-
Differentially Private Inductive Miner
Authors:
Max Schulze,
Yorck Zisgen,
Moritz Kirschte,
Esfandiar Mohammadi,
Agnes Koschmider
Abstract:
Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task: an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficie…
▽ More
Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task: an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 8 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Recent Advances in Data-Driven Business Process Management
Authors:
Lars Ackermann,
Martin Käppel,
Laura Marcus,
Linda Moder,
Sebastian Dunzer,
Markus Hornsteiner,
Annina Liessmann,
Yorck Zisgen,
Philip Empl,
Lukas-Valentin Herm,
Nicolas Neis,
Julian Neuberger,
Leo Poss,
Myriam Schaschek,
Sven Weinzierl,
Niklas Wördehoff,
Stefan Jablonski,
Agnes Koschmider,
Wolfgang Kratsch,
Martin Matzner,
Stefanie Rinderle-Ma,
Maximilian Röglinger,
Stefan Schönig,
Axel Winkelmann
Abstract:
The rapid development of cutting-edge technologies, the increasing volume of data and also the availability and processability of new types of data sources has led to a paradigm shift in data-based management and decision-making. Since business processes are at the core of organizational work, these developments heavily impact BPM as a crucial success factor for organizations. In view of this emer…
▽ More
The rapid development of cutting-edge technologies, the increasing volume of data and also the availability and processability of new types of data sources has led to a paradigm shift in data-based management and decision-making. Since business processes are at the core of organizational work, these developments heavily impact BPM as a crucial success factor for organizations. In view of this emerging potential, data-driven business process management has become a relevant and vibrant research area. Given the complexity and interdisciplinarity of the research field, this position paper therefore presents research insights regarding data-driven BPM.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Process Mining for Unstructured Data: Challenges and Research Directions
Authors:
Agnes Koschmider,
Milda Aleknonytė-Resch,
Frederik Fonger,
Christian Imenkamp,
Arvid Lepsien,
Kaan Apaydin,
Maximilian Harms,
Dominik Janssen,
Dominic Langhammer,
Tobias Ziolkowski,
Yorck Zisgen
Abstract:
The application of process mining for unstructured data might significantly elevate novel insights into disciplines where unstructured data is a common data format. To efficiently analyze unstructured data by process mining and to convey confidence into the analysis result, requires bridging multiple challenges. The purpose of this paper is to discuss these challenges, present initial solutions an…
▽ More
The application of process mining for unstructured data might significantly elevate novel insights into disciplines where unstructured data is a common data format. To efficiently analyze unstructured data by process mining and to convey confidence into the analysis result, requires bridging multiple challenges. The purpose of this paper is to discuss these challenges, present initial solutions and describe future research directions. We hope that this article lays the foundations for future collaboration on this topic.
△ Less
Submitted 30 November, 2023;
originally announced January 2024.
-
Privacy and Confidentiality in Process Mining -- Threats and Research Challenges
Authors:
Gamal Elkoumy,
Stephan A. Fahrenkrog-Petersen,
Mohammadreza Fani Sani,
Agnes Koschmider,
Felix Mannhardt,
Saskia Nuñez von Voigt,
Majid Rafiei,
Leopold von Waldthausen
Abstract:
Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body…
▽ More
Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body of work on privacy and confidentiality in process mining. A newly developed conceptual model structures the discussion that existing techniques leave room for improvement. This results in a number of important research challenges that should be addressed by future process mining research.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Quantifying the Re-identification Risk of Event Logs for Process Mining
Authors:
S. Nuñez von Voigt,
S. A. Fahrenkrog-Petersen,
D. Janssen,
A. Koschmider,
F. Tschorsch,
F. Mannhardt,
O. Landsiedel,
M. Weidlich
Abstract:
Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back…
▽ More
Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual uniqueness in a collection of publicly available event logs. Our results suggest that potentially up to all of the cases in an event log may be re-identified, which highlights the importance of privacy-preserving techniques in process mining.
△ Less
Submitted 19 June, 2020; v1 submitted 24 March, 2020;
originally announced March 2020.
-
The Internet-of-Things Meets Business Process Management: A Manifesto
Authors:
Christian Janiesch,
Agnes Koschmider,
Massimo Mecella,
Barbara Weber,
Andrea Burattin,
Claudio Di Ciccio,
Giancarlo Fortino,
Avigdor Gal,
Udo Kannengiesser,
Francesco Leotta,
Felix Mannhardt,
Andrea Marrella,
Jan Mendling,
Andreas Oberweis,
Manfred Reichert,
Stefanie Rinderle-Ma,
Estefania Serral,
WenZhan Song,
Jianwen Su,
Victoria Torres,
Matthias Weidlich,
Mathias Weske,
Liang Zhang
Abstract:
The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and acros…
▽ More
The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and across organizations. While the IoT and BPM have been regarded as separate topics in research and practice, we strongly believe that the management of IoT applications will strongly benefit from BPM concepts, methods and technologies on the one hand; on the other one, the IoT poses challenges that will require enhancements and extensions of the current state-of-the-art in the BPM field. In this paper, we question to what extent these two paradigms can be combined and we discuss the emerging challenges.
△ Less
Submitted 28 October, 2020; v1 submitted 11 September, 2017;
originally announced September 2017.