{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T02:24:55Z","timestamp":1777775095157,"version":"3.51.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031509735","type":"print"},{"value":"9783031509742","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50974-2_5","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T10:03:27Z","timestamp":1704881007000},"page":"57-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Reinforcement Learning to\u00a0Optimize Responses in\u00a0Care Processes: A Case Study on\u00a0Aggression Incidents"],"prefix":"10.1007","author":[{"given":"Bart J.","family":"Verhoef","sequence":"first","affiliation":[]},{"given":"Xixi","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10115-021-01633-w","volume":"64","author":"SA Fahrenkrog-Petersen","year":"2021","unstructured":"Fahrenkrog-Petersen, S.A., et al.: Fire now, fire later: alarm-based systems for prescriptive process monitoring. Knowl. Inf. Syst. 64(2), 559\u2013587 (2021)","journal-title":"Knowl. Inf. Syst."},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-58666-9_16","volume-title":"Business Process Management","author":"A Metzger","year":"2020","unstructured":"Metzger, A., Kley, T., Palm, A.: Triggering proactive business process adaptations via online reinforcement learning. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 273\u2013290. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_16"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-031-34560-9_22","volume-title":"Advanced Information Systems Engineering","author":"ZD Bozorgi","year":"2023","unstructured":"Bozorgi, Z.D., Dumas, M., Rosa, M.L., Polyvyanyy, A., Shoush, M., Teinemaa, I.: Learning when to treat business processes: prescriptive process monitoring with causal inference and reinforcement learning. In: Indulska, M., Reinhartz-Berger, I., Cetina, C., Pastor, O. (eds.) CAiSE 2023. LNCS, vol. 13901, pp. 364\u2013380. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-34560-9_22"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"103994","DOI":"10.1016\/j.jbi.2022.103994","volume":"127","author":"J Munoz-Gama","year":"2022","unstructured":"Munoz-Gama, J., et al.: Process mining for healthcare: characteristics and challenges. J. Biomed. Inform. 127, 103994 (2022)","journal-title":"J. Biomed. Inform."},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s10597-013-9636-0","volume":"50","author":"JM Hensel","year":"2013","unstructured":"Hensel, J.M., Lunsky, Y., Dewa, C.S.: Staff perception of aggressive behaviour in community services for adults with intellectual disabilities. Community Ment. Health J. 50(6), 743\u2013751 (2013)","journal-title":"Community Ment. Health J."},{"issue":"9","key":"5_CR6","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1111\/j.1365-2788.2011.01438.x","volume":"55","author":"S Mills","year":"2011","unstructured":"Mills, S., Rose, J.: The relationship between challenging behaviour, burnout and cognitive variables in staff working with people who have intellectual disabilities. J. Intellect. Disabil. Res. 55(9), 844\u2013857 (2011)","journal-title":"J. Intellect. Disabil. Res."},{"issue":"6","key":"5_CR7","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1037\/0022-3514.88.6.969","volume":"88","author":"BJ Bushman","year":"2005","unstructured":"Bushman, B.J., Bonacci, A.M., Pedersen, W.C., Vasquez, E.A., Miller, N.: Chewing on it can chew you up: effects of rumination on triggered displaced aggression. J. Pers. Soc. Psychol. 88(6), 969\u2013983 (2005)","journal-title":"J. Pers. Soc. Psychol."},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-030-34146-6_12","volume-title":"Advances in Conceptual Modeling","author":"J Koorn","year":"2019","unstructured":"Koorn, J., Lu, X., Leopold, H., Reijers, H.A.: Towards understanding aggressive behavior in residential care facilities using process mining. In: Guizzardi, G., Gailly, F., Suzana Pitangueira Maciel, R. (eds.) ER 2019. LNCS, vol. 11787, pp. 135\u2013145. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34146-6_12"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-030-58666-9_10","volume-title":"Business Process Management","author":"JJ Koorn","year":"2020","unstructured":"Koorn, J.J., Lu, X., Leopold, H., Reijers, H.A.: Looking for meaning: discovering action-response-effect patterns in\u00a0business processes. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 167\u2013183. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_10"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"102035","DOI":"10.1016\/j.is.2022.102035","volume":"109","author":"JJ Koorn","year":"2022","unstructured":"Koorn, J.J., Lu, X., Leopold, H., Reijers, H.A.: From action to response to effect: mining statistical relations in work processes. Inf. Syst. 109, 102035 (2022)","journal-title":"Inf. Syst."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Koorn, J.J., Lu, X., Leopold, H., Martin, N., Verboven, S., Reijers, H.A.: Mining statistical relations for better decision making in healthcare processes. In: ICPM, pp. 32\u201339. IEEE (2022)","DOI":"10.1109\/ICPM57379.2022.9980719"},{"key":"5_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-031-16171-1_9","volume-title":"Business Process Management Forum","author":"S Branchi","year":"2022","unstructured":"Branchi, S., Di Francescomarino, C., Ghidini, C., Massimo, D., Ricci, F., Ronzani, M.: Learning to act: a reinforcement learning approach to recommend the best next activities. In: Di Ciccio, C., Dijkman, R., del R\u00edo Ortega, A., Rinderle-Ma, S. (eds.) BPM 2022. LNBIP, vol. 458, pp. 137\u2013154. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16171-1_9"},{"key":"5_CR13","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. A Bradford Book, Cambridge (2018)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Bozorgi, Z.D., Teinemaa, I., Dumas, M., Rosa, M.L., Polyvyanyy, A.: Prescriptive process monitoring for cost-aware cycle time reduction. In: 2021 3rd International Conference on Process Mining (ICPM), pp. 96\u2013103 (2021)","DOI":"10.1109\/ICPM53251.2021.9576853"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Weinzierl, S., Zilker, S., Stierle, M., Matzner, M., Park, G.: From predictive to prescriptive process monitoring: recommending the next best actions instead of calculating the next most likely events. In: Wirtschaftsinformatik (Zentrale Tracks), pp. 364\u2013368 (2020)","DOI":"10.30844\/wi_2020_c12-weinzierl"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Nijman, H.L., et al.: The staff observation aggression scale-revised (SOAS-R). Aggressive Behav. 25(3), 197\u2013209 (1999)","DOI":"10.1002\/(SICI)1098-2337(1999)25:3<197::AID-AB4>3.0.CO;2-C"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50974-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:00:48Z","timestamp":1777485648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50974-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031509735","9783031509742"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50974-2_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2023.sites.uu.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}