{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:23:36Z","timestamp":1773923016321,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s00607-018-00696-y","type":"journal-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T19:43:13Z","timestamp":1547840593000},"page":"263-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Logs and enterprise networks for overcoming obstacles in business processes"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7547-1857","authenticated-orcid":false,"given":"Mohamed","family":"Sellami","sequence":"first","affiliation":[]},{"given":"Zakaria","family":"Maamar","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Lefebvre","sequence":"additional","affiliation":[]},{"given":"Noura","family":"Faci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"696_CR1","doi-asserted-by":"crossref","unstructured":"Accorsi R, Stocker T (2012) On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of the 27th ACM symposium on applied computing (SAC\u20192012), Riva del Garda, Trento, Italy, pp 1709\u20131716","DOI":"10.1145\/2245276.2232051"},{"issue":"1","key":"696_CR2","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MIC.2014.85","volume":"19","author":"VA Bur\u00e9gio","year":"2015","unstructured":"Bur\u00e9gio VA, Maamar Z, Meira SL (2015) An architecture and guiding framework for the social enterprise. IEEE Internet Comput 19(1):64\u201368","journal-title":"IEEE Internet Comput"},{"issue":"4","key":"696_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4018\/IJSSOE.2016100103","volume":"6","author":"VA Bur\u00e9gio","year":"2016","unstructured":"Bur\u00e9gio VA, Kajan E, Sellami M, Faci N, Maamar Z, Benslimane D (2016) Revisiting software engineering in the social era. Int J Syst Serv Oriented Eng 6(4):36\u201346","journal-title":"Int J Syst Serv Oriented Eng"},{"key":"696_CR4","doi-asserted-by":"crossref","unstructured":"Conforti R, de Leoni M, La Rosa M, van der Aalst WMP (2013) Supporting risk-informed decisions during business process execution. In: Proceedings of the 25th international conference on advanced information systems engineering, Valencia, Spain, pp 116\u2013132","DOI":"10.1007\/978-3-642-38709-8_8"},{"issue":"3","key":"696_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1023\/A:1019116823502","volume":"1","author":"C Dellarocas","year":"2000","unstructured":"Dellarocas C, Klein M (2000) A knowledge-based approach for handling exceptions in business processes. Inf Technol Manag 1(3):155\u2013169","journal-title":"Inf Technol Manag"},{"issue":"2","key":"696_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.5937\/SPSUNP1402081F","volume":"6","author":"N Faci","year":"2014","unstructured":"Faci N, Maamar Z, Kajan E, Benslimane D (2014) Research roadmap for the enterprise 2.0-issues & solutions. Sci Publ State Univ Novi Pazar J Ser A Appl Math Inf Mech 6(2):81\u201389","journal-title":"Sci Publ State Univ Novi Pazar J Ser A Appl Math Inf Mech"},{"key":"696_CR7","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.02.018","volume":"63","author":"H Hacid","year":"2017","unstructured":"Hacid H, Ugljanin E, Sellami M, Maamar Z (2017) Adapting selection strategies of executors of business processes based on profit and social qualities. Comput Electr Eng 63:320\u2013331","journal-title":"Comput Electr Eng"},{"key":"696_CR8","unstructured":"Japsen B (2012) U.S. Workforce Illness Costs \\$576B annually from sick days to workers compensation. \n                    https:\/\/www.forbes.com\/sites\/brucejapsen\/2012\/09\/12\/u-s-workforce-illness-costs-576b-annually-from-sick-days-to-workers-compensation\/\n                    \n                  . Accessed 16 Dec 2017"},{"issue":"2","key":"696_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MIC.2014.35","volume":"18","author":"E Kajan","year":"2014","unstructured":"Kajan E, Faci N, Maamar Z, Loo A, Pljaskovic A, Sheng QZ (2014) The network-based business process. IEEE Internet Comput 18(2):63\u201369","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"696_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1108\/02635571211193617","volume":"112","author":"B Kang","year":"2011","unstructured":"Kang B, Kim D, Kang SH (2011) Periodic performance prediction for real-time business process monitoring. Ind Manag Data Syst 112(1):4\u201323","journal-title":"Ind Manag Data Syst"},{"issue":"1\/2","key":"696_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/2332226","volume":"30","author":"MG Kendall","year":"1938","unstructured":"Kendall MG (1938) A new measure of rank correlation. Biometrika 30(1\/2):81\u201393","journal-title":"Biometrika"},{"issue":"1","key":"696_CR12","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.eswa.2010.06.078","volume":"38","author":"K Kim","year":"2011","unstructured":"Kim K, Choi I, Park C (2011) A rule-based approach to proactive exception handling in business processes. Expert Syst Appl 38(1):394\u2013409","journal-title":"Expert Syst Appl"},{"key":"696_CR13","doi-asserted-by":"crossref","unstructured":"Lu R, Sadiq S, Governatori G, Yang X (2009) Defining adaptation constraints for business process variants. In: Proceedings of the international conference on business information systems (BIS\u20192019), Poznan, Poland, pp 145\u2013156","DOI":"10.1007\/978-3-642-01190-0_13"},{"key":"696_CR14","doi-asserted-by":"crossref","unstructured":"Maamar Z, Bur\u00e9gio VA, Sellami M (2015a) Collaborative enterprise applications based on business and social artifacts. In: Proceedings of the 24th IEEE international conference on enabling technologies: infrastructure for collaborative enterprises, Larnaca, Cyprus, pp 150\u2013155","DOI":"10.1109\/WETICE.2015.12"},{"key":"696_CR15","doi-asserted-by":"crossref","unstructured":"Maamar Z, Faci N, Kajan E, Boukadi K, Sakr S, Boukhebouze M, Most\u00e9faoui SK, Bur\u00e9gio VA, Yahya F, Monfort V, Hennion R (2015b) Enterprise 2.0: research challenges and opportunities. In: Proceedings of the 10th international conference on web information systems and technologies, revised selected papers, Barcelona, Spain, pp 16\u201330","DOI":"10.1007\/978-3-319-27030-2_2"},{"key":"696_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.is.2016.02.005","volume":"58","author":"Z Maamar","year":"2016","unstructured":"Maamar Z, Faci N, Sakr S, Boukhebouze M, Barnawi A (2016) Network-based social coordination of business processes. Inf Syst 58:56\u201374","journal-title":"Inf Syst"},{"key":"696_CR17","doi-asserted-by":"crossref","unstructured":"Maamar Z, Sellami M, Faci N, Lefebvre S (2017) Detecting and tackling run-time obstacles in social business processes. In: Proceedings of the 31st IEEE international conference on advanced information networking and applications, Taipei, Taiwan, pp 371\u2013378","DOI":"10.1109\/AINA.2017.38"},{"key":"696_CR18","unstructured":"Moln\u00e1r F (2011) Link prediction analysis in the wikipedia collaboration graph. \n                    www.cs.rpi.edu\/~magdon\/courses\/casp\/projects\/Molnar.pdf\n                    \n                  . Accessed 3 Jan 2018"},{"key":"696_CR19","unstructured":"M\u00fchlen M (2001) Workflow-based process controlling-or: what you can measure you can control. In: Workflow handbook 2001, workflow management coalition, pp 61\u201377"},{"key":"696_CR20","unstructured":"Object Management Group (OMG) (2014) Business process model and notation. \n                    http:\/\/www.omg.org\/spec\/BPMN\/2.0.2\/\n                    \n                  . Accessed 5 May 2017"},{"key":"696_CR21","doi-asserted-by":"crossref","unstructured":"Pesic M, Schonenberg MH, Sidorova N, van\u00a0der Aalst WMP (2007) Constraint-based workflow models: change made easy. In: Proceedings of the on the move to meaningful internet systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, pp 77\u201394","DOI":"10.1007\/978-3-540-76848-7_7"},{"issue":"1","key":"696_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64\u201395","journal-title":"Inf Syst"},{"key":"696_CR23","doi-asserted-by":"crossref","unstructured":"Rozinat A, Wynn M, van der Aalst WMP, ter Hofstede AHM, Fidge C (2008) Workflow simulation for operational decision support using design, historic and state information. In: Proceedings of the 6th international conference of business process management, Milan, Italy, pp 196\u2013211","DOI":"10.1007\/978-3-540-85758-7_16"},{"key":"696_CR24","unstructured":"Russell N, van der Aalst W, ter Hofstede A (2006a) Workflow exception patterns. In: Proceedings of the 18th international conference on advanced information systems engineering, Luxembourg, Luxembourg, pp 288\u2013302"},{"key":"696_CR25","unstructured":"Russell N, van der Aalst WMP, ter Hofstede AHM (2006b) Exception handling patterns in process-aware information systems. Tech. Rep. BPM-06-04, BPM Center"},{"key":"696_CR26","doi-asserted-by":"crossref","unstructured":"Thullner R, Rozsnyai S, Schiefer J, Obweger H, Suntinger M (2011) Proactive business process compliance monitoring with event-based systems. In: Proceedings of the workshops of the 15th IEEE international conference on enterprise distributed object computing, Helsinki, Finland, pp 429\u2013437","DOI":"10.1109\/EDOCW.2011.22"},{"key":"696_CR27","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process mining: data science in action","author":"WMP Aalst van der","year":"2016","unstructured":"van der Aalst WMP (2016) Process mining: data science in action. Springer, Berlin, pp 325\u2013352 (chap Process Mining Software)"},{"key":"696_CR28","doi-asserted-by":"publisher","unstructured":"van Dongen BF (2017) BPI challenge 2017. \n                    https:\/\/doi.org\/10.4121\/uuid:5f3067df-f10b-45da-b98b-86ae4c7a310b\n                    \n                  . Accessed 6 Nov 2017","DOI":"10.4121\/uuid:5f3067df-f10b-45da-b98b-86ae4c7a310b"},{"key":"696_CR29","doi-asserted-by":"crossref","unstructured":"Verbeek HMW, Buijs JCAM, van Dongen BF, van der Aalst WMP (2011) XES, XESame, and ProM\u00a06. In: Proceedings of information systems evolution\u2014CAiSE forum, Hammamet, Tunisia, pp 60\u201375","DOI":"10.1007\/978-3-642-17722-4_5"},{"key":"696_CR30","doi-asserted-by":"crossref","unstructured":"Verenich I, M\u00f5\u0161kovski S, Raboczi S, Dumas M, La Rosa M, Maggi F (2018) Predictive process monitoring in apromore. In: Proceedings of the CAiSE forum\u20192018, Tallinn, Estonia, pp 244\u2013253","DOI":"10.1007\/978-3-319-92901-9_21"},{"key":"696_CR31","unstructured":"Weijters AJMM, Alves De Medeiros AK (2006) Process mining with the heuristics miner algorithm. Technische Universiteit Eindhoven, Tech Rep"},{"issue":"16","key":"696_CR32","doi-asserted-by":"publisher","first-page":"3401","DOI":"10.1080\/00207540500095613","volume":"43","author":"GA Zsidisin","year":"2005","unstructured":"Zsidisin GA, Melnyk SA, Ragatz GL (2005) An institutional theory perspective of business continuity planning for purchasing and supply management. Int J Prod Res 43(16):3401\u20133420","journal-title":"Int J Prod Res"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-00696-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-00696-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-00696-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T19:21:32Z","timestamp":1579375292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-00696-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["696"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-00696-y","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"11 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}