{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T23:22:22Z","timestamp":1773789742685,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10796-020-09990-7","type":"journal-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T18:03:46Z","timestamp":1586369026000},"page":"753-772","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4869-9872","authenticated-orcid":false,"given":"Amit V.","family":"Deokar","sequence":"first","affiliation":[]},{"given":"Jie","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"key":"9990_CR1","unstructured":"Agrawal, R., and Srikant, R. (1994). \u201cFast Algorithms for Mining Association Rules,\u201d in Proceeding VLDB \u201894 Proceedings of the 20th International Conference on Very Large Data Bases, pp. 487\u2013499."},{"key":"9990_CR2","doi-asserted-by":"crossref","unstructured":"Alirezaei, E., and Parsa, S. (2018). \u201cAdaptable cross-organizational unstructured business processes via dynamic rule-based semantic network,\u201d Information Systems Frontiers.","DOI":"10.1007\/s10796-018-9886-z"},{"key":"9990_CR3","unstructured":"Alves de Medeiros, A. K., van Dongen, B., van der Aalst, W. M. P., and Weijters, A. J. M. M. (2004). \u201cProcess mining: Extending the alpha-algorithm to mine short loops,\u201d Eindhoven."},{"issue":"2","key":"9990_CR4","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10796-014-9529-y","volume":"18","author":"J Becker","year":"2016","unstructured":"Becker, J., Delfmann, P., Dietrich, H. A., Steinhorst, M., & Eggert, M. (2016). Business process compliance checking \u2013 Applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. Information Systems Frontiers, 18(2), 359\u2013405. https:\/\/doi.org\/10.1007\/s10796-014-9529-y.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9990_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1108\/14637151111105571","volume":"17","author":"M Bertolini","year":"2011","unstructured":"Bertolini, M., Bevilacqua, M., Ciarapica, F. E., & Giacchetta, G. (2011). Business process re-engineering in healthcare management: A case study. Business Process Management Journal, 17(1), 42\u201366. https:\/\/doi.org\/10.1108\/14637151111105571.","journal-title":"Business Process Management Journal"},{"key":"9990_CR6","doi-asserted-by":"crossref","unstructured":"Bose, R., and van der Aalst, W. M. P. (2010). \u201cTrace clustering based on conserved patterns: Towards achieving better process models,\u201d in Business Process Management Workshops, Lecture Notes in Business Information Processing (Vol. 43), pp. 170\u2013181 (available at http:\/\/www.springerlink.com\/index\/n4h7t16v75752749.pdf).","DOI":"10.1007\/978-3-642-12186-9_16"},{"issue":"2","key":"9990_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.is.2011.08.003","volume":"37","author":"R Bose","year":"2012","unstructured":"Bose, R., & van der Aalst, W. M. P. (2012). Process Diagnostics Using Trace Alignment : Opportunities , Issues , and Challenges. Information Systems, 37(2), 117\u2013141.","journal-title":"Information Systems"},{"issue":"3","key":"9990_CR8","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1108\/14637150910960648","volume":"15","author":"T Bucher","year":"2009","unstructured":"Bucher, T., Gericke, A., & Sigg, S. (2009). Process-centric business intelligence. Business Process Management Journal, 15(3), 408\u2013429. https:\/\/doi.org\/10.1108\/14637150910960648.","journal-title":"Business Process Management Journal"},{"key":"9990_CR9","doi-asserted-by":"publisher","unstructured":"Caron, F., Vanthienen, J., and Baesens, B. (2013). \u201cComprehensive rule-based compliance checking and risk management with process mining,\u201d Decision Support Systems (54:3), Elsevier B.V., pp. 1357\u20131369 (doi: https:\/\/doi.org\/10.1016\/j.dss.2012.12.012).","DOI":"10.1016\/j.dss.2012.12.012"},{"issue":"4","key":"9990_CR10","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s10796-014-9525-2","volume":"17","author":"Z Cong","year":"2015","unstructured":"Cong, Z., Fernandez, A., Billhardt, H., & Lujak, M. (2015). Service discovery acceleration with hierarchical clustering. Information Systems Frontiers, 17(4), 799\u2013808. https:\/\/doi.org\/10.1007\/s10796-014-9525-2.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"9990_CR11","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1007\/s10796-015-9565-2","volume":"17","author":"S Fan","year":"2015","unstructured":"Fan, S., Kang, L., & Zhao, J. L. (2015). Workflow-aware attention tracking to enhance collaboration management. Information Systems Frontiers, 17(6), 1253\u20131264. https:\/\/doi.org\/10.1007\/s10796-015-9565-2.","journal-title":"Information Systems Frontiers"},{"key":"9990_CR12","doi-asserted-by":"publisher","unstructured":"Ferreira, D. R., and Alves, C. (2012). \u201cDiscovering user communities in large event logs,\u201d Lecture Notes in Business Information Processing (99 LNBIP:PART 1), pp. 123\u2013134 (doi: https:\/\/doi.org\/10.1007\/978-3-642-28108-2_11).","DOI":"10.1007\/978-3-642-28108-2_11"},{"issue":"1","key":"9990_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1504\/IJBPIM.2012.047909","volume":"6","author":"DR Ferreira","year":"2012","unstructured":"Ferreira, D. R., & Thom, L. H. (2012). A semantic approach to the discovery of workflow activity patterns in event logs. International Journal of Business Process Integration and Management, 6(1), 4\u201317.","journal-title":"International Journal of Business Process Integration and Management"},{"issue":"383","key":"9990_CR14","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1080\/01621459.1983.10478008","volume":"78","author":"EB Fowlkes","year":"1983","unstructured":"Fowlkes, E. B., & Mallows, C. L. (1983). A method for comparing two hierarchical Clusterings. Journal of the American Statistical Association, 78(383), 553\u2013569.","journal-title":"Journal of the American Statistical Association"},{"key":"9990_CR15","doi-asserted-by":"publisher","unstructured":"Fraga, A., Llorens, J., and G\u00e9nova, G. (2019). \u201cTowards a Methodology for Knowledge Reuse Based on Semantic Repositories,\u201d Information Systems Frontiers (21:1), Information Systems Frontiers, pp. 5\u201325 (doi: https:\/\/doi.org\/10.1007\/s10796-018-9862-7).","DOI":"10.1007\/s10796-018-9862-7"},{"issue":"6","key":"9990_CR16","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s10796-016-9731-1","volume":"20","author":"M Garriga","year":"2018","unstructured":"Garriga, M., De Renzis, A., Lizarralde, I., Flores, A., Mateos, C., Cechich, A., & Zunino, A. (2018). A structural-semantic web service selection approach to improve retrievability of web services. Information Systems Frontiers, 20(6), 1319\u20131344. https:\/\/doi.org\/10.1007\/s10796-016-9731-1.","journal-title":"Information Systems Frontiers"},{"key":"9990_CR17","doi-asserted-by":"publisher","unstructured":"Ghattas, J., Soffer, P., and Peleg, M. (2014). \u201cImproving business process decision making based on past experience,\u201d Decision Support Systems (59), Elsevier B.V., pp. 93\u2013107 (doi: https:\/\/doi.org\/10.1016\/j.dss.2013.10.009).","DOI":"10.1016\/j.dss.2013.10.009"},{"key":"9990_CR18","doi-asserted-by":"crossref","unstructured":"Guillet, F., and Hamilton, H. J. (Eds.). (2007). Quality Measures in Data Mining, Vol. 43, Springer.","DOI":"10.1007\/978-3-540-44918-8"},{"key":"9990_CR19","doi-asserted-by":"crossref","unstructured":"Guinard, D., Trifa, V., Karnouskos, S., Spiess, P., and Savio, D. (2010). \u201cInteracting with the SOA-Based Internet of Things : Discovery , Query , Selection , and On-Demand Provisioning of Web Services,\u201d Services Computing, IEEE Transactions on (3:3), pp. 223\u2013235.","DOI":"10.1109\/TSC.2010.3"},{"key":"9990_CR20","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, C. W., and van der Aalst, W. M. P. (2007). \u201cFuzzy Mining \u2013 Adaptive Process Simplification Based on Multi-perspective Metrics,\u201d in Business Process Management, Lecture Notes in Computer Science (Vol. 4714), pp. 328\u2013343.","DOI":"10.1007\/978-3-540-75183-0_24"},{"key":"9990_CR21","doi-asserted-by":"publisher","unstructured":"Huang, Z., Lu, X., and Duan, H. (2012). \u201cResource behavior measure and application in business process management,\u201d Expert Systems with Applications (39:7), Elsevier Ltd, pp. 6458\u20136468 (doi: https:\/\/doi.org\/10.1016\/j.eswa.2011.12.061).","DOI":"10.1016\/j.eswa.2011.12.061"},{"key":"9990_CR22","unstructured":"IEEE Task Force on Process Mining. (2011). \u201cProcess Mining Manifesto,\u201d in Business Process Management Workshops, Lecture Notes in Business Information Processing (Vol. 99), pp. 169\u2013194."},{"issue":"3","key":"9990_CR23","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1108\/14637151311319905","volume":"19","author":"W Jareevongpiboon","year":"2013","unstructured":"Jareevongpiboon, W., & Janecek, P. (2013). Ontological approach to enhance results of business process mining and analysis. Business Process Management Journal, 19(3), 459\u2013476. https:\/\/doi.org\/10.1108\/14637151311319905.","journal-title":"Business Process Management Journal"},{"issue":"1","key":"9990_CR24","first-page":"35","volume":"6","author":"S Kannan","year":"2009","unstructured":"Kannan, S., & Bhaskaran, R. (2009). Association rule pruning based on interestingness measures with clustering. Journal of Computer Science, 6(1), 35\u201343 available at http:\/\/arxiv.org\/abs\/0912.1822.","journal-title":"Journal of Computer Science"},{"key":"9990_CR25","doi-asserted-by":"publisher","unstructured":"Kluza, K., and Nalepa, G. J. (2018). \u201cFormal model of business processes integrated with business rules,\u201d Information Systems Frontiers, Information Systems Frontiers, pp. 1\u201319 (doi: https:\/\/doi.org\/10.1007\/s10796-018-9826-y).","DOI":"10.1007\/s10796-018-9826-y"},{"issue":"1\u20132","key":"9990_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11257-010-9087-z","volume":"21","author":"M K\u00f6ck","year":"2011","unstructured":"K\u00f6ck, M., & Paramythis, A. (2011). Activity sequence modelling and dynamic clustering for personalized e-learning. User Modeling and User-Adapted Interaction, 21(1\u20132), 51\u201397. https:\/\/doi.org\/10.1007\/s11257-010-9087-z.","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"9990_CR27","doi-asserted-by":"publisher","unstructured":"Leyer, M., Schneider, C., and Claus, N. (2016). \u201cWould you like to know who knows? Connecting employees based on process-oriented knowledge mapping,\u201d Decision Support Systems (87), Elsevier B.V., pp. 94\u2013104 (doi: https:\/\/doi.org\/10.1016\/j.dss.2016.05.003).","DOI":"10.1016\/j.dss.2016.05.003"},{"issue":"5","key":"9990_CR28","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.compind.2007.12.002","volume":"59","author":"Y Liu","year":"2008","unstructured":"Liu, Y., Wang, J., Yang, Y., & Sun, J. (2008). A semi-automatic approach for workflow staff assignment. Computers in Industry, 59(5), 463\u2013476. https:\/\/doi.org\/10.1016\/j.compind.2007.12.002.","journal-title":"Computers in Industry"},{"key":"9990_CR29","doi-asserted-by":"publisher","unstructured":"Liu, T., Cheng, Y., and Ni, Z. (2012). \u201cMining event logs to support workflow resource allocation,\u201d Knowledge-Based Systems (35), Elsevier B.V., pp. 320\u2013331 (doi: https:\/\/doi.org\/10.1016\/j.knosys.2012.05.010).","DOI":"10.1016\/j.knosys.2012.05.010"},{"issue":"4","key":"9990_CR30","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.is.2012.07.003","volume":"38","author":"N Lohmann","year":"2013","unstructured":"Lohmann, N. (2013). Compliance by design for artifact-centric business processes. Information Systems, 38(4), 606\u2013618. https:\/\/doi.org\/10.1016\/j.is.2012.07.003.","journal-title":"Information Systems"},{"key":"9990_CR31","doi-asserted-by":"publisher","unstructured":"Nguyen, D., Vo, B., and Le, B. (2014). \u201cEfficient strategies for parallel mining class association rules,\u201d Expert Systems with Applications (41:10), Elsevier Ltd, pp. 4716\u20134729 (doi: https:\/\/doi.org\/10.1016\/j.eswa.2014.01.038).","DOI":"10.1016\/j.eswa.2014.01.038"},{"key":"9990_CR32","unstructured":"Ni, Z., Wang, S., and Li, H. (2011). \u201cMining organizational structure from workflow logs,\u201d in e-Education, Entertainment and e-Management (ICEEE), 2011 International Conference on, pp. 222\u2013225 (available at http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6137791)."},{"key":"9990_CR33","doi-asserted-by":"publisher","unstructured":"Pourmasoumi, A., Kahani, M., and Bagheri, E. (2017). \u201cMining variable fragments from process event logs,\u201d Information Systems Frontiers (19:6), Information Systems Frontiers, pp. 1423\u20131443 (doi: https:\/\/doi.org\/10.1007\/s10796-016-9662-x).","DOI":"10.1007\/s10796-016-9662-x"},{"key":"9990_CR34","doi-asserted-by":"publisher","unstructured":"Qiu, J., and Lin, Z. (2011). \u201cA framework for exploring organizational structure in dynamic social networks,\u201d Decision Support Systems (51:4), Elsevier B.V., pp. 760\u2013771 (doi: https:\/\/doi.org\/10.1016\/j.dss.2011.01.011).","DOI":"10.1016\/j.dss.2011.01.011"},{"key":"9990_CR35","unstructured":"Savasere, A., Omiecinski, E., and Navathe, S. (1995). \u201cAn efficient algorithm for mining association rules in large databases,\u201d (available at http:\/\/smartech.gatech.edu\/handle\/1853\/6678)."},{"issue":"3","key":"9990_CR36","doi-asserted-by":"publisher","first-page":"401","DOI":"10.6138\/JIT.2013.14.3.05","volume":"14","author":"R Sellami","year":"2013","unstructured":"Sellami, R., Gaaloul, W., & Defude, B. (2013). Process socio space discovery based on semantic logs. Journal of Internet Technology, 14(3), 401\u2013412. https:\/\/doi.org\/10.6138\/JIT.2013.14.3.05.","journal-title":"Journal of Internet Technology"},{"key":"9990_CR37","doi-asserted-by":"publisher","unstructured":"Shepitsen, A., Gemmell, J., Mobasher, B., and Burke, R. (2008). \u201cPersonalized recommendation in social tagging systems using hierarchical clustering,\u201d in Proceedings of the 2008 ACM conference on Recommender systems - RecSys \u201808, New York, New York, USA: ACM Press, p. 259 (doi: https:\/\/doi.org\/10.1145\/1454008.1454048).","DOI":"10.1145\/1454008.1454048"},{"issue":"2","key":"9990_CR38","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.compind.2011.11.001","volume":"63","author":"S Smirnov","year":"2012","unstructured":"Smirnov, S., Weidlich, M., Mendling, J., & Weske, M. (2012). Action patterns in business process model repositories. Computers in Industry, 63(2), 98\u2013111.","journal-title":"Computers in Industry"},{"key":"9990_CR39","doi-asserted-by":"publisher","unstructured":"Song, M., and van der Aalst, W. M. P. (2008). \u201cTowards comprehensive support for organizational mining,\u201d Decision Support Systems (46:1), Elsevier B.V., pp. 300\u2013317 (doi: https:\/\/doi.org\/10.1016\/j.dss.2008.07.002).","DOI":"10.1016\/j.dss.2008.07.002"},{"issue":"1","key":"9990_CR40","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.dss.2013.01.028","volume":"55","author":"SX Sun","year":"2013","unstructured":"Sun, S. X., & Zhao, J. L. (2013). Formal workflow design analytics using data flow modeling. Decision Support Systems, 55(1), 270\u2013283. https:\/\/doi.org\/10.1016\/j.dss.2013.01.028.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9990_CR41","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1287\/isre.1060.0105","volume":"17","author":"SX Sun","year":"2006","unstructured":"Sun, S. X., Zhao, J. L., Nunamaker, J. F., & Sheng, O. R. L. (2006). Formulating the data-flow perspective for business process management. Information Systems Research, 17(4), 374\u2013391. https:\/\/doi.org\/10.1287\/isre.1060.0105.","journal-title":"Information Systems Research"},{"key":"9990_CR42","doi-asserted-by":"publisher","unstructured":"Tan, W., Jiang, C., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. Information Systems Frontiers, 10(5), 519\u2013529. https:\/\/doi.org\/10.1007\/s10796-008-9107-2.","DOI":"10.1007\/s10796-008-9107-2"},{"key":"9990_CR43","doi-asserted-by":"publisher","unstructured":"Tao, J., & Deokar, A. V. (2015). \u201cSemantics-based Event Log Aggregation for Process Mining and Analytics,\u201d Information Systems Frontiers, (17):1209\u20131226. https:\/\/doi.org\/10.1007\/s10796-015-9563-4.","DOI":"10.1007\/s10796-015-9563-4"},{"key":"9990_CR44","unstructured":"Thomas, O., and Fellmann, M. (2006). \u201cSemantic event-driven process chains,\u201d in Proceedings of the Workshop on Semantics for Business Process Management (SBPM \u201806), held at the 3rd European Semantic Web Conference (ESWC 2006), Budva, Montenegro, June, p. 2."},{"issue":"1","key":"9990_CR45","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/14637150810849373","volume":"14","author":"A Tiwari","year":"2008","unstructured":"Tiwari, A., Turner, C. J., & Majeed, B. (2008). A review of business process mining: State-of-the-art and future trends. Business Process Management Journal, 14(1), 5\u201322. https:\/\/doi.org\/10.1108\/14637150810849373.","journal-title":"Business Process Management Journal"},{"key":"9990_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process mining: Discovery, conformance and enhancement of business processes (2nd ed.)","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W. M. P. (2011). Process mining: Discovery, conformance and enhancement of business processes (2nd ed.). Berlin Heidelberg: Springer. https:\/\/doi.org\/10.1007\/978-3-662-49851-4."},{"issue":"2","key":"9990_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2229156.2229157","volume":"3","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W. M. P. (2012a). Process mining: Overview and opportunities. ACM Transactions on Management Information Systems, 3(2), 1\u201317. https:\/\/doi.org\/10.1145\/2229156.2229157.","journal-title":"ACM Transactions on Management Information Systems"},{"key":"9990_CR48","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-19345-3","volume-title":"\u201cProcess Mining,\u201d Communications of the ACM (55:8)","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W. M. P. (2012b). \u201cProcess Mining,\u201d Communications of the ACM (55:8) (pp. 76\u201383). Berlin: Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-19345-3."},{"key":"9990_CR49","first-page":"48","volume-title":"\u201cGenetic process mining,\u201d in Applications and Theory of Petri Nets 2005, Proceedings","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W. M. P., Alves de Medeiros, A. K., & Weijters, A. J. M. M. (2005). In G. Ciardo & P. Darondeau (Eds.), \u201cGenetic process mining,\u201d in Applications and Theory of Petri Nets 2005, Proceedings (Vol. 3536, pp. 48\u201369). Berlin: Springer-Verlag."},{"issue":"4","key":"9990_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2685352","volume":"5","author":"WMP van der Aalst","year":"2015","unstructured":"van der Aalst, W. M. P., Zhao, J. L., & Wang, H. J. (2015). Business process intelligence: Connecting data and processes. ACM Transactions on Management Information Systems, 5(4), 1\u20137. https:\/\/doi.org\/10.1145\/2685352.","journal-title":"ACM Transactions on Management Information Systems"},{"key":"9990_CR51","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-540-27793-4_26","volume-title":"Applications and Theory of Petri Nets 2004, Proceedings","author":"B van Dongen","year":"2004","unstructured":"van Dongen, B., & van der Aalst, W. M. P. (2004). EMiT: A process mining tool. In Applications and Theory of Petri Nets 2004, Proceedings (Vol. 3099, pp. 454\u2013463). Berlin: Springer-Verlag Berlin."},{"issue":"3","key":"9990_CR52","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.eswa.2014.09.033","volume":"42","author":"K Vladimir","year":"2015","unstructured":"Vladimir, K., Budiseli\u0107, I., & Srblji\u0107, S. (2015). Consumerized and peer-tutored service composition. Expert Systems with Applications, 42(3), 1028\u20131038. https:\/\/doi.org\/10.1016\/j.eswa.2014.09.033.","journal-title":"Expert Systems with Applications"},{"key":"9990_CR53","doi-asserted-by":"publisher","unstructured":"Wahyudi, A., Kuk, G., and Janssen, M. (2018). \u201cA Process Pattern Model for Tackling and Improving Big Data Quality,\u201d Information Systems Frontiers (20:3), Information Systems Frontiers, pp. 457\u2013469 (doi: https:\/\/doi.org\/10.1007\/s10796-017-9822-7).","DOI":"10.1007\/s10796-017-9822-7"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-020-09990-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-020-09990-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-020-09990-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:14:22Z","timestamp":1626221662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-020-09990-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,8]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9990"],"URL":"https:\/\/doi.org\/10.1007\/s10796-020-09990-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,8]]},"assertion":[{"value":"8 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}