{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:31:46Z","timestamp":1766050306431,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031278143"},{"type":"electronic","value":"9783031278150"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T00:00:00Z","timestamp":1679788800000},"content-version":"vor","delay-in-days":84,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>To improve the user experience, service providers may systematically record and analyse user interactions with a service using event logs. User journeys model these interactions from the user\u2019s perspective. They can be understood as event logs created by two independent parties, the user and the service provider, both controlling their share of actions. We propose <jats:italic>multi-party event logs<\/jats:italic> as an extension of event logs with information on the parties, allowing user journeys to be analysed as weighted games between two players. To reduce the size of games for complex user journeys, we identify <jats:italic>decision boundaries<\/jats:italic> at which the outcome of the game is determined. Decision boundaries identify subgames that are equivalent to the full game with respect to the final outcome of user journeys. The decision boundary analysis from multi-party event logs has been implemented and evaluated on the BPI\u00a0Challenge 2017 event log with promising results, and can be connected to existing process mining pipelines.<\/jats:p>","DOI":"10.1007\/978-3-031-27815-0_6","type":"book-chapter","created":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T10:03:04Z","timestamp":1679738584000},"page":"71-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Building User Journey Games from\u00a0Multi-party Event Logs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0635-1915","authenticated-orcid":false,"given":"Paul","family":"Kobialka","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1733-777X","authenticated-orcid":false,"given":"Felix","family":"Mannhardt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9948-2748","authenticated-orcid":false,"given":"Silvia Lizeth","family":"Tapia Tarifa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5382-3949","authenticated-orcid":false,"given":"Einar Broch","family":"Johnsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,26]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1509\/jmkg.70.1.003.qxd","volume":"70","author":"C Fornell","year":"2006","unstructured":"Fornell, C., Mithas, S., Morgeson, F.V., Krishnan, M.: Customer satisfaction and stock prices: high returns, low risk. J. Mark. 70(1), 3\u201314 (2006)","journal-title":"J. Mark."},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.2307\/41166446","volume":"50","author":"MJ Bitner","year":"2008","unstructured":"Bitner, M.J., Ostrom, A.L., Morgan, F.N.: Service blueprinting: a practical technique for service innovation. Calif. Manage. Rev. 50(3), 66\u201394 (2008)","journal-title":"Calif. Manage. Rev."},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.bushor.2016.09.010","volume":"60","author":"MS Rosenbaum","year":"2017","unstructured":"Rosenbaum, M.S., Otalora, M.L., Ram\u00edrez, G.C.: How to create a realistic customer journey map. Bus. Horiz. 60(1), 143\u2013150 (2017)","journal-title":"Bus. Horiz."},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1108\/JSTP-05-2015-0111","volume":"26","author":"R Halvorsrud","year":"2016","unstructured":"Halvorsrud, R., Kvale, K., F\u00f8lstad, A.: Improving service quality through customer journey analysis. J. Serv. Theory Pract. 26(6), 840\u2013867 (2016)","journal-title":"J. Serv. Theory Pract."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Terragni, A., Hassani, M.: Optimizing customer journey using process mining and sequence-aware recommendation. In: Proceedings of the 34th Symposium on Applied Computing (SAC 2019), pp. 57\u201365. ACM Press (2019)","DOI":"10.1145\/3297280.3297288"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-030-28730-6_16","volume-title":"Advances in Databases and Information Systems","author":"G Bernard","year":"2019","unstructured":"Bernard, G., Andritsos, P.: Contextual and behavioral customer journey discovery using a genetic approach. In: Welzer, T., Eder, J., Podgorelec, V., Kami\u0161ali\u0107 Latifi\u0107, A. (eds.) ADBIS 2019. LNCS, vol. 11695, pp. 251\u2013266. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28730-6_16"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bernard, G., Andritsos, P.: A process mining based model for customer journey mapping. In: Proceedings of the Forum and Doctoral Consortium Papers at the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017). CEUR Workshop Proceedings, vol. 1848, pp. 49\u201356. CEUR-WS.org (2017)","DOI":"10.1007\/978-3-319-92901-9_5"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hassani, M., Habets, S.: Predicting next touch point in a customer journey: a use case in telecommunication. In: European Conference on Modeling and Simulation (2021)","DOI":"10.7148\/2021-0048"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45563-0_25","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"H Nguyen","year":"2014","unstructured":"Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Mining business process deviance: a quest for accuracy. In: Meersman, R., et al. (eds.) OTM 2014. LNCS, vol. 8841, pp. 436\u2013445. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45563-0_25"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying inductive logic programming to process mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS (LNAI), vol. 4894, pp. 132\u2013146. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78469-2_16"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-15280-1_28","volume-title":"Knowledge Science, Engineering and Management","author":"E Bellodi","year":"2010","unstructured":"Bellodi, E., Riguzzi, F., Lamma, E.: Probabilistic declarative process mining. In: Bi, Y., Williams, M.