{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T07:57:18Z","timestamp":1776671838030,"version":"3.51.2"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005722","name":"Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005722","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2026,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Process mining, a family of techniques for analyzing large amounts of data collected on business processes, has gained significant practical and academic importance. Extant process mining research mainly examines technical aspects. Only recently has research started to investigate organizational aspects of process mining, such as how organizations use process mining to create business value. On an individual level, research has examined the analysis strategies of individual process mining analysts. So far, however, the literature does not provide a holistic investigation of individual process mining use, including individuals\u2019 behavior, cognition, and affective states. Yet, understanding individual process mining use is pivotal for realizing its organizational value. To address this shortcoming, this paper examines the individual use of process mining employing a multiple case study with process mining users from six large organizations in a post-adoption context, i.e., in organizations that have several years of experience with process mining. Based on the configuration of how process mining users act, think, and feel in practice, four distinct process mining user categories were identified: (1) process mining influencers, (2) power users, (3) process participants, and (4) strategic users. For practitioners, the findings provide insights into the actual process mining use of individuals and what shapes their use patterns. This information enables tailoring process mining training and algorithms to specific user categories.<\/jats:p>","DOI":"10.1007\/s12599-025-00931-9","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T14:40:32Z","timestamp":1739889632000},"page":"319-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["How do Process Mining Users Act, Think, and Feel?"],"prefix":"10.1007","volume":"68","author":[{"given":"Jana","family":"Ammann","sequence":"first","affiliation":[]},{"given":"Laura","family":"Lohoff","sequence":"additional","affiliation":[]},{"given":"Bastian","family":"Wurm","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Hess","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"issue":"4","key":"931_CR1","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/S0148-2963(03)00138-3","volume":"58","author":"J Agarwal","year":"2005","unstructured":"Agarwal J, Malhotra NK (2005) An integrated model of attitude and affect: theoretical foundation and an empirical investigation. J Bus Res 58(4):483\u2013493","journal-title":"J Bus Res"},{"issue":"2","key":"931_CR2","first-page":"102","volume":"8","author":"S Aguirre","year":"2017","unstructured":"Aguirre S, Parra C, Sep\u00falveda M (2017) Methodological proposal for process mining projects. Int J Bus Integr Manag 8(2):102\u2013113","journal-title":"Int J Bus Integr Manag"},{"key":"931_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2019.113113","volume":"125","author":"N Ain","year":"2019","unstructured":"Ain N, Vaia G, DeLone WH, Waheed M (2019) Two decades of research on business intelligence system adoption, utilization and success \u2013 a systematic literature review. Decis Support Syst 125:1\u201313","journal-title":"Decis Support Syst"},{"issue":"4","key":"931_CR4","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2018","unstructured":"Augusto A, Conforti R, Dumas M, La Rosa M, Maggi FM, Marrella A, Mecella M, Soo A (2018) Automated discovery of process models from event logs: review and benchmark. IEEE Trans Knowl Data Eng 31(4):686\u2013705","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"931_CR5","unstructured":"Aysolmaz B, Nemeth M, Iren D (2021) A method for objective performance benchmarking of teams with process mining and DEA. In: Proceedings of the 29th European conference on information systems, Marrakesh"},{"issue":"4","key":"931_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jsis.2022.101745","volume":"31","author":"P Badakhshan","year":"2022","unstructured":"Badakhshan P, Wurm B, Grisold T, Geyer-Klingeberg J, Mendling J, vom Brocke J (2022) Creating business value with process mining. J Strateg Inf Syst 31(4):1\u201344","journal-title":"J Strateg Inf Syst"},{"issue":"7","key":"931_CR7","first-page":"361","volume":"15","author":"FF Bagayogo","year":"2014","unstructured":"Bagayogo FF, Lapointe L, Bassellier G (2014) Enhanced use of IT: a new perspective on post-adoption. J Assoc Inf Syst 15(7):361\u2013387","journal-title":"J Assoc Inf Syst"},{"issue":"3","key":"931_CR8","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1080\/0960085X.2020.1718007","volume":"29","author":"A Baiyere","year":"2020","unstructured":"Baiyere A, Salmela H, Tapanainen T (2020) Digital transformation and the new logics of business process management. Eur J Inf Syst 29(3):238\u2013259","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"931_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.2307\/25750701","volume":"34","author":"A Beaudry","year":"2010","unstructured":"Beaudry A, Pinsonneault A (2010) The other side of acceptance: studying the direct and indirect effects of emotions on information technology use. MIS Q 34(4):689\u2013710","journal-title":"MIS Q"},{"issue":"2","key":"931_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.2307\/25148634","volume":"28","author":"A Bhattacherjee","year":"2004","unstructured":"Bhattacherjee A, Premkumar G (2004) Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test. MIS Q 28(2):229\u2013254","journal-title":"MIS Q"},{"key":"931_CR11","unstructured":"van den Broek T, van Veenstra AF (2015) Modes of governance in inter-organizational data collaborations. In: Proceedings of the 23rd European conference on information systems, M\u00fcnster"},{"issue":"2","key":"931_CR12","first-page":"79","volume":"5","author":"SA Brown","year":"2004","unstructured":"Brown SA, Fuller RM, Vician C (2004) Who\u2019s afraid of the virtual world? Anxiety and computer-mediated communication. J Assoc Inf Syst 5(2):79\u2013107","journal-title":"J Assoc Inf Syst"},{"issue":"4","key":"931_CR13","doi-asserted-by":"publisher","first-page":"657","DOI":"10.2307\/25148815","volume":"31","author":"A Burton-Jones","year":"2007","unstructured":"Burton-Jones A, Gallivan MJ (2007) Toward a deeper understanding of system usage in organizations: a multilevel perspective. MIS Q 31(4):657\u2013679","journal-title":"MIS Q"},{"issue":"3","key":"931_CR14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1287\/isre.1060.0096","volume":"17","author":"A Burton-Jones","year":"2006","unstructured":"Burton-Jones A, Straub DW (2006) Reconceptualizing system usage: an approach and empirical test. Inf Syst Res 17(3):228\u2013246","journal-title":"Inf Syst Res"},{"issue":"1","key":"931_CR15","first-page":"1","volume":"1","author":"A Burton-Jones","year":"2017","unstructured":"Burton-Jones A, Stein M-K, Mishra A (2017) MIS quarterly research curation on IS use. MIS Q Res Curations 1(1):1\u201324","journal-title":"MIS Q Res Curations"},{"key":"931_CR16","unstructured":"Celonis (2022) Celonis raises $1b in funding at $13b valuation. https:\/\/www.celonis.com\/press\/crunchbase-celonis-raises-1billion. Accessed 23 Oct 2024"},{"issue":"4","key":"931_CR17","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen H, Chiang RHL, Storey VC (2012) Business intelligence and analytics: from big data to big impact. MIS Q 36(4):1165\u20131188","journal-title":"MIS Q"},{"issue":"4","key":"931_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/07421222.2015.1138364","volume":"32","author":"DQ Chen","year":"2015","unstructured":"Chen DQ, Preston DS, Swink M (2015) How the use of big data analytics affects value creation in supply chain management. J Manag