2012
DOI: 10.1016/j.is.2012.05.001
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: a b s t r a c tCompanies have to adhere to compliance requirements. The compliance analysis of business operations is typically a joint effort of business experts and compliance experts. Those experts need to create a common understanding of business processes to effectively conduct compliance management. In this paper, we present a technique that aims at supporting this process. We argue that process templates generated out of compliance requirements provide a basis for negotiation among business and complian… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 42 publications
(80 reference statements)
0
5
0
Order By: Relevance
“…3 considered with UC extraction without sets of time points, a UC was obtained for 611. With sets of time points enabled one instance more 4 and one instance less are solved. An analysis by category (for plots see App.…”
Section: Experimental Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…3 considered with UC extraction without sets of time points, a UC was obtained for 611. With sets of time points enabled one instance more 4 and one instance less are solved. An analysis by category (for plots see App.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Checks for vacuous specifications, which are closely related to UCs [36], are an important feature of industrial hardware verification tools (see, e.g., [7,3]). In the academic world UCs are an important part of design methods for embedded systems (e.g., [30]) as well as for business processes (e.g., [4]). Despite this relevance of UCs efforts to provide additional information in the context of UCs or vacuity have remained isolated (e.g., [38]).…”
Section: Introductionmentioning
confidence: 99%
“…In particular, out of the 698 instances we considered with UC extraction without sets of time points, a UC was obtained for 611. With sets of time points enabled one instance more 4 and one instance less are solved. An analysis by category (for plots see App.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…It first appears in the context of a UC extraction algorithm that is complete only for a strict subset of LTL. Later [36] proposes example (4) and conjectures that sets of time points can be obtained from a tableau method and that these sets are semilinear. Some work [31,6] determines the time points at which propositions in witnesses of satisfiable LTL formulas are relevant for satisfiability.…”
Section: Introductionmentioning
confidence: 99%
“…Given that the personal information was destroyed the entity was excused from the violation of the rst section (illegal collection of personal information). However, even if the entity was excused from the illegal collection, they were never entitled (i.e., permitted) to collect personal information 5 , consequently they were not permitted to collect medical information; thus the prohibition of collecting medical information was in force. Accordingly, the collection of medical information violates the norm forbidding such an activity.…”
Section: A P Amentioning
confidence: 99%