{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:41:25Z","timestamp":1775421685558,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":10,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2021,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Process mining is an active research domain and has been applied to understand and improve business processes. While significant research has been conducted on the development and improvement of algorithms, evidence on the application of process mining in organizations has been far more limited. In particular, there is limited understanding of the opportunities and challenges of using process mining in organizations. Such an understanding has the potential to guide research by highlighting barriers for process mining adoption and, thus, can contribute to successful process mining initiatives in practice. In this respect, the paper provides a holistic view of opportunities and challenges for process mining in organizations identified in a Delphi study with 40 international experts from academia and industry. Besides proposing a set of 30 opportunities and 32 challenges, the paper conveys insights into the comparative relevance of individual items, as well as differences in the perceived relevance between academics and practitioners. Therefore, the study contributes to the future development of process mining, both as a research field and regarding its application in organizations.<\/jats:p>","DOI":"10.1007\/s12599-021-00720-0","type":"journal-article","created":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T10:05:01Z","timestamp":1633946701000},"page":"511-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":91,"title":["Opportunities and Challenges for Process Mining in Organizations: Results of a Delphi Study"],"prefix":"10.1007","volume":"63","author":[{"given":"Niels","family":"Martin","sequence":"first","affiliation":[]},{"given":"Dominik A.","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Georgi D.","family":"Kerpedzhiev","sequence":"additional","affiliation":[]},{"given":"Kanika","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Sander J. J.","family":"Leemans","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"R\u00f6glinger","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]},{"given":"Marlon","family":"Dumas","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"La Rosa","sequence":"additional","affiliation":[]},{"given":"Moe T.","family":"Wynn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,11]]},"reference":[{"key":"720_CR1","first-page":"142","volume-title":"Proceedings of the IEEE enterprise distributed object computing conference","author":"S Agostinelli","year":"2019","unstructured":"Agostinelli S, Maggi FM, Marrella A, Milani F (2019) A user evaluation of process discovery algorithms in a software engineering company. In: Proceedings of the IEEE enterprise distributed object computing conference, pp 142\u2013150"},{"issue":"10","key":"720_CR2","doi-asserted-by":"publisher","first-page":"3426","DOI":"10.3390\/ijerph17103426","volume":"17","author":"R Andrews","year":"2020","unstructured":"Andrews R, Wynn MT, Vallmuur K, Ter Hofstede AH, Bosley E (2020) A comparative process mining analysis of road trauma patient pathways. Int J Environ Res Public Health 17(10):3426","journal-title":"Int J Environ Res Public Health"},{"issue":"4","key":"720_CR3","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2018","unstructured":"Augusto A, Conforti R, Dumas M, La Rosa M, Maggi FM, Marrella A, Mecella M, Soo A (2018) Automated discovery of process models from event logs: review and benchmark. IEEE Trans Knowl Data Eng 31(4):686\u2013705","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"720_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-015-0394-0","author":"J Becker","year":"2015","unstructured":"Becker J, Jv Brocke, Heddier M, Seidel S (2015) In search of information systems (grand) challenges: a community of inquirers perspective. Bus Inf Syst Eng. https:\/\/doi.org\/10.1007\/s12599-015-0394-0","journal-title":"Bus Inf Syst Eng"},{"key":"720_CR5","volume-title":"An introduction to medical statistics","author":"M Bland","year":"2015","unstructured":"Bland M (2015) An introduction to medical statistics, vol 4. Oxford