Skip to main content

Showing 1–2 of 2 results for author: Trottier, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.05869  [pdf, other

    cs.CY

    Using Process Mining to Improve Digital Service Delivery

    Authors: Jacques Trottier, William Van Woensel, Xiaoyang Wang, Kavya Mallur, Najah El-Gharib, Daniel Amyot

    Abstract: We present a case study of Process Mining (PM) for personnel security screening in the Canadian government. We consider customer (process time) and organizational (cost) perspectives. Furthermore, in contrast to most published case studies, we assess the full process improvement lifecycle: pre-intervention analyses pointed out initial bottlenecks, and post-intervention analyses identified the inte… ▽ More

    Submitted 23 August, 2024; originally announced September 2024.

    Comments: 15 pages, 4 figures, submitted to the 1st Workshop on Empirical Research in Process Mining (ERPM)

    ACM Class: J.1

  2. arXiv:2209.11878  [pdf, other

    cs.CR cs.HC

    "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software

    Authors: Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan

    Abstract: Employees are often required to use Enterprise Security Software ("ESS") on corporate and personal devices. ESS products collect users' activity data including users' location, applications used, and websites visited - operating from employees' device to the cloud. To the best of our knowledge, the privacy implications of this data collection have yet to be explored. We conduct an online survey (n… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: To appear in USENIX Security Symposium 2023