Skip to main content

Showing 1–6 of 6 results for author: Koschmider, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04595  [pdf, other

    cs.CR cs.DB

    Differentially Private Inductive Miner

    Authors: Max Schulze, Yorck Zisgen, Moritz Kirschte, Esfandiar Mohammadi, Agnes Koschmider

    Abstract: Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task: an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficie… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: The first two authors equally contributed to this work

  2. arXiv:2406.01786  [pdf, other

    cs.DB cs.AI

    Recent Advances in Data-Driven Business Process Management

    Authors: Lars Ackermann, Martin Käppel, Laura Marcus, Linda Moder, Sebastian Dunzer, Markus Hornsteiner, Annina Liessmann, Yorck Zisgen, Philip Empl, Lukas-Valentin Herm, Nicolas Neis, Julian Neuberger, Leo Poss, Myriam Schaschek, Sven Weinzierl, Niklas Wördehoff, Stefan Jablonski, Agnes Koschmider, Wolfgang Kratsch, Martin Matzner, Stefanie Rinderle-Ma, Maximilian Röglinger, Stefan Schönig, Axel Winkelmann

    Abstract: The rapid development of cutting-edge technologies, the increasing volume of data and also the availability and processability of new types of data sources has led to a paradigm shift in data-based management and decision-making. Since business processes are at the core of organizational work, these developments heavily impact BPM as a crucial success factor for organizations. In view of this emer… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: position paper, 34 pages, 10 figures

    MSC Class: 68U35 68T07 68T07; 68U35; 68T01 ACM Class: H.4.1; I.2.1; I.2.6; I.2.7; H.2.8; K.6.1

  3. arXiv:2401.13677  [pdf, other

    cs.DB cs.AI cs.LG

    Process Mining for Unstructured Data: Challenges and Research Directions

    Authors: Agnes Koschmider, Milda Aleknonytė-Resch, Frederik Fonger, Christian Imenkamp, Arvid Lepsien, Kaan Apaydin, Maximilian Harms, Dominik Janssen, Dominic Langhammer, Tobias Ziolkowski, Yorck Zisgen

    Abstract: The application of process mining for unstructured data might significantly elevate novel insights into disciplines where unstructured data is a common data format. To efficiently analyze unstructured data by process mining and to convey confidence into the analysis result, requires bridging multiple challenges. The purpose of this paper is to discuss these challenges, present initial solutions an… ▽ More

    Submitted 30 November, 2023; originally announced January 2024.

  4. arXiv:2106.00388  [pdf, ps, other

    cs.CR cs.DB

    Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen

    Abstract: Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Management Information Systems

  5. Quantifying the Re-identification Risk of Event Logs for Process Mining

    Authors: S. Nuñez von Voigt, S. A. Fahrenkrog-Petersen, D. Janssen, A. Koschmider, F. Tschorsch, F. Mannhardt, O. Landsiedel, M. Weidlich

    Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back… ▽ More

    Submitted 19 June, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted to CAiSE-2020

    Journal ref: CAiSE 2020: Advanced Information Systems Engineering pp 252-267

  6. The Internet-of-Things Meets Business Process Management: A Manifesto

    Authors: Christian Janiesch, Agnes Koschmider, Massimo Mecella, Barbara Weber, Andrea Burattin, Claudio Di Ciccio, Giancarlo Fortino, Avigdor Gal, Udo Kannengiesser, Francesco Leotta, Felix Mannhardt, Andrea Marrella, Jan Mendling, Andreas Oberweis, Manfred Reichert, Stefanie Rinderle-Ma, Estefania Serral, WenZhan Song, Jianwen Su, Victoria Torres, Matthias Weidlich, Mathias Weske, Liang Zhang

    Abstract: The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and acros… ▽ More

    Submitted 28 October, 2020; v1 submitted 11 September, 2017; originally announced September 2017.