posted by user: fmannhardt2 || 2800 views || tracked by 2 users: [display]

TPSA 2021 : 2nd Workshop on Trust, Privacy and Security Aspects in Process Analytics


When Oct 31, 2021 - Nov 4, 2021
Where Eindhoven
Abstract Registration Due Aug 19, 2021
Submission Deadline Aug 26, 2021
Notification Due Sep 16, 2021
Final Version Due Sep 30, 2021
Categories    responsible data science   business process management   privacy   security

Call For Papers

Process Mining has been successfully applied in analysing and improving processes based on event logs in all kinds of environments. However, aspects of trust, privacy, and security have been largely neglected when considering the technical design as well as the organizational application of Process Mining. These aspects can be seen from two perspectives:

(A) Responsible application of Process Mining and the trust that the methods and their results cannot or are not misused. Criteria for responsible data science have been defined, e.g., the FACT (Fairness, Accuracy, Confidentiality, Transparency) criteria. How should these criteria be embedded in the design and the application of Process Mining methods.

(B) Investigating privacy and security aspects of information systems by using Process Mining methods. How can Process Mining be used to find privacy violations or security issues that undermine the trust in systems.

For us, privacy relates to the concern that event logs may contain personal data of both customers and employees and the challenge of protecting the information about individuals while still being useful for process mining (e.g., differential privacy, k-anonymity, homomorphic encryption, secure multi-party computing). However, Process Mining could also be used to investigate whether privacy regulations are being followed and pinpoint compliance violations. Often, security aspects (e.g., encryption) are closely connected when processing personal data cannot be avoided. On the other hand, the workshop is about the concept of trust, which is required both from the perspective of trust in organizational and technological measures that event logs are not misused (e.g., for worker surveillance) as well as from the perspective of trust that the results of a process mining analysis faithfully reflect reality (e.g., data quality, traceability, auditability).

The main objective of the TPSA workshop is to give a forum for the trust, privacy, and security aspects and the responsible application of process mining including other concerns such as fairness, transparency, and accuracy. We invite researchers and industry to share their research, ideas, experience reports, and challenges in this area. The best papers submitted to the workshop will be invited to submit a revised version to a special issue of the EMISA Journal.

The topics of interest for this workshop, but not limited to, are provided below.
- Privacy-preserving methods for Process Analytics (Process Mining, Data Mining, Machine Learning)
- Privacy-preserving methods for Business Process Management
- Privacy and Trust for Blockchains in Business Process Management
- Privacy Engineering for Event Logs
- Privacy and Trust in Organizational Data Collection
- Analysis of Privacy Compliance with Process Analytics
- GDPR and Process Mining
- Data Quality, and Traceability in Process Analytics
- Methods and Techniques for Privacy and Trust Management in Process Mining
- Trust in Process Analytics
- Fairness in Process Analytics
- Responsible Process Analytics
- Trust in Explainable Process Analytics

Organizing Committee

- Felix Mannhardt, TU Eindhoven
- Agnes Koschmider, Kiel University
- Nathalie Baracaldo, IBM Almaden Research Center

Program committee (tentative)

- Luciano Garcia BaƱuelos, Tecnologico de Monterrey, Mexico
- Olivia Choudhury, Amazon Inc.
- Stephan Fahrenkrog-Petersen, Humboldt University of Berlin
- Marwan Hassani, TU Eindhoven
- Judith Michael, RWTH Aachen
- Florian Tschorsch, Technical University Berlin
- Melanie Volkamer, Karlsruhe Institute of Technology
- Moe Wynn, Queensland University of Technology
- Sebastiaan van Zelst, RWTH Aachen / FIT

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IWSPA 2022   IWSPA 2022 -- 8th ACM International Workshop on Security and Privacy Analytics
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
IEEE CSP--EI Compendex, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing