{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:20:10Z","timestamp":1772911210249,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007105","name":"Universit\u00e4t Mannheim","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007105","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Studying the behavior of users in software systems has become an essential task for software vendors who want to mitigate usability problems and identify automation potentials, or for researchers who want to test behavioral theories. One approach to studying user behavior in a data-driven way is through the analysis of so-called user interaction (UI) logs, which record the low-level activities that a user performs while executing a task. In the paper, the authors refer to the analysis of UI logs as User Behavior Mining (UBM) and position it as a research topic. UBM is conceptualized by means of a four-component framework that elaborates how UBM data can be captured, which technologies can be applied to analyze it, which objectives UBM can accomplish, and how theories can guide the analytical process. The applicability of the framework is demonstrated by three exemplary applications from an ongoing research project with a partner company. Finally, the paper discusses practical challenges to UBM and derives an agenda for potential future research directions.<\/jats:p>","DOI":"10.1007\/s12599-023-00848-1","type":"journal-article","created":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T09:02:01Z","timestamp":1704445321000},"page":"799-816","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["User Behavior Mining"],"prefix":"10.1007","volume":"66","author":[{"given":"Jana-Rebecca","family":"Rehse","sequence":"first","affiliation":[]},{"given":"Luka","family":"Abb","sequence":"additional","affiliation":[]},{"given":"Gregor","family":"Berg","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Bormann","sequence":"additional","affiliation":[]},{"given":"Timotheus","family":"Kampik","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Warmuth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,5]]},"reference":[{"key":"848_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-031-16103-2_7","volume-title":"Business Process Management","author":"L Abb","year":"2022","unstructured":"Abb L, Rehse JR (2022) A reference data model for process-related user interaction logs. Business Process Management. Springer, Heidelberg, pp 57\u201374"},{"key":"848_CR2","unstructured":"Abb L, Bormann C, van der Aa H, Rehse JR (2022) Trace clustering for user behavior mining. In: European Conference for Information Systems, AIS"},{"key":"848_CR3","first-page":"116","volume-title":"BPM Forum","author":"S Agostinelli","year":"2020","unstructured":"Agostinelli S, Lupia M, Marrella A, Mecella M (2020) Automated generation of executable RPA scripts from user interface logs. BPM Forum. Springer, Heidelberg, pp 116\u2013131"},{"key":"848_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-030-75018-3_3","volume-title":"Research Challenges in Information Science","author":"S Agostinelli","year":"2021","unstructured":"Agostinelli S, Marrella A, Mecella M (2021) Exploring the challenge of automated segmentation in robotic process automation. Research Challenges in Information Science. Springer, Heidelberg, pp 38\u201354"},{"key":"848_CR5","doi-asserted-by":"crossref","unstructured":"Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34(55)","DOI":"10.17705\/1CAIS.03455"},{"issue":"3","key":"848_CR6","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1016\/j.chb.2004.12.002","volume":"23","author":"K Amoako-Gyampah","year":"2007","unstructured":"Amoako-Gyampah K (2007) Perceived usefulness, user involvement and behavioral intention: an empirical study of ERP implementation. Comput Human Behav 23(3):1232\u20131248","journal-title":"Comput Human