[1] Hatefi, M. A., Seyedhoseini, S. M. and Noori, S. (2007). Risk response actions selection. The International Journal of Applied Management and Technology, Vol. 5, No. 1, pp 385-408.
[2] Fehr-Duda, H., Bruhin, A., Epper, T. and Schubert, R. (2010). Rationality on the rise: Why relative risk aversion increases with stake size. Journal of Risk Uncertain, No. 40, pp. 147–180.
[3] Ray, B., Apte, C., McAuliffl, K. and Deleris, L. (2008). Harnessing Uncertainty: The Future of Risk Analytics.IBM research report.
[4] Gusmão, C. M. G. (2003). ISO, CMMI and PMBOK Risk Management: a Comparative Analysis, Cristine Martins Gomes de.The International Journal of Applied Management and Technology, Vol. 1, No. 1, pp. 65-75.
[5] Shaw, G.K. (2010). A risk management model for the tourism industry in South Africa. Ph.D Thesis. The Potchefstroom Campus of the North-West University.
[6] Smith, D. and Fischbacher, M. (2009). The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience. Risk Management Journal, Vol. 11, No. 1, pp. 1–12.
[7] Zhao, G.Y., Zhao, G., Lv, C. and Sun, Y.F. (2010). Risk Management Technology for Missile Operational Support. International Conference on Management of Innovation and Technology (ICMIT), IEEE Press, pp. 1259-1263.
[8] Karadsheh, L. A. (2010). A framework for integrating knowledge management with risk management for information technology projects.Ph.D. thesis.Lawrence Technological University, College of Management.
[9] El Sheikh, A. A. R. and Alnoukari, M. (2011). Business Intelligence and Agile Methodologies for Knowledge-Based Organizations:Cross-Disciplinary Applications, 1st Edition, IGI Global.
[10] Aalst, W. V. D.(2011). Process Mining: Making Knowledge Discovery Process Centric. SIGKDD ExplorationsJournal, Vol. 13, No. 20, pp.25-49.
[11] Heijden, V. D. (2012). Process Mining Project Methodology: Developing a General Approach to Apply Process Mining in Practice. M.Sc. thesis.TUE.School of Industrial Engineering.
[12] Rozinat, A., Alves de Medeiros, A.K., G¨unther, C.W., Weijters, A.J.M. M. and Aalst, W. V. D.(2007). The Need for a Process Mining Evaluation Framework in Research and Practice: Position Paper. Proceeding of the 2007 international conference on Business process management (BPM'07), pp. 84-89.
[13] Caron, F., Vanthienen, J. and Baesens. B. (2013).Comprehensive Rule-Based Compliance Checking and Risk Management with Process Mining.Decision Support Systems Journal, Vol. 54, No. 3, pp. 1357-1369.
[14] Jans, M., van der Werf, J. M., Lybaert, N. and Vanhoof, K. (2011). A business process mining application for internal transaction fraud mitigation.Expert Systems with Applications Journal, Vol. 38, No. 10, pp. 13351–13359.
[15] Jans, M., Lybaert, N., Vanhoof, K. and van der Werf, J.M. (2010). Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study. International Research Symposium on Accounting Information Systems.
[16] Yang, W. S. and Hwang, S. Y.( 2006). A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with ApplicationsJournal, Vol.31, No.1, pp.56–68.
69 Applying the Process Mining Project Methodology for...
[17] Werner, M., Gehrke, N. and Nüttgens, M. (2012). Business Process Mining and Reconstruction for Financial Audits.45th Hawaii International Conference on System Sciences, pp. 5350-5359.
[18] Aalst, W. V. D. and Dustdar, S. (2012). Process Mining Put into Context.Internet Computing Journals, IEEE Press, Vol. 16, No. 1, pp.82-86.
[19] Buijs, J.C.A.M. (2010). Mapping Data Sources to XES in a Generic Way.M.Sc. thesis.Department of Mathematics and Computer Science, Eindhoven University of Technology.
[20] Aalst, W. V. D. (2011). Process Mining Discovery, Conformance and Enhancement of Business Processes. 1st Edition, Springer.
[21] Verbeek, H.M.W., Buijs, J. C. A. M., Dongen, B. F. V. and Aalst, W. V. D. (2010).ProM6 : The Process Mining Toolkit.In La Rosa, M. (Ed.).Proceedings of the Business Process Management 2010 Demonstration Track, pp. 34-39.
[22] Liu, Y., Zhang, H., Li, C. and Jiao, R.J. (2012). Workflow simulation for operational decision support using event graph through process mining.Decision Support Systems Journal, Vol. 52, No. 3, pp.685–697.
[23] Aalst, W. V. D., Reijers, H. A., Weijters, A. J. M. M., Dongen, B. F., Alves de Medeiros, A. K., Song, M. And Verbeek, H. M. W. (2007). Business process mining: An industrial application.Information Systems Journal, Vol. 32, No. 5, pp.713-732.
[24] Lakshmanan, G. and Khalaf, R. (2012). Leveraging Process Mining Techniques to Analyze Semi-Structured Processes.IT Professional Journal, IEEE Press,Vol. 15 , No. 5, pp. 22-30.
[25] Li, J., Ouyang, J. and Feng, M. (2011). A Heuristic Genetic Process Mining Algorithm.Seventh International Conference on Computational Intelligence and Security, pp.15-19.
[26] Bose, R.P.J.C., Aalst, W. V. D. (2010). Trace alignment in process mining: opportunities for process diagnostics.Proceeding of the 8th international conference on Business Process Management (BPM'10), pp.227-242.