Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and confidentiality in process mining: Threats and research challenges
Privacy and confidentiality are very important prerequisites for applying process mining to
comply with regulations and keep company secrets. This article provides a foundation for …
comply with regulations and keep company secrets. This article provides a foundation for …
Opportunities and challenges for applying process mining in healthcare: a systematic map** study
MR Dallagassa, C dos Santos Garcia… - Journal of ambient …, 2022 - Springer
Process mining applies robust methodologies using data mining and machine learning for
pattern recognition, using models that represent the process flow identified by the sequence …
pattern recognition, using models that represent the process flow identified by the sequence …
A five-level framework for research on process mining
Process Mining is a novel technology that helps enterprises to better understand their
business processes. Over the last 20 years, intensive research has been conducted into …
business processes. Over the last 20 years, intensive research has been conducted into …
Adoption, use and management of process mining in practice
Purpose This study explores how process managers perceive the adoption, use and
management of process mining in practice. While research in process mining predominantly …
management of process mining in practice. While research in process mining predominantly …
Privacy-preserving process mining in healthcare
Process mining has been successfully applied in the healthcare domain and has helped to
uncover various insights for improving healthcare processes. While the benefits of process …
uncover various insights for improving healthcare processes. While the benefits of process …
[PDF][PDF] A Delimitation of Data Sovereignty from Digital and Technological Sovereignty.
M Hellmeier, F von Scherenberg - ECIS, 2023 - researchgate.net
Digital technology significantly impacts our everyday social lives and how we conduct
business. This development results in abundant new data generated by people and …
business. This development results in abundant new data generated by people and …
[HTML][HTML] Group-based privacy preservation techniques for process mining
Process mining techniques help to improve processes using event data. Such data are
widely available in information systems. However, they often contain highly sensitive …
widely available in information systems. However, they often contain highly sensitive …
A survey of the fusion of traditional data security technology and blockchain
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …
widely used in various fields. For example, utilizing a chain data structure to verify and …
No longer out of sight, no longer out of mind? How organizations engage with process mining-induced transparency to achieve increased process awareness
In recent years, process mining has emerged as the leading big data technology for
business process analysis. By extracting knowledge from event logs in information systems …
business process analysis. By extracting knowledge from event logs in information systems …
Improving Process Mining Maturity–From Intentions to Actions
J Brock, K Brennig, B Löhr, C Bartelheimer… - Business & Information …, 2024 - Springer
Process mining is advancing as a powerful tool for revealing valuable insights about
process dynamics. Nevertheless, the imperative to employ process mining to enhance …
process dynamics. Nevertheless, the imperative to employ process mining to enhance …