{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:19:58Z","timestamp":1759483198326,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T00:00:00Z","timestamp":1440374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,24]]},"DOI":"10.1145\/2785592.2785612","type":"proceedings-article","created":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T18:24:13Z","timestamp":1439317453000},"page":"137-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A process mining approach to measure how users interact with software: an industrial case study"],"prefix":"10.1145","author":[{"given":"Saulius","family":"Astromskis","sequence":"first","affiliation":[{"name":"Free University of Bolzano, Italy"}]},{"given":"Andrea","family":"Janes","sequence":"additional","affiliation":[{"name":"Free University of Bolzano, Italy"}]},{"given":"Michael","family":"Mairegger","sequence":"additional","affiliation":[{"name":"Schwer Pr\u00e4zision, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,8,24]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","volume":"26","author":"Astromskis S.","year":"2013","unstructured":"S. Astromskis, A. Janes, A. Sillitti, and G. Succi. Implementing organization-wide gemba using non-invasive process mining. Cutter IT Journal, 26(4), 2013.","journal-title":"Implementing organization-wide gemba using non-invasive process mining. Cutter IT Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1142\/S0218194014400117"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/580949"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/865128"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/1793114.1793145"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Advanced Computer Control","author":"Haung K.-Z.","year":"2011","unstructured":"K.-Z. Haung, T. Chen, and Y.-K. Chung. Perspectives on process mining within cloud computing. In International Conference on Advanced Computer Control, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"July","author":"Testing Qualifications Board International Software","year":"2014","unstructured":"International Software Testing Qualifications Board. Standard glossary of terms used in software testing, July 2014."},{"doi-asserted-by":"publisher","unstructured":"A. Janes and G. Succi. The dark side of agile software development. In Proceedings of the ACM international symposium on New ideas new paradigms and reflections on programming and software Conference on Systems Programming and Applications: Software for Humanity (SPLASH) Onward! Tucson AZ USA 2012. ACM. 10.1145\/2384592.2384612","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2384592.2384612"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.17487\/RFC4122"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICSMC.2011.6083858"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/CSMR.2011.5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2652524.2652583"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/SACI.2014.6840098"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/977403.978497"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/WI-IAT.2010.288"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/WETICE.2011.64"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/1983446"},{"key":"e_1_3_2_1_18_1","volume-title":"2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). IEEE","author":"W. M.","year":"2011","unstructured":"W. M. P. van der Aalst. Process mining: discovering and improving Spaghetti and Lasagna processes. In 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). IEEE, April 2011."},{"unstructured":"Introduction Related work Data collection Data analysis Results Threats to validity Conclusion References","key":"e_1_3_2_1_19_1"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ICSSP '15","name":"ICSSP '15: International Conference on Software and Systems Process 2015","location":"Tallinn Estonia"},"container-title":["Proceedings of the 2015 International Conference on Software and System Process"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785592.2785612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785592.2785612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:10Z","timestamp":1750223230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785592.2785612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,24]]},"references-count":19,"alternative-id":["10.1145\/2785592.2785612","10.1145\/2785592"],"URL":"https:\/\/doi.org\/10.1145\/2785592.2785612","relation":{},"subject":[],"published":{"date-parts":[[2015,8,24]]},"assertion":[{"value":"2015-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}