Business Process Management Forum: BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Lecture Notes in Business Information Processing Series
v.458 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (237 Seiten) |
ISBN: | 9783031161711 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049408575 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 231114s2022 |||| o||u| ||||||eng d | ||
020 | |a 9783031161711 |9 978-3-031-16171-1 | ||
035 | |a (ZDB-30-PQE)EBC7081053 | ||
035 | |a (ZDB-30-PAD)EBC7081053 | ||
035 | |a (ZDB-89-EBL)EBL7081053 | ||
035 | |a (OCoLC)1344160861 | ||
035 | |a (DE-599)BVBBV049408575 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 658.05 | |
084 | |a QP 340 |0 (DE-625)141861: |2 rvk | ||
100 | 1 | |a Di Ciccio, Claudio |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business Process Management Forum |b BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
250 | |a 1st ed | ||
264 | 1 | |a Cham |b Springer International Publishing AG |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (237 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Business Information Processing Series |v v.458 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents -- Modeling and Design -- Why Do Banks Find Business Process Compliance so Challenging? An Australian Perspective -- 1 Introduction -- 2 Background and Related Work -- 2.1 Business Process Compliance -- 2.2 Australian Banking Context -- 3 Methodology, Results, and Overview -- 3.1 Methodology -- 3.2 Results -- 3.3 Overview -- 4 Discussion -- 5 Limitations of the Study -- 6 Conclusion -- References -- On the Use of the Conformance and Compliance Keywords During Verification of Business Processes -- 1 Introduction -- 2 Verification and the Business Process Management Lifecycle -- 2.1 Business Process Management Artifacts Used for Verification -- 2.2 Verification Relations -- 3 The Goals of Verification Within Business Process Management -- 3.1 System Conformance -- 3.2 Process Conformance -- 3.3 Model Conformance -- 3.4 Model Compliance -- 3.5 Regulatory Compliance -- 4 Overview of the Relations and Goals of Verification -- 5 Discussion -- 5.1 Should Process Conformance Be Used to Prove Regulatory Compliance? -- 5.2 Should Regulatory Compliance Be Used to Prove Process Conformance? -- 5.3 Should Process Conformance Always Be Used to Prove Legal Conformance? -- 6 Conclusion -- References -- A Data-Centric Approach to Design Resilient-Aware Process Models in BPMN -- 1 Introduction -- 2 Related Work -- 3 Business Process Modeling Notation -- 3.1 Running Example -- 4 Maturity Model -- 4.1 Level 0 - No Resilience Awareness -- 4.2 Level 1 - Failure Awareness -- 4.3 Level 2 - Risk and Quality Awareness -- 4.4 Level 3 - Alternative Data Awareness -- 4.5 Level 4 - Data Recovery Awareness -- 5 Extending BPMN -- 6 User Evaluation and Concluding Remarks -- References -- The Early Process Catches the Weak Event: Process Latency and Strategies for Its Reduction -- 1 Introduction -- 2 Research Context | |
505 | 8 | |a 2.1 Explorative BPM Techniques -- 2.2 Process Latency -- 3 Research Methodology -- 4 Process Latency Reduction Strategies -- 5 Discussion -- 6 Conclusions, Limitations, and Future Work -- References -- Bridging the Gap Between Process Mining Methodologies and Process Mining Practices -- 1 Introduction -- 2 Theoretical Background -- 2.1 Process Optimization Methodologies -- 2.2 Challenges and Enables of Process Mining in Organizations -- 2.3 Process Mining Methodologies -- 3 Methodology -- 3.1 Practitioner and Expert Interviews -- 3.2 Gap Analysis -- 4 Results -- 4.1 Local Government Professionals -- 4.2 Process Mining Experts -- 4.3 Elements of Process Mining Methodologies -- 4.4 Comparison Table Gap Analysis -- 4.5 Gap Analysis -- 5 Conclusion and Discussion -- References -- Process Mining -- Systems Mining with Heraklit: The Next Step -- 1 Introduction -- 2 Modules and Their Composition -- 2.1 Example: Occurrence Modules of a Retail Business -- 2.2 The Formal Framework of Modules -- 2.3 Completing the Example -- 2.4 Composing an Occurrence Module from Occurrence Atoms -- 3 System Models -- 3.1 Structures and Signatures -- 3.2 System Atoms and Their Composition -- 3.3 Constructing a System Net from Symbolic Occurrence Modules -- 3.4 Deriving a Net Schema -- 4 How to Mine a System Model -- 4.1 From Logs to Runs -- 4.2 From Runs to Systems -- 5 Related Work -- 6 Conclusion -- References -- Conformance Checking over Stochastically Known Logs -- 1 Introduction -- 2 Stochastic Trace Model -- 3 Stochastic Alignment Algorithm -- 4 Empirical Evaluation -- 4.1 The Datasets -- 4.2 Data Preparation and Experiment Design -- 4.3 Results -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Alpha Precision: Estimating the Significant System Behavior in a Model -- 1 Introduction -- 2 Preliminaries -- 3 Alpha Precision -- 3.1 Rationale and Design | |
505 | 8 | |a 3.2 Estimation Method -- 3.3 Estimating the System Support Size -- 4 Empirical Evaluation -- 4.1 Unbiasedness Estimator -- 4.2 Demonstration on Real-Life Event Logs -- 4.3 Impact of K and -- 4.4 Discussion -- 5 Related Work -- 6 Conclusions -- References -- Learning to Act: A Reinforcement Learning Approach to Recommend the Best Next Activities -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Prescriptive Process Monitoring -- 2.3 Reinforcement Learning -- 3 Two Motivating Scenarios -- 4 Mapping PPM to RL -- 5 Evaluation of the Recommendation Policy -- 5.1 Datasets -- 5.2 Experimental Setting -- 5.3 Results -- 6 Related Work -- 7 Conclusion -- References -- Predictive Process Monitoring -- Change Detection in Dynamic Event Attributes -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 The Three Dimensions of Change -- 4.2 Change Detection as a Before-After Comparison -- 4.3 Statistical Tests -- 4.4 Connecting Continuous and Categorical Event Attributes -- 5 Evaluation -- 5.1 Dataset -- 5.2 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Dealing with Unexpected Runtime Outcomes Within Process Models -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Satisfying Obligations -- 3.2 Executions and States -- 4 Full Compliance of Process Models -- 4.1 Compliance Checking: Required Properties -- 5 Detecting Runtime Deviations -- 5.1 Detection -- 5.2 Assessment -- 6 Reparation -- 6.1 Computational Complexity -- 6.2 Effective Evaluation -- 6.3 A Practical Approach -- 7 Summary -- References -- Detecting Context-Aware Deviations in Process Executions -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Deviation Detection -- 2.2 Context -- 3 Preliminaries -- 4 Context-Aware Deviation Detection -- 4.1 Context-Aware Deviation Detection Problem -- 4.2 Context-Awareness | |
505 | 8 | |a 5 Framework for Context-Aware Deviation Detection -- 5.1 Running Example -- 5.2 Context Analysis -- 5.3 Linking Context to Traces -- 5.4 Post Processing -- 6 Implementation -- 7 Evaluation -- 7.1 Experimental Design -- 7.2 Experimental Results -- 8 Conclusion -- References -- When to Intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints -- 1 Introduction -- 2 Motivating Example -- 3 Background and Related Work -- 3.1 Predictive Process Monitoring -- 3.2 Prescriptive Process Monitoring -- 3.3 Causal Inference -- 4 Approach -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Evaluation -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Results -- 5.4 Threats to Validity -- 6 Conclusion and Future Work -- References -- Author Index | |
650 | 4 | |a Business-Data processing-Management | |
650 | 4 | |a Management information systems-Cost effectiveness | |
650 | 0 | 7 | |a Prozessmanagement |0 (DE-588)4353072-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z Münster (Westf) |2 gnd-content | |
689 | 0 | 0 | |a Prozessmanagement |0 (DE-588)4353072-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Dijkman, Remco |e Sonstige |4 oth | |
700 | 1 | |a del Río Ortega, Adela |e Sonstige |4 oth | |
700 | 1 | |a Rinderle-Ma, Stefanie |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Di Ciccio, Claudio |t Business Process Management Forum |d Cham : Springer International Publishing AG,c2022 |z 9783031161704 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034735659 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7081053 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186133051998208 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Di Ciccio, Claudio |
author_facet | Di Ciccio, Claudio |
author_role | aut |
author_sort | Di Ciccio, Claudio |
author_variant | c c d cc ccd |
building | Verbundindex |
bvnumber | BV049408575 |
classification_rvk | QP 340 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents -- Modeling and Design -- Why Do Banks Find Business Process Compliance so Challenging? An Australian Perspective -- 1 Introduction -- 2 Background and Related Work -- 2.1 Business Process Compliance -- 2.2 Australian Banking Context -- 3 Methodology, Results, and Overview -- 3.1 Methodology -- 3.2 Results -- 3.3 Overview -- 4 Discussion -- 5 Limitations of the Study -- 6 Conclusion -- References -- On the Use of the Conformance and Compliance Keywords During Verification of Business Processes -- 1 Introduction -- 2 Verification and the Business Process Management Lifecycle -- 2.1 Business Process Management Artifacts Used for Verification -- 2.2 Verification Relations -- 3 The Goals of Verification Within Business Process Management -- 3.1 System Conformance -- 3.2 Process Conformance -- 3.3 Model Conformance -- 3.4 Model Compliance -- 3.5 Regulatory Compliance -- 4 Overview of the Relations and Goals of Verification -- 5 Discussion -- 5.1 Should Process Conformance Be Used to Prove Regulatory Compliance? -- 5.2 Should