Online process mining refers to a class of techniques for analyzing in real-time event streams generated by the execution 5 of business processes. These techniques are crucial in the reactive monitoring of business processes, timely resource allocation and 6 detection/prevention of dysfunctional behavior. Many interesting advances have been made by the research community in recent 7 years, but there is no consensus on the exact set of properties these techniques have to achieve. This article fills the gap by identifying 8 a set of evaluation goals for online process mining and examining their fulfillment in the state of the art. We discuss parameters and 9 techniques regulating the balance between conflicting goals and outline research needed for their improvement. Concept drift detection 10 is crucial in this sense but, as demonstrated by our experiments, it is only partially supported by current solutions. Q1 11 Index Terms-Online process mining, event stream, requirements and goals, concept drift Ç 12 1 INTRODUCTION 13 P ROCESS Mining (PM) is a set of data science techniques 14 focused on the analysis of event logs [1]. Events are 15 recorded when executing a Business Process and collected 16 into cases, i.e., end to end sequences of events relevant to the 17 same process instance. Traditional PM algorithms were 18 designed to work offline, analyzing historical batches of logs 19 gathering the complete course of cases, if necessary with 20 multiple passes of analysis. This is, however, insufficient, 21 from a business standpoint, when the real-time assessment 22 of processes is crucial to timely manage resources and 23 quickly react to dysfunctional behaviors [2]. Today's fast-24 changing market requires systematic adjustments of pro-25 cesses in response to changes in the organization's operat-26 ing system or to trends emerging from the environment [3]. 27 Recently, the notion of online PM has emerged in reference 28 to analytics capable of handling real-time event streams [4], 29 [5]. An event stream differs from an event log because it is an 30 unbounded sequence of events ingested one-by-one and 31 allowing for limited actions in terms of iteration and memory 32 or time consumption [6].