{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:16Z","timestamp":1742913856071,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319192963"},{"type":"electronic","value":"9783319192970"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19297-0_1","type":"book-chapter","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T23:28:18Z","timestamp":1433287698000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Enterprise Operational Analysis Using DEMO and the Enterprise Operating System"],"prefix":"10.1007","author":[{"given":"Emmy","family":"Dudok","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio","family":"Guerreiro","sequence":"additional","affiliation":[]},{"given":"Eduard","family":"Babkin","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Pergl","sequence":"additional","affiliation":[]},{"given":"Steven J. H.","family":"van Kervel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Berlin (2011)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00899-3_1","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"WMP van der Aalst","year":"2009","unstructured":"van der Aalst, W.M.P.: Process-aware information systems: lessons to be learned from process mining. In: Jensen, K., van der Aalst, W.M. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 1\u201326. Springer, Heidelberg (2009)"},{"key":"1_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. In: Electronic Notes in Theoretical Computer Science, vol. 121, pp. 3\u201321 (2005)","DOI":"10.1016\/j.entcs.2004.10.013"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/11494744_5","volume-title":"Applications and Theory of Petri Nets 2005","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., de Medeiros, A.K.A., Weijters, A.: Genetic process mining. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 48\u201369. Springer, Heidelberg (2005)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16, 1128\u20131142 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR7","unstructured":"Basel Committee on Banking Supervision in 2010\u201311"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TNNLS.2013.2278313","volume":"25","author":"RPJC Bose","year":"2014","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P., Zliobaite, I., Pechenizkiy, M.: Dealing with concept drifts in process mining. IEEE Trans. Neural Netw. Learn. Syst. 25(1), 154\u2013171 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"1_CR9","unstructured":"Ciao! Consortium; Cooperation & Interoperability - Architecture & Ontology. www.ciaonetwork.org"},{"key":"1_CR10","unstructured":"DEMO Knowledge Centre, Design and Engineering Methodology for Organizations (2012). www.demo.nl"},{"key":"1_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33149-2","volume-title":"Enterprise Ontology: Theory and Methodology","author":"JLG Dietz","year":"2006","unstructured":"Dietz, J.L.G.: Enterprise Ontology: Theory and Methodology. Springer, Heidelberg (2006)"},{"issue":"1","key":"1_CR12","first-page":"86","volume":"3","author":"JLG Dietz","year":"2013","unstructured":"Dietz, J.L.G., Hoogervorst, J.A.P.: The discipline of enterprise engineering. Int. J. Organ. Des. Eng. 3(1), 86\u2013114 (2013)","journal-title":"Int. J. Organ. Des. Eng."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30464-7_29","volume-title":"Conceptual Modeling \u2013 ER 2004","author":"BF van Dongen","year":"2004","unstructured":"van Dongen, B.F., van der Aalst, W.M.: Multi-phase process mining: building instance graphs. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol. 3288, pp. 362\u2013376. Springer, Heidelberg (2004)"},{"key":"1_CR14","unstructured":"El Kharbili, M., de Medeiros, A.K.A., Stein, S., van der Aalst, W.M.P.: Business process compliance checking: current state and future challenges. In: MobIS, vol. 141, pp. 107\u2013113 (2008)"},{"key":"1_CR15","unstructured":"Franklin, F., Powell, D., Emami, A.: Feedback Control of Dynamic Systems, 6th edition. Addison-Wesley, Massachusetts (2009)"},{"key":"1_CR16","unstructured":"Guerreiro, S.: Enterprise governance enforcement in the operation of the runtime transactions using DEMO and ACM. In: Enterprise Engineering Working Conference (2011)"},{"key":"1_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-16419-4_29","volume-title":"ENTERprise Information Systems","author":"S Guerreiro","year":"2010","unstructured":"Guerreiro, S., Vasconcelos, A., Tribolet, J.: Adaptive access control modes enforcement in organizations. In: Quintela Varaj\u00e3o, J.E., Cruz-Cunha, M.M., Putnik, G.D., Trigo, A. (eds.) CENTERIS 2010. CCIS, vol. 110, pp. 283\u2013294. Springer, Heidelberg (2010)"},{"key":"1_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-33244-9_7","volume-title":"Knowledge and Technologies in Innovative Information Systems","author":"S Guerreiro","year":"2012","unstructured":"Guerreiro, S., van Kervel, S.J., Vasconcelos, A., Tribolet, J.: Executing enterprise dynamic systems control with the demo processor: the business transactions transition space validation. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.) MCIS 2012. LNBIP, vol. 129, pp. 97\u2013112. Springer, Heidelberg (2012)"},{"key":"1_CR19","unstructured":"Guerreiro, S., Kervel, S., Babkin, E.: Towards devising an architectural framework for enterprise operating systems. In: Proceedings of 8th International Conference on Software Paradigm Trends (2013)"},{"key":"1_CR20","unstructured":"Guerreiro, S., Tribolet, J.: Conceptualizing enterprise dynamic systems control for run-time business transactions. In: Proceedings of 21st European Conference on Information Systems, paper 56 (2013)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-75183-0_24","volume-title":"Business Process Management","author":"CW G\u00fcnther","year":"2007","unstructured":"G\u00fcnther, C.W., van der Aalst, W.M.: Fuzzy mining \u2013 adaptive process simplification based on multi-perspective metrics. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 328\u2013343. Springer, Heidelberg (2007)"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013105 (2004)","journal-title":"MIS Q."},{"issue":"2","key":"1_CR23","first-page":"87","volume":"19","author":"AR Hevner","year":"2007","unstructured":"Hevner, A.R.: A three cycle view of design science research. Inf. Syst. Decis. Sci. Scandinavian J. Inf. Syst. 19(2), 87\u201392 (2007)","journal-title":"Inf. Syst. Decis. Sci. Scandinavian J. Inf. Syst."},{"key":"1_CR24","unstructured":"Hintzen, J., van Kervel, S.J.H., van Meeuwen, T., Vermolen, J.A.J., Zijlstra, B.: A professional case management system in production, modeled and implemented using DEMO. In: Proceedings of 16th IEEE Conference on Business Informatics (2014)"},{"key":"1_CR25","unstructured":"van Kervel, S.J.H., Dietz, J.L.G., Hintzen, J., van Meeuwen, T., Zijlstra, B.: Enterprise ontology driven software engineering. In: Proceedings of 7th International Conference on Software Paradigm Trends (2012)"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-642-24574-9_55","volume-title":"Advances in Conceptual Modeling","author":"SJ van Kervel","year":"2011","unstructured":"van Kervel, S.J.: High quality technical documentation for large industrial plants using an enterprise engineering and conceptual modeling based software solution. In: De Troyer, O., Bauzer Medeiros, C., Billen, R., Hallot, P., Simitsis, A., Van Mingroot, H. (eds.) ER Workshops 2011. LNCS, vol. 6999, pp. 383\u2013388. Springer, Heidelberg (2011)"},{"key":"1_CR27","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-01915-9_9","volume-title":"Advances in Enterprise Engineering III","author":"D Van Nuffel","year":"2009","unstructured":"Van Nuffel, D., Mulder, H., Van Kervel, S.: Enhancing the formal foundations of BPMN by enterprise ontology. In: Albani, A., Barjis, J., Dietz, J.L. (eds.) CIAO! 2009. LNBIP, vol. 34, pp. 115\u2013129. Springer, Heidelberg (2009)"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-13241-4_11","volume-title":"Communications and Multimedia Security","author":"N Racz","year":"2010","unstructured":"Racz, N., Weippl, E., Seufert, A.: A frame of reference for research of integrated governance, risk and compliance (GRC). In: De Decker, B., Schaum\u00fcller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 106\u2013117. Springer, Heidelberg (2010)"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-319-10172-9_28","volume-title":"Business Process Management","author":"PH Richetti","year":"2014","unstructured":"Richetti, P.H., Bai\u00e3o, F.A., Santoro, F.M.: Declarative process mining: reducing discovered models complexity by pre-processing event logs. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 400\u2013407. Springer, Heidelberg (2014)"},{"key":"1_CR31","first-page":"159","volume-title":"Handbook of BPM","author":"S Sadiq","year":"2009","unstructured":"Sadiq, S., Governatori, G.: A methodological framework for aligning business processes and regulatory compliance. In: vom Brocke, J., Rosemann, M. (eds.) Handbook of BPM, vol. 2, pp. 159\u2013176. Springer, Heidelberg (2009)"},{"key":"1_CR32","unstructured":"Sarbanes\u2013Oxley Act of 2002 (2002). Sarbanes-Oxley Act. Pub.L. 107\u2013204, 116 Stat. 745, enacted 30 July 2002"},{"key":"1_CR33","volume-title":"Handbook of Research on E-Business Standards and Protocols: Documents, Data, and Advanced Web Technologies","author":"M Spies","year":"2012","unstructured":"Spies, M., Tabet, S.: Emerging standards and protocols for governance risk and compliance management. In: Kajan, E., Dorloff, F.D., Bedini, I. (eds.) Handbook of Research on E-Business Standards and Protocols: Documents, Data, and Advanced Web Technologies. IGI Global, Hershey (2012)"},{"key":"1_CR34","unstructured":"Verwaest, J.: Towards a comprehensive methodology for the implementation of Enterprise Governance & Assurance of IT, based on COBIT5, using the discipline of enterprise engineering. MSc. thesis, Antwerp Management School (2013)"},{"key":"1_CR35","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining with the heuristics miner-algorithm. In: BETA Working Paper Series, WP 166 (2006)"}],"container-title":["Lecture Notes in Business Information Processing","Advances in Enterprise Engineering IX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19297-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T11:58:13Z","timestamp":1674561493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19297-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319192963","9783319192970"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19297-0_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"3 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}