Regulatory Compliance Be Used to Prove Process Conformance? -- 5.3 Should Process Conformance Always Be Used to Prove Legal Conformance? -- 6 Conclusion -- References -- A Data-Centric Approach to Design Resilient-Aware Process Models in BPMN -- 1 Introduction -- 2 Related Work -- 3 Business Process Modeling Notation -- 3.1 Running Example -- 4 Maturity Model -- 4.1 Level 0 - No Resilience Awareness -- 4.2 Level 1 - Failure Awareness -- 4.3 Level 2 - Risk and Quality Awareness -- 4.4 Level 3 - Alternative Data Awareness -- 4.5 Level 4 - Data Recovery Awareness -- 5 Extending BPMN -- 6 User Evaluation and Concluding Remarks -- References -- The Early Process Catches the Weak Event: Process Latency and Strategies for Its Reduction -- 1 Introduction -- 2 Research Context 2.1 Explorative BPM Techniques -- 2.2 Process Latency -- 3 Research Methodology -- 4 Process Latency Reduction Strategies -- 5 Discussion -- 6 Conclusions, Limitations, and Future Work -- References -- Bridging the Gap Between Process Mining Methodologies and Process Mining Practices -- 1 Introduction -- 2 Theoretical Background -- 2.1 Process Optimization Methodologies -- 2.2 Challenges and Enables of Process Mining in Organizations -- 2.3 Process Mining Methodologies -- 3 Methodology -- 3.1 Practitioner and Expert Interviews -- 3.2 Gap Analysis -- 4 Results -- 4.1 Local Government Professionals -- 4.2 Process Mining Experts -- 4.3 Elements of Process Mining Methodologies -- 4.4 Comparison Table Gap Analysis -- 4.5 Gap Analysis -- 5 Conclusion and Discussion -- References -- Process Mining -- Systems Mining with Heraklit: The Next Step -- 1 Introduction -- 2 Modules and Their Composition -- 2.1 Example: Occurrence Modules of a Retail Business -- 2.2 The Formal Framework of Modules -- 2.3 Completing the Example -- 2.4 Composing an Occurrence Module from Occurrence Atoms -- 3 System Models -- 3.1 Structures and Signatures -- 3.2 System Atoms and Their Composition -- 3.3 Constructing a System Net from Symbolic Occurrence Modules -- 3.4 Deriving a Net Schema -- 4 How to Mine a System Model -- 4.1 From Logs to Runs -- 4.2 From Runs to Systems -- 5 Related Work -- 6 Conclusion -- References -- Conformance Checking over Stochastically Known Logs -- 1 Introduction -- 2 Stochastic Trace Model -- 3 Stochastic Alignment Algorithm -- 4 Empirical Evaluation -- 4.1 The Datasets -- 4.2 Data Preparation and Experiment Design -- 4.3 Results -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Alpha Precision: Estimating the Significant System Behavior in a Model -- 1 Introduction -- 2 Preliminaries -- 3 Alpha Precision -- 3.1 Rationale and Design 3.2 Estimation Method -- 3.3 Estimating the System Support Size -- 4 Empirical Evaluation -- 4.1 Unbiasedness Estimator -- 4.2 Demonstration on Real-Life Event Logs -- 4.3 Impact of K and -- 4.4 Discussion -- 5 Related Work -- 6 Conclusions -- References -- Learning to Act: A Reinforcement Learning Approach to Recommend the Best Next Activities -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Prescriptive Process Monitoring -- 2.3 Reinforcement Learning -- 3 Two Motivating Scenarios -- 4 Mapping PPM to RL -- 5 Evaluation of the Recommendation Policy -- 5.1 Datasets -- 5.2 Experimental Setting -- 5.3 Results -- 6 Related Work -- 7 Conclusion -- References -- Predictive Process Monitoring -- Change Detection in Dynamic Event Attributes -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 The Three Dimensions of Change -- 4.2 Change Detection as a Before-After Comparison -- 4.3 Statistical Tests -- 4.4 Connecting Continuous and Categorical Event Attributes -- 5 Evaluation -- 5.1 Dataset -- 5.2 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Dealing with Unexpected Runtime Outcomes Within Process Models -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Satisfying Obligations -- 3.2 Executions and States -- 4 Full Compliance of Process Models -- 4.1 Compliance Checking: Required Properties -- 5 Detecting Runtime Deviations -- 5.1 Detection -- 5.2 Assessment -- 6 Reparation -- 6.1 Computational Complexity -- 6.2 Effective Evaluation -- 6.3 A Practical Approach -- 7 Summary -- References -- Detecting Context-Aware Deviations in Process Executions -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Deviation Detection -- 2.2 Context -- 3 Preliminaries -- 4 Context-Aware Deviation Detection -- 4.1 Context-Aware Deviation Detection Problem -- 4.2 Context-Awareness 5 Framework for Context-Aware Deviation Detection -- 5.1 Running Example -- 5.2 Context Analysis -- 5.3 Linking Context to Traces -- 5.4 Post Processing -- 6 Implementation -- 7 Evaluation -- 7.1 Experimental Design -- 7.2 Experimental Results -- 8 Conclusion -- References -- When to Intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints -- 1 Introduction -- 2 Motivating Example -- 3 Background and Related Work -- 3.1 Predictive Process Monitoring -- 3.2 Prescriptive Process Monitoring -- 3.3 Causal Inference -- 4 Approach -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Evaluation -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Results -- 5.4 Threats to Validity -- 6 Conclusion and Future Work -- References -- Author Index |
ctrlnum | (ZDB-30-PQE)EBC7081053 (ZDB-30-PAD)EBC7081053 (ZDB-89-EBL)EBL7081053 (OCoLC)1344160861 (DE-599)BVBBV049408575 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08480nmm a2200553zcb4500</leader><controlfield tag="001">BV049408575</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231114s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031161711</subfield><subfield code="9">978-3-031-16171-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7081053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7081053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7081053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344160861</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049408575</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 340</subfield><subfield code="0">(DE-625)141861:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Di Ciccio, Claudio</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business Process Management Forum</subfield><subfield code="b">BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (237 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Business Information Processing Series</subfield><subfield code="v">v.458</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- Modeling and Design -- Why Do Banks Find Business Process Compliance so Challenging? An Australian Perspective -- 1 Introduction -- 2 Background and Related Work -- 2.1 Business Process Compliance -- 2.2 Australian Banking Context -- 3 Methodology, Results, and Overview -- 3.1 Methodology -- 3.2 Results -- 3.3 Overview -- 4 Discussion -- 5 Limitations of the Study -- 6 Conclusion -- References -- On the Use of the Conformance and Compliance Keywords During Verification of Business Processes -- 1 Introduction -- 2 Verification and the Business Process Management Lifecycle -- 2.1 Business Process Management Artifacts Used for Verification -- 2.2 Verification Relations -- 3 The Goals of Verification Within Business Process Management -- 3.1 System Conformance -- 3.2 Process Conformance -- 3.3 Model Conformance -- 3.4 Model Compliance -- 3.5 Regulatory Compliance -- 4 Overview of the Relations and Goals of Verification -- 5 Discussion -- 5.1 Should Process Conformance Be Used to Prove Regulatory Compliance? -- 5.2 Should Regulatory Compliance Be Used to Prove Process Conformance? -- 5.3 Should Process Conformance Always Be Used to Prove Legal Conformance? -- 6 Conclusion -- References -- A Data-Centric Approach to Design Resilient-Aware Process Models in BPMN -- 1 Introduction -- 2 Related Work -- 3 Business Process Modeling Notation -- 3.1 Running Example -- 4 Maturity Model -- 4.1 Level 0 - No Resilience Awareness -- 4.2 Level 1 - Failure Awareness -- 4.3 Level 2 - Risk and Quality Awareness -- 4.4 Level 3 - Alternative Data Awareness -- 4.5 Level 4 - Data Recovery Awareness -- 5 Extending BPMN -- 6 User Evaluation and Concluding Remarks -- References -- The Early Process Catches the Weak Event: Process Latency and Strategies for Its Reduction -- 1 Introduction -- 2 Research Context</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1 Explorative BPM Techniques -- 2.2 Process Latency -- 3 Research Methodology -- 4 Process Latency Reduction Strategies -- 5 Discussion -- 6 Conclusions, Limitations, and Future Work -- References -- Bridging the Gap Between Process Mining Methodologies and Process Mining Practices -- 1 Introduction -- 2 Theoretical Background -- 2.1 Process Optimization Methodologies -- 2.2 Challenges and Enables of Process Mining in Organizations -- 2.3 Process Mining Methodologies -- 3 Methodology -- 3.1 Practitioner and Expert Interviews -- 3.2 Gap Analysis -- 4 Results -- 4.1 Local Government Professionals -- 4.2 Process Mining Experts -- 4.3 Elements of Process Mining Methodologies -- 4.4 Comparison Table Gap Analysis -- 4.5 Gap Analysis -- 5 Conclusion and Discussion -- References -- Process Mining -- Systems Mining with Heraklit: The Next Step -- 1 Introduction -- 2 Modules and Their Composition -- 2.1 Example: Occurrence Modules of a Retail Business -- 2.2 The Formal Framework of Modules -- 2.3 Completing the Example -- 2.4 Composing an Occurrence Module from Occurrence Atoms -- 3 System Models -- 3.1 Structures and Signatures -- 3.2 System Atoms and Their Composition -- 3.3 Constructing a System Net from Symbolic Occurrence Modules -- 3.4 Deriving a Net Schema -- 4 How to Mine a System Model -- 4.1 From Logs to Runs -- 4.2 From Runs to Systems -- 5 Related Work -- 6 Conclusion -- References -- Conformance Checking over Stochastically Known Logs -- 1 Introduction -- 2 Stochastic Trace Model -- 3 Stochastic Alignment Algorithm -- 4 Empirical Evaluation -- 4.1 The Datasets -- 4.2 Data Preparation and Experiment Design -- 4.3 Results -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Alpha Precision: Estimating the Significant System Behavior in a Model -- 1 Introduction -- 2 Preliminaries -- 3 Alpha Precision -- 3.1 Rationale and Design</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.2 Estimation Method -- 3.3 Estimating the System Support Size -- 4 Empirical Evaluation -- 4.1 Unbiasedness Estimator -- 4.2 Demonstration on Real-Life Event Logs -- 4.3 Impact of K and -- 4.4 Discussion -- 5 Related Work -- 6 Conclusions -- References -- Learning to Act: A Reinforcement Learning Approach to Recommend the Best Next Activities -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Prescriptive Process Monitoring -- 2.3 Reinforcement Learning -- 3 Two Motivating Scenarios -- 4 Mapping PPM to RL -- 5 Evaluation of the Recommendation Policy -- 5.1 Datasets -- 5.2 Experimental Setting -- 5.3 Results -- 6 Related Work -- 7 Conclusion -- References -- Predictive Process Monitoring -- Change Detection in Dynamic Event Attributes -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 The Three Dimensions of Change -- 4.2 Change Detection as a Before-After Comparison -- 4.3 Statistical Tests -- 4.4 Connecting Continuous and Categorical Event Attributes -- 5 Evaluation -- 5.1 Dataset -- 5.2 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Dealing with Unexpected Runtime Outcomes Within Process Models -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Satisfying Obligations -- 3.2 Executions and States -- 4 Full Compliance of Process Models -- 4.1 Compliance Checking: Required Properties -- 5 Detecting Runtime Deviations -- 5.1 Detection -- 5.2 Assessment -- 6 Reparation -- 6.1 Computational Complexity -- 6.2 Effective Evaluation -- 6.3 A Practical Approach -- 7 Summary -- References -- Detecting Context-Aware Deviations in Process Executions -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Deviation Detection -- 2.2 Context -- 3 Preliminaries -- 4 Context-Aware Deviation Detection -- 4.1 Context-Aware Deviation Detection Problem -- 4.2 Context-Awareness</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5 Framework for Context-Aware Deviation Detection -- 5.1 Running Example -- 5.2 Context Analysis -- 5.3 Linking Context to Traces -- 5.4 Post Processing -- 6 Implementation -- 7 Evaluation -- 7.1 Experimental Design -- 7.2 Experimental Results -- 8 Conclusion -- References -- When to Intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints -- 1 Introduction -- 2 Motivating Example -- 3 Background and Related Work -- 3.1 Predictive Process Monitoring -- 3.2 Prescriptive Process Monitoring -- 3.3 Causal Inference -- 4 Approach -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Evaluation -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Results -- 5.4 Threats to Validity -- 6 Conclusion and Future Work -- References -- Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business-Data processing-Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems-Cost effectiveness</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Münster (Westf)</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dijkman, Remco</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">del Río Ortega, Adela</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rinderle-Ma, Stefanie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Di Ciccio, Claudio</subfield><subfield code="t">Business Process Management Forum</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031161704</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034735659</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7081053</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 Münster (Westf) gnd-content |
genre_facet | Konferenzschrift 2022 Münster (Westf) |
id | DE-604.BV049408575 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:05:37Z |
indexdate | 2024-07-10T10:06:16Z |
institution | BVB |
isbn | 9783031161711 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034735659 |
oclc_num | 1344160861 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (237 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes in Business Information Processing Series |
spelling | Di Ciccio, Claudio Verfasser aut Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings 1st ed Cham Springer International Publishing AG 2022 ©2022 1 Online-Ressource (237 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Business Information Processing Series v.458 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents -- Modeling and Design -- Why Do Banks Find Business Process Compliance so Challenging? An Australian Perspective -- 1 Introduction -- 2 Background and Related Work -- 2.1 Business Process Compliance -- 2.2 Australian Banking Context -- 3 Methodology, Results, and Overview -- 3.1 Methodology -- 3.2 Results -- 3.3 Overview -- 4 Discussion -- 5 Limitations of the Study -- 6 Conclusion -- References -- On the Use of the Conformance and Compliance Keywords During Verification of Business Processes -- 1 Introduction -- 2 Verification and the Business Process Management Lifecycle -- 2.1 Business Process Management Artifacts Used for Verification -- 2.2 Verification Relations -- 3 The Goals of Verification Within Business Process Management -- 3.1 System Conformance -- 3.2 Process Conformance -- 3.3 Model Conformance -- 3.4 Model Compliance -- 3.5 Regulatory Compliance -- 4 Overview of the Relations and Goals of Verification -- 5 Discussion -- 5.1 Should Process Conformance Be Used to Prove Regulatory Compliance? -- 5.2 Should Regulatory Compliance Be Used to Prove Process Conformance? -- 5.3 Should Process Conformance Always Be Used to Prove Legal Conformance? -- 6 Conclusion -- References -- A Data-Centric Approach to Design Resilient-Aware Process Models in BPMN -- 1 Introduction -- 2 Related Work -- 3 Business Process Modeling Notation -- 3.1 Running Example -- 4 Maturity Model -- 4.1 Level 0 - No Resilience Awareness -- 4.2 Level 1 - Failure Awareness -- 4.3 Level 2 - Risk and Quality Awareness -- 4.4 Level 3 - Alternative Data Awareness -- 4.5 Level 4 - Data Recovery Awareness -- 5 Extending BPMN -- 6 User Evaluation and Concluding Remarks -- References -- The Early Process Catches the Weak Event: Process Latency and Strategies for Its Reduction -- 1 Introduction -- 2 Research Context 2.1 Explorative BPM Techniques -- 2.2 Process Latency -- 3 Research Methodology -- 4 Process Latency Reduction Strategies -- 5 Discussion -- 6 Conclusions, Limitations, and Future Work -- References -- Bridging the Gap Between Process Mining Methodologies and Process Mining Practices -- 1 Introduction -- 2 Theoretical Background -- 2.1 Process Optimization Methodologies -- 2.2 Challenges and Enables of Process Mining in Organizations -- 2.3 Process Mining Methodologies -- 3 Methodology -- 3.1 Practitioner and Expert Interviews -- 3.2 Gap Analysis -- 4 Results -- 4.1 Local Government Professionals -- 4.2 Process Mining Experts -- 4.3 Elements of Process Mining Methodologies -- 4.4 Comparison Table Gap Analysis -- 4.5 Gap Analysis -- 5 Conclusion and Discussion -- References -- Process Mining -- Systems Mining with Heraklit: The Next Step -- 1 Introduction -- 2 Modules and Their Composition -- 2.1 Example: Occurrence Modules of a Retail Business -- 2.2 The Formal Framework of Modules -- 2.3 Completing the Example -- 2.4 Composing an Occurrence Module from Occurrence Atoms -- 3 System Models -- 3.1 Structures and Signatures -- 3.2 System Atoms and Their Composition -- 3.3 Constructing a System Net from Symbolic Occurrence Modules -- 3.4 Deriving a Net Schema -- 4 How to Mine a System Model -- 4.1 From Logs to Runs -- 4.2 From Runs to Systems -- 5 Related Work -- 6 Conclusion -- References -- Conformance Checking over Stochastically Known Logs -- 1 Introduction -- 2 Stochastic Trace Model -- 3 Stochastic Alignment Algorithm -- 4 Empirical Evaluation -- 4.1 The Datasets -- 4.2 Data Preparation and Experiment Design -- 4.3 Results -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Alpha Precision: Estimating the Significant System Behavior in a Model -- 1 Introduction -- 2 Preliminaries -- 3 Alpha Precision -- 3.1 Rationale and Design 3.2 Estimation Method -- 3.3 Estimating the System Support Size -- 4 Empirical Evaluation -- 4.1 Unbiasedness Estimator -- 4.2 Demonstration on Real-Life Event Logs -- 4.3 Impact of K and -- 4.4 Discussion -- 5 Related Work -- 6 Conclusions -- References -- Learning to Act: A Reinforcement Learning Approach to Recommend the Best Next Activities -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Prescriptive Process Monitoring -- 2.3 Reinforcement Learning -- 3 Two Motivating Scenarios -- 4 Mapping PPM to RL -- 5 Evaluation of the Recommendation Policy -- 5.1 Datasets -- 5.2 Experimental Setting -- 5.3 Results -- 6 Related Work -- 7 Conclusion -- References -- Predictive Process Monitoring -- Change Detection in Dynamic Event Attributes -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 The Three Dimensions of Change -- 4.2 Change Detection as a Before-After Comparison -- 4.3 Statistical Tests -- 4.4 Connecting Continuous and Categorical Event Attributes -- 5 Evaluation -- 5.1 Dataset -- 5.2 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Dealing with Unexpected Runtime Outcomes Within Process Models -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Satisfying Obligations -- 3.2 Executions and States -- 4 Full Compliance of Process Models -- 4.1 Compliance Checking: Required Properties -- 5 