{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:54:45Z","timestamp":1776394485987,"version":"3.51.2"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030494346","type":"print"},{"value":"9783030494353","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49435-3_16","type":"book-chapter","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T20:11:27Z","timestamp":1591128687000},"page":"252-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Quantifying the Re-identification Risk of Event Logs for Process Mining"],"prefix":"10.1007","author":[{"given":"Saskia","family":"Nu\u00f1ez von Voigt","sequence":"first","affiliation":[]},{"given":"Stephan A.","family":"Fahrenkrog-Petersen","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Agnes","family":"Koschmider","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Mannhardt","sequence":"additional","affiliation":[]},{"given":"Olaf","family":"Landsiedel","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,3]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action, 2nd edn. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4","edition":"2"},{"issue":"5","key":"16_CR2","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt, F., Koschmider, A., Baracaldo, N., Weidlich, M., Michael, J.: Privacy-preserving process mining. Bus. Inf. Syst. Eng. 61(5), 595\u2013614 (2019). https:\/\/doi.org\/10.1007\/s12599-019-00613-3","journal-title":"Bus. Inf. Syst. Eng."},{"key":"16_CR3","unstructured":"Bauer, M., Fahrenkrog-Petersen, S.A., Koschmider, A., Mannhardt, F.: ELPaaS: event Log Privacy as a service. In: Proceedings of the Dissertation Award, 17th International Conference on Business Process Management, BPM 2019, p. 5 (2019)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: PRETSA: event log sanitization for privacy-aware process discovery. In: Proceedings of the International Conference on Process Mining, ICPM 2019, pp. 1\u20138 (2019)","DOI":"10.1109\/ICPM.2019.00012"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Lavrenovs, A., Podins, K.: Privacy violations in Riga open data public transport system. In: Proceedings of the IEEE 4th Workshop on Advances in Information, Electronic and Electrical Engineering, AIEEE 2016, pp. 1\u20136 (2016)","DOI":"10.1109\/AIEEE.2016.7821808"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing NYC taxi data: does it matter? In: Proceedings of the IEEE International Conference on Data Science and Advanced Analytics, DSAA 2016, pp. 140\u2013148 (2016)","DOI":"10.1109\/DSAA.2016.21"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J., Montjoye, Y.A.: Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10, 1\u20139 (2019)","journal-title":"Nat. Commun."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Pika, A., Leyer, M., Wynn, M.T., Fidge, C.J., Ter Hofstede, A.H., van der Aalst, W.M.: Mining resource profiles from event logs. In: Proceedings of ACM Transactions on Management Information Systems, TMIS 2017, vol. 8, no. 1, p. 1 (2017)","DOI":"10.1145\/3041218"},{"key":"16_CR9","unstructured":"van Dongen, B., Borchert, F.: BPI Challenge 2018. TU Eindhoven, Dataset (2018)"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/1472-6947-12-66","volume":"12","author":"FK Dankar","year":"2012","unstructured":"Dankar, F.K., El Emam, K., Neisa, A., Roffey, T.: Estimating the re-identification risk of clinical data sets. BMC Med. Inform. Decis. Mak. 12(1), 66 (2012)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"16_CR11","unstructured":"Mannhardt, F.: Sepsis Cases - Event Log. TU Eindhoven, Dataset (2016)"},{"key":"16_CR12","unstructured":"Song, Y., Dahlmeier, D., Bressan, S.: Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In: Proceeding of the 1st International Workshop on Privacy-Preserving IR, PIR@SIGIR 2014, vol. 2014, pp. 19\u201324 (2014)"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"YA de Montjoye","year":"2013","unstructured":"de Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","journal-title":"Sci. Rep."},{"key":"16_CR14","unstructured":"Sztyler, T., Carmona, J.: Activities of Daily Living of Several Individuals. University of Mannheim, Germany. Dataset (2015)"},{"key":"16_CR15","unstructured":"Steeman, W.: BPI Challenge 2013. Ghent University, Dataset (2013)"},{"key":"16_CR16","unstructured":"van Dongen, B.: BPI Challenge 2012. 4TU.Centre for Research Data. Dataset (2012)"},{"key":"16_CR17","unstructured":"van Dongen, B.: BPI Challenge 2015. 4TU.Centre for Research Data. Dataset (2015)"},{"key":"16_CR18","unstructured":"van Dongen, B.: BPI Challenge 2017. TU Eindhoven, Dataset (2017)"},{"key":"16_CR19","unstructured":"Munoz-Gama, J., de la Fuente, R., Sep\u00falveda, M., Fuentes, R.: Conformance Checking Challenge 2019 (CCC19). 