Abstract
With a steady increase of regulatory requirements for business processes, automation support of compliance management is a field garnering increasing attention in Information Systems research. Several approaches have been developed to support compliance checking of process models. One major challenge for such approaches is their ability to handle different modeling techniques and compliance rules in order to enable widespread adoption and application. Applying a structured literature search strategy, we reflect and discuss compliance-checking approaches in order to provide an insight into their generalizability and evaluation. The results imply that current approaches mainly focus on special modeling techniques and/or a restricted set of types of compliance rules. Most approaches abstain from real-world evaluation which raises the question of their practical applicability. Referring to the search results, we propose a roadmap for further research in model-based business process compliance checking.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Abdullah, Norris Syed, Shazia Sadiq, and Marta Indulska (2010): Emerging Challenges in Information Systems Research for Regulatory Compliance Management in: Barbara Pernici (ed.): Advanced Information Systems Engineering, Springer: Berlin et al., 251–265.
Accorsi, Rafael, Lutz Lowis, and Yoshinori Sato (2011): Automated Certification for Compliant Cloud-Based Business Processes, Business & Information Systems Engineering, 3 (3): 145–154.
Adler, Isolde, Frederic Dorn, Fedor V. Fomin, Ignasi Sau, and Dimitrios M. Thilikos (2010): Faster Parameterized Algorithms for Minor Containment, in: Haim Kaplan (ed.): Algorithm Theory: SWAT 2010, Springer: Berlin et al., 322–333.
Alavi, Maryam (1984): An Assessment of the Prototyping Approach to Information Systems Development, Communications of the ACM, 27 (6): 556–563.
Arbab, Farhad, Natallia Kokash, and Sun Meng (2009): Towards Using Reo for Compliance-Aware Business Process Modeling, in: Margaria Tiziana and Steffen Bernhard (eds.): Leveraging Applications of Formal Methods, Verification and Validation, Springer: Berlin et al., 108–123.
Awad, Ahmed (2007): BPMN-Q: A Language to Query Business Processes, in: Manfred Reichert, Stefan Strecker, and Klaus Turowski (eds.): Enterprise Modelling and Information Systems Architectures: Concepts and Applications, Gesell-schaft für Informatik: Bonn, 115–128.
Awad, Ahmed (2010): A Compliance Management Framework for Business Process Models, Dissertation, University of Potsdam: Potsdam.
Awad, Ahmed, Gero Decker, and Mathias Weske (2008): Efficient Compliance Checking Using BPMN-Q and Temporal Logic, in: Marlon Dumas, Manfred Reichert, and Ming-Chien Shan (eds.): Business Process Management, Springer: Berlin et al., 326–341.
Awad, Ahmed, Sergey Smirnov, and Mathias Weske (2009a): Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach, in: Robert Meersman, Tharam Dillon, and Pilar Herrero (eds.): On the Move to Meaningful Internet Systems: OTM 2009, Springer: Berlin et al., 6–23.
Awad, Ahmed, Sergey Smirnov, and Mathias Weske (2009b): Towards Resolving Compliance Violations in Business Process Models, CEUR Workshop Proceedings, 459: 1–15.
Awad, Ahmed and Mathias Weske (2009): Visualization of Compliance Violation Using Anti-Patterns, BPT Technical Report, http://bpt.hpi.uni-potsdam.de/pub/Public/AhmedAwad/VoV.pdf (Access date: 2012-09-21).
Awad, Ahmed and Mathias Weske (2010): Visualization of Compliance Violation in Business Process Models, in: Stefanie Rinderle-Ma, Shazia Sadiq, and Frank Leymann (eds.): Business Process Management Workshops (BPM 2009), Springer: Berlin et al., 182–193.
BaFin (2010): Rundschreiben 11/2010 (BA) — Mindestanfor-derungen an das Risikomanagement — MaRisk, http://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/Rundschreiben/rs_1011_ba_marisk.html (Access date: 2012-09-21).
Becker, Axel, Walter Gruber, and Dirk Wohlert (eds.) (2006): Handbuch MaRisk: Mindestanforderungen an das Risiko-management in der Bankpraxis, Knapp: Frankfurt am Main.
Breuker, Dominik, Hanns Alexander Dietrich, Johannes Püster, Matthias Steinhorst, Jörg Becker, and Patrick Delfmann (2012): Eine empirische Studie zur strukturellen Komplexität konzeptioneller Modelle Grundlegung eines effi-zienten Ansatzes zur strukturellen Modellanalyse, in: Dirk Christian Mattfeld and S. Robra-Bissantz (eds.): Multikonfe-renz Wirtschaftsinformatik 2012, Gito: Berlin, 1688–1701.
Cantor, Georg (1895): Beiträge zur Begründung der transfiniten Mengenlehre, Mathematische Annalen, 46 (4): 481–512.
Chakrabarti, Deepayan and Christos Faloutsos (2006): Graph Mining: Laws, Generators, and Algorithms, ACM Computing Surveys, 38 (1): Article 2.
Cimatti, Alessandro, Edmund Clarke, Enrico Giunchiglia, Fausto Giunchiglia, Marco Pistore, Marco Roveri, Roberto Sebastiani, and Armando Tacchella (2002): NuSMV 2: An OpenSource Tool for Symbolic Model Checking, in: Ed Brinksma and Kim G. Larsen (eds.): 14th International Conference on Computer Aided Verification (CAV 2002), Springer: Berlin et al., 359–364.
Clarke, Edmund M. Jr., Orna Grumberg, and Doron A. Peled (2000): Model Checking, MIT Press: Cambridge, MA, USA.
Conte, Donatello, Pasquale Foggia, Carlo Sansone, and Mario Vento (2004): Thirty Years Of Graph Matching, International Journal of Pattern Recognition and Artificial Intelligence, 18 (3): 265–298.
Damaggio, Elio, Alin Deutsch, Richard Hull, and Victor Vianu (2011): Automatic Verification of Data-Centric Business Processes, in: Stefanie Rinderle-Ma, Farouk Toumani, and Karsten Wolf (eds.): 9th International Conference on Business Process Management (BPM 2011), Springer: Berlin et al., 3–16.
Davenport, Thomas H. and Donna B. Stoddard (1994): Reengineering: Business Change of Mythic Proportions?, MIS Quarterly, 18 (2): 121–127.
Davis, Islay, Peter Green, Michael Rosemann, Marta Indulska, and Stan Gallo (2006): How Do Practitioners Use Conceptual Modeling in Practice?, Data & Knowledge Engineering, 58 (3): 358–380.
Delfmann, Patrick, Sebastian Herwig, and Lukasz Lis (2009): Unified Enterprise Knowledge Representation With Conceptual Models: Capturing Corporate Language in Naming Conventions, in: ICIS 2009 Proceedings, Paper 45, http://aisel.aisnet.org/icis2009/45 (Access date: 2012-09-24).
DeToro, Irving and Thomas McCabe (1997): How to Stay Flexible and Elude Fads, Quality Progress, 30 (3): 55–60.
Diestel, Reinhard (2010): Graph Theory, Springer: Berlin et al.
Dorn, Frederic (2010): Planar Subgraph Isomorphism Revisited, in: Jean-Yves Marion and Thomas Schwentick (eds.): 27th International Symposium on Theoretical Aspects of Computer Science, Leibniz-Zentrum für Informatik: Wadern, 263–274.
El Kharbili, Marwane, Ana Karla Alves De Medeiros, Sebastian Stein, and Wil M. P. van der Aalst (2008): Business Process Compliance Checking: Current State and Future Challenges, in: Peter Loos (ed.): Modellierung betrieblicher Informations-systeme (MoBIS 2008), Gesellschaft für Informatik: Bonn, 107–113.
El Kharbili, Marwane, Sebastian Stein, Ivan Markovic, and Elke Pulvermueller (2008): Towards a Framework for Semantic Business Process Compliance Management, CEUR Workshop Proceedings, 339: 1–15.
Elgammal, Amal, Oktay Turetken, Willem-Jan van den Heuvel, and Mike Papazoglou (2010): Root-Cause Analysis of Design-Time Compliance Violations on the Basis of Property Patterns, in: Paul P. Maglio, Mathias Weske, Jian Yang, and Marcelo Fantinato (eds.): Service-Oriented Computing, Springer: Berlin et al., 17–31.
Elzinga, D. Jack, Tomas Horak, Chung-Yee Lee, and Charles Bruner (1995): Business Process Management: Survey and Methodology, IEEE Transactions on Engineering Management, 42 (2): 119–128.
Eshuis, Rik (2006): Symbolic Model Checking of UML Activity Diagrams, ACM Transactions on Software Engineering and Methodology, 15 (1): 1–38.
Eshuis, Rik and Roel Wieringa (2004): Tool Support for Verifying UML Activity Diagrams, IEEE Transactions on Software Engineering, 30 (7): 437–447.
Foerster, Alexander, Gregor Engels, and Tim Schattkowsky (2005): Activity Diagram Patterns for Modeling Quality Constraints in Business Processes, in: Lionel Briand and Clay Williams (eds.): Model Driven Engineering Languages and Systems, Springer: Berlin et al., 2–16.
Foerster, Alexander, Gregor Engels, Tim Schattkowsky, and Ragnhild Van Der Straeten (2007): Verification of Business Process Quality Constraints Based on Visual Process Patterns, in: First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE 2007), IEEE Computer Society: Los Alamitos, CA, 197–208.
Georges, Andy, Dries Buytaert, and Lieven Eeckhout (2007): Statistically Rigorous Java Performance Evaluation, ACM SIG-PLAN Notices, 42 (10): 57–76.
Gerstlberger, Wolfgang, Michael Kreuzkamp, Peter E. Harland, and Vitali Altholz (2010): Implementation of MaRisk and Sustainability Aspects of Innovation, Economic and Environmental Studies, 10 (4): 357–378.
Ghose, Aditya and George Koliadis (2007): Auditing Business Process Compliance, in: Bernd J. Krämer, Kwei-Jay Lin, and Priya Narasimhan (eds.): Service-Oriented Computing (ICSOC 2007), Springer: Berlin et al., 169–180.
Ginzberg, Michael J. (1981): Early Diagnosis of MIS Implementation Failure: Promising Results and Unanswered Questions, Management Science, 27 (4): 459–478.
Goedertier, Stijn and Jan Vanthienen (2006): Designing Compliant Business Processes With Obligations and Permissions, in: Johann Eder and Schahram Dustdar (eds.): Business Process Management Workshops (BPM 2006), Springer: Berlin et al., 5–14.
Governatori, Guido and Zoran Milosevic (2006): A Formal Analysis of a Business Contract Language, International Journal of Cooperative Information Systems, 15 (4): 659–685.
Governatori, Guido, Zoran Milosevic, and Shazia Sadiq (2006): Compliance Checking Between Business Processes and Business Contracts, in: 10th IEEE International Enterprise Distributed Object Computer Conference, IEEE Computer Society: Los Alamitos, CA, 221–232.
Governatori, Guido and Antonino Rotolo (2010): A Conceptually Rich Model of Business Process Compliance, in: Sebastian Link and Aditya K. Ghose (eds.): 7th Asia-Pacific Conference on Conceptual Modelling (APCCM 2010), Australian Computer Society: Darlinghurst, 3–12.
Grant, Delvin (2002): A Wider View of Business Process Reengineering, Communications of the ACM, 45 (2): 85–90.
Hajiaghayi, Mohammad and Naomi Nishimura (2007): Subgraph Isomorphism, Log-Bounded Fragmentation, and Graphs of (Locally) Bounded Treewidth, Journal of Computer and System Sciences, 73 (5): 755–768.
Hammer, Michael and James Champy (1993): Reengineering the Corporation: A Manifesto for Business Revolution, HarperBusiness: New York, NY.
Harmon, Paul (2003): Business Process Change: A Manager’s Guide to Improving, Redesigning, and Automating Processes, Morgan-Kaufmann: Amsterdam et al.
Hevner, Alan R., Salvatore T. March, Jinsoo Park, and Sudha Ram (2004): Design Science in Information Systems Research, MIS Quarterly, 28 (1): 75–105.
Hicks, Illya V. (2004): Branch Decompositions and Minor Containment, Networks, 43 (1): 1–9.
Hinz, Sebastian, Karsten Schmidt, and Christian Stahl (2005): Transforming BPEL to Petