{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:38:39Z","timestamp":1774021119404,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032029355","type":"print"},{"value":"9783032029362","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02936-2_16","type":"book-chapter","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:13:31Z","timestamp":1756462411000},"page":"216-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy and\u00a0Confidentiality Requirements Engineering for\u00a0Process Data"],"prefix":"10.1007","author":[{"given":"Fabian","family":"Haertel","sequence":"first","affiliation":[]},{"given":"Juergen","family":"Mangler","sequence":"additional","affiliation":[]},{"given":"Nataliia","family":"Klievtsova","sequence":"additional","affiliation":[]},{"given":"Celine","family":"Mader","sequence":"additional","affiliation":[]},{"given":"Eugen","family":"Rigger","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"key":"16_CR1","volume":"76","author":"M Bakhtina","year":"2023","unstructured":"Bakhtina, M., Matulevicius, R., Seeba, M.: Tool-supported method for privacy analysis of a business process model. J. Inf. Secur. Appl. 76, 103525 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"16_CR2","volume":"68","author":"E Batista","year":"2022","unstructured":"Batista, E., Mart\u00ednez-Ballest\u00e9, A., Solanas, A.: Privacy-preserving process mining: a microaggregation-based approach. J. Inf. Secur. Appl. 68, 103235 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"16_CR3","unstructured":"Bauer, M., Fahrenkrog-Petersen, S.A., Koschmider, A., Mannhardt, F., van\u00a0der Aa, H., Weidlich, M.: ELPAAS: event log privacy as a service. In: BPM Demos, pp. 159\u2013163 (2019)"},{"issue":"2","key":"16_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10009-021-00636-w","volume":"24","author":"M Dumas","year":"2022","unstructured":"Dumas, M., et al.: Multi-level privacy analysis of business processes: the PLEAK toolset. Int. J. Softw. Tools Technol. Transf. 24(2), 183\u2013203 (2022)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Secure multi-party computation for inter-organizational process mining. In: EMMSAD, pp. 166\u2013181 (2020)","DOI":"10.1007\/978-3-030-49418-6_11"},{"key":"16_CR6","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Shareprom: a tool for privacy-preserving inter-organizational process mining. In: BPM Demos, pp. 72\u201376 (2020)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., et al.: Privacy and confidentiality in process mining: threats and research challenges. ACM Trans. Manag. Inf. Syst. 13(1), 11:1\u201311:17 (2022)","DOI":"10.1145\/3468877"},{"key":"16_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2022.102161","volume":"115","author":"G Elkoumy","year":"2023","unstructured":"Elkoumy, G., Pankova, A., Dumas, M.: Differentially private release of event logs for process mining. Inf. Syst. 115, 102161 (2023)","journal-title":"Inf. Syst."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S.A., van\u00a0der Aa, H., Weidlich, M.: PRETSA: event log sanitization for privacy-aware process discovery. In: Process Mining, pp.\u00a01\u20138 (2019)","DOI":"10.1109\/ICPM.2019.00012"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S.A., van\u00a0der Aa, H., Weidlich, M.: Optimal event log sanitization for privacy-preserving process mining. Data Knowl. Eng. 145 (2023)","DOI":"10.1016\/j.datak.2023.102175"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Haertel, F.: Privacy and Confidentiality Requirements Engineering in Process Mining. Master\u2019s thesis, Technical University of Munich (2024)","DOI":"10.1007\/978-3-032-02936-2_16"},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.infsof.2013.12.004","volume":"56","author":"M Leitner","year":"2014","unstructured":"Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273\u2013293 (2014)","journal-title":"Inf. Softw. Technol."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Data Engineering, pp. 106\u2013115 (2006)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. TKDD 1(1) (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Mannhardt, F.: Responsible process mining. In: Process Mining Handbook, pp. 373\u2013401 (2022)","DOI":"10.1007\/978-3-031-08848-3_12"},{"issue":"5","key":"16_CR16","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt, F., Koschmider, A., Baracaldo, N., Weidlich, M., Michael, J.: Privacy-preserving process mining - differential privacy for event logs. Bus. Inf. Syst. Eng. 61(5), 595\u2013614 (2019)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12599-018-0518-4","volume":"60","author":"R Matulevicius","year":"2018","unstructured":"Matulevicius, R., Norta, A., Samar\u00fctel, S.: Security requirements elicitation from airline turnaround processes. Bus. Inf. Syst. Eng. 60(1), 3\u201320 (2018)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Pika, A., Wynn, M.T., Budiono, S., ter Hofstede, A.H.M., van\u00a0der Aalst, W.M.P., Reijers, H.A.: Towards privacy-preserving process mining in healthcare. In: Business Process Management Workshops, pp. 483\u2013495 (2019)","DOI":"10.1007\/978-3-030-37453-2_39"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Rafiei, M., Wagner, M., van\u00a0der Aalst, W.M.P.: TLKC-privacy model for process mining. In: Research Challenges in Information Science, pp. 398\u2013416 (2020)","DOI":"10.1007\/978-3-030-50316-1_24"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wildemuth, B.M.: Unstructured interviews. In: Applications of Social Research Methods to Questions in Information and Library Science, pp. 000\u2013060 (2016)","DOI":"10.5040\/9798400613739"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management: Responsible BPM Forum, Process Technology Forum, Educators Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02936-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:19:32Z","timestamp":1757481572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02936-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"ISBN":["9783032029355","9783032029362"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02936-2_16","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"30 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bpm2025seville.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}