University Press, Oxford"},{"key":"720_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99414-7","volume-title":"Conformance checking","author":"J Carmona","year":"2018","unstructured":"Carmona J, van Dongen B, Solti A, Weidlich M (2018) Conformance checking. Springer, Heidelberg"},{"issue":"101","key":"720_CR7","first-page":"855","volume":"105","author":"L Chiudinelli","year":"2020","unstructured":"Chiudinelli L, Dagliati A, Tibollo V, Albasini S, Geifman N, Peek N, Holmes JH, Corsi F, Bellazzi R, Sacchi L (2020) Mining post-surgical care processes in breast cancer patients. Artif Intell Med 105(101):855","journal-title":"Artif Intell Med"},{"key":"720_CR8","first-page":"187","volume-title":"Process mining and the ProM framework: an exploratory survey","author":"J Claes","year":"2013","unstructured":"Claes J, Poels G (2013) Process mining and the ProM framework: an exploratory survey, Lecture Notes in Business Information Processing, vol 132, pp 187\u2013198"},{"key":"720_CR9","first-page":"643","volume-title":"Proceedings of the 2007 australasian conference on information systems","author":"T de Bruin","year":"2007","unstructured":"de Bruin T, Rosemann M (2007) Using the Delphi technique to identify BPM capability areas. In: Proceedings of the 2007 australasian conference on information systems, pp 643\u2013653"},{"issue":"4","key":"720_CR10","doi-asserted-by":"publisher","first-page":"451","DOI":"10.3390\/electronics10040451","volume":"10","author":"P Drakoulogkonas","year":"2021","unstructured":"Drakoulogkonas P, Apostolou D (2021) On the selection of process mining tools. Electronics 10(4):451","journal-title":"Electronics"},{"key":"720_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of business process management","author":"M Dumas","year":"2018","unstructured":"Dumas M, Rosa ML, Mendling J, Reijers HA (2018) Fundamentals of business process management. Springer, Heidelberg"},{"key":"720_CR12","first-page":"127","volume-title":"A case study lens on process mining in practice","author":"F Emamjome","year":"2019","unstructured":"Emamjome F, Andrews R, ter Hofstede AHM (2019) A case study lens on process mining in practice, Lecture Notes in Computer Science, vol 11877, pp 127\u2013145"},{"key":"720_CR13","first-page":"309","volume-title":"Enhancing event log quality: detecting and quantifying timestamp imperfections","author":"DA Fischer","year":"2020","unstructured":"Fischer DA, Goel K, Andrews R, van Dun CGJ, Wynn MT, R\u00f6glinger M (2020) Enhancing event log quality: detecting and quantifying timestamp imperfections, Lecture Notes in Computer Science, vol 12168, pp 309\u2013326"},{"key":"720_CR14","unstructured":"Galic G, Wolf (2021) Global process mining survey 2021: delivering value with process analytics\u2014adoption and success factors of process mining. https:\/\/www2.deloitte.com\/de\/de\/pages\/finance\/articles\/global-process-mining-survey-2021.html. Accessed 6 July 2021"},{"key":"720_CR15","first-page":"198","volume-title":"Proceedings of the 2017 IEEE european conference on electrical engineering and computer science","author":"MA Ghazal","year":"2017","unstructured":"Ghazal MA, Ibrahim O, Salama MA (2017) Educational process mining: a systematic literature review. In: Proceedings of the 2017 IEEE european conference on electrical engineering and computer science, pp 198\u2013203"},{"issue":"2","key":"720_CR16","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1108\/BPMJ-03-2020-0112","volume":"27","author":"T Grisold","year":"2020","unstructured":"Grisold T, Mendling J, Otto M, vom Brocke J (2020) Adoption, use and management of process mining in practice. Bus Process Manag J 27(2):369\u2013387","journal-title":"Bus Process Manag J"},{"issue":"2","key":"720_CR17","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0040-1625(96)00094-7","volume":"53","author":"UG Gupta","year":"1996","unstructured":"Gupta UG, Clarke RE (1996) Theory and applications of the Delphi technique. Technol Forecast Soc Change 53(2):185\u2013211","journal-title":"Technol Forecast Soc Change"},{"key":"720_CR18","first-page":"242","volume-title":"Microeconometrics","author":"JJ Heckman","year":"2010","unstructured":"Heckman JJ (2010) Selection bias and self-selection. In: Durlauf SN, Blume LE (eds) Microeconometrics, vol 24. Palgrave Macmillan, London, pp 242\u2013266"},{"key":"720_CR19","unstructured":"HSPI (2020) Process mining: a database of applications. https:\/\/www.hspi.it\/wp-content\/uploads\/2020\/01\/HSPI_Process_Mining_Database2020.pdf. Accessed 3 Feb 2020"},{"key":"720_CR20","first-page":"458","volume-title":"Business process modeling: perceived benefits","author":"M Indulska","year":"2009","unstructured":"Indulska M, Green PF, Recker J, Rosemann M (2009) Business process modeling: perceived benefits, Lecture Notes in Computer Science, vol 5829, pp 458\u2013471"},{"issue":"2","key":"720_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1111\/j.1365-2648.2006.03716.x","volume":"53","author":"S Keeney","year":"2006","unstructured":"Keeney S, Hasson F, McKenna H (2006) Consulting the Oracle: ten lessons from using the Delphi technique in nursing research. J Adv Nurs 53(2):205\u2013212","journal-title":"J Adv Nurs"},{"issue":"2","key":"720_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s12599-020-00637-0","volume":"63","author":"GD Kerpedzhiev","year":"2021","unstructured":"Kerpedzhiev GD, K\u00f6nig UM, R\u00f6glinger M, Rosemann M (2021) An exploration into future business process management capabilities in view of digitalization. Bus Inf Syst Eng 63(2):83\u201396. https:\/\/doi.org\/10.1007\/s12599-020-00637-0","journal-title":"Bus Inf Syst Eng"},{"key":"720_CR23","unstructured":"Kerremans M, Searle S, Srivastava T, Iijima K (2020) Market guide for process mining. https:\/\/www.gartner.com\/en\/documents\/3991229\/market-guide-for-process-mining. Accessed 7 Oct 2020"},{"issue":"2","key":"720_CR24","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s40685-018-0076-0","volume":"12","author":"UM K\u00f6nig","year":"2019","unstructured":"K\u00f6nig UM, Linhart A, R\u00f6glinger M (2019) Why do business processes deviate? Bus Res 12(2):425\u2013453","journal-title":"Bus Res"},{"key":"720_CR25","unstructured":"Koplowitz R (2020) Now tech: process mining and documentation. https:\/\/www.forrester.com\/report\/Now+Tech+Process+Mining+And+Documentation+Q1+2020\/-\/E-RES158955#. Accessed 5 Feb 2020"},{"issue":"3","key":"720_CR26","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s12599-020-00645-0","volume":"63","author":"W Kratsch","year":"2020","unstructured":"Kratsch W, Manderscheid J, R\u00f6glinger M (2020) Machine learning in business process monitoring: a comparison of deep learning and classical approaches used for outcome prediction. Bus Inf Syst Eng 63(3):261\u2013276","journal-title":"Bus Inf Syst Eng"},{"issue":"6","key":"720_CR27","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.im.2018.03.004","volume":"55","author":"M Lang","year":"2018","unstructured":"Lang M, Wiesche M, Krcmar H (2018) Criteria for selecting cloud service providers: a Delphi study of quality-of-service attributes. Inf Manag 55(6):746\u2013758. https:\/\/doi.org\/10.1016\/j.im.2018.03.004","journal-title":"Inf Manag"},{"key":"720_CR28","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.procs.2015.12.167","volume":"72","author":"E Mahendrawathi","year":"2015","unstructured":"Mahendrawathi E, Astuti HM, Nastiti A (2015) Analysis of customer fulfilment with process mining: a case study in a telecommunication company. Procedia Comput Sci 72:588\u2013596","journal-title":"Procedia Comput Sci"},{"key":"720_CR29","unstructured":"Mans R, Reijers HA, Berends H, Bandara W, Prince R (2013) Business process mining success. In: Proceedings of the 2013 European conference on information systems, p\u00a089"},{"issue":"1","key":"720_CR30","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s12599-015-0410-4","volume":"58","author":"N Martin","year":"2016","unstructured":"Martin N, Depaire B, Caris A (2016) The use of process mining in business process simulation model construction. Bus Inf Syst Eng 58(1):73\u201387","journal-title":"Bus Inf Syst Eng"},{"issue":"382","key":"720_CR31","first-page":"427","volume":"78","author":"CR Mehta","year":"1983","unstructured":"Mehta CR, Patel NR (1983) A network algorithm for performing Fisher's exact test in r \u00d7 c contingency tables. J Am Stat Assoc 78(382):427\u2013434","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"720_CR32","first-page":"52","volume":"16","author":"A Moghaddam","year":"2006","unstructured":"Moghaddam A (2006) Coding issues in grounded theory. Issues Educ Res 16(1):52\u201366","journal-title":"Issues Educ Res"},{"issue":"1","key":"720_CR33","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.im.2003.11.002","volume":"42","author":"C Okoli","year":"2004","unstructured":"Okoli C, Pawlowski SD (2004) The Delphi method as a research tool: an example, design considerations and applications. Inf Manag 42(1):15\u201329","journal-title":"Inf Manag"},{"key":"720_CR34","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.im.2013.03.003","volume":"50","author":"G Par\u00e9","year":"2013","unstructured":"Par\u00e9 G, Cameron A, Poba-Nzaou P, Templier M (2013) A systematic assessment of rigor in information systems ranking-type Delphi studies. Inf Manag 50:207\u2013217","journal-title":"Inf Manag"},{"issue":"4","key":"720_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2629446","volume":"5","author":"A Partington","year":"2015","unstructured":"Partington A, Wynn M, Suriadi S, Ouyang C, Karnon J (2015) Process mining for clinical processes: a comparative analysis of four Australian hospitals. ACM Trans Manag Inf Syst 5(4):1\u201318","journal-title":"ACM Trans Manag Inf Syst"},{"issue":"2","key":"720_CR36","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10209-017-0534-z","volume":"17","author":"MS Rad","year":"2018","unstructured":"Rad MS, Nilashi M, Dahlan HM (2018) Information technology adoption: a review of the literature and classification. Univers Access Inf Soc 17(2):361\u2013390","journal-title":"Univers Access Inf Soc"},{"key":"720_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40172-6","volume-title":"Process mining in action: principles, use cases and outlook","author":"L Reinkemeyer","year":"2020","unstructured":"Reinkemeyer L (2020) Process mining in action: principles, use cases and outlook. Springer, Heidelberg"},{"key":"720_CR38","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.jbi.2016.04.007","volume":"61","author":"E Rojas","year":"2016","unstructured":"Rojas E, Munoz-Gama J, Sep\u00falveda M, Capurro D (2016) Process mining in healthcare. J Biomed Inform 61:224\u2013236","journal-title":"J Biomed Inform"},{"key":"720_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45100-3","volume-title":"Handbook on business process management 1","author":"M Rosemann","year":"2015","unstructured":"Rosemann M, vom Brocke J (2015a) Handbook on business process management 1. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-45100-3"},{"key":"720_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45103-4","volume-title":"Handbook on business process management 2","author":"M Rosemann","year":"2015","unstructured":"Rosemann M, vom Brocke J (2015b) Handbook on business process management 2. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-45103-4"},{"key":"720_CR41","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-45100-3_5","volume-title":"Handbook on business process management 1","author":"M Rosemann","year":"2015","unstructured":"Rosemann M, vom Brocke J (2015c) The six core elements of business process management. In: Rosemann M, vom Brocke J (eds) Handbook on business process management 1. Springer, Heidelberg, pp 105\u2013122"},{"key":"720_CR42","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1111\/j.1540-5915.1997.tb01330.x","volume":"28","author":"R Schmidt","year":"1997","unstructured":"Schmidt R (1997) Managing Delphi surveys using nonparametric statistical techniques. Decis Sci 28:763\u2013774","journal-title":"Decis Sci"},{"key":"720_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.2001.11045662","volume":"17","author":"R Schmidt","year":"2001","unstructured":"Schmidt R, Lyytinen K, Keil M, Cule P (2001) Identifying software project risks. J Manag Inf Syst 17:5\u201336","journal-title":"J Manag Inf Syst"},{"key":"720_CR44","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1108\/14637151311308321","volume":"19","author":"T Schmiedel","year":"2013","unstructured":"Schmiedel T, vom Brocke J, Recker J (2013) Which cultural values matter to business process management? Bus Process Manag J 19:292\u2013317","journal-title":"Bus Process Manag J"},{"key":"720_CR45","first-page":"31","volume":"37","author":"D