515\/9783110676693-011"},{"key":"7_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-030-75018-3_3","volume-title":"Research Challenges in Information Science","author":"S Agostinelli","year":"2021","unstructured":"Agostinelli, S., Marrella, A., Mecella, M.: Exploring the challenge of automated segmentation in robotic process automation. In: Cherfi, S., Perini, A., Nurcan, S. (eds.) RCIS 2021. LNBIP, vol. 415, pp. 38\u201354. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75018-3_3"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Ardimento, P., Bernardi, M.L., Cimitile, M., Ruvo, G.D.: Learning analytics to improve coding abilities: a fuzzy-based process mining approach. In: International Conference on Fuzzy Systems, pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/FUZZ-IEEE.2019.8859009"},{"key":"7_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-030-26643-1_9","volume-title":"Business Process Management Forum","author":"A Bosco","year":"2019","unstructured":"Bosco, A., Augusto, A., Dumas, M., La Rosa, M., Fortino, G.: Discovering automatable routines from user interaction logs. In: Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.) BPM 2019. LNBIP, vol. 360, pp. 144\u2013162. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26643-1_9"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Chac\u00f3n Montero, J., Jimenez-Ramirez, A., Gonzalez Enr\u00edquez, J.: Towards a method for automated testing in robotic process automation projects. In: International Workshop on Automation of Software Test, pp. 42\u201347 (2019)","DOI":"10.1109\/AST.2019.00012"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Choi, D., R\u2019bigui, H., Cho, C.: Candidate digital tasks selection methodology for automation with robotic process automation. Sustainability 13(16), 8980 (2021)","DOI":"10.3390\/su13168980"},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TSE.2016.2592905","volume":"43","author":"K Damevski","year":"2017","unstructured":"Damevski, K., Shepherd, D.C., Schneider, J., Pollock, L.: Mining sequences of developer interactions in visual studio for usage smells. IEEE Trans. Softw. Eng. 43(4), 359\u2013371 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR11","unstructured":"Dees, M., van Dongen, B.: BPI challenge 2016 (2016). https:\/\/data.4tu.nl\/articles\/dataset\/BPI_Challenge_2016_Clicks_Logged_In\/12674816\/1"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dev, H., Liu, Z.: Identifying frequent user tasks from application logs. In: International Conference on Intelligent User Interfaces, pp. 263\u2013273. ACM (2017)","DOI":"10.1145\/3025171.3025184"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1287\/isre.2015.0568","volume":"26","author":"A Ding","year":"2015","unstructured":"Ding, A., Li, S., Chatterjee, P.: Learning user real-time intent for optimal dynamic web page transformation. Inf. Syst. Res. 26(2), 339\u2013359 (2015)","journal-title":"Inf. Syst. Res."},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-1-4939-0378-8_14","volume-title":"Ways of Knowing in HCI","author":"S Dumais","year":"2014","unstructured":"Dumais, S., Jeffries, R., Russell, D.M., Tang, D., Teevan, J.: Understanding user behavior through log data and analysis. In: Olson, J.S., Kellogg, W.A. (eds.) Ways of Knowing in HCI, pp. 349\u2013372. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4939-0378-8_14"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1721831.1721834","volume":"17","author":"X Fern","year":"2010","unstructured":"Fern, X., Komireddy, C., Grigoreanu, V., Burnett, M.: Mining problem-solving strategies from HCI data. ACM Trans. Comput. Human Interact. 17(1), 1\u20137 (2010)","journal-title":"ACM Trans. Comput. Human Interact."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-03848-8_11","volume-title":"Business Process Management","author":"DR Ferreira","year":"2009","unstructured":"Ferreira, D.R., Gillblad, D.: Discovering process models from unlabelled event logs. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 143\u2013158. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03848-8_11"},{"key":"7_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-85082-1_16","volume-title":"New Trends in Database and Information Systems","author":"AF Ghahfarokhi","year":"2021","unstructured":"Ghahfarokhi, A.F., Park, G., Berti, A., van der Aalst, W.M.P.: OCEL: a standard for object-centric event logs. In: Bellatreche, L., et al. (eds.) ADBIS 2021. CCIS, vol. 1450, pp. 169\u2013175. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85082-1_16"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TVCG.2015.2467613","volume":"22","author":"H Guo","year":"2016","unstructured":"Guo, H., Gomez, S., Ziemkiewicz, C., Laidlaw, D.: A case study using visualization interaction logs and insight metrics to understand how analysts arrive at insights. IEEE Trans. Visual. Comput. Graph. 22(1), 51\u201360 (2016)","journal-title":"IEEE Trans. Visual. Comput. Graph."},{"issue":"3","key":"7_CR19","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1287\/isre.1090.0262","volume":"22","author":"S Ho","year":"2010","unstructured":"Ho, S., Bodoff, D., Tam, K.: Timing of adaptive web personalization and its effects on online consumer behavior. Inf. Syst. Res. 22(3), 660\u2013679 (2010)","journal-title":"Inf. Syst. Res."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Hofmann, A., Pr\u00e4tori, T., Seubert, F., Wanner, J., Fischer, M., Winkelmann, A.: Process selection for RPA projects: a holistic approach. In: Robotic Process Automation, pp. 77\u201390. De Gruyter Oldenbourg (2021)","DOI":"10.1515\/9783110676693-004"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Islamaj Dogan, R., Murray, G., N\u00e9v\u00e9ol, A., Lu, Z.: Understanding PubMed\u00ae user search behavior through log analysis. Database 2009 (2009)","DOI":"10.1093\/database\/bap018"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-030-21290-2_28","volume-title":"Advanced Information Systems Engineering","author":"A Jimenez-Ramirez","year":"2019","unstructured":"Jimenez-Ramirez, A., Reijers, H.A., Barba, I., Del Valle, C.: A method to improve the early stages of the robotic process automation lifecycle. In: Giorgini, P., Weber, B. (eds.) CAiSE 2019. LNCS, vol. 11483, pp. 446\u2013461. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21290-2_28"},{"key":"7_CR23","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele University, Technical report (2004)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Leno, V., Augusto, A., Dumas, M., La Rosa, M., Maggi, F.M., Polyvyanyy, A.: Identifying candidate routines for robotic process automation from unsegmented UI logs. In: International Conference on Process Mining, pp. 153\u2013160. IEEE (2020)","DOI":"10.1109\/ICPM49681.2020.00031"},{"key":"7_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101916","volume":"107","author":"V Leno","year":"2021","unstructured":"Leno, V., Augusto, A., Dumas, M., La Rosa, M., Maggi, F.M., Polyvyanyy, A.: Discovering data transfer routines from user interaction logs. Inf. Syst. 107, 101916 (2021)","journal-title":"Inf. Syst."},{"issue":"3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12599-020-00641-4","volume":"63","author":"V Leno","year":"2021","unstructured":"Leno, V., Polyvyanyy, A., Dumas, M., La Rosa, M., Maggi, F.M.: Robotic process mining: vision and challenges. Bus. Inf. Syst. Eng. 63(3), 301\u2013314 (2021)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"7_CR27","unstructured":"Leno, V., Polyvyanyy, A., La Rosa, M., Dumas, M., Maggi, F.: Action logger: Enabling process mining for robotic process automation. In: BPM Demos. Springer (2019)"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Linares-V\u00e1squez, M., White, M., Bernal-C\u00e1rdenas, C., Moran, K., Poshyvanyk, D.: Mining android app usages for generating actionable GUI-based execution scenarios. In: Working Conference on Mining Software Repositories, pp. 111\u2013122. IEEE (2015)","DOI":"10.1109\/MSR.2015.18"},{"key":"7_CR29","unstructured":"Linn, C., Zimmermann, P., Werth, D.: Desktop activity mining - a new level of detail in mining business processes. In: INFORMATIK, pp. 245\u2013258. K\u00f6llen (2018)"},{"key":"7_CR30","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-58779-6_12","volume-title":"Business Process Management: Blockchain and Robotic Process Automation Forum","author":"JM L\u00f3pez-Carnicer","year":"2020","unstructured":"L\u00f3pez-Carnicer, J.M., del Valle, C., Enr\u00edquez, J.G.: Towards an OpenSource logger for the analysis of RPA projects. In: Asatiani, A., et al. (eds.) BPM 2020. LNBIP, vol. 393, pp. 176\u2013184. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58779-6_12"},{"issue":"3","key":"7_CR31","first-page":"1","volume":"14","author":"JR Rehse","year":"2019","unstructured":"Rehse, J.R., Fettke, P.: A procedure model for situational reference model mining. Enterprise Model. Inf. Syst. Architect. 14(3), 1\u20139 (2019)","journal-title":"Enterprise Model. Inf. Syst. Architect."},{"key":"7_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40172-6","volume-title":"Process Mining in Action: Principles","author":"L Reinkemeyer","year":"2020","unstructured":"Reinkemeyer, L.: Process Mining in Action: Principles. Use Cases and Outlook. Springer, Switzerland (2020). https:\/\/doi.org\/10.1007\/978-3-030-40172-6"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Rubin, V.A., Mitsyuk, A.A., Lomazova, I.A., van der Aalst, W.: Process mining can be applied to software too! In: International Symposium on Empirical Software Engineering and Measurement. ACM (2014)","DOI":"10.1145\/2652524.2652583"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: Discovery and applications of usage patterns from web data. In: SIGKDD Explorations, vol. 1, pp. 12\u201323. ACM (2000)","DOI":"10.1145\/846183.846188"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-85469-0_18","volume-title":"Business Process Management","author":"Y Urabe","year":"2021","unstructured":"Urabe, Y., Yagi, S., Tsuchikawa, K., Oishi, H.: Task clustering method using user interaction logs to plan RPA introduction. In: Polyvyanyy, A., Wynn, M.T., Van Looy, A., Reichert, M. (eds.) BPM 2021. LNCS, vol. 12875, pp. 273\u2013288. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85469-0_18"},{"key":"7_CR36","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-030-94343-1_8","volume-title":"Business Process Management Workshops","author":"WMP van der Aalst","year":"2022","unstructured":"van der Aalst, W.M.P., Santos, L.: May I take your order? In: Marrella, A., Weber, B. (eds.) BPM 2021. LNBIP, vol. 436, pp. 99\u2013110. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-94343-1_8"},{"key":"7_CR37","unstructured":"WWW Consortium: Extended log file format (1995). https:\/\/www.w3.org\/TR\/WD-logfile.html"},{"key":"7_CR38","unstructured":"XES Working Group: IEEE standard for eXtensible Event Stream (XES) for achieving interoperability in event logs and event streams. IEEE Std 1849 (2016)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16103-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:08:30Z","timestamp":1710259710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16103-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031161025","9783031161032"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16103-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"M\u00fcnster","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2022.uni-muenster.de","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the BPM Forum 13 papers have been accepted out of the total of 98 submissions. The Blockchain, RPA and CEE Forum accepted 20 papers out of a total of 40 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}