2019
DOI: 10.1109/tsc.2016.2617331
|View full text |Cite
|
Sign up to set email alerts
|

Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 88 publications
(49 citation statements)
references
References 55 publications
0
49
0
Order By: Relevance
“…Process mining is an extension of data mining in process management, and its applications include process discovery, conformance checking, and bottleneck analysis [15][16][17][18][19][20][21], etc. Among them, process discovery gets the process model based on multiple sequences in the event log.…”
Section: Video Learning Behavior Process Model Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…Process mining is an extension of data mining in process management, and its applications include process discovery, conformance checking, and bottleneck analysis [15][16][17][18][19][20][21], etc. Among them, process discovery gets the process model based on multiple sequences in the event log.…”
Section: Video Learning Behavior Process Model Miningmentioning
confidence: 99%
“…if (vi, vj not belong to V) then: : add vi, vj to V//record videos that meet the conditions : end if : add (vi , vj) to E//record the order relationship between videos : end if : end for : output (V, E) Algorithm 2 first counts the number of directly following relationships (lines 7-9) betwee ery two adjacent videos vi and vi+1 in the learning sequence. Next, it calculates the dependenc tween every two videos vi and vj (lines [11][12][13][14][15][16]. Then, if the number of directly followin ationships and the dependence of vi and vj are greater than Tf and Td, vi and vj are added into th eo set of the VLBP model and the sequence relationship of vi and vj is added into the relationshi t of the VLBP model (lines 17-22).…”
mentioning
confidence: 99%
“…Already in 2012, the Process Mining Manifesto [23] stated that event logs of the highest quality should address privacy and security considerations adequately and the development of privacypreserving process mining methods would be required for cross-organizational mining [23]. Liu et al consider the privacy of internal event logs and process models in a crossorganizational process discovery setting in [24]. A few very valuable guidelines for the privacy-aware application of process mining, from a practical viewpoint and mainly in a consulting context, are given by Rozinat et al in [25].…”
Section: Privacy In Process Miningmentioning
confidence: 99%
“…In this section, we mainly discuss related work on process mining, software process mining, and software usability analysis. Process mining deals with dis-covering, monitoring, and improving real business processes by extracting knowledge from event logs that are available in modern information systems [1,3,4]. There are three major types of process mining: (i) process discovery, (ii) conformance checking, and (iii) enhancement.…”
Section: Related Workmentioning
confidence: 99%