Skinner","year":"2015","unstructured":"Skinner D, Nelson R, Chin W, Land L (2015) The Delphi method research strategy in studies of information systems. Commun Assoc Inf Syst 37:31\u201363","journal-title":"Commun Assoc Inf Syst"},{"issue":"1","key":"720_CR46","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.dss.2008.07.002","volume":"46","author":"M Song","year":"2008","unstructured":"Song M, van der Aalst WMP (2008) Towards comprehensive support for organizational mining. Decis Support Syst 46(1):300\u2013317","journal-title":"Decis Support Syst"},{"key":"720_CR47","doi-asserted-by":"crossref","unstructured":"Syed R, Leemans SJJ, Eden R, Buijs JACM (2020) Process mining adoption: a technology continuity versus discontinuity perspective. Lecture Notes in Business Information Processing, vol 392, pp 229\u2013245","DOI":"10.1007\/978-3-030-58638-6_14"},{"issue":"2","key":"720_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301300","volume":"13","author":"I Teinemaa","year":"2019","unstructured":"Teinemaa I, Dumas M, Rosa ML, Maggi FM (2019) Outcome-oriented predictive process monitoring. ACM Trans Knowl Discov Data 13(2):1\u201357","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"4","key":"720_CR49","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1108\/BPMJ-06-2017-0148","volume":"24","author":"M Thiede","year":"2018","unstructured":"Thiede M, Fuerstenau D, Barquet APB (2018) How is process mining technology used by organizations? Bus Process Manag J 24(4):900\u2013922","journal-title":"Bus Process Manag J"},{"issue":"3","key":"720_CR50","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1108\/14637151211232669","volume":"18","author":"CJ Turner","year":"2012","unstructured":"Turner CJ, Tiwari A, Olaiya R, Xu Y (2012) Process mining: from theory to practice. Bus Process Manag J 18(3):493\u2013512. https:\/\/doi.org\/10.1108\/14637151211232669","journal-title":"Bus Process Manag J"},{"key":"720_CR51","first-page":"169","volume-title":"Process mining manifesto","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst WMP, Adriansyah A, Wynn M (2012) Process mining manifesto, Lecture Notes in Business Information Processing, vol 99, pp 169\u2013194"},{"key":"720_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process mining: data science in action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst WMP (2016) Process mining: data science in action. Springer, Heidelberg"},{"issue":"2","key":"720_CR53","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1080\/17517575.2012.688222","volume":"8","author":"A Van Looy","year":"2014","unstructured":"Van Looy A, De Backer M, Poels G (2014) A conceptual framework and classification of capability areas for business process maturity. Enterp Inf Syst 8(2):188\u2013224","journal-title":"Enterp Inf Syst"},{"issue":"6","key":"720_CR54","first-page":"461","volume":"18","author":"A Van Looy","year":"2017","unstructured":"Van Looy A, Poels G, Snoeck M (2017) Evaluating business process maturity models. J Assoc Inf Syst 18(6):461\u2013486","journal-title":"J Assoc Inf Syst"},{"key":"720_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58307-5","volume-title":"Business process management cases","author":"J vom Brocke","year":"2018","unstructured":"vom Brocke J, Mendling J (2018) Business process management cases. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-58307-5"},{"issue":"8","key":"720_CR56","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1016\/j.techfore.2012.04.013","volume":"79","author":"HA von der Gracht","year":"2012","unstructured":"von der Gracht HA (2012) Consensus measurement in Delphi studies. Technol Forecast Soc Change 79(8):1525\u20131536","journal-title":"Technol Forecast Soc Change"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-021-00720-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-021-00720-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-021-00720-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T12:25:54Z","timestamp":1635251154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-021-00720-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["720"],"URL":"https:\/\/doi.org\/10.1007\/s12599-021-00720-0","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"31 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}