{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:03:39Z","timestamp":1749873819668,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031949302","type":"print"},{"value":"9783031949319","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94931-9_11","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:44:37Z","timestamp":1749793477000},"page":"129-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Suspicious Activity Detection Using Blockchain Process Mining"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5182-4714","authenticated-orcid":false,"given":"Felipe Alejandro Manzor","family":"Manzor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4407-2199","authenticated-orcid":false,"given":"Adam","family":"Burke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5545-0549","authenticated-orcid":false,"given":"Nagarajan","family":"Venkatachalam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9763-1399","authenticated-orcid":false,"given":"Andrzej","family":"Janusz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCE.2018.2816299","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Das, G.: Everything you wanted to know about the blockchain: its promise, components, processes, and problems. IEEE Consum. Electron. Maga. 7, 6\u201314 (2018)","journal-title":"IEEE Consum. Electron. Maga."},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s12525-022-00536-0","volume":"32","author":"J Sedlmeir","year":"2022","unstructured":"Sedlmeir, J., Lautenschlager, J., Fridgen, G., Urbach, N.: The transparency challenge of blockchain in organizations. Electron. Mark. 32(3), 1779\u20131794 (2022)","journal-title":"Electron. Mark."},{"key":"11_CR3","unstructured":"vChain: About vchain https:\/\/www.vchain.io\/about. Accessed 2 Feb 2025"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"van\u00a0der Aalst, W.: Process Mining: Data Science in Action, 2 edn. (2016)","DOI":"10.1007\/978-3-662-49851-4"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Jans, M., Eulerich, M.: Process mining for financial auditing. In: Process Mining Handbook. LNBIP (2022)","DOI":"10.1007\/978-3-031-08848-3_15"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Hobeck, R., Klinkm\u00fcller, C., Bandara, H.M.N.D., Weber, I., van\u00a0der Aalst, W.M.P.: Process mining on blockchain data: a case study of Augur. In: BPM. LNISA, pp. 306\u2013323 (2021)","DOI":"10.1007\/978-3-030-85469-0_20"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Kell, T., Yousaf, H., Allen, S., Meiklejohn, S., Juels, A.: Forsage: anatomy of a smart-contract pyramid scheme. In: Financial Cryptography and Data Security, vol. 13951 of LNCS. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-47751-5_14","DOI":"10.1007\/978-3-031-47751-5_14"},{"issue":"9","key":"11_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2022.9881234","volume":"59","author":"MS Smith","year":"2022","unstructured":"Smith, M.S.: The spectacular collapse of cryptokitties. IEEE Spect. 59(9), 42\u201347 (2022)","journal-title":"IEEE Spect."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Mackaay, E.: Black markets. In: Law and Economics for Civil Law Systems (2021)","DOI":"10.4337\/9781788118262.00016"},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s10270-016-0545-x","volume":"17","author":"S Leemans","year":"2018","unstructured":"Leemans, S., Fahland, D., van der Aalst, W.: Scalable process discovery and conformance checking. Softw. Syst. Model. 17(2), 599\u2013631 (2018)","journal-title":"Softw. Syst. Model."},{"key":"11_CR11","unstructured":"Panisi, F., Buckley, R., Arner, D.W.: Blockchain and public companies: a revolution in share ownership transparency, proxy-voting and corporate governance? Stanford J. Blockchain Law Policy (2019)"},{"key":"11_CR12","unstructured":"Yin, X.: Blockchain technology in corporate governance: advantages and limitations. Acad. J. Bus. Manag. (2023)"},{"key":"11_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-58779-6_1","volume-title":"Business Process Management: Blockchain and Robotic Process Automation Forum","author":"M M\u00fcller","year":"2020","unstructured":"M\u00fcller, M., Ostern, N., Rosemann, M.: Silver bullet for all trust issues? Blockchain-based trust patterns for collaborative business processes. In: Asatiani, A., et al. (eds.) BPM 2020. LNBIP, vol. 393, pp. 3\u201318. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58779-6_1"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.): BPM 2019. LNCS, vol. 11675. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26619-6","DOI":"10.1007\/978-3-030-26619-6"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Moctar-M\u2019Baba, L., Sellami, M., Gaaloul, W., Nanne, M.F.: Blockchain logging for process mining: a systematic review. In: Hawaii International Conference on System Sciences (2022)","DOI":"10.24251\/HICSS.2022.751"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"M\u00fcller, M., Ruppel, P.: Process mining for decentralized applications. In: International Conference on Decentralized Applications and Infrastructures (2019)","DOI":"10.1109\/DAPPCON.2019.00031"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Leyer, M., ter Hofstede, A.H., Syed, R.: Detecting weasels at work: a theory-driven behavioural process mining approach. In: BPM, pp. 337\u2013354 (2023)","DOI":"10.1007\/978-3-031-41623-1_20"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Bala, S., Jacobowitz, T., Mendling, J.: Spotting the weasel at work: mining inappropriate behavior patterns in event logs. In: International Conference on Enterprise Design, Operations, and Computing, pp. 36\u201352 (2024)","DOI":"10.1007\/978-3-031-79059-1_3"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Hobeck, R., Klinkm\u00fcller, C., Bandara, H.M.N.D., Weber, I., van\u00a0der Aalst, W.: On the suitability of process mining for enhancing transparency of blockchain applications. Bus. Inf. Syst. Eng. (2024)","DOI":"10.1007\/s12599-024-00903-5"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-19069-3_19","volume-title":"Advanced Information Systems Engineering","author":"ML van Eck","year":"2015","unstructured":"van Eck, M.L., Lu, X., Leemans, S., van der Aalst, W.: PM$$^2$$: a process mining project methodology. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 297\u2013313. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19069-3_19"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94931-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:44:41Z","timestamp":1749793481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94931-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031949302","9783031949319"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94931-9_11","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.big.tuwien.ac.at\/caise2025\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}