Inf Syst 32(4):4\u201339","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"931_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1287\/mnsc.36.2.123","volume":"36","author":"RB Cooper","year":"1990","unstructured":"Cooper RB, Zmud RW (1990) Information technology implementation research: a technological diffusion approach. Manag Sci 36(2):123\u2013139","journal-title":"Manag Sci"},{"issue":"8","key":"931_CR20","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis FD, Bagozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 35(8):982\u20131003","journal-title":"Manag Sci"},{"issue":"4","key":"931_CR21","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","volume":"19","author":"WH DeLone","year":"2003","unstructured":"DeLone WH, McLean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. J Manag Inf Syst 19(4):9\u201330","journal-title":"J Manag Inf Syst"},{"issue":"3","key":"931_CR22","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1287\/mnsc.49.3.273.12736","volume":"49","author":"S Devaraj","year":"2003","unstructured":"Devaraj S, Kohli R (2003) Performance impacts of information technology: Is actual usage the missing link? Manag Sci 49(3):273\u2013289","journal-title":"Manag Sci"},{"issue":"4","key":"931_CR23","doi-asserted-by":"publisher","first-page":"597","DOI":"10.2307\/30036550","volume":"27","author":"L Dub\u00e9","year":"2003","unstructured":"Dub\u00e9 L, Par\u00e9 G (2003) Rigor in information systems positivist case research: current practices, trends, and recommendations. MIS Q 27(4):597\u2013636","journal-title":"MIS Q"},{"issue":"7","key":"931_CR24","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0148-2963(00)00195-8","volume":"55","author":"A Dubois","year":"2002","unstructured":"Dubois A, Gadde L-E (2002) Systematic combining: an abductive approach to case research. J Bus Res 55(7):553\u2013560","journal-title":"J Bus Res"},{"key":"931_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of business process management","author":"M Dumas","year":"2018","unstructured":"Dumas M, La Rosa M, Mendling J, Reijers HA (2018) Fundamentals of business process management, 2nd edn. Springer, Heidelberg","edition":"2"},{"key":"931_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-030-85469-0_23","volume-title":"Business process management LNCS","author":"R Eden","year":"2021","unstructured":"Eden R, Syed R, Leemans SJJ, Buijs JACM (2021) A case study of inconsistency in process mining use: implications for the theory of effective use. In: Polyvyanyy A et al (eds) Business process management LNCS, vol 12875. Springer, Cham, pp 363\u2013379"},{"issue":"5","key":"931_CR27","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s12599-021-00715-x","volume":"63","author":"J Eggers","year":"2021","unstructured":"Eggers J, Hein A, B\u00f6hm M, Krcmar H (2021) No longer out of sight, no longer out of mind? How organizations engage with process mining-induced transparency to achieve increased process awareness. Bus Inf Syst Eng 63(5):491\u2013510","journal-title":"Bus Inf Syst Eng"},{"key":"931_CR28","unstructured":"Eggers J, Hein A (2020) Turning big data into value: a literature review on business value realization from process mining. In: Proceedings of the 28th European conference on information systems, Marrakesh"},{"key":"931_CR29","unstructured":"Eggers J, H\u00e4ge M-C, Zimmermann S, Gewald H (2023) Assessing process mining use cases: a taxonomy of antecedents and value potentials of process mining. In: Proceedings of the 29th Americas conference on information systems, Panama City"},{"issue":"4","key":"931_CR30","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2307\/258557","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt KM (1989) Building theories from case study research. Acad Manag Rev 14(4):532\u2013550","journal-title":"Acad Manag Rev"},{"key":"931_CR31","unstructured":"El-Khatib R, Barki H (2012) The relationship between habit and intention in post-adoptive is acceptance. In: Proceedings of the 18th Americas conference on information systems, Seattle"},{"key":"931_CR32","unstructured":"Fortune Business Insights (2024) Process mining software market, Report ID: FBI104792. https:\/\/www.fortunebusinessinsights.com\/process-mining-software-market-104792. Accessed 17 Oct 2024"},{"issue":"6","key":"931_CR33","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/isj.12080","volume":"25","author":"KE Greenaway","year":"2015","unstructured":"Greenaway KE, Chan YE, Crossler RE (2015) Company information privacy orientation: a conceptual framework. Inf Syst J 25(6):579\u2013606","journal-title":"Inf Syst J"},{"issue":"2","key":"931_CR34","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1108\/BPMJ-03-2020-0112","volume":"27","author":"T Grisold","year":"2020","unstructured":"Grisold T, Mendling J, Otto M, vom Brocke J (2020) Adoption, use and management of process mining in practice. Bus Proc Manag J 27(2):369\u2013387","journal-title":"Bus Proc Manag J"},{"issue":"1","key":"931_CR35","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1177\/02683962231208724","volume":"39","author":"T Grisold","year":"2024","unstructured":"Grisold T, Kremser W, Mendling J, Recker J, vom Brocke J, Wurm B (2024) Generating impactful situated explanations through digital trace data. J Inf Technol 39(1):2\u201318","journal-title":"J Inf Technol"},{"key":"931_CR36","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.jbusres.2016.08.004","volume":"70","author":"A Gunasekaran","year":"2017","unstructured":"Gunasekaran A, Papadopoulos T, Dubey R, Wamba SF, Childe SJ, Hazen B, Akter S (2017) Big data and predictive analytics for supply chain and organizational performance. J Bus Res 70:308\u2013317","journal-title":"J Bus Res"},{"issue":"3","key":"931_CR37","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.jsis.2017.07.003","volume":"26","author":"WA G\u00fcnther","year":"2017","unstructured":"G\u00fcnther WA, Rezazade Mehrizi MH, Huysman M, Feldberg F (2017) Debating big data: a literature review on realizing value from big data. J Strateg Inf Syst 26(3):191\u2013209","journal-title":"J Strateg Inf Syst"},{"issue":"3","key":"931_CR38","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1057\/palgrave.ejis.3000663","volume":"16","author":"JJP-A Hsieh","year":"2007","unstructured":"Hsieh JJP-A, Wang W (2007) Explaining employees\u2019 extended use of complex information systems. Eur J Inf Syst 16(3):216\u2013227","journal-title":"Eur J Inf Syst"},{"issue":"11","key":"931_CR39","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1287\/mnsc.1110.1398","volume":"57","author":"JJP-A Hsieh","year":"2011","unstructured":"Hsieh JJP-A, Rai A, Xu SX (2011) Extracting business value from IT: a sensemaking perspective of post-adoptive use. Manag Sci 57(11):2018\u20132039","journal-title":"Manag Sci"},{"issue":"3","key":"931_CR40","first-page":"257","volume":"32","author":"TC-K Huang","year":"2012","unstructured":"Huang TC-K, Liu C-C, Chang D-C (2012) An empirical investigation of factors influencing the adoption of data mining tools. Int J Inf Manag 32(3):257\u2013270","journal-title":"Int J Inf Manag"},{"issue":"3","key":"931_CR41","doi-asserted-by":"publisher","first-page":"279","DOI":"10.2307\/249498","volume":"21","author":"M Igbaria","year":"1997","unstructured":"Igbaria M, Zinatelli N, Cragg P, Angele LMC (1997) Personal computing acceptance factors in small firms: a structural equation model. MIS Q 21(3):279\u2013305","journal-title":"MIS Q"},{"issue":"1","key":"931_CR42","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1207\/s15327590ijhc1901_8","volume":"19","author":"V Jain","year":"2005","unstructured":"Jain V, Kanungo S (2005) Beyond perceptions and usage: Impact of nature of information systems use on information system-enabled productivity. Int J Hum-Comput Interact 19(1):113\u2013136","journal-title":"Int J Hum-Comput Interact"},{"issue":"3","key":"931_CR43","doi-asserted-by":"publisher","first-page":"525","DOI":"10.2307\/25148694","volume":"29","author":"J Jasperson","year":"2005","unstructured":"Jasperson J, Carter PE, Zmud RW (2005) A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Q 29(3):525\u2013557","journal-title":"MIS Q"},{"issue":"3","key":"931_CR44","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1287\/isre.1100.0314","volume":"22","author":"GC Kane","year":"2011","unstructured":"Kane GC, Labianca G (2011) IS avoidance in health-care groups: a multilevel investigation. Inf Syst Res 22(3):504\u2013522","journal-title":"Inf Syst Res"},{"issue":"2","key":"931_CR45","doi-asserted-by":"publisher","first-page":"183","DOI":"10.2307\/249751","volume":"23","author":"E Karahanna","year":"1999","unstructured":"Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q 23(2):183\u2013213","journal-title":"MIS Q"},{"key":"931_CR46","unstructured":"Kerremans M, Srivastava T, Choudhary F (2021) Market guide for process mining. Gartner, Inc. https:\/\/www.gartner.com\/doc\/reprints?id=1-289D1SO7&ct=211129&st=sb. Accessed 27 Jan 2022"},{"issue":"6","key":"931_CR47","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.ijhcs.2006.11.009","volume":"65","author":"H-W Kim","year":"2007","unstructured":"Kim H-W, Chan HC, Chan YP (2007) A balanced thinking \u2013 feelings model of information systems continuance. Int J Hum-Comput Stud 65(6):511\u2013525","journal-title":"Int J Hum-Comput Stud"},{"issue":"3","key":"931_CR48","doi-asserted-by":"publisher","first-page":"461","DOI":"10.2307\/25148692","volume":"29","author":"L Lapointe","year":"2005","unstructured":"Lapointe L, Rivard S (2005) A multilevel model of resistance to information technology implementation. MIS Q 29(3):461\u2013491","journal-title":"MIS Q"},{"issue":"4","key":"931_CR49","doi-asserted-by":"publisher","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem M, Hirt SG, Cheung CMK (2007) How habit limits the predictive power of intention: the case of information systems continuance. MIS Q 31(4):705\u2013737","journal-title":"MIS Q"},{"key":"931_CR50","unstructured":"Lohoff L, Engert SP (2024) Better not invented here: Investigating algorithm appreciation in process mining. In: Proceedings of the 32nd European conference on information systems, Paphos"},{"key":"931_CR51","unstructured":"Lohoff L (2022) A taxonomy for digital process innovation. In: Proceedings of the Pacific Asia conference on information systems, Taipei"},{"key":"931_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-024-00860-z","author":"A Mamudu","year":"2024","unstructured":"Mamudu A, Bandara W, Wynn MT, Leemans SJJ (2024) Process mining success factors and their interrelationships. Bus Inf Syst Eng. https:\/\/doi.org\/10.1007\/s12599-024-00860-z","journal-title":"Bus Inf Syst Eng"},{"issue":"5","key":"931_CR53","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt F, Koschmider A, Baracaldo N, Weidlich M, Michael J (2019) Privacy-preserving process mining. Bus Inf Syst Eng 61(5):595\u2013614","journal-title":"Bus Inf Syst Eng"},{"key":"931_CR54","doi-asserted-by":"crossref","unstructured":"Mannhardt F, Petersen SA, Oliveira MF (2018) Privacy challenges for process mining in human-centered industrial environments. In: Proceedings of the 14th international conference on intelligent environments (IE), Rome","DOI":"10.1109\/IE.2018.00017"},{"key":"931_CR55","unstructured":"Mans RR, Reijers H, Berends H, Bandara W, Prince R (2013) Business process mining success. In: Proceedings of the 21st European conference on information systems, Utrecht"},{"issue":"5","key":"931_CR56","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s12599-021-00720-0","volume":"63","author":"N Martin","year":"2021","unstructured":"Martin N, Fischer DA, Kerpedzhiev GD, Goel K, Leemans SJJ, R\u00f6glinger M, van der Aalst WMP, Dumas M, La Rosa M, Wynn MT (2021) Opportunities and challenges for process mining in organizations: results of a Delphi study. Bus Inf Syst Eng 63(5):511\u2013527","journal-title":"Bus Inf Syst Eng"},{"issue":"3","key":"931_CR57","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10115-009-0224-0","volume":"21","author":"L M\u0103ru\u015fter","year":"2009","unstructured":"M\u0103ru\u015fter L, van Beest NRTP (2009) Redesigning business processes: a methodology based on simulation and process mining techniques. Knowl Inf Syst 21(3):267\u2013297","journal-title":"Knowl Inf Syst"},{"key":"931_CR58","volume-title":"Qualitative data analysis: an expanded sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook, 2nd edn. Sage, Thousand Oaks","edition":"2"},{"key":"931_CR59","volume-title":"Qualitative data analysis: a methods sourcebook","author":"MB Miles","year":"2014","unstructured":"Miles MB, Huberman AM, Salda\u00f1a J (2014) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage, Thousand Oaks","edition":"3"},{"issue":"1","key":"931_CR60","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers MD, Newman M (2007) The qualitative interview in IS research: examining the craft. Inf Organ 17(1):2\u201326","journal-title":"Inf Organ"},{"issue":"3","key":"931_CR61","doi-asserted-by":"publisher","first-page":"433","DOI":"10.2307\/20650303","volume":"33","author":"A Ort\u00edz de Guinea","year":"2009","unstructured":"Ort\u00edz de Guinea A, Markus ML (2009) Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use. MIS Q 33(3):433\u2013444","journal-title":"MIS Q"},{"issue":"4","key":"931_CR62","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.25300\/MISQ\/2013\/37.4.08","volume":"37","author":"A Ort\u00edz de Guinea","year":"2013","unstructured":"Ort\u00edz de Guinea A, Webster J (2013) An investigation of information systems use patterns: technological events as triggers, the effect of time, and consequences for performance. MIS Q 37(4):1165\u20131188","journal-title":"MIS Q"},{"issue":"1","key":"931_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3041218","volume":"8","author":"A Pika","year":"2017","unstructured":"Pika A, Leyer M, Wynn MT, Fidge CJ, ter Hofstede AHM, van der Aalst WMP (2017) Mining resource profiles from event logs. ACM Trans Manag Inf Syst 8(1):1\u201330","journal-title":"ACM Trans Manag Inf Syst"},{"key":"931_CR64","unstructured":"Reinkemeyer L, Grindemann P, Egli V, R\u00f6glinger M, Marcus L, Fabri L (2022) Accelerating business transformation with process mining centers of excellence (CoEs). Celonis SE, Fraunhofer Institute for Applied Information Technology FIT"},{"issue":"1","key":"931_CR65","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1111\/jbl.12082","volume":"36","author":"T Schoenherr","year":"2015","unstructured":"Schoenherr T, Speier-Pero C (2015) Data science, predictive analytics, and big data in supply chain management: current state and future potential. J Bus Logist 36(1):120\u2013132","journal-title":"J Bus Logist"},{"issue":"1","key":"931_CR66","first-page":"1","volume":"16","author":"A Singh","year":"2017","unstructured":"Singh A, Hess T (2017) How chief digital officers promote the digital transformation of their companies. MIS Q Exec 16(1):1\u201317","journal-title":"MIS Q Exec"},{"issue":"7","key":"931_CR67","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1108\/IJPDLM-01-2018-0041","volume":"49","author":"A Sodero","year":"2019","unstructured":"Sodero A, Jin YH, Barratt M (2019) The social process of big data and predictive analytics use for logistics and supply chain management. Int J Phys Distrib Logist Manag 49(7):706\u2013726","journal-title":"Int J Phys Distrib Logist Manag"},{"issue":"2","key":"931_CR68","doi-asserted-by":"publisher","first-page":"367","DOI":"10.25300\/MISQ\/2015\/39.2.05","volume":"39","author":"M-K Stein","year":"2015","unstructured":"Stein M-K, Newell S, Wagner EL, Galliers RD (2015) Coping with information technology: mixed emotions, vacillation, and nonconforming use patterns. MIS Q 39(2):367\u2013392","journal-title":"MIS Q"},{"key":"931_CR69","doi-asserted-by":"crossref","unstructured":"Stein Dani V, Leopold H, van der Werf JME, Beerepoot I, Reijers HA (2024) From loss of interest to denial: a study on the terminators of process mining initiatives. In: International conference on advanced information systems engineering, Limassol","DOI":"10.1007\/978-3-031-61057-8_22"},{"key":"931_CR70","doi-asserted-by":"publisher","unstructured":"Stertz F, Mangler J, Scheibel B, Rinderle-Ma S (2021) Expectations vs. experiences \u2013 process mining in small and medium sized manufacturing companies. In: Business process management forum. https:\/\/doi.org\/10.1007\/978-3-030-85440-9_12","DOI":"10.1007\/978-3-030-85440-9_12"},{"issue":"4","key":"931_CR71","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/41703494","volume":"36","author":"D Straub","year":"2012","unstructured":"Straub D, del Giudice M (2012) Editor\u2019s comments: Use. MIS Q 36(4):iii\u2013vii","journal-title":"MIS Q"},{"issue":"1","key":"931_CR72","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2307\/25148624","volume":"28","author":"M Subramani","year":"2004","unstructured":"Subramani M (2004) How do suppliers benefit from information technology use in supply chain relationships? MIS Q 28(1):45\u201373","journal-title":"MIS Q"},{"issue":"4","key":"931_CR73","doi-asserted-by":"publisher","first-page":"633","DOI":"10.5465\/amj.2006.22083020","volume":"49","author":"R Suddaby","year":"2006","unstructured":"Suddaby R (2006) From the editors: what grounded theory is not. Acad Manag J 49(4):633\u2013642","journal-title":"Acad Manag J"},{"key":"931_CR74","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-030-58638-6_14","volume-title":"Business process management forum","author":"R Syed","year":"2020","unstructured":"Syed R, Leemans SJJ, Eden R, Buijs JACM (2020) Process mining adoption. In: Fahland D et al (eds) Business process management forum. Springer, Cham, pp 229\u2013245"},{"issue":"3","key":"931_CR75","doi-asserted-by":"publisher","first-page":"141","DOI":"10.2753\/MIS0742-1222300306","volume":"30","author":"PP Tallon","year":"2013","unstructured":"Tallon PP, Ramirez RV, Short JE (2013) The information artifact in IT governance: toward a theory of information governance. J Manag Inf Syst 30(3):141\u2013177","journal-title":"J Manag Inf Syst"},{"issue":"4","key":"931_CR76","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1108\/BPMJ-06-2017-0148","volume":"24","author":"M Thiede","year":"2018","unstructured":"Thiede M, F\u00fcrstenau D, Barquet APB (2018) How is process mining technology used by organizations? A systematic literature review of empirical studies. Bus Proc Manag J 24(4):900\u2013922","journal-title":"Bus Proc Manag J"},{"issue":"3","key":"931_CR77","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1177\/0735275112457914","volume":"30","author":"S Timmermans","year":"2012","unstructured":"Timmermans S, Tavory I (2012) Theory construction in qualitative research: from grounded theory to abductive analysis. Sociol Theor 30(3):167\u2013186","journal-title":"Sociol Theor"},{"key":"931_CR78","first-page":"169","volume-title":"Business process management workshops","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst WMP, Adriansyah A, de Medeiros AKA, Arcieri F, Baier T, Blickle T, Bose JC, van den Brand P, Brandtjen R, Buijs J, Burattin A, Carmona J, Castellanos M, Claes J, Cook J, Costantini N, Curbera F, Damiani E, de Leoni M, Delias P, van Dongen BF, Dumas M, Dustdar S, Fahland D, Ferreira DR, Gaaloul W, van Geffen F, Goel S, G\u00fcnther C, Guzzo A, Harmon P, ter Hofstede A, Hoogland J, Ingvaldsen JE, Kato K, Kuhn R, Kumar A, La Rosa M, Maggi F, Malerba D, Mans RS, Manuel A, McCreesh M, Mello P, Mendling J, Montali M, Motahari-Nezhad HR, Zur Muehlen M, Munoz-Gama J, Pontieri L, Ribeiro J, Rozinat A, Seguel P\u00e9rez H, Seguel P\u00e9rez R, Sep\u00falveda M, Sinur J, Soffer P, Song M, Sperduti A, Stilo G, Stoel C, Swenson K, Talamo M, Tan W, Turner C, Vanthienen J, Varvaressos G, Verbeek E, Verdonk M, Vigo R, Wang J, Weber B, Weidlich M, Weijters T, Wen L, Westergaard M, Wynn M (2011) Process mining manifesto. In: Daniel F et al (eds) Business process management workshops. Springer, Heidelberg, pp 169\u2013194"},{"key":"931_CR79","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-319-19069-3_19","volume-title":"Advanced information systems engineering","author":"ML van Eck","year":"2015","unstructured":"van Eck ML, Lu X, Leemans SJJ, van der Aalst WMP (2015) PM2: a process mining project methodology. In: Zdravkovic J et al (eds) Advanced information systems engineering. Springer, Cham, pp 297\u2013313"},{"issue":"3","key":"931_CR80","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478","journal-title":"MIS Q"},{"issue":"5","key":"931_CR81","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s12599-021-00718-8","volume":"63","author":"J vom Brocke","year":"2021","unstructured":"vom Brocke J, Jans M, Mendling J, Reijers HA (2021) A five-level framework for research on process mining. Bus Inf Syst Eng 63(5):483\u2013490","journal-title":"Bus Inf Syst Eng"},{"issue":"2","key":"931_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306607","volume":"28","author":"S Wagner","year":"2019","unstructured":"Wagner S, Fern\u00e1ndez DM, Felderer M, Vetr\u00f2 A, Kalinowski M, Wieringa R, Pfahl D, Conte T, Christiansson M-T, Greer D (2019) Status quo in requirements engineering: a theory and a global family of surveys. ACM Trans Softw Eng Methodol 28(2):1\u201348","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"931_CR83","unstructured":"Wurm B, Claus R (2024) Reflection on action: the role of process mining for process change. In: Proceedings of the 45th international conference on information systems, Bangkok"},{"key":"931_CR84","volume-title":"Case study research and applications: design and methods","author":"RK Yin","year":"2018","unstructured":"Yin RK (2018) Case study research and applications: design and methods, vol 6. Sage, Thousand Oaks"},{"key":"931_CR85","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-85440-9_9","volume-title":"Business process management forum","author":"F Zerbato","year":"2021","unstructured":"Zerbato F, Soffer P, Weber B (2021) Initial insights into exploratory process mining practices. In: Polyvyanyy A et al (eds) Business process management forum. Springer, Cham, pp 145\u2013161"},{"key":"931_CR86","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-031-16103-2_19","volume-title":"Business process management","author":"F Zerbato","year":"2022","unstructured":"Zerbato F, Soffer P, Weber B (2022) Process mining practices: evidence from interviews. In: Di Ciccio C et al (eds) Business process management. Springer, Cham, pp 268\u2013285"},{"issue":"1","key":"931_CR87","doi-asserted-by":"publisher","first-page":"247","DOI":"10.25300\/MISQ\/2013\/37.1.11","volume":"37","author":"P Zhang","year":"2013","unstructured":"Zhang P (2013) The affective response model: a theoretical framework of affective concepts and their relationships in the ICT context. MIS Q 37(1):247\u2013274","journal-title":"MIS Q"},{"issue":"3","key":"931_CR88","doi-asserted-by":"publisher","first-page":"811","DOI":"10.25300\/MISQ\/2017\/41.3.07","volume":"41","author":"X Zhang","year":"2017","unstructured":"Zhang X (2017) Knowledge management system use and job performance: a multilevel contingency model. MIS Q 41(3):811\u2013840","journal-title":"MIS Q"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00931-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-025-00931-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00931-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T07:01:56Z","timestamp":1776668516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-025-00931-9"}},"subtitle":["An Explorative Study of Process Mining Use Patterns"],"short-title":[],"issued":{"date-parts":[[2025,2,18]]},"references-count":88,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["931"],"URL":"https:\/\/doi.org\/10.1007\/s12599-025-00931-9","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,18]]},"assertion":[{"value":"24 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}