Detecting Runtime Deviations -- 5.1 Detection -- 5.2 Assessment -- 6 Reparation -- 6.1 Computational Complexity -- 6.2 Effective Evaluation -- 6.3 A Practical Approach -- 7 Summary -- References -- Detecting Context-Aware Deviations in Process Executions -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Deviation Detection -- 2.2 Context -- 3 Preliminaries -- 4 Context-Aware Deviation Detection -- 4.1 Context-Aware Deviation Detection Problem -- 4.2 Context-Awareness 5 Framework for Context-Aware Deviation Detection -- 5.1 Running Example -- 5.2 Context Analysis -- 5.3 Linking Context to Traces -- 5.4 Post Processing -- 6 Implementation -- 7 Evaluation -- 7.1 Experimental Design -- 7.2 Experimental Results -- 8 Conclusion -- References -- When to Intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints -- 1 Introduction -- 2 Motivating Example -- 3 Background and Related Work -- 3.1 Predictive Process Monitoring -- 3.2 Prescriptive Process Monitoring -- 3.3 Causal Inference -- 4 Approach -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Evaluation -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Results -- 5.4 Threats to Validity -- 6 Conclusion and Future Work -- References -- Author Index Business-Data processing-Management Management information systems-Cost effectiveness Prozessmanagement (DE-588)4353072-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2022 Münster (Westf) gnd-content Prozessmanagement (DE-588)4353072-2 s DE-604 Dijkman, Remco Sonstige oth del Río Ortega, Adela Sonstige oth Rinderle-Ma, Stefanie Sonstige oth Erscheint auch als Druck-Ausgabe Di Ciccio, Claudio Business Process Management Forum Cham : Springer International Publishing AG,c2022 9783031161704 |
spellingShingle | Di Ciccio, Claudio Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings Intro -- Preface -- Organization -- Contents -- Modeling and Design -- Why Do Banks Find Business Process Compliance so Challenging? An Australian Perspective -- 1 Introduction -- 2 Background and Related Work -- 2.1 Business Process Compliance -- 2.2 Australian Banking Context -- 3 Methodology, Results, and Overview -- 3.1 Methodology -- 3.2 Results -- 3.3 Overview -- 4 Discussion -- 5 Limitations of the Study -- 6 Conclusion -- References -- On the Use of the Conformance and Compliance Keywords During Verification of Business Processes -- 1 Introduction -- 2 Verification and the Business Process Management Lifecycle -- 2.1 Business Process Management Artifacts Used for Verification -- 2.2 Verification Relations -- 3 The Goals of Verification Within Business Process Management -- 3.1 System Conformance -- 3.2 Process Conformance -- 3.3 Model Conformance -- 3.4 Model Compliance -- 3.5 Regulatory Compliance -- 4 Overview of the Relations and Goals of Verification -- 5 Discussion -- 5.1 Should Process Conformance Be Used to Prove Regulatory Compliance? -- 5.2 Should Regulatory Compliance Be Used to Prove Process Conformance? -- 5.3 Should Process Conformance Always Be Used to Prove Legal Conformance? -- 6 Conclusion -- References -- A Data-Centric Approach to Design Resilient-Aware Process Models in BPMN -- 1 Introduction -- 2 Related Work -- 3 Business Process Modeling Notation -- 3.1 Running Example -- 4 Maturity Model -- 4.1 Level 0 - No Resilience Awareness -- 4.2 Level 1 - Failure Awareness -- 4.3 Level 2 - Risk and Quality Awareness -- 4.4 Level 3 - Alternative Data Awareness -- 4.5 Level 4 - Data Recovery Awareness -- 5 Extending BPMN -- 6 User Evaluation and Concluding Remarks -- References -- The Early Process Catches the Weak Event: Process Latency and Strategies for Its Reduction -- 1 Introduction -- 2 Research Context 2.1 Explorative BPM Techniques -- 2.2 Process Latency -- 3 Research Methodology -- 4 Process Latency Reduction Strategies -- 5 Discussion -- 6 Conclusions, Limitations, and Future Work -- References -- Bridging the Gap Between Process Mining Methodologies and Process Mining Practices -- 1 Introduction -- 2 Theoretical Background -- 2.1 Process Optimization Methodologies -- 2.2 Challenges and Enables of Process Mining in Organizations -- 2.3 Process Mining Methodologies -- 3 Methodology -- 3.1 Practitioner and Expert Interviews -- 3.2 Gap Analysis -- 4 Results -- 4.1 Local Government Professionals -- 4.2 Process Mining Experts -- 4.3 Elements of Process Mining Methodologies -- 4.4 Comparison Table Gap Analysis -- 4.5 Gap Analysis -- 5 Conclusion and Discussion -- References -- Process Mining -- Systems Mining with Heraklit: The Next Step -- 1 Introduction -- 2 Modules and Their Composition -- 2.1 Example: Occurrence Modules of a Retail Business -- 2.2 The Formal Framework of Modules -- 2.3 Completing the Example -- 2.4 Composing an Occurrence Module from Occurrence Atoms -- 3 System Models -- 3.1 Structures and Signatures -- 3.2 System Atoms and Their Composition -- 3.3 Constructing