{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:50:07Z","timestamp":1743126607910,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031278143"},{"type":"electronic","value":"9783031278150"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T00:00:00Z","timestamp":1679788800000},"content-version":"vor","delay-in-days":84,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The modernization of legacy software systems is one of the key challenges in software industry, which requires comprehensive system analysis. In this context, process mining has proven to be useful for understanding the (business) processes implemented by the legacy software system. However, process mining algorithms are highly dependent on both the quality and existence of suitable event logs. In many scenarios, existing software systems (e.g., legacy applications) do not leverage process engines capable of producing such high-quality event logs, which hampers the application of process mining algorithms. Deriving suitable event log data from legacy software systems, therefore, constitutes a relevant task that fosters data-driven analysis approaches, including process mining, data-based process documentation, and process-centric software migration. This paper presents an approach for deriving event logs from legacy software systems by combining knowledge from source code and corresponding database operations. The goal is to identify relevant business objects as well as to document user and software interactions with them in an event log suitable for process mining.<\/jats:p>","DOI":"10.1007\/978-3-031-27815-0_30","type":"book-chapter","created":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T10:03:04Z","timestamp":1679738584000},"page":"409-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deriving Event Logs from\u00a0Legacy Software Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1572-4573","authenticated-orcid":false,"given":"Marius","family":"Breitmayer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2358-2571","authenticated-orcid":false,"given":"Lisa","family":"Arnold","sequence":"additional","affiliation":[]},{"given":"Stephan La","family":"Rocca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2536-4153","authenticated-orcid":false,"given":"Manfred","family":"Reichert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,26]]},"reference":[{"key":"30_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"issue":"1","key":"30_CR2","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"30_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2018","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management, 2nd edn. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-642-33143-5","edition":"2"},{"key":"30_CR4","volume-title":"Working Effectively with Legacy Code","author":"M Feathers","year":"2013","unstructured":"Feathers, M.: Working Effectively with Legacy Code. Addison-Wesley, Boston (2013)"},{"key":"30_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining: Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining: Data Science in Action, 2nd edn. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4","edition":"2"},{"key":"30_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43839-8"},{"key":"30_CR7","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. Stanford InfoLab, Technical Report 1999\u201366, previous number = SIDL-WP-1999-0120 (1999)"},{"issue":"11","key":"30_CR8","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B Fluri","year":"2007","unstructured":"Fluri, B., Wursch, M., Pinzger, M., Gall, H.: Change distilling: tree differencing for fine-grained source code change extraction. IEEE Trans. Softw. Eng. 33(11), 725\u2013743 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-319-23063-4_25","volume-title":"Business Process Management","author":"EGL de Murillas","year":"2015","unstructured":"de Murillas, E.G.L., van der Aalst, W.M.P., Reijers, H.A.: Process mining on databases: unearthing historical data from redo logs. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 367\u2013385. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_25"},{"key":"30_CR10","series-title":"Management for Professionals","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-14430-6_8","volume-title":"BPM - Driving Innovation in a Digital World","author":"WMP van der Aalst","year":"2015","unstructured":"van der Aalst, W.M.P.: Extracting event data from databases to unleash process mining. In: vom Brocke, J., Schmiedel, T. (eds.) BPM - Driving Innovation in a Digital World. MP, pp. 105\u2013128. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14430-6_8"},{"issue":"2","key":"30_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/157710.157715","volume":"4","author":"W Cunningham","year":"1992","unstructured":"Cunningham, W.: The wycash portfolio management system. SIGPLAN OOPS Mess. 4(2), 29\u201330 (1992)","journal-title":"SIGPLAN OOPS Mess."},{"key":"30_CR12","unstructured":"Breitmayer, M., Arnold, L., Reichert, M.: Towards retrograde process analysis in running legacy applications. In: Proceedings of the 14th ZEUS Workshop, vol. 3113, pp. 11\u201315. CEUR-WS.org (2022)"},{"key":"30_CR13","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-030-44711-3_22","volume-title":"Innovation in Sustainable Management and Entrepreneurship","author":"D Dakic","year":"2020","unstructured":"Dakic, D., Stefanovic, D., Lolic, T., Narandzic, D., Simeunovic, N.: Event log extraction for the purpose of process mining: a systematic literature review. In: Prostean, G., Lavios Villahoz, J.J., Brancu, L., Bakacsi, G. (eds.) SIM 2019. SPBE, pp. 299\u2013312. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44711-3_22"},{"key":"30_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-42887-1_12","volume-title":"Business Process Management Workshops","author":"D Calvanese","year":"2016","unstructured":"Calvanese, D., Montali, M., Syamsiyah, A., van der Aalst, W.M.P.: Ontology-driven extraction of event logs from relational databases. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 140\u2013153. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42887-1_12"},{"key":"30_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113265","volume":"132","author":"R Andrews","year":"2020","unstructured":"Andrews, R., et al.: Quality-informed semi-automated event log generation for process mining. Decis. Supp. Syst. 132, 113265 (2020)","journal-title":"Decis. Supp. Syst."},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Wewerka, J., Reichert, M.: Robotic process automation - a systematic mapping study and classification framework. Enterprise Information Systems (2022)","DOI":"10.1080\/17517575.2021.1986862"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"39604","DOI":"10.1109\/ACCESS.2022.3165797","volume":"10","author":"D Choi","year":"2022","unstructured":"Choi, D., R\u2019bigui, H., Cho, C.: Enabling the gab between RPA and process mining: User interface interactions recorder. IEEE Access 10, 39604\u201339612 (2022)","journal-title":"IEEE Access"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"06","DOI":"10.1007\/s12599-020-00641-4","volume":"63","author":"V Leno","year":"2021","unstructured":"Leno, V., Polyvyanyy, A., Dumas, M., La Rosa, M., Maggi, F.: Robotic process mining: vision and challenges. Bus. Inf. Syst. Eng. 63, 06 (2021)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"30_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-58779-6_12","volume-title":"Business Process Management: Blockchain and Robotic Process Automation Forum","author":"JM L\u00f3pez-Carnicer","year":"2020","unstructured":"L\u00f3pez-Carnicer, J.M., del Valle, C., Enr\u00edquez, J.G.: Towards an opensource logger for the analysis of RPA projects. In: Asatiani, A., et al. (eds.) BPM 2020. LNBIP, vol. 393, pp. 176\u2013184. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58779-6_12"},{"key":"30_CR20","unstructured":"Zou, Y., Hung, M.: An approach for extracting workflows from e-commerce applications. In: 14th IEEE ICPC 2006, pp. 127\u2013136 (2006)"},{"issue":"12","key":"30_CR21","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/smr.1652","volume":"26","author":"R P\u00e9rez-Castillo","year":"2014","unstructured":"P\u00e9rez-Castillo, R., Caivano, D., Piattini, M.: Ontology-based similarity applied to business process clustering. J. Softw. Evol. Process 26(12), 1128\u20131149 (2014)","journal-title":"J. Softw. Evol. Process"},{"issue":"3","key":"30_CR22","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1080\/17517575.2011.587545","volume":"5","author":"R P\u00e9rez-Castillo","year":"2011","unstructured":"P\u00e9rez-Castillo, R., Weber, B., Pinggera, J., Zugal, S., de Guzm\u00e1n, I.G.R., Piattini, M.: Generating event logs from non-process-aware systems enabling business process mining. Enterp. Inf. Syst. 5(3), 301\u2013335 (2011)","journal-title":"Enterp. Inf. Syst."}],"container-title":["Lecture Notes in Business Information Processing","Process Mining Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27815-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T10:06:40Z","timestamp":1679738800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27815-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031278143","9783031278150"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27815-0_30","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Process Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bozen-Bolzano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpmconference.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.93","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}