Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, M. Sani, A. Koschmider, F. Mannhardt, Saskia Nuñez Von Voigt, Majid Rafiei, Leopold von Waldthausen
{"title":"Privacy and Confidentiality in Process Mining: Threats and Research Challenges","authors":"Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, M. Sani, A. Koschmider, F. Mannhardt, Saskia Nuñez Von Voigt, Majid Rafiei, Leopold von Waldthausen","doi":"10.1145/3468877","DOIUrl":null,"url":null,"abstract":"Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to a motivation application scenario in a hospital context as well as to the current body of work on privacy and confidentiality in process mining. A newly developed conceptual model structures the discussion that existing techniques leave room for improvement. This results in a number of important research challenges that should be addressed by future process mining research.","PeriodicalId":157366,"journal":{"name":"ACM Transactions on Management Information System (TMIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Management Information System (TMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3468877","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28
Abstract
Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to a motivation application scenario in a hospital context as well as to the current body of work on privacy and confidentiality in process mining. A newly developed conceptual model structures the discussion that existing techniques leave room for improvement. This results in a number of important research challenges that should be addressed by future process mining research.