a System Net from Symbolic Occurrence Modules -- 3.4 Deriving a Net Schema -- 4 How to Mine a System Model -- 4.1 From Logs to Runs -- 4.2 From Runs to Systems -- 5 Related Work -- 6 Conclusion -- References -- Conformance Checking over Stochastically Known Logs -- 1 Introduction -- 2 Stochastic Trace Model -- 3 Stochastic Alignment Algorithm -- 4 Empirical Evaluation -- 4.1 The Datasets -- 4.2 Data Preparation and Experiment Design -- 4.3 Results -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Alpha Precision: Estimating the Significant System Behavior in a Model -- 1 Introduction -- 2 Preliminaries -- 3 Alpha Precision -- 3.1 Rationale and Design 3.2 Estimation Method -- 3.3 Estimating the System Support Size -- 4 Empirical Evaluation -- 4.1 Unbiasedness Estimator -- 4.2 Demonstration on Real-Life Event Logs -- 4.3 Impact of K and -- 4.4 Discussion -- 5 Related Work -- 6 Conclusions -- References -- Learning to Act: A Reinforcement Learning Approach to Recommend the Best Next Activities -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Prescriptive Process Monitoring -- 2.3 Reinforcement Learning -- 3 Two Motivating Scenarios -- 4 Mapping PPM to RL -- 5 Evaluation of the Recommendation Policy -- 5.1 Datasets -- 5.2 Experimental Setting -- 5.3 Results -- 6 Related Work -- 7 Conclusion -- References -- Predictive Process Monitoring -- Change Detection in Dynamic Event Attributes -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 The Three Dimensions of Change -- 4.2 Change Detection as a Before-After Comparison -- 4.3 Statistical Tests -- 4.4 Connecting Continuous and Categorical Event Attributes -- 5 Evaluation -- 5.1 Dataset -- 5.2 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Dealing with Unexpected Runtime Outcomes Within Process Models -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Satisfying Obligations -- 3.2 Executions and States -- 4 Full Compliance of Process Models -- 4.1 Compliance Checking: Required Properties -- 5 Detecting Runtime Deviations -- 5.1 Detection -- 5.2 Assessment -- 6 Reparation -- 6.1 Computational Complexity -- 6.2 Effective Evaluation -- 6.3 A Practical Approach -- 7 Summary -- References -- Detecting Context-Aware Deviations in Process Executions -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Deviation Detection -- 2.2 Context -- 3 Preliminaries -- 4 Context-Aware Deviation Detection -- 4.1 Context-Aware Deviation Detection Problem -- 4.2 Context-Awareness 5 Framework for Context-Aware Deviation Detection -- 5.1 Running Example -- 5.2 Context Analysis -- 5.3 Linking Context to Traces -- 5.4 Post Processing -- 6 Implementation -- 7 Evaluation -- 7.1 Experimental Design -- 7.2 Experimental Results -- 8 Conclusion -- References -- When to Intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints -- 1 Introduction -- 2 Motivating Example -- 3 Background and Related Work -- 3.1 Predictive Process Monitoring -- 3.2 Prescriptive Process Monitoring -- 3.3 Causal Inference -- 4 Approach -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Evaluation -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Results -- 5.4 Threats to Validity -- 6 Conclusion and Future Work -- References -- Author Index Business-Data processing-Management Management information systems-Cost effectiveness Prozessmanagement (DE-588)4353072-2 gnd |
subject_GND | (DE-588)4353072-2 (DE-588)1071861417 |
title | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_auth | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_exact_search | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_exact_search_txtP | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_full | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_fullStr | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_full_unstemmed | Business Process Management Forum BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
title_short | Business Process Management Forum |
title_sort | business process management forum bpm 2022 forum munster germany september 11 16 2022 proceedings |
title_sub | BPM 2022 Forum, Münster, Germany, September 11-16, 2022, Proceedings |
topic | Business-Data processing-Management Management information systems-Cost effectiveness Prozessmanagement (DE-588)4353072-2 gnd |
topic_facet | Business-Data processing-Management Management information systems-Cost effectiveness Prozessmanagement Konferenzschrift 2022 Münster (Westf) |
work_keys_str_mv | AT diciccioclaudio businessprocessmanagementforumbpm2022forummunstergermanyseptember11162022proceedings AT dijkmanremco businessprocessmanagementforumbpm2022forummunstergermanyseptember11162022proceedings AT delrioortegaadela businessprocessmanagementforumbpm2022forummunstergermanyseptember11162022proceedings AT rinderlemastefanie businessprocessmanagementforumbpm2022forummunstergermanyseptember11162022proceedings |