{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:58:43Z","timestamp":1757627923475,"version":"3.44.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032029355"},{"type":"electronic","value":"9783032029362"}],"license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02936-2_1","type":"book-chapter","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:13:48Z","timestamp":1756462428000},"page":"7-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of\u00a0Event Data Partitioning on\u00a0Privacy-Aware Process Discovery"],"prefix":"10.1007","author":[{"given":"Jungeun","family":"Lim","sequence":"first","affiliation":[]},{"given":"Stephan A.","family":"Fahrenkrog-Petersen","sequence":"additional","affiliation":[]},{"given":"Xixi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]},{"given":"Minseok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2019","unstructured":"Augusto, A., et al.: Automated discovery of process models from event logs: review and benchmark. IEEE Trans. Knowl. Data Eng. 31(4), 686\u2013705 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"Baier, T., Mendling, J., Weske, M.: Bridging abstraction layers in process mining. Inf. Syst. 46, 123\u2013139 (2014)","journal-title":"Inf. Syst."},{"key":"1_CR3","unstructured":"Berti, A., Van\u00a0Zelst, S.J., van\u00a0der Aalst, W.: Process mining for python (pm4py): bridging the gap between process-and data science. arXiv preprint arXiv:1905.06169 (2019)"},{"key":"1_CR4","unstructured":"van Dongen, B.: Bpi challenge 2012 (2012). https:\/\/data.4tu.nl\/articles\/dataset\/BPI_Challenge_2012\/12689204\/1"},{"key":"1_CR5","unstructured":"van Dongen, B.: Bpi challenge 2017 (2017). https:\/\/data.4tu.nl\/articles\/dataset\/BPI_Challenge_2017\/12696884\/1"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"van Eck, M.L., Sidorova, N., van\u00a0der Aalst, W.M.P.: Enabling process mining on sensor data from smart products. In: RCIS, pp. 1\u201312. IEEE (2016)","DOI":"10.1109\/RCIS.2016.7549355"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., Dumas, M.: Libra: high-utility anonymization of event logs for process mining via subsampling. In: Burattin, A., Polyvyanyy, A., Weber, B. (eds.) ICPM, pp. 144\u2013151. IEEE (2022)","DOI":"10.1109\/ICPM57379.2022.9980619"},{"key":"1_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-49418-6_11","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Elkoumy","year":"2020","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Secure multi-party computation for inter-organizational process mining. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 166\u2013181. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_11"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., et al.: Privacy and confidentiality in process mining: threats and research challenges. ACM TMIS (2021)","DOI":"10.1145\/3468877"},{"key":"1_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2022.102161","volume":"115","author":"G Elkoumy","year":"2023","unstructured":"Elkoumy, G., Pankova, A., Dumas, M.: Differentially private release of event logs for process mining. Inf. Syst. 115, 102161 (2023)","journal-title":"Inf. Syst."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-58666-9_7","volume-title":"Business Process Management","author":"SA Fahrenkrog-Petersen","year":"2020","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: PRIPEL: privacy-preserving event log publishing including contextual information. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 111\u2013128. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_7"},{"key":"1_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2023.102175","volume":"145","author":"SA Fahrenkrog-Petersen","year":"2023","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: Optimal event log sanitization for privacy-preserving process mining. DKE 145, 102175 (2023)","journal-title":"DKE"},{"key":"1_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102169","volume":"114","author":"SA Fahrenkrog-Petersen","year":"2023","unstructured":"Fahrenkrog-Petersen, S.A., Kabierski, M., van der Aa, H., Weidlich, M.: Semantics-aware mechanisms for control-flow anonymization in process mining. Inf. Syst. 114, 102169 (2023)","journal-title":"Inf. Syst."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Goretti, V., Basile, D., Barbaro, L., Ciccio, C.D.: Trusted execution environment for decentralized process mining. In: Guizzardi, G., Santoro, F.M., Mouratidis, H., Soffer, P. (eds.) CAiSE (2024)","DOI":"10.1007\/978-3-031-61057-8_30"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, C.W., Rozinat, A., van\u00a0der Aalst, W.M.P.: Activity mining by global trace segmentation. In: BPM Workshops (2009)","DOI":"10.1007\/978-3-642-12186-9_13"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Hildebrant, R., Fahrenkrog-Petersen, S.A., Weidlich, M., Ren, S.: PMDG: privacy for multi-perspective process mining through data generalization. In: CAiSE. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-34560-9_30","DOI":"10.1007\/978-3-031-34560-9_30"},{"key":"1_CR18","unstructured":"Kirchmann, H., Fahrenkrog-Petersen, S.A., Kabierski, M., van\u00a0der Aa, H., Weidlich, M.: Privacy-preserving process mining with pm4py (extended abstract). In: ICPM Demo. CEUR-WS.org (2022)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Kirchmann, H., Fahrenkrog-Petersen, S.A., Mannhardt, F., Weidlich, M.: Control-flow reconstruction attacks on business process models. CoRR abs\/ arXiv: 2409.10986 (2024)","DOI":"10.1007\/978-3-031-78338-8_4"},{"key":"1_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06257-0_6"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Li, C.Y., van Zelst, S.J., van\u00a0der Aalst, W.M.: Event abstraction for partial order patterns. In: BPM, pp. 38\u201354. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-41620-0_3","DOI":"10.1007\/978-3-031-41620-0_3"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Lim, J., Song, M.: Navigating event abstraction in process mining: A comprehensive analysis of sub-problems, data, and process characteristic considerations. In: BPM Workshops. pp. 174\u2013185. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-50974-2_14","DOI":"10.1007\/978-3-031-50974-2_14"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Lu, X., Gal, A., Reijers, H.A.: Discovering hierarchical processes using flexible activity trees for event abstraction. In: ICPM, pp. 145\u2013152. IEEE (2020)","DOI":"10.1109\/ICPM49681.2020.00030"},{"key":"1_CR24","first-page":"595","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt, F., Koschmider, A., Baracaldo, N., Weidlich, M., Michael, J.: Privacy-preserving process mining: differential privacy for event logs. BISE 61, 595\u2013614 (2019)","journal-title":"BISE"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-15618-2_16","volume-title":"Business Process Management","author":"J Mu\u00f1oz-Gama","year":"2010","unstructured":"Mu\u00f1oz-Gama, J., Carmona, J.: A fresh look at precision in process conformance. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol. 6336, pp. 211\u2013226. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15618-2_16"},{"key":"1_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101908","volume":"134","author":"M Rafiei","year":"2021","unstructured":"Rafiei, M., van der Aalst, W.M.P.: Group-based privacy preservation techniques for process mining. DKE 134, 101908 (2021)","journal-title":"DKE"},{"key":"1_CR27","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-030-72693-5_29","volume-title":"Process Mining Workshops","author":"M Rafiei","year":"2021","unstructured":"Rafiei, M., van der Aalst, W.M.P.: Towards quantifying privacy in process mining. In: Leemans, S., Leopold, H. (eds.) ICPM 2020. LNBIP, vol. 406, pp. 385\u2013397. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72693-5_29"},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Rafiei, M., Wangelik, F., Pourbafrani, M., van\u00a0der Aalst, W.M.P.: Travag: differentially private trace variant generation using gans. In: RCIS. Lecture Notes in Business Information Processing, vol.\u00a0476, pp. 415\u2013431. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-33080-3_25","DOI":"10.1007\/978-3-031-33080-3_25"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Rebmann, A., Weidlich, M., van\u00a0der Aa, H.: GECCO: constraint-driven abstraction of low-level event logs. In: ICDE, pp. 150\u2013163. IEEE (2022)","DOI":"10.1109\/ICDE53745.2022.00016"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Robillard, M.P., et al.: Communicating study design trade-offs in software engineering. ACM TOSEM (2024)","DOI":"10.1145\/3649598"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Van Der\u00a0Aalst, W., van\u00a0der Aalst, W.: Data science in action. Springer (2016)","DOI":"10.1007\/978-3-662-49851-4_1"},{"key":"1_CR32","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-030-98581-3_28","volume-title":"Process Mining Workshops","author":"K Maatouk","year":"2022","unstructured":"Maatouk, K., Mannhardt, F.: Quantifying the re-identification risk in published process models. In: Munoz-Gama, J., Lu, X. (eds.) ICPM 2021. LNBIP, vol. 433, pp. 382\u2013394. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98581-3_28"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Weijters, A., Ribeiro, J.: Flexible heuristics miner (fhm). In: CIDM, pp. 310\u2013317 (2011)","DOI":"10.1109\/CIDM.2011.5949453"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management: Responsible BPM Forum, Process Technology Forum, Educators Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02936-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:19:14Z","timestamp":1757481554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02936-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"ISBN":["9783032029355","9783032029362"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02936-2_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"30 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bpm2025seville.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}