Behav"},{"key":"848_CR7","doi-asserted-by":"crossref","unstructured":"Astromskis S, Janes A, Mairegger M (2015) A process mining approach to measure how users interact with software: an industrial case study. In: International Conference on Software and System Process, ACM, p 137-141","DOI":"10.1145\/2785592.2785612"},{"issue":"2","key":"848_CR8","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/0749-5978(91)90022-L","volume":"50","author":"A Bandura","year":"1991","unstructured":"Bandura A (1991) Social cognitive theory of self-regulation. Organ Behav Human Decis Process 50(2):248\u2013287","journal-title":"Organ Behav Human Decis Process"},{"key":"848_CR9","doi-asserted-by":"crossref","unstructured":"Beerepoot I, Lu X, van de Weerd I, Reijers H (2021) Seeing the signs of workarounds: A mixed-methods approach to the detection of nurses\u2019 process deviations. In: Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2021.456"},{"issue":"103","key":"848_CR10","first-page":"837","volume":"146","author":"I Beerepoot","year":"2023","unstructured":"Beerepoot I, Di Ciccio C, Reijers HA, Rinderle-Ma S, Bandara W, Burattin A, Calvanese D, Chen T, Cohen I, Depaire B et al (2023) The biggest business process management problems to solve before we die. Comput Indust 146(103):837","journal-title":"Comput Indust"},{"issue":"1","key":"848_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1287\/isre.2018.0774","volume":"30","author":"N Berente","year":"2019","unstructured":"Berente N, Seidel S, Safadi H (2019) Research commentary - data-driven computationally intensive theory development. Inf Syst Res 30(1):50\u201364","journal-title":"Inf Syst Res"},{"key":"848_CR12","doi-asserted-by":"crossref","unstructured":"Bozorgi ZD, Teinemaa I, Dumas M, Rosa ML, Polyvyanyy A (2020) Process mining meets causal machine learning: discovering causal rules from event logs. In: International Conference on Process Mining, pp 129\u2013136","DOI":"10.1109\/ICPM49681.2020.00028"},{"issue":"3","key":"848_CR13","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1287\/isre.1060.0096","volume":"17","author":"A Burton-Jones","year":"2006","unstructured":"Burton-Jones A, Straub D (2006) Reconceptualizing system usage: an approach and empirical test. Inf Syst Res 17(3):228\u2013246","journal-title":"Inf Syst Res"},{"key":"848_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-72839-9_5","volume-title":"Autonomous Intelligent Systems: Multi-Agents and Data Mining","author":"L Cao","year":"2007","unstructured":"Cao L, Luo C, Zhang C (2007) Agent-mining interaction: an emerging area. Autonomous Intelligent Systems: Multi-Agents and Data Mining. Springer, Heidelberg, pp 60\u201373"},{"issue":"3","key":"848_CR15","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s10458-011-9191-4","volume":"25","author":"L Cao","year":"2012","unstructured":"Cao L, Weiss G, Yu P (2012) A brief introduction to agent mining. Auton Agents Multi-Agent Syst 25(3):419\u2013424","journal-title":"Auton Agents Multi-Agent Syst"},{"key":"848_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99414-7","volume-title":"Conformance checking","author":"J Carmona","year":"2018","unstructured":"Carmona J, van Dongen B, Solti A, Weidlich M (2018) Conformance checking. Springer, Heidelberg"},{"issue":"1","key":"848_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TVCG.2016.2598471","volume":"23","author":"F Dabek","year":"2017","unstructured":"Dabek F, Caban J (2017) A grammar-based approach for modeling user interactions and generating suggestions during the data exploration process. IEEE Transact Visual Comput Graph 23(1):41\u201350","journal-title":"IEEE Transact Visual Comput Graph"},{"key":"848_CR18","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-46781-4_7","volume-title":"Design Science Research Cases","author":"S Dadashnia","year":"2020","unstructured":"Dadashnia S, Houy C, Loos P (2020) Usability Mining. Design Science Research Cases. Springer, Heidelberg, pp 155\u2013176"},{"key":"848_CR19","doi-asserted-by":"crossref","unstructured":"Dev H, Liu Z (2017) Identifying frequent user tasks from application logs. In: International Conference on Intelligent User Interfaces, ACM, p 263-273","DOI":"10.1145\/3025171.3025184"},{"key":"848_CR20","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-031-08848-3_4","volume-title":"Process mining handbook","author":"C Di Ciccio","year":"2022","unstructured":"Di Ciccio C, Montali M (2022) Declarative process specifications: reasoning, discovery, monitoring. Process mining handbook, vol 448. Springer, Heidelberg, pp 495\u2013502"},{"key":"848_CR21","doi-asserted-by":"crossref","unstructured":"Di\u00a0Federico G, Burattin A (2023) Do you behave always the same? A process mining approach. In: ICPM workshops, Springer, pp 5\u201317","DOI":"10.1007\/978-3-031-27815-0_1"},{"issue":"2","key":"848_CR22","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1287\/isre.2015.0568","volume":"26","author":"AW Ding","year":"2015","unstructured":"Ding AW, Li S, Chatterjee P (2015) Learning user real-time intent for optimal dynamic web page transformation. Inf Syst Res 26(2):339\u2013359","journal-title":"Inf Syst Res"},{"issue":"3","key":"848_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1207\/s15327051hci2103_2","volume":"21","author":"P Dourish","year":"2006","unstructured":"Dourish P, Anderson K (2006) Collective information practice: exploring privacy and security as social and cultural phenomena. Human-Comput Interact 21(3):319\u2013342","journal-title":"Human-Comput Interact"},{"key":"848_CR24","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-1-4939-0378-8_14","volume-title":"Ways of knowing in HCI","author":"S Dumais","year":"2014","unstructured":"Dumais S, Jeffries R, Russell D, Tang D, Teevan J (2014) Understanding user behavior through log data and analysis. Ways of knowing in HCI. Springer, Heidelberg, pp 349\u2013372"},{"key":"848_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.dss.2017.04.003","volume":"100","author":"J Evermann","year":"2017","unstructured":"Evermann J, Rehse JR, Fettke P (2017) Predicting process behaviour using deep learning. Decis Support Syst 100:129\u2013140","journal-title":"Decis Support Syst"},{"key":"848_CR26","unstructured":"Fallon M, Schmidt K, Aydinguel O, Heinzl A (2021) Feedback messages during goal pursuit: The dynamic impact on mhealth use. In: International Conference on Information Systems, AIS"},{"key":"848_CR27","doi-asserted-by":"crossref","unstructured":"Fern X, Komireddy C, Grigoreanu V, Burnett M (2010) Mining problem-solving strategies from HCI data. ACM Transact Comput-Human Interact 17(1)","DOI":"10.1145\/1721831.1721834"},{"key":"848_CR28","doi-asserted-by":"crossref","unstructured":"Gregor S (2006) The nature of theory in information systems. MIS Q pp 611\u2013642","DOI":"10.2307\/25148742"},{"key":"848_CR29","doi-asserted-by":"crossref","unstructured":"Grisold T, Wurm B, Mendling J, Vom Brocke J (2020) Using process mining to support theorizing about change in organizations. In: Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2020.675"},{"issue":"1","key":"848_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TVCG.2015.2467613","volume":"22","author":"H Guo","year":"2016","unstructured":"Guo H, Gomez S, Ziemkiewicz C, Laidlaw D (2016) A case study using visualization interaction logs and insight metrics to understand how analysts arrive at insights. IEEE Transact Visual Comput Graph 22(1):51\u201360","journal-title":"IEEE Transact Visual Comput Graph"},{"issue":"3","key":"848_CR31","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1287\/isre.1090.0262","volume":"22","author":"S Ho","year":"2010","unstructured":"Ho S, Bodoff D, Tam K (2010) Timing of adaptive web personalization and its effects on online consumer behavior. Inf Syst Res 22(3):660\u2013679","journal-title":"Inf Syst Res"},{"key":"848_CR32","unstructured":"Hoffmann P, Mateja D, Spohrer K, Heinzl A (2019) Bridging the vendor-user gap in enterprise cloud software development through data-driven requirements engineering. In: International Conference on Information Systems, AIS"},{"key":"848_CR33","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-85469-0_26","volume-title":"Business Process Management","author":"S Huo","year":"2021","unstructured":"Huo S, V\u00f6lzer H, Reddy P, Agarwal P, Isahagian V, Muthusamy V (2021) Graph autoencoders for business process anomaly detection. Business Process Management. Springer, Heidelberg, pp 417\u2013433"},{"key":"848_CR34","doi-asserted-by":"crossref","unstructured":"Islamaj\u00a0Dogan R, Murray G, N\u00e9v\u00e9ol A, Lu Z (2009) Understanding pubmed\u00ae user search behavior through log analysis. Database","DOI":"10.1093\/database\/bap018"},{"issue":"2","key":"848_CR35","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1111\/j.1540-5915.1997.tb01315.x","volume":"28","author":"C Jackson","year":"1997","unstructured":"Jackson C, Chow S, Leitch R (1997) Toward an understanding of the behavioral intention to use an information system. Decis Sci 28(2):357\u2013389","journal-title":"Decis Sci"},{"key":"848_CR36","doi-asserted-by":"crossref","unstructured":"Jansen BJ, Jung Sg, Salminen J (2023) Finetuning analytics information systems for a better understanding of users: evidence of personification bias on multiple digital channels. Inf Syst Front pp 1\u201324","DOI":"10.1007\/s10796-023-10395-5"},{"issue":"6","key":"848_CR37","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s12599-018-0567-8","volume":"61","author":"G Janssenswillen","year":"2019","unstructured":"Janssenswillen G, Depaire B (2019) Towards confirmatory process discovery: making assertions about the underlying system. Bus Inf Syst Eng 61(6):713\u2013728","journal-title":"Bus Inf Syst Eng"},{"key":"848_CR38","doi-asserted-by":"crossref","unstructured":"Jeong J, Kim N, Peter H (2020) Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior. Int J Human-Comput Stud 139","DOI":"10.1016\/j.ijhcs.2019.10.001"},{"key":"848_CR39","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-030-21290-2_28","volume-title":"Advanced Information Systems Engineering","author":"A Jimenez-Ramirez","year":"2019","unstructured":"Jimenez-Ramirez A, Reijers H, Barba I, Del Valle C (2019) A method to improve the early stages of the robotic process automation lifecycle. Advanced Information Systems Engineering. Springer, Heidelberg, pp 446\u2013461"},{"key":"848_CR40","doi-asserted-by":"crossref","unstructured":"Jorritsma W, Cnossen F, Dierckx R, Oudkerk M, Van\u00a0Ooijen P (2015) Pattern mining of user interaction logs for a post-deployment usability evaluation of a radiology PACS client. Int J Med Inform 85","DOI":"10.1016\/j.ijmedinf.2015.10.007"},{"key":"848_CR41","doi-asserted-by":"crossref","unstructured":"Karande V, Bauman E, Lin Z, Khan L (2017) Sgx-log: Securing system logs with sgx. In: Computer and communications security, ACM, p 19-30","DOI":"10.1145\/3052973.3053034"},{"key":"848_CR42","volume-title":"Behavioural models - From modelling finite automata to analysing business processes","author":"M Kunze","year":"2016","unstructured":"Kunze M, Weske M (2016) Behavioural models - From modelling finite automata to analysing business processes. Springer, Heidelberg"},{"key":"848_CR43","doi-asserted-by":"crossref","unstructured":"Lambeck C, M\u00fcller R, Fohrholz C, Leyh C (2014) (Re-)Evaluating user interface aspects in ERP systems \u2013 an empirical user study. In: Hawaii International Conference on System Sciences, pp 396\u2013405","DOI":"10.1109\/HICSS.2014.57"},{"key":"848_CR44","unstructured":"Lebherz J, Di\u00a0Ciccio C (2022) OCED meta-model presentation, XES\/OCED symposium, ICPM 2022. https:\/\/icpmconference.org\/2022\/wp-content\/uploads\/sites\/7\/2022\/12\/OCED_Symposium_intro.pdf, accessed 25 Oct 2022"},{"key":"848_CR45","first-page":"183","volume-title":"Advanced Information Systems Engineering","author":"S Leemans","year":"2022","unstructured":"Leemans S, Tax N (2022) Causal reasoning over control-flow decisions in process models. Advanced Information Systems Engineering. Springer, Heidelberg, pp 183\u2013200"},{"issue":"101","key":"848_CR46","first-page":"724","volume":"102","author":"S Leemans","year":"2021","unstructured":"Leemans S, van der Aalst W, Brockhoff T, Polyvyanyy A (2021) Stochastic process mining: earth movers\u2019 stochastic conformance. Inf Syst 102(101):724","journal-title":"Inf Syst"},{"key":"848_CR47","unstructured":"Leno V, Polyvyanyy A, La\u00a0Rosa M, Dumas M, Maggi F (2019) Action logger: enabling process mining for robotic process automation. In: BPM Demos"},{"issue":"3","key":"848_CR48","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12599-020-00641-4","volume":"63","author":"V Leno","year":"2021","unstructured":"Leno V, Polyvyanyy A, Dumas M, La Rosa M, Maggi FM (2021) Robotic process mining: vision and challenges. Bus Inf Syst Eng 63(3):301\u2013314","journal-title":"Bus Inf Syst Eng"},{"key":"848_CR49","first-page":"298","volume-title":"CAiSE Workshops","author":"F Leotta","year":"2015","unstructured":"Leotta F, Mecella M, Mendling J (2015) Applying process mining to smart spaces: perspectives and research challenges. CAiSE Workshops. Springer, Heidelberg, pp 298\u2013304"},{"issue":"1","key":"848_CR50","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TSE.2014.2360674","volume":"41","author":"S Lim","year":"2015","unstructured":"Lim S, Bentley P, Kanakam N, Ishikawa F, Honiden S (2015) Investigating country differences in mobile app user behavior and challenges for software engineering. IEEE Transact Softw Eng 41(1):40\u201364","journal-title":"IEEE Transact Softw Eng"},{"issue":"10","key":"848_CR51","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TKDE.2017.2720601","volume":"29","author":"A Maaradji","year":"2017","unstructured":"Maaradji A, Dumas M, La Rosa M, Ostovar A (2017) Detecting sudden and gradual drifts in business processes from execution traces. IEEE Transact Knowl Data Eng 29(10):2140\u20132154","journal-title":"IEEE Transact Knowl Data Eng"},{"issue":"5","key":"848_CR52","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s12599-016-0444-2","volume":"58","author":"A Maedche","year":"2016","unstructured":"Maedche A, Morana S, Schacht S, Werth D, Krumeich J (2016) Advanced user assistance systems. Bus Inf Syst Eng 58(5):367\u2013370","journal-title":"Bus Inf Syst Eng"},{"issue":"5","key":"848_CR53","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt F, Koschmider A, Baracaldo N, Weidlich M, Michael J (2019) Privacy-preserving process mining. Bus Inf Syst Eng 61(5):595\u2013614","journal-title":"Bus Inf Syst Eng"},{"key":"848_CR54","volume-title":"Business process management","author":"A Mart\u00ednez-Rojas","year":"2022","unstructured":"Mart\u00ednez-Rojas A, Jim\u00e9nez-Ram\u00edrez A, Enr\u00edquez JG, Reijers HA (2022) Analyzing variable human actions for robotic process automation. In: Di Ciccio C, Dijkman R, del R\u00edo Ortega A, Rinderle-Ma S (eds) Business process management. Springer, Cham"},{"issue":"6","key":"848_CR55","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1365\/s40702-020-00673-0","volume":"57","author":"B Maurer","year":"2020","unstructured":"Maurer B, Al-Taie C, Zimmermann P, Linn C, Werth D (2020) Aufgabenfelder und Einsatzm\u00f6glichkeiten von Desktop Activity Mining. HMD Prax Wirtschaftsinform 57(6):1163\u20131172","journal-title":"HMD Prax Wirtschaftsinform"},{"issue":"103","key":"848_CR56","first-page":"994","volume":"127","author":"J Munoz-Gama","year":"2022","unstructured":"Munoz-Gama J, Martin N, Fernandez-Llatas C, Johnson OA, Sep\u00falveda M, Helm E, Galvez-Yanjari V, Rojas E, Martinez-Millana A, Aloini D et al (2022) Process mining for healthcare: characteristics and challenges. J Biomed Inform 127(103):994","journal-title":"J Biomed Inform"},{"key":"848_CR57","volume-title":"Usability engineering","author":"J Nielsen","year":"1994","unstructured":"Nielsen J (1994) Usability engineering. Morgan Kaufmann, Burlington"},{"key":"848_CR58","doi-asserted-by":"crossref","unstructured":"O\u2019Hare N, Juan P, Schifanella R, He Y, Yin D, Chang Y (2016) Leveraging user interaction signals for web image search. In: International Conference on Research and Development in Information Retrieval, ACM, pp 559\u2013568","DOI":"10.1145\/2911451.2911532"},{"key":"848_CR59","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.chb.2013.07.049","volume":"30","author":"S Pachidi","year":"2014","unstructured":"Pachidi S, Spruit M, van de Weerd I (2014) Understanding users\u2019 behavior with software operation data mining. Comput Human Behav 30:583\u2013594","journal-title":"Comput Human Behav"},{"key":"848_CR60","doi-asserted-by":"crossref","unstructured":"Parks N (2012) Testing & quantifying ERP usability. In: Annual Conference on Research in Information Technology, ACM, p 31-36","DOI":"10.1145\/2380790.2380799"},{"issue":"5","key":"848_CR61","first-page":"5","volume":"21","author":"BT Pentland","year":"2020","unstructured":"Pentland BT, Recker J, Wolf JR, Wyner G (2020) Bringing context inside process research with digital trace data. J Assoc Inf Syst 21(5):5","journal-title":"J Assoc Inf Syst"},{"key":"848_CR62","unstructured":"Polyvyanyy A, Su Z, Lipovetzky N, Sardi\u00f1a S (2020) Goal recognition using off-the-shelf process mining techniques. In: International Conference on Autonomous Agents and Multiagent Systems, ACM, pp 1072\u20131080"},{"key":"848_CR63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85436-2","volume-title":"Scientific research in information systems","author":"J Recker","year":"2021","unstructured":"Recker J (2021) Scientific research in information systems, 2nd edn. Springer, Heidelberg","edition":"2"},{"key":"848_CR64","doi-asserted-by":"crossref","unstructured":"Rubin V, Mitsyuk A, Lomazova I, van der Aalst W (2014) Process mining can be applied to software too! In: International Symposium on Empirical Software Engineering and Measurement, ACM","DOI":"10.1145\/2652524.2652583"},{"issue":"5","key":"848_CR65","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1007\/s10270-020-00859-6","volume":"20","author":"R Seiger","year":"2021","unstructured":"Seiger R, K\u00fchn R, Korzetz M, A\u00dfmann U (2021) Holoflows: modelling of processes for the internet of things in mixed reality. Softw Syst Model 20(5):1465\u20131489","journal-title":"Softw Syst Model"},{"key":"848_CR66","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J Srivastava","year":"2000","unstructured":"Srivastava J, Cooley R, Deshpande M, Tan PN (2000) Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor 1:12\u201323","journal-title":"SIGKDD Explor"},{"issue":"2","key":"848_CR67","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"J Stanton","year":"2005","unstructured":"Stanton J, Stam K, Mastrangelo P, Jolton J (2005) Analysis of end user security behaviors. Comput Secur 24(2):124\u2013133","journal-title":"Comput Secur"},{"key":"848_CR68","doi-asserted-by":"crossref","unstructured":"Torok L, Pelegrino M, Lessa J, Trevisan D, Vasconcelos C, Clua E, Montenegro A (2015) Evaluating and customizing user interaction in an adaptive game controller. In: International Conference of Design, User Experience, and Usability, Springer, Heidelberg","DOI":"10.1007\/978-3-319-20889-3_30"},{"key":"848_CR69","doi-asserted-by":"crossref","unstructured":"Tour A, Polyvyanyy A, Kalenkova A (2021) Agent system mining: vision, benefits, and challenges. IEEE Access 9","DOI":"10.1109\/ACCESS.2021.3095464"},{"key":"848_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process mining: data science in action","author":"W van der Aalst","year":"2016","unstructured":"van der Aalst W (2016) Process mining: data science in action, 2nd edn. Springer, Heidelberg","edition":"2"},{"key":"848_CR71","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-30446-1_1","volume-title":"Software Engineering and Formal Methods","author":"W van der Aalst","year":"2019","unstructured":"van der Aalst W (2019) Object-centric process mining: dealing with divergence and convergence in event data. Software Engineering and Formal Methods. Springer, Heidelberg, pp 3\u201325"},{"key":"848_CR72","first-page":"5","volume-title":"International Conference on Data Science","author":"W van der Aalst","year":"2020","unstructured":"van der Aalst W (2020) On the pareto principle in process mining, task mining, and robotic process automation. International Conference on Data Science. SciTePress, Technology and Applications, pp 5\u201312"},{"key":"848_CR73","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-031-08848-3_17","volume-title":"Process mining handbook","author":"W van der Aalst","year":"2022","unstructured":"van der Aalst W, Carmona J (2022) Scaling process mining to turn insights into actions. Process mining handbook. Springer, Heidelberg, pp 495\u2013502"},{"issue":"4","key":"848_CR74","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s12599-018-0542-4","volume":"60","author":"W van der Aalst","year":"2018","unstructured":"van der Aalst W, Bichler M, Heinzl A (2018) Robotic process automation. Bus Inf Syst Eng 60(4):269\u2013272","journal-title":"Bus Inf Syst Eng"},{"key":"848_CR75","doi-asserted-by":"crossref","unstructured":"Wang G, Zhang X, Tang S, Wilson C, Zheng H, Zhao BY (2017) Clickstream user behavior models. ACM Transact Web 11(4):21:1\u201321:37","DOI":"10.1145\/3068332"},{"key":"848_CR76","unstructured":"Weinmann M, Valacich J, Schneider C, Jenkins JL, Hibbeln MT (2021) The path of the righteous: using trace data to understand fraud decisions in real time. MIS Q"},{"key":"848_CR77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-59432-2","volume-title":"Business process management: concepts, languages, architectures","author":"M Weske","year":"2019","unstructured":"Weske M (2019) Business process management: concepts, languages, architectures, 3rd edn. Springer, Heidelberg","edition":"3"},{"key":"848_CR78","doi-asserted-by":"crossref","unstructured":"Wynn MT, Lebherz J, van der Aalst W, Accorsi R, Di\u00a0Ciccio C, Jayarathna L, Verbeek H (2021) Rethinking the input for process mining: Insights from the XES survey and workshop. In: ICPM workshops, Springer, Heidelberg","DOI":"10.1007\/978-3-030-98581-3_1"},{"issue":"3","key":"848_CR79","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s41066-020-00226-2","volume":"6","author":"S van Zelst","year":"2021","unstructured":"van Zelst S, Mannhardt F, de Leoni M, Koschmider A (2021) Event abstraction in process mining: literature review and taxonomy. Granul Comput 6(3):719\u2013736","journal-title":"Granul Comput"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00848-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-023-00848-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00848-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T10:08:01Z","timestamp":1734689281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-023-00848-1"}},"subtitle":["A Research Agenda"],"short-title":[],"issued":{"date-parts":[[2024,1,5]]},"references-count":79,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["848"],"URL":"https:\/\/doi.org\/10.1007\/s12599-023-00848-1","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,5]]},"assertion":[{"value":"1 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}