-A. (eds.) KSEM 2010. LNCS (LNAI), vol. 6291, pp. 292\u2013303. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15280-1_28"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Rubin, V.A., Mitsyuk, A.A., Lomazova, I.A., van der Aalst, W.M.: Process mining can be applied to software too! In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1\u20138 (2014)","DOI":"10.1145\/2652524.2652583"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Teinemaa, I., Dumas, M., Rosa, M.L., Maggi, F.M.: Outcome-oriented predictive process monitoring: Review and benchmark. ACM Trans. Knowl. Discov. Data 13(2), 17:1\u201317:57 (2019)","DOI":"10.1145\/3301300"},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s12599-020-00645-0","volume":"63","author":"W Kratsch","year":"2021","unstructured":"Kratsch, W., Manderscheid, J., R\u00f6glinger, M., Seyfried, J.: Machine learning in business process monitoring: a comparison of deep learning and classical approaches used for outcome prediction. Bus. Inf. Syst. Eng. 63(3), 261\u2013276 (2021)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-031-17108-6_16","volume-title":"Software Engineering and Formal Methods","author":"P Kobialka","year":"2022","unstructured":"Kobialka, P., Tapia Tarifa, S.L., Bergersen, G.R., Johnsen, E.B.: Weighted games for user journeys. In: Schlingloff, B.H., Chai, M. (eds.) SEFM 2022. LNCS, vol. 13550, pp. 253\u2013270. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17108-6_16"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Saraeian, S., Shirazi, B.: Process mining-based anomaly detection of additive manufacturing process activities using a game theory modeling approach. Comput. Industr. Eng. 146, 106584 (2020)","DOI":"10.1016\/j.cie.2020.106584"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Galanti, R., Coma-Puig, B., de Leoni, M., Carmona, J., Navarin, N.: Explainable predictive process monitoring. In: Proceedings of the ICPM, pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/ICPM49681.2020.00012"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"van Dongen, B.: BPI Challenge 2017 (2017). https:\/\/doi.org\/10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f","DOI":"10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f"},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"issue":"7","key":"6_CR20","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.jlap.2010.07.010","volume":"79","author":"C Thrane","year":"2010","unstructured":"Thrane, C., Fahrenberg, U., Larsen, K.G.: Quantitative analysis of weighted transition systems. J. Log. Algebraic Program. 79(7), 689\u2013703 (2010)","journal-title":"J. Log. Algebraic Program."},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-30538-5_13","volume-title":"FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science","author":"P Bouyer","year":"2004","unstructured":"Bouyer, P., Cassez, F., Fleury, E., Larsen, K.G.: Optimal strategies in priced timed game automata. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol. 3328, pp. 148\u2013160. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30538-5_13"},{"issue":"3","key":"6_CR22","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-662-46681-0_16","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A David","year":"2015","unstructured":"David, A., Jensen, P.G., Larsen, K.G., Miku\u010dionis, M., Taankvist, J.H.:  Uppaal Stratego. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 206\u2013211. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_16"},{"issue":"1\u20132","key":"6_CR24","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s100090050010","volume":"1","author":"KG Larsen","year":"1997","unstructured":"Larsen, K.G., Pettersson, P., Yi, W.: UPPAAL in a nutshell. Intl. J. Softw. Tools Technol. Transf. 1(1\u20132), 134\u2013152 (1997)","journal-title":"Intl. J. Softw. Tools Technol. Transf."},{"issue":"1","key":"6_CR25","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10270-008-0106-z","volume":"9","author":"WMP van der Aalst","year":"2010","unstructured":"van der Aalst, W.M.P., Rubin, V., Verbeek, H.M.W., van Dongen, B.F., Kindler, E., G\u00fcnther, C.W.: Process mining: a two-step approach to balance between underfitting and overfitting. Softw. Syst. Model. 9(1), 87\u2013111 (2010)","journal-title":"Softw. Syst. Model."},{"key":"6_CR26","unstructured":"Rodrigues, A.M.B., et al.: Stairway to value: mining a loan application process. https:\/\/www.win.tue.nl\/bpi\/lib\/exe\/fetch.php?media=2017:bpi2017_winner_academic.pdf"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-030-85469-0_25","volume-title":"Business Process Management","author":"JN Adams","year":"2021","unstructured":"Adams, J.N., van Zelst, S.J., Quack, L., Hausmann, K., van der Aalst, W.M.P., Rose, T.: A framework for explainable concept drift detection in process mining. In: Polyvyanyy, A., Wynn, M.T., Van Looy, A., Reichert, M. (eds.) BPM 2021. LNCS, vol. 12875, pp. 400\u2013416. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85469-0_25"}],"container-title":["Lecture Notes in Business Information Processing","Process Mining Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27815-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T13:05:43Z","timestamp":1693832743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27815-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031278143","9783031278150"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27815-0_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Process Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bozen-Bolzano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpmconference.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.93","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}