User-centered and privacy-driven process mining system design for IoT

Judith Michael, Agnes Koschmider, Felix Mannhardt, Nathalie Baracaldo, Bernhard Rumpe

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

Abstract

Process mining uses event data recorded by information systems to reveal the actual execution of business processes in organizations. By doing this, event logs can expose sensitive information that may be attributed back to individuals (e.g., reveal information on the performance of individual employees). Due to GDPR organizations are obliged to consider privacy throughout the complete development process, which also applies to the design of process mining systems. The aim of this paper is to develop a privacy-preserving system design for process mining. The user-centered view on the system design allows to track who does what, when, why, where and how with personal data. The approach is demonstrated on an IoT manufacturing use case.

Original languageEnglish
Title of host publicationInformation Systems Engineering in Responsible Information Systems - CAiSE Forum 2019, Proceedings
EditorsMarcela Ruiz, Cinzia Cappiello
PublisherSpringer
Pages194-206
Number of pages13
ISBN (Print)9783030212964
DOIs
Publication statusPublished - 2019
Externally publishedYes
Event31st International Conference on Advanced Information Systems Engineering, CAiSE 2019 - Rome, Italy
Duration: 3 Jun 20197 Jun 2019

Publication series

NameLecture Notes in Business Information Processing
Volume350
ISSN (Print)1865-1348
ISSN (Electronic)1865-1356

Conference

Conference31st International Conference on Advanced Information Systems Engineering, CAiSE 2019
CountryItaly
CityRome
Period3/06/197/06/19

Keywords

  • Access control
  • Event log
  • Meta-model
  • Privacy preserving system architecture
  • Privacy-by-design
  • Process mining

Fingerprint Dive into the research topics of 'User-centered and privacy-driven process mining system design for IoT'. Together they form a unique fingerprint.

Cite this