@inproceedings{BenderFabianLessmannetal.2016, author = {Bender, Benedict and Fabian, Benjamin and Lessmann, Stefan and Haupt, Johannes}, title = {E-Mail Tracking}, series = {Proceedings of the 37th International Conference on Information Systems (ICIS)}, booktitle = {Proceedings of the 37th International Conference on Information Systems (ICIS)}, pages = {19}, year = {2016}, abstract = {E-mail advertisement, as one instrument in the marketing mix, allows companies to collect fine-grained behavioural data about individual users' e-mail reading habits realised through sophisticated tracking mechanisms. Such tracking can be harmful for user privacy and security. This problem is especially severe since e-mail tracking techniques gather data without user consent. Striving to increase privacy and security in e-mail communication, the paper makes three contributions. First, a large database of newsletter e-mails is developed. This data facilitates investigating the prevalence of e- mail tracking among 300 global enterprises from Germany, the United Kingdom and the United States. Second, countermeasures are developed for automatically identifying and blocking e-mail tracking mechanisms without impeding the user experience. The approach consists of identifying important tracking descriptors and creating a neural network-based detection model. Last, the effectiveness of the proposed approach is established by means of empirical experimentation. The results suggest a classification accuracy of 99.99\%.}, language = {en} } @inproceedings{GlaschkeGronauBender2016, author = {Glaschke, Christian and Gronau, Norbert and Bender, Benedict}, title = {Cross-System Process Mining using RFID Technology}, series = {Proceedings of the Sixth International Symposium on Business Modeling and Software Design - BMSD}, booktitle = {Proceedings of the Sixth International Symposium on Business Modeling and Software Design - BMSD}, publisher = {SCITEPRESS - Science and Technology Publications}, address = {Set{\´u}bal}, isbn = {978-989-758-190-8}, doi = {10.5220/0006223501790186}, pages = {179 -- 186}, year = {2016}, abstract = {In times of digitalization, the collection and modeling of business processes is still a challenge for companies. The demand for trustworthy process models that reflect the actual execution steps therefore increases. The respective kinds of processes significantly determine both, business process analysis and the conception of future target processes and they are the starting point for any kind of change initiatives. Existing approaches to model as-is processes, like process mining, are exclusively focused on reconstruction. Therefore, transactional protocols and limited data from a single application system are used. Heterogeneous application landscapes and business processes that are executed across multiple application systems, on the contrary, are one of the main challenges in process mining research. Using RFID technology is hence one approach to close the existing gap between different application systems. This paper focuses on methods for data collection from real world objects via RFID technology and possible combinations with application data (process mining) in order to realize a cross system mining approach.}, language = {en} } @inproceedings{GronauGrumBender2016, author = {Gronau, Norbert and Grum, Marcus and Bender, Benedict}, title = {Determining the optimal level of autonomy in cyber-physical production systems}, series = {IEEE 14th International Conference on Industrial Informatics (INDIN)}, booktitle = {IEEE 14th International Conference on Industrial Informatics (INDIN)}, publisher = {IEEE}, address = {New York}, doi = {10.1109/INDIN.2016.7819367}, pages = {1293 -- 1299}, year = {2016}, abstract = {Traditional production systems are enhanced by cyber-physical systems (CPS) and Internet of Things. A kind of next generation systems, those cyber-physical production systems (CPPS) are able to raise the level of autonomy of its production components. To find the optimal degree of autonomy in a given context, a research approach is formulated using a simulation concept. Based on requirements and assumptions, a cyber-physical market is modeled and qualitative hypotheses are formulated, which will be verified with the help of the CPPS of a hybrid simulation environment.}, language = {en} }