{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:04:25Z","timestamp":1770545065404,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008815","name":"Libera Universit\u00e0 di Bolzano","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008815","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Business Process Deviance refers to the phenomenon where a subset of the executions of a business process deviate, in a negative or positive way, with respect to their expected or desirable outcomes. Deviant executions of a business process include ones which violate compliance rules, or executions that underachieve or exceed performance targets. Business Process Deviance Mining is concerned with uncovering the reasons for deviant executions by analyzing event logs stored by the systems which support the execution of a business process. Good characterizations of deviant executions give analysts insights concerning the causes that generate such deviance, thus providing effective process improvement solutions. In the paper, the problem of explaining deviations in business processes is investigated from a novel perspective that integrates sequential and declarative patterns with data attributes of events and traces in event logs. This integration provides process analysts with richer explanations than existing Deviance Mining approaches, thus guaranteeing a better characterization of deviant executions. The research methodology followed in the paper is the design science methodology for information systems research. Using real-life logs from multiple domains, a range of feature types and different forms of explanations are evaluated in terms of their ability to accurately discriminate between deviant and non-deviant executions of a process as well as in terms of understandability of the final outcome returned to the analysts.<\/jats:p>","DOI":"10.1007\/s12599-024-00911-5","type":"journal-article","created":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T02:34:27Z","timestamp":1738377267000},"page":"877-894","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Business Process Deviance Mining with Sequential and Declarative Patterns"],"prefix":"10.1007","volume":"67","author":[{"given":"Chiara","family":"Di Francescomarino","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Donadello","sequence":"additional","affiliation":[]},{"given":"Chiara","family":"Ghidini","sequence":"additional","affiliation":[]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Joonas","family":"Puura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,1]]},"reference":[{"key":"911_CR1","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In: VLDB, Morgan Kaufmann, pp 487\u2013499"},{"key":"911_CR2","doi-asserted-by":"crossref","unstructured":"Alman A, Donadello I, Maggi FM, Montali M (2023) Declarative process mining for software processes: The rum toolkit and the declare4py python library. In: PROFES (2), Springer, Lecture Notes in Computer Science, vol 14484, pp 13\u201319","DOI":"10.1007\/978-3-031-49269-3_2"},{"key":"911_CR3","unstructured":"Alter S (2015) Beneficial noncompliance and detrimental compliance: expected paths to unintended consequences. In: AMCIS, Association for Information Systems"},{"key":"911_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.17705\/1CAIS.03455","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter S (2014) Theory of workarounds. CAIS 34:55","journal-title":"CAIS"},{"key":"911_CR5","first-page":"267","volume":"8659","author":"A Armas-Cervantes","year":"2014","unstructured":"Armas-Cervantes A, Baldan P, Dumas M, Garc\u00eda-Ba\u00f1uelos L (2014) Behavioral comparison of process models based on canonically reduced event structures. BPM 8659:267\u2013282","journal-title":"BPM"},{"issue":"4","key":"911_CR6","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2019","unstructured":"Augusto A, Conforti R, Dumas M, La Rosa M, Maggi FM, Marrella A, Mecella M, Soo A (2019) Automated discovery of process models from event logs: review and benchmark. IEEE Trans Knowl Data Eng 31(4):686\u2013705","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"911_CR7","doi-asserted-by":"crossref","unstructured":"Bose RPJC, van\u00a0der Aalst WMP (2013) Discovering signature patterns from event logs. In: CIDM, IEEE, pp 111\u2013118","DOI":"10.1109\/CIDM.2013.6597225"},{"key":"911_CR8","first-page":"159","volume":"5701","author":"RPJC Bose","year":"2009","unstructured":"Bose RPJC, van der Aalst WMP (2009) Abstractions in process mining: A taxonomy of patterns. BPM 5701:159\u2013175","journal-title":"BPM"},{"key":"911_CR9","volume-title":"Conformance checking\u2013relating processes and models","author":"J Carmona","year":"2018","unstructured":"Carmona J, van Dongen BF, Solti A, Weidlich M (2018) Conformance checking\u2013relating processes and models. Springer, USA"},{"key":"911_CR10","first-page":"73","volume":"427","author":"A Cecconi","year":"2021","unstructured":"Cecconi A, Augusto A, Di Ciccio C (2021) Detection of statistically significant differences between process variants through declarative rules. BPM (forum) 427:73\u201391","journal-title":"BPM (forum)"},{"key":"911_CR11","doi-asserted-by":"crossref","unstructured":"Chen N, Hoi SCH, Xiao X (2011) Software process evaluation: a machine learning approach. In: ASE, IEEE Computer Society, pp 333\u2013342","DOI":"10.1109\/ASE.2011.6100070"},{"issue":"11","key":"911_CR12","doi-asserted-by":"publisher","first-page":"11,784","DOI":"10.1109\/TKDE.2022.3232207","volume":"35","author":"F Chesani","year":"2023","unstructured":"Chesani F, Francescomarino CD, Ghidini C, Loreti D, Maggi FM, Mello P, Montali M, Tessaris S (2023) Process discovery on deviant traces and other stranger things. IEEE Trans Knowl Data Eng 35(11):11,784-11,800","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"911_CR13","doi-asserted-by":"crossref","unstructured":"Cohen WW (1995) Fast effective rule induction. In: ICML, Morgan Kaufmann, pp 115\u2013123","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"911_CR14","first-page":"146","volume":"9415","author":"A Cuzzocrea","year":"2015","unstructured":"Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2015) A multi-view learning approach to the discovery of deviant process instances. OTM Conf 9415:146\u2013165","journal-title":"OTM Conf"},{"key":"911_CR15","first-page":"3809","volume":"2016","author":"A Cuzzocrea","year":"2016","unstructured":"Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2016) A multi-view multi-dimensional ensemble learning approach to mining business process deviances. IJCNN 2016:3809\u20133816","journal-title":"IJCNN"},{"issue":"4","key":"911_CR16","doi-asserted-by":"publisher","first-page":"1740003","DOI":"10.1142\/S0218843017400032","volume":"25","author":"A Cuzzocrea","year":"2016","unstructured":"Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2016) A robust and versatile multi-view learning framework for the detection of deviant business process instances. Int J Cooperative Inf Syst 25(4):1740003","journal-title":"Int J Cooperative Inf Syst"},{"key":"911_CR17","first-page":"162","volume":"2017","author":"A Cuzzocrea","year":"2017","unstructured":"Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2017) Extensions, analysis and experimental assessment of a probabilistic ensemble-learning framework for detecting deviances in business process instances. ICEIS 2017:162\u2013173","journal-title":"ICEIS"},{"key":"911_CR18","first-page":"1","volume":"7","author":"J Demsar","year":"2006","unstructured":"Demsar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330","journal-title":"J Mach Learn Res"},{"key":"911_CR19","first-page":"701","volume":"132","author":"B Depaire","year":"2012","unstructured":"Depaire B, Swinnen J, Jans M, Vanhoof K (2012) A process deviation analysis framework. Bpm Workshops 132:701\u2013706","journal-title":"Bpm Workshops"},{"issue":"1","key":"911_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s13740-014-0038-4","volume":"4","author":"C Di Ciccio","year":"2015","unstructured":"Di Ciccio C, Marrella A, Russo A (2015) Knowledge-intensive processes: Characteristics, requirements and analysis of contemporary approaches. J Data Semant 4(1):29\u201357","journal-title":"J Data Semant"},{"key":"911_CR21","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.is.2018.01.011","volume":"78","author":"C Di Ciccio","year":"2018","unstructured":"Di Ciccio C, Maggi FM, Montali M, Mendling J (2018) On the relevance of a business constraint to an event log. Inf Syst 78:144\u2013161","journal-title":"Inf Syst"},{"issue":"106","key":"911_CR22","first-page":"899","volume":"126","author":"I Donadello","year":"2023","unstructured":"Donadello I, Francescomarino CD, Maggi FM, Ricci F, Shikhizada A (2023) Outcome-oriented prescriptive process monitoring based on temporal logic patterns. Eng Appl Artif Intell 126(106):899","journal-title":"Eng Appl Artif Intell"},{"key":"911_CR23","doi-asserted-by":"crossref","unstructured":"Donadello I, Felli P, Innes C, Maggi FM, Montali M (2024) Conformance checking of fuzzy logs against declarative temporal specifications. BPM, Springer, Lecture Notes in Computer Science vol 14940, pp 39\u201356","DOI":"10.1007\/978-3-031-70396-6_3"},{"key":"911_CR24","unstructured":"Donadello I, Ko J, Maggi FM, Mendling J, Riva F, Weidlich M (2023b) Knowledge-driven modulation of neural networks with attention mechanism for next activity prediction. CoRR arXiv:2312.08847"},{"key":"911_CR25","unstructured":"Donadello I, Riva F, Maggi FM, Shikhizada A (2022) Declare4py: a python library for declarative process mining. In: BPM (phd\/demos), CEUR-WS.org, CEUR Workshop Proceedings, vol 3216, pp 117\u2013121"},{"key":"911_CR26","first-page":"145","volume-title":"vom Brocke J","author":"M Dumas","year":"2015","unstructured":"Dumas M, Maggi FM (2015) Enabling process innovation via deviance mining and predictive monitoring. In: Schmiedel T (ed) vom Brocke J. BPM\u2013driving innovation in a digital world, Springer, pp 145\u2013154"},{"issue":"2","key":"911_CR27","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10115-021-01633-w","volume":"64","author":"SA Fahrenkrog-Petersen","year":"2022","unstructured":"Fahrenkrog-Petersen SA, Tax N, Teinemaa I, Dumas M, de Leoni M, Maggi FM, Weidlich M (2022) Fire now, fire later: alarm-based systems for prescriptive process monitoring. Knowl Inf Syst 64(2):559\u2013587","journal-title":"Knowl Inf Syst"},{"key":"911_CR28","unstructured":"Gu Q, Li Z, Han J (2011) Generalized fisher score for feature selection. In: UAI, AUAI Press, pp 266\u2013273"},{"issue":"1","key":"911_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75\u2013105","journal-title":"MIS Q"},{"issue":"113","key":"911_CR30","first-page":"669","volume":"153","author":"J Kim","year":"2022","unstructured":"Kim J, Comuzzi M, Dumas M, Maggi FM, Teinemaa I (2022) Encoding resource experience for predictive process monitoring. Decis Support Syst 153(113):669","journal-title":"Decis Support Syst"},{"issue":"2","key":"911_CR31","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s40685-018-0076-0","volume":"12","author":"UM K\u00f6nig","year":"2019","unstructured":"K\u00f6nig UM, Linhart A, R\u00f6glinger M (2019) Why do business processes deviate? results from a delphi study. Bus Res 12(2):425\u2013453","journal-title":"Bus Res"},{"key":"911_CR32","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s100090100062","volume":"2023","author":"O Kupferman","year":"2003","unstructured":"Kupferman O, Vardi MY (2003) Vacuity detection in temporal model checking. Int J Softw Tools for Techn Transf 2023:224\u2013233","journal-title":"Int J Softw Tools for Techn Transf"},{"key":"911_CR33","doi-asserted-by":"crossref","unstructured":"Lakshmanan GT, Rozsnyai S, Wang F (2013) Investigating clinical care pathways correlated with outcomes. BPM, Springer, Lecture Notes in Computer Science vol 8094, pp 323\u2013338","DOI":"10.1007\/978-3-642-40176-3_27"},{"key":"911_CR34","first-page":"344","volume":"2007","author":"E Lamma","year":"2007","unstructured":"Lamma E, Mello P, Montali M, Riguzzi F, Storari S (2007) Inducing declarative logic-based models from labeled traces. BPM 2007:344\u2013359","journal-title":"BPM"},{"key":"911_CR35","first-page":"176","volume":"11080","author":"V Leno","year":"2018","unstructured":"Leno V, Dumas M, Maggi FM (2018) Correlating activation and target conditions in data-aware declarative process discovery. BPM 11080:176\u2013193","journal-title":"BPM"},{"issue":"101","key":"911_CR36","first-page":"482","volume":"89","author":"V Leno","year":"2020","unstructured":"Leno V, Dumas M, Maggi FM, La Rosa M, Polyvyanyy A (2020) Automated discovery of declarative process models with correlated data conditions. Inf Syst 89(101):482","journal-title":"Inf Syst"},{"key":"911_CR37","first-page":"297","volume":"9253","author":"A Leontjeva","year":"2015","unstructured":"Leontjeva A, Conforti R, Di Francescomarino C, Dumas M, Maggi FM (2015) Complex symbolic sequence encodings for predictive monitoring of business processes. BPM 9253:297\u2013313","journal-title":"BPM"},{"key":"911_CR38","doi-asserted-by":"crossref","unstructured":"Lo D, Khoo S, Liu C (2007) Efficient mining of iterative patterns for software specification discovery. In: KDD, ACM, pp 460\u2013469","DOI":"10.1145\/1281192.1281243"},{"key":"911_CR39","doi-asserted-by":"crossref","unstructured":"Maggi FM, Corapi D, Russo A, Lupu E, Visaggio G (2010) Revising process models through inductive learning. In: Bpm workshops, pp 182\u2013193","DOI":"10.1007\/978-3-642-20511-8_16"},{"key":"911_CR40","first-page":"270","volume":"7328","author":"FM Maggi","year":"2012","unstructured":"Maggi FM, Bose RPJC, van der Aalst WMP (2012) Efficient discovery of understandable declarative process models from event logs. Caise 7328:270\u2013285","journal-title":"Caise"},{"key":"911_CR41","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-40176-3_8","volume-title":"Business process management","author":"FM Maggi","year":"2013","unstructured":"Maggi FM, Dumas M, Garc\u00eda-Ba\u00f1uelos L, Montali M (2013) Discovering data-aware declarative process models from event logs. In: Daniel F, Wang J, Weber B (eds) Business process management. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 81\u201396"},{"key":"911_CR42","first-page":"158","volume":"9850","author":"FM Maggi","year":"2016","unstructured":"Maggi FM, Montali M, Di Ciccio C, Mendling J (2016) Semantical vacuity detection in declarative process mining. BPM 9850:158\u2013175","journal-title":"BPM"},{"key":"911_CR43","first-page":"436","volume":"8841","author":"H Nguyen","year":"2014","unstructured":"Nguyen H, Dumas M, La Rosa M, Maggi FM, Suriadi S (2014) Mining business process deviance: a quest for accuracy. OTM Conf 8841:436\u2013445","journal-title":"OTM Conf"},{"issue":"4","key":"911_CR44","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/2629446","volume":"5","author":"A Partington","year":"2015","unstructured":"Partington A, Wynn MT, Suriadi S, Ouyang C, Karnon J (2015) Process mining for clinical processes: a comparative analysis of four Australian hospitals. ACM Trans Management Inf Syst 5(4):19:1-19:18","journal-title":"ACM Trans Management Inf Syst"},{"issue":"3","key":"911_CR45","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2008","unstructured":"Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S (2008) A design science research methodology for information systems research. J Manag Inf Syst 24(3):45\u201377","journal-title":"J Manag Inf Syst"},{"key":"911_CR46","unstructured":"Pesic M (2008) Constraint-based workflow management systems: shifting control to users. PhD thesis, TU\/e"},{"key":"911_CR47","volume-title":"C45: Programs for Machine Learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C45: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA"},{"issue":"115","key":"911_CR48","first-page":"962","volume":"187","author":"PHP Richetti","year":"2022","unstructured":"Richetti PHP, Jazbik LS, Bai\u00e3o FA, Campos MLM (2022) Deviance mining with treatment learning and declare-based encoding of event logs. Expert Syst Appl 187(115):962","journal-title":"Expert Syst Appl"},{"key":"911_CR49","doi-asserted-by":"crossref","unstructured":"Sadiq SW, Sadiq W, Orlowska ME (2001) Pockets of flexibility in workflow specification. ER, Springer, Lecture Notes in Computer Science vol 2224, pp 513\u2013526","DOI":"10.1007\/3-540-45581-7_38"},{"key":"911_CR50","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.is.2019.01.007","volume":"84","author":"A Senderovich","year":"2019","unstructured":"Senderovich A, Francescomarino CD, Maggi FM (2019) From knowledge-driven to data-driven inter-case feature encoding in predictive process monitoring. Inf Syst 84:255\u2013264","journal-title":"Inf Syst"},{"key":"911_CR51","unstructured":"Simon C, Mendling J (2006) Verification of forbidden behavior in epcs. In: Modellierung, GI, LNI, vol P-82, pp 233\u2013242"},{"key":"911_CR52","first-page":"47","volume":"12875","author":"T Slaats","year":"2021","unstructured":"Slaats T, Debois S, Back CO (2021) Weighing the pros and cons: process discovery with negative examples. BPM 12875:47\u201364","journal-title":"BPM"},{"key":"911_CR53","doi-asserted-by":"crossref","unstructured":"Sun C, Du J, Chen N, Khoo S, Yang Y (2013) Mining explicit rules for software process evaluation. In: ICSSP, ACM, pp 118\u2013125","DOI":"10.1145\/2486046.2486067"},{"key":"911_CR54","first-page":"449","volume":"7908","author":"S Suriadi","year":"2013","unstructured":"Suriadi S, Wynn MT, Ouyang C, ter Hofstede AHM, van Dijk NJ (2013) Understanding process behaviours in a large insurance company in Australia: a case study. Caise 7908:449\u2013464","journal-title":"Caise"},{"key":"911_CR55","first-page":"43","volume":"181","author":"S Suriadi","year":"2014","unstructured":"Suriadi S, Mans R, Wynn MT, Partington A, Karnon J (2014) Measuring patient flow variations: a cross-organisational process mining approach. AP-BPM 181:43\u201358","journal-title":"AP-BPM"},{"issue":"2","key":"911_CR56","doi-asserted-by":"publisher","first-page":"17:1","DOI":"10.1145\/3301300","volume":"13","author":"I Teinemaa","year":"2019","unstructured":"Teinemaa I, Dumas M, La Rosa M, Maggi FM (2019) Outcome-oriented predictive process monitoring: review and benchmark. ACM Trans Knowl Discov Data 13(2):17:1-17:57","journal-title":"ACM Trans Knowl Discov Data"},{"key":"911_CR57","doi-asserted-by":"crossref","unstructured":"Teinemaa I, Tax N, de\u00a0Leoni M, Dumas M, Maggi FM (2018) Alarm-based prescriptive process monitoring. In: Business process management forum\u2013BPM forum 2018, sydney, nsw, australia, september 9-14, 2018, proceedings, Springer, Lecture Notes in Business Information Processing, vol 329, pp 91\u2013107","DOI":"10.1007\/978-3-319-98651-7_6"},{"key":"911_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining-Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst WMP (2016) Process Mining-Data Science in Action, 2nd edn. Springer, USA. https:\/\/doi.org\/10.1007\/978-3-662-49851-4","edition":"2"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00911-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-024-00911-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00911-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T07:14:52Z","timestamp":1764314092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-024-00911-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["911"],"URL":"https:\/\/doi.org\/10.1007\/s12599-024-00911-5","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]},"assertion":[{"value":"18 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}