4TU.Centre for Research Data. Dataset (2019)"},{"key":"16_CR20","unstructured":"Djedovi\u0107, A.: Credit Requirement Event Logs. 4TU.Centre for Research Data. Dataset (2017)"},{"key":"16_CR21","unstructured":"Mannhardt, F.: Hospital Billing - Event Log. TU Eindhoven, Dataset (2017)"},{"key":"16_CR22","unstructured":"van Dongen, B.: Real-life Event Logs - Hospital log. TU Eindhoven, Dataset (2011)"},{"key":"16_CR23","unstructured":"Buijs, J.: Receipt Phase of an Environmental Permit Application Process (\u2018WABO\u2019). Eindhoven University of Technology, Dataset (2014)"},{"key":"16_CR24","unstructured":"de Leoni, M., Mannhardt, F.: Road Traffic Fine Management Process. TU Eindhoven, Dataset (2015)"},{"key":"16_CR25","unstructured":"Leemans, M.: Apache Commons Crypto 1.0.0 - Stream CbcNopad Unit Test Software Event Log. TU Eindhoven. Dataset (2017)"},{"key":"16_CR26","unstructured":"van Dongen, B.: BPI Challenge 2014. 4TU.Centre for Research Data. Dataset (2014)"},{"key":"16_CR27","unstructured":"Dees, M., van Dongen, B.: BPI Challenge 2016. 4TU.Centre for Research Data. Dataset (2016)"},{"key":"16_CR28","unstructured":"van Dongen, B.: BPI Challenge 2019. 4TU.Centre for Research Data. Dataset (2019)"},{"key":"16_CR29","unstructured":"Leemans, M.: JUnit 4.12 Software Event Log. TU Eindhoven. Dataset (2016)"},{"key":"16_CR30","unstructured":"Leemans, M.: NASA Crew Exploration Vehicle (CEV) Software Event Log. TU Eindhoven, Dataset (2017)"},{"key":"16_CR31","unstructured":"Leemans, M.: Statechart Workbench and Alignments Software Event Log. TU Eindhoven, Dataset (2018)"},{"key":"16_CR32","unstructured":"Mannhardt, F., Blinde, D.: Analyzing the trajectories of patients with sepsis using process mining. In: Joint Proceedings. Volume 1859 of CEUR Workshop Proceedings, RADAR+EMISA 2017, pp. 72\u201380. CEUR-WS.org (2017)"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Pika, A., Wynn, M.T., Budiono, S.: Towards privacy-preserving process mining in healthcare. Proceedings of International Workshop on Process-Oriented Data Science for Healthcare, PODS4H 2019, p. 12 (2019)","DOI":"10.1007\/978-3-030-37453-2_39"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Zook, M., et al.: Ten simple rules for responsible big data research (2017)","DOI":"10.1371\/journal.pcbi.1005399"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 29th IEEE Symposium on Security and Privacy, S&P 2008, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing Social Networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, S&P 2009, pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"issue":"1","key":"16_CR37","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67\u201382 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR38","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"issue":"05","key":"16_CR39","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"16_CR40","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI International (1998)"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, pp. 265\u2013284 (2006)","DOI":"10.1007\/11681878_14"},{"key":"16_CR42","unstructured":"Rafiei, M., von Waldthausen, L., van der Aalst, W.M.P.: Ensuring confidentiality in process mining. In: Proceedings of the 8th International Symposium on Data-driven Process Discovery and Analysis, SIMPDA 2018, pp. 3\u201317 (2018)"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Burattin, A., Conti, M., Turato, D.: Toward an anonymous process mining. In: Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, FiCloud 2015, Rome, Italy, pp. 58\u201363 (2015)","DOI":"10.1109\/FiCloud.2015.9"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Mannhardt, F., Petersen, S.A., Oliveira, M.F.: Privacy challenges for process mining in human-centered industrial environments. In: Proceedings of the 14th International Conference on Intelligent Environments, IE 2018, pp. 64\u201371 (2018)","DOI":"10.1109\/IE.2018.00017"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49435-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T22:02:32Z","timestamp":1748815352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49435-3_16"}},"subtitle":["Empiricial Evaluation Paper"],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494346","9783030494353"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49435-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise20.imag.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 11 papers were published from the CAiSE 2020 workshops. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}