{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:07:50Z","timestamp":1774915670955,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T00:00:00Z","timestamp":1742342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T00:00:00Z","timestamp":1742342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Fraunhofer-Institut f\u00fcr Angewandte Informationstechnik FIT"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Process mining is a data-driven technique that leverages event logs to analyze, visualize, and improve business processes. However, data quality is often low in real-world settings due to various event log imperfections, which, in turn, degrade the accuracy and reliability of process mining insights. One notable example is the elusive case imperfection pattern, describing the absence of case identifiers responsible for linking events to a specific process instance. Elusive cases are particularly problematic, as process mining techniques rely heavily on the accurate mapping of events to instances to provide meaningful and actionable insights into business processes. To address this issue, the study follows the Design Science Research paradigm to iteratively develop a method for repairing the elusive case imperfection pattern in event logs. The proposed Hybrid Elusive Case Repair Method (<jats:italic>HERE<\/jats:italic>) combines a traditional, rule-based approach with generative artificial intelligence, specifically the Transformer architecture. By integrating domain knowledge, <jats:italic>HERE<\/jats:italic> constitutes a comprehensive human-in-the-loop approach, enhancing its ability to accurately repair elusive cases in event logs. The method is evaluated by instantiating it as a software prototype, applying it to repair three publicly accessible event logs, and seeking expert feedback in a total of 21 interviews conducted at different points during the design and development phase. The results demonstrate that <jats:italic>HERE<\/jats:italic> makes significant progress in addressing the elusive case imperfection pattern, particularly when provided with sufficient data volume, laying the groundwork for resolving further data quality issues in process mining.<\/jats:p>","DOI":"10.1007\/s12599-025-00935-5","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:41:35Z","timestamp":1742402495000},"page":"311-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Case ID Revealed HERE: Hybrid Elusive Case Repair Method for Transformer-Driven Business Process Event Log Enhancement"],"prefix":"10.1007","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9443-3485","authenticated-orcid":false,"given":"Felix","family":"Zetzsche","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7743-5772","authenticated-orcid":false,"given":"Robert","family":"Andrews","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2730-0201","authenticated-orcid":false,"given":"Arthur H. M.","family":"ter Hofstede","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4743-4511","authenticated-orcid":false,"given":"Maximilian","family":"R\u00f6glinger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-1708","authenticated-orcid":false,"given":"Sebastian Johannes","family":"Schmid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7205-8821","authenticated-orcid":false,"given":"Moe Thandar","family":"Wynn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,19]]},"reference":[{"issue":"1","key":"935_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1080\/2573234X.2021.1947751","volume":"5","author":"R Andrews","year":"2022","unstructured":"Andrews R, Emamjome F, ter Hofstede AHM, Reijers HA (2022) Root-cause analysis of process-data quality problems. J Bus Anal 5(1):51\u201375. https:\/\/doi.org\/10.1080\/2573234X.2021.1947751","journal-title":"J Bus Anal"},{"key":"935_CR6","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-030-02610-3_7","volume-title":"On the Move to Meaningful Internet Systems. OTM 2018 Conferences","author":"R Andrews","year":"2018","unstructured":"Andrews R, Suriadi S, Ouyang C, Poppe E (2018) Towards Event Log Querying for Data Quality: Let\u2019s Start with Detecting Log Imperfections. In: Panetto H, Debruyne C, Proper HA, Ardagna CA, Roman D, Meersman R (eds) On the Move to Meaningful Internet Systems. OTM 2018 Conferences. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-02610-3_7"},{"issue":"4","key":"935_CR7","doi-asserted-by":"publisher","first-page":"101,745","DOI":"10.1016\/j.jsis.2022.101745","volume":"31","author":"P Badakhshan","year":"2022","unstructured":"Badakhshan P, Wurm B, Grisold T, Geyer-Klingeberg J, Mendling J, vom Brocke J (2022) Creating business value with process mining. J Strateg Inf Syst 31(4):101,745. https:\/\/doi.org\/10.1016\/j.jsis.2022.101745","journal-title":"J Strateg Inf Syst"},{"key":"935_CR8","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12525-023-00680-1","volume":"33","author":"L Banh","year":"2023","unstructured":"Banh L, Strobel G (2023) Generative artificial intelligence. Electron Mark 33:63. https:\/\/doi.org\/10.1007\/s12525-023-00680-1","journal-title":"Electron Mark"},{"key":"935_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24106-7","volume-title":"Data and Information Quality: Dimensions, Principles and Techniques. Data-Centric Systems and Applications","author":"C Batini","year":"2016","unstructured":"Batini C, Scannapieco M (2016)  Data and Information Quality: Dimensions, Principles and Techniques. Data-Centric Systems and Applications. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-24106-7"},{"key":"935_CR10","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-39696-5_17","volume-title":"Advanced Information Systems Engineering","author":"D Bayomie","year":"2016","unstructured":"Bayomie D, Awad A, Ezat E (2016a) Correlating Unlabeled Events from Cyclic Business Processes Execution. In: Nurcan S, Soffer P, Bajec M, Eder J (eds) Advanced Information Systems  Engineering. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-39696-5_17"},{"key":"935_CR12","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-030-33223-5_12","volume-title":"Conceptual Modeling","author":"D Bayomie","year":"2019","unstructured":"Bayomie D, Di Ciccio C, La Rosa M, Mendling J (2019) A Probabilistic Approach to Event-Case Correlation for Process Mining. In: Laender AHF, Pernici B, Lim E-P, de Oliveira JPM (eds) Conceptual Modeling. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-33223-5_12"},{"key":"935_CR11","doi-asserted-by":"publisher","first-page":"102,167","DOI":"10.1016\/j.is.2023.102167","volume":"114","author":"D Bayomie","year":"2023","unstructured":"Bayomie D, Di Ciccio C, Mendling J (2023) Event-case correlation for process mining using probabilistic optimization. Inf Syst 114:102,167. https:\/\/doi.org\/10.1016\/j.is.2023.102167","journal-title":"Inf Syst"},{"key":"935_CR13","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-319-42887-1_20","volume-title":"Business process management workshops","author":"D Bayomie","year":"2016","unstructured":"Bayomie D, Helal IMA, Awad A, Ezat E, ElBastawissi A (2016b) Deducing Case IDs for Unlabeled Event Logs. In: Reichert M, Reijers HA (eds) Business Process Management Workshops. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-42887-1_20"},{"key":"935_CR14","doi-asserted-by":"publisher","unstructured":"Bayomie D, Revoredo K, Di\u00a0Ciccio C, Mendling J (2022) Improving Accuracy and Explainability in Event-Case Correlation via Rule Mining. In: 4th International Conference on Process Mining, Bolzano. https:\/\/doi.org\/10.1109\/ICPM57379.2022.9980684","DOI":"10.1109\/ICPM57379.2022.9980684"},{"key":"935_CR15","doi-asserted-by":"publisher","first-page":"103,837","DOI":"10.1016\/j.compind.2022.103837","volume":"146","author":"I Beerepoot","year":"2023","unstructured":"Beerepoot I, Di Ciccio C, Reijers HA, Rinderle-Ma S, Bandara W, Burattin A, Calvanese D et al (2023) The biggest business process management problems to solve before we die. Comput Ind 146:103,837. https:\/\/doi.org\/10.1016\/j.compind.2022.103837","journal-title":"Comput Ind"},{"key":"935_CR16","doi-asserted-by":"publisher","unstructured":"Beheshti A, Yang J, Sheng QZ, Benatallah B, Casati F, Dustdar S, Motahari Nezhad HR, Zhang X, Xue S (2023) ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence. In: 2023 IEEE International Conference on Web Services, Chicago. https:\/\/doi.org\/10.1109\/ICWS60048.2023.00099","DOI":"10.1109\/ICWS60048.2023.00099"},{"key":"935_CR17","unstructured":"Bukhsh ZA, Saeed A, Dijkman RM (2021) ProcessTransformer: Predictive Business Process Monitoring with Transformer Network. arXiv:2104.00721"},{"key":"935_CR18","doi-asserted-by":"publisher","unstructured":"Burattin A, Vigo R (2011) A framework for semi-automated process instance discovery from decorative attributes. In: 2011 IEEE Symposium on Computational Intelligence and Data Mining, Paris. https:\/\/doi.org\/10.1109\/CIDM.2011.5949450","DOI":"10.1109\/CIDM.2011.5949450"},{"key":"935_CR19","doi-asserted-by":"publisher","unstructured":"Busch K, Rochlitzer A, Sola D, Leopold H (2023) Just Tell Me: Prompt Engineering in Business Process Management. In: van der Aa H, Bork D, Proper HA, Schmidt R (eds) Enterprise, Business-Process and Information Systems Modeling. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-34241-7_1","DOI":"10.1007\/978-3-031-34241-7_1"},{"key":"935_CR20","doi-asserted-by":"publisher","unstructured":"Chen T, Han L, Demartini G, Indulska M, Sadiq S (2020) Building Data Curation Processes with Crowd Intelligence. In: Herbaut N, La Rosa M (eds) Advanced Information Systems Engineering. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58135-0_3","DOI":"10.1007\/978-3-030-58135-0_3"},{"issue":"3","key":"935_CR22","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Q 13(3):319\u2013340. https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Q"},{"key":"935_CR23","doi-asserted-by":"publisher","unstructured":"De Fazio R, Balzanella A, Marrone S, Marulli F, Verde L, Reccia V, Valletta P (2024) CaseID Detection for Process Mining: A Heuristic-Based Methodology. In: De Smedt J, Soffer P (eds) Process Mining Workshops. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-56107-8_4","DOI":"10.1007\/978-3-031-56107-8_4"},{"key":"935_CR70","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-031-08848-3_6","volume-title":"Process Mining Handbook","author":"J De Weerdt","year":"2022","unstructured":"De Weerdt J, Wynn MT (2022) Foundations of Process Event Data. In: van der Aalst WMP, Carmona J (eds) Process Mining Handbook. Springer, Cham, pp 193\u2013211. https:\/\/doi.org\/10.1007\/978-3-031-08848-3_6"},{"key":"935_CR21","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-031-08848-3_4","volume-title":"Process Mining Handbook","author":"C Di Ciccio","year":"2022","unstructured":"Di Ciccio C, Montali M (2022) Declarative Process Specifications: Reasoning, Discovery, Monitoring. In: van der Aalst WMP, Carmona J (eds) Process Mining Handbook. Springer, Cham, pp 108\u2013152. https:\/\/doi.org\/10.1007\/978-3-031-08848-3_4"},{"issue":"2","key":"935_CR25","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-021-00709-9","volume":"64","author":"Y Evron","year":"2022","unstructured":"Evron Y, Soffer P, Zamansky A (2022) Model-based Analysis of Data Inaccuracy Awareness in Business Processes. Bus Inf Syst Eng 64(2):183\u2013200. https:\/\/doi.org\/10.1007\/s12599-021-00709-9","journal-title":"Bus Inf Syst Eng"},{"key":"935_CR26","doi-asserted-by":"publisher","unstructured":"Ferreira DR, Gillblad D (2009) Discovering Process Models from Unlabelled Event Logs. In: Dayal U, Eder J, Koehler J, Reijers HA (eds) Business Process Management. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-03848-8_11","DOI":"10.1007\/978-3-642-03848-8_11"},{"issue":"1","key":"935_CR27","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s12599-023-00834-7","volume":"66","author":"S Feuerriegel","year":"2024","unstructured":"Feuerriegel S, Hartmann J, Janiesch C, Zschech P (2024) Generative AI. Bus Inf Syst Eng 66(1):111\u2013126. https:\/\/doi.org\/10.1007\/s12599-023-00834-7","journal-title":"Bus Inf Syst Eng"},{"key":"935_CR28","doi-asserted-by":"publisher","first-page":"102,039","DOI":"10.1016\/j.is.2022.102039","volume":"109","author":"DA Fischer","year":"2022","unstructured":"Fischer DA, Goel K, Andrews R, van Dun CGJ, Wynn MT, R\u00f6glinger M (2022) Towards interactive event log forensics: Detecting and quantifying timestamp imperfections. Inf Syst 109:102,039. https:\/\/doi.org\/10.1016\/j.is.2022.102039","journal-title":"Inf Syst"},{"key":"935_CR29","unstructured":"Galic G, Wolf M (2021) Delivering Value with Process Analytics: Process Mining adoption and success factors. https:\/\/www2.deloitte.com\/de\/de\/pages\/finance\/articles\/global-process-mining-survey-2021.html, Accessed 3 June 2024"},{"issue":"2","key":"935_CR30","doi-asserted-by":"publisher","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","volume":"37","author":"S Gregor","year":"2013","unstructured":"Gregor S, Hevner AR (2013) Positioning and Presenting Design Science Research for Maximum Impact. MIS Q 37(2):337\u2013355. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01","journal-title":"MIS Q"},{"issue":"2","key":"935_CR31","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1108\/BPMJ-03-2020-0112","volume":"27","author":"T Grisold","year":"2021","unstructured":"Grisold T, Mendling J, Otto M, vom Brocke J (2021) Adoption, use and management of process mining in practice. Bus Process Manag J 27(2):369\u2013387. https:\/\/doi.org\/10.1108\/BPMJ-03-2020-0112","journal-title":"Bus Process Manag J"},{"issue":"1","key":"935_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, March ST, Park J, Ram S (2004) Design Science in Information Systems Research. MIS Q 28(1):75\u2013105. https:\/\/doi.org\/10.2307\/25148625","journal-title":"MIS Q"},{"issue":"8","key":"935_CR33","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long Short-Term Memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"935_CR34","doi-asserted-by":"publisher","unstructured":"Hoffmann M, Malburg L, Bergmann R (2022) ProGAN: Toward a Framework for Process Monitoring and Flexibility by Change via Generative Adversarial Networks. In: Marrella A, Weber B (eds) Business Process Management Workshops. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-94343-1_4","DOI":"10.1007\/978-3-030-94343-1_4"},{"key":"935_CR35","doi-asserted-by":"publisher","unstructured":"Hofmann P, R\u00fcckel T, Urbach N (2021) Innovating with Artificial Intelligence: Capturing the Constructive Functional Capabilities of Deep Generative Learning. In: 54th Hawaii International Conference on System Sciences, Virtual. https:\/\/doi.org\/10.24251\/HICSS.2021.669","DOI":"10.24251\/HICSS.2021.669"},{"key":"935_CR36","doi-asserted-by":"publisher","first-page":"102,544","DOI":"10.1016\/j.ssresearch.2021.102544","volume":"97","author":"JK H\u00f6hne","year":"2021","unstructured":"H\u00f6hne JK, Krebs D, K\u00fchnel S-M (2021) Measurement properties of completely and end labeled unipolar and bipolar scales in Likert-type questions on income (in)equality. Soc Sci Res 97:102,544. https:\/\/doi.org\/10.1016\/j.ssresearch.2021.102544","journal-title":"Soc Sci Res"},{"key":"935_CR37","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s12525-021-00475-2","volume":"31","author":"C Janiesch","year":"2021","unstructured":"Janiesch C, Zschech P, Heinrich K (2021) Machine learning and deep learning. Electron Mark 31:685\u2013695. https:\/\/doi.org\/10.1007\/s12525-021-00475-2","journal-title":"Electron Mark"},{"key":"935_CR38","unstructured":"Kerremans I, Kerremans M (2023) The Impact of Generative AI on Process Mining. https:\/\/www.gartner.com\/doc\/reprints?id=1-2F77X9LO&ct=231003&st=sb, Accessed 2 May 2024"},{"key":"935_CR39","unstructured":"Mannhardt F (2017) Hospital Billing - Event Log. https:\/\/data.4tu.nl\/articles\/_\/12705113\/1, Accessed 4 June 2024"},{"issue":"4","key":"935_CR40","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March ST, Smith GF (1995) Design and natural science research on information technology. Decis Support Syst 15(4):251\u2013266. https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decis Support Syst"},{"issue":"4","key":"935_CR41","doi-asserted-by":"publisher","first-page":"725","DOI":"10.2307\/25148869","volume":"32","author":"ST March","year":"2008","unstructured":"March ST, Storey VC (2008) Design Science in the Information Systems Discipline: An Introduction to the Special Issue on Design Science Research. MIS Q 32(4):725\u2013730. https:\/\/doi.org\/10.2307\/25148869","journal-title":"MIS Q"},{"key":"935_CR42","doi-asserted-by":"publisher","first-page":"116,274","DOI":"10.1016\/j.eswa.2021.116274","volume":"191","author":"N Martin","year":"2022","unstructured":"Martin N, van Houdt G, Janssenswillen G (2022) DaQAPO: Supporting flexible and fine-grained event log quality assessment. Expert Syst Appl 191:116,274. https:\/\/doi.org\/10.1016\/j.eswa.2021.116274","journal-title":"Expert Syst Appl"},{"key":"935_CR43","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1007\/s10462-022-10246-w","volume":"56","author":"E Mosqueira-Rey","year":"2023","unstructured":"Mosqueira-Rey E, Hern\u00e1ndez-Pereira E, Alonso-R\u00edos D, Bobes-Bascar\u00e1n J, Fern\u00e1ndez-Leal \u00c1 (2023) Human-in-the-loop machine learning: a state of the art. Artif Intell Rev 56:3005\u20133054. https:\/\/doi.org\/10.1007\/s10462-022-10246-w","journal-title":"Artif Intell Rev"},{"issue":"1","key":"935_CR44","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers MD, Newman M (2007) The qualitative interview in IS research: Examining the craft. Inf Organ 17(1):2\u201326. https:\/\/doi.org\/10.1016\/j.infoandorg.2006.11.001","journal-title":"Inf Organ"},{"key":"935_CR45","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.eswa.2019.04.052","volume":"131","author":"HTC Nguyen","year":"2019","unstructured":"Nguyen HTC, Lee S, Kim J, Ko J, Comuzzi M (2019) Autoencoders for improving quality of process event logs. Expert Syst Appl 131:132\u2013147. https:\/\/doi.org\/10.1016\/j.eswa.2019.04.052","journal-title":"Expert Syst Appl"},{"key":"935_CR46","unstructured":"Padmanabhan B, Fang X, Sahoo N, Burton-Jones A (2022) Machine Learning in Information Systems Research. MIS Q 46(1):iii\u2013xviii"},{"key":"935_CR48","doi-asserted-by":"publisher","unstructured":"Peffers K, Rothenberger M, Tuunanen T, Vaezi R (2012) Design Science Research Evaluation. In: Peffers K, Rothenberger M, Kuechler B (eds) Design Science Research in Information Systems: Advances in Theory and Practice. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-29863-9_29","DOI":"10.1007\/978-3-642-29863-9_29"},{"issue":"3","key":"935_CR47","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S (2007) A Design Science Research Methodology for Information Systems Research. J Manag Inf Syst 24(3):45\u201377. https:\/\/doi.org\/10.2753\/MIS0742-1222240302","journal-title":"J Manag Inf Syst"},{"key":"935_CR49","doi-asserted-by":"publisher","unstructured":"Pegoraro M, Uysal MS, H\u00fclsmann T-H, van der Aalst WMP (2022) Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data. In: Augusto A, Gill A, Bork D, Nurcan S, Reinhartz-Berger I, Schmidt R (eds) Enterprise, Business-Process and Information Systems Modeling. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-07475-2_12","DOI":"10.1007\/978-3-031-07475-2_12"},{"key":"935_CR50","doi-asserted-by":"publisher","unstructured":"Pesic M, Schonenberg H, van der Aalst WM (2007) DECLARE: Full Support for Loosely-Structured Processes. In: 11th IEEE International Enterprise Distributed Object Computing Conference, Annapolis. https:\/\/doi.org\/10.1109\/EDOC.2007.14","DOI":"10.1109\/EDOC.2007.14"},{"key":"935_CR51","unstructured":"Pohl T, Berti A (2023) (Un)Fair Process Mining Event Logs. https:\/\/zenodo.org\/records\/8059489, Accessed 4 June 2024"},{"issue":"2","key":"935_CR52","doi-asserted-by":"publisher","first-page":"1742,002","DOI":"10.1142\/S0218843017420023","volume":"26","author":"S Pourmirza","year":"2017","unstructured":"Pourmirza S, Dijkman R, Grefen P (2017) Correlation Miner: Mining Business Process Models and Event Correlations Without Case Identifiers. Int J Coop Inf Syst 26(2):1742,002. https:\/\/doi.org\/10.1142\/S0218843017420023","journal-title":"Int J Coop Inf Syst"},{"issue":"2","key":"935_CR53","doi-asserted-by":"publisher","first-page":"441","DOI":"10.5465\/amr.2021.0421","volume":"50","author":"S Raisch","year":"2024","unstructured":"Raisch S, Fomina K (2024) Combining Human and Artificial Intelligence: Hybrid Problem-Solving in Organizations. Acad Manag Rev 50(2):441\u2013464. https:\/\/doi.org\/10.5465\/amr.2021.0421","journal-title":"Acad Manag Rev"},{"key":"935_CR54","unstructured":"Reinkemeyer L, R\u00f6glinger M, Kratsch W, Fabri L, Schmid S, Wittmann J (2023) Exploring the Interplay of Process Mining and Generative AI: Research and Recommendations for CoEs. https:\/\/www.celonis.com\/report\/fraunhofer-study\/genai\/download\/, Accessed 2 May 2024"},{"key":"935_CR55","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-662-65004-2_15","volume-title":"Digital Transformation","author":"S Rinderle-Ma","year":"2023","unstructured":"Rinderle-Ma S, Stertz F, Mangler J, Pauker F (2023) Process Mining\u2014Discovery, Conformance, and Enhancement of Manufacturing Processes. In: Vogel-Heuser B, Wimmer M (eds) Digital Transformation. Springer, Heidelberg, pp 363\u2013383. https:\/\/doi.org\/10.1007\/978-3-662-65004-2_15"},{"key":"935_CR56","doi-asserted-by":"publisher","unstructured":"Rivera\u00a0Lazo G, \u00d1anculef R (2022) Multi-attribute Transformers for Sequence Prediction in Business Process Management. In: Pascal P, Ienco D (eds) Discovery Science. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-18840-4_14","DOI":"10.1007\/978-3-031-18840-4_14"},{"issue":"1","key":"935_CR57","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/14780887.2013.801543","volume":"11","author":"OC Robinson","year":"2014","unstructured":"Robinson OC (2014) Sampling in Interview-Based Qualitative Research: A Theoretical and Practical Guide. Qual Res Psychol 11(1):25\u201341. https:\/\/doi.org\/10.1080\/14780887.2013.801543","journal-title":"Qual Res Psychol"},{"key":"935_CR60","doi-asserted-by":"publisher","unstructured":"Sadeghianasl S, ter Hofstede AHM, Suriadi S, Turkay S (2020) Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs. In: 2020 2nd International Conference on Process Mining, Virtual. https:\/\/doi.org\/10.1109\/ICPM49681.2020.00017","DOI":"10.1109\/ICPM49681.2020.00017"},{"key":"935_CR59","doi-asserted-by":"publisher","unstructured":"Sadeghianasl S, ter Hofstede AHM, Wynn MT, Suriadi S (2019) A Contextual Approach to Detecting Synonymous and Polluted Activity Labels in Process Event Logs. In: Panetto H, Debruyne C, Hepp M, Lewis D, Ardagna CA, Meersman R (eds) On the Move to Meaningful Internet Systems: OTM 2019 Conferences. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-33246-4_5","DOI":"10.1007\/978-3-030-33246-4_5"},{"key":"935_CR58","doi-asserted-by":"publisher","first-page":"107,875","DOI":"10.1016\/j.engappai.2024.107875","volume":"132","author":"S Sadeghianasl","year":"2024","unstructured":"Sadeghianasl S, ter Hofstede AHM, Wynn MT, T\u00fcrkay S (2024) Humans-in-the-loop: Gamifying activity label repair in process event logs. Eng Appl Artif Intell 132:107,875. https:\/\/doi.org\/10.1016\/j.engappai.2024.107875","journal-title":"Eng Appl Artif Intell"},{"key":"935_CR61","doi-asserted-by":"publisher","first-page":"102,246","DOI":"10.1016\/j.is.2023.102246","volume":"118","author":"SJ Schmid","year":"2023","unstructured":"Schmid SJ, Moder L, Hofmann P, R\u00f6glinger M (2023) Everything at the proper time: Repairing identical timestamp errors in event logs with Generative Adversarial Networks. Inf Syst 118:102,246. https:\/\/doi.org\/10.1016\/j.is.2023.102246","journal-title":"Inf Syst"},{"key":"935_CR62","doi-asserted-by":"publisher","unstructured":"Sonnenberg C, vom Brocke J (2012) Evaluations in the Science of the Artificial \u2013 Reconsidering the Build-Evaluate Pattern in Design Science Research. In: Peffers K, Rothenberger M, Kuechler B (eds) Design Science Research in Information Systems: Advances in Theory and Practice. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-29863-9_28","DOI":"10.1007\/978-3-642-29863-9_28"},{"key":"935_CR63","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.is.2016.07.011","volume":"64","author":"S Suriadi","year":"2017","unstructured":"Suriadi S, Andrews R, ter Hofstede AHM, Wynn MT (2017) Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Inf Syst 64:132\u2013150. https:\/\/doi.org\/10.1016\/j.is.2016.07.011","journal-title":"Inf Syst"},{"key":"935_CR64","unstructured":"Sutskever I, Vinyals O, Le QV (2014) Sequence to Sequence Learning with Neural Networks. arXiv:1409.3215"},{"key":"935_CR65","doi-asserted-by":"publisher","first-page":"60,578","DOI":"10.1109\/ACCESS.2023.3284053","volume":"11","author":"K Tajima","year":"2023","unstructured":"Tajima K, Du B, Narusue Y, Saito S, Iimura Y, Morikawa H (2023) Step-by-Step Case ID Identification Based on Activity Connection for Cross-Organizational Process Mining. IEEE Access 11:60,578-60,589. https:\/\/doi.org\/10.1109\/ACCESS.2023.3284053","journal-title":"IEEE Access"},{"key":"935_CR66","doi-asserted-by":"publisher","unstructured":"Taymouri F, La Rosa M, Erfani S, Bozorgi ZD, Verenich I (2020) Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction. In: Fahland D, Ghidini C, Becker J, Dumas M (eds) Business Process Management. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58666-9_14","DOI":"10.1007\/978-3-030-58666-9_14"},{"issue":"2","key":"935_CR67","doi-asserted-by":"publisher","first-page":"427","DOI":"10.25300\/MISQ\/2023\/16700","volume":"48","author":"T Tuunanen","year":"2024","unstructured":"Tuunanen T, Winter R, vom Brocke J (2024) Dealing with Complexity in Design Science Research: A Methodology Using Design Echelons. MIS Q 48(2):427\u2013458. https:\/\/doi.org\/10.25300\/MISQ\/2023\/16700","journal-title":"MIS Q"},{"key":"935_CR74","unstructured":"van der Aalst W (2010) Synthetic event logs \u2013 review example large.xes.gz. https:\/\/data.4tu.nl\/articles\/_\/12716609\/1, Accessed 4 June 2024"},{"key":"935_CR1","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-662-49851-4_14","volume-title":"Process Mining","author":"W van der Aalst","year":"2016","unstructured":"van der Aalst W (2016a) Analyzing \u201cSpaghetti Processes\u2019\u2019. In: van der Aalst W (ed) Process Mining. Springer, Heidelberg, pp 411\u2013427. https:\/\/doi.org\/10.1007\/978-3-662-49851-4_14"},{"key":"935_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-662-49851-4_5","volume-title":"Process mining","author":"W van der Aalst","year":"2016","unstructured":"van der Aalst W (2016b) Getting the Data. In: van der Aalst W (ed) Process Mining. Springer, Heidelberg, pp 125\u2013162. https:\/\/doi.org\/10.1007\/978-3-662-49851-4_5"},{"key":"935_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-662-49851-4_2","volume-title":"Process Mining","author":"W van der Aalst","year":"2016","unstructured":"van der Aalst W (2016c) Process Mining: The Missing Link. In: van der Aalst W (ed) Process Mining. Springer, Heidelberg, pp 25\u201352. https:\/\/doi.org\/10.1007\/978-3-662-49851-4_2"},{"key":"935_CR75","doi-asserted-by":"publisher","unstructured":"van der Aalst W, Adriansyah A, de Medeiros AKA, Arcieri F, Baier T, Blickle T, Bose JC, et al (2012) Process Mining Manifesto. In: Daniel F, Barkaoui K, Dustdar S (eds) Business Process Management Workshops. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19","DOI":"10.1007\/978-3-642-28108-2_19"},{"key":"935_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-08848-3_1","volume-title":"Process Mining Handbook","author":"WMP van der Aalst","year":"2022","unstructured":"van der Aalst WMP (2022) Process Mining: A 360 Degree Overview. In: van der Aalst WMP, Carmona J (eds) Process Mining Handbook. Springer, Cham, pp 3\u201334. https:\/\/doi.org\/10.1007\/978-3-031-08848-3_1"},{"key":"935_CR24","doi-asserted-by":"publisher","first-page":"113,880","DOI":"10.1016\/j.dss.2022.113880","volume":"165","author":"C van Dun","year":"2023","unstructured":"van Dun C, Moder L, Kratsch W, R\u00f6glinger M (2023) ProcessGAN: Supporting the creation of business process improvement ideas through generative machine learning. Decis Support Syst 165:113,880. https:\/\/doi.org\/10.1016\/j.dss.2022.113880","journal-title":"Decis Support Syst"},{"key":"935_CR68","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention Is All You Need. arXiv:1706.03762"},{"issue":"1","key":"935_CR69","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/ejis.2014.36","volume":"25","author":"J Venable","year":"2016","unstructured":"Venable J, Pries-Heje J, Baskerville R (2016) FEDS: a Framework for Evaluation in Design Science Research. Eur J Inf Syst 25(1):77\u201389. https:\/\/doi.org\/10.1057\/ejis.2014.36","journal-title":"Eur J Inf Syst"},{"key":"935_CR71","doi-asserted-by":"publisher","first-page":"124,181","DOI":"10.1016\/j.eswa.2024.124181","volume":"253","author":"S Weinzierl","year":"2024","unstructured":"Weinzierl S, Zilker S, Dunzer S, Matzner M (2024) Machine learning in business process management: A systematic literature review. Expert Syst Appl 253:124,181. https:\/\/doi.org\/10.1016\/j.eswa.2024.124181","journal-title":"Expert Syst Appl"},{"issue":"1","key":"935_CR72","doi-asserted-by":"publisher","first-page":"2346,059","DOI":"10.1080\/08839514.2024.2346059","volume":"38","author":"P Wu","year":"2024","unstructured":"Wu P, Fang X, Fang H, Gong Z, Kan D (2024) An Event Log Repair Method Based on Masked Transformer Model. Appl Artif Intell 38(1):2346,059. https:\/\/doi.org\/10.1080\/08839514.2024.2346059","journal-title":"Appl Artif Intell"},{"key":"935_CR73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98581-3_1","volume-title":"Process Mining Workshops","author":"MT Wynn","year":"2022","unstructured":"Wynn MT, Lebherz J, van der Aalst WMP, Accorsi R, Di Ciccio C, Jayarathna L, Verbeek HMW (2022) Rethinking the Input for Process Mining: Insights from the XES Survey and Workshop. In: Munoz-Gama J, Lu X (eds) Process Mining Workshops. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-98581-3_1"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00935-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-025-00935-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00935-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T15:20:23Z","timestamp":1756999223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-025-00935-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,19]]},"references-count":75,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["935"],"URL":"https:\/\/doi.org\/10.1007\/s12599-025-00935-5","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,19]]},"assertion":[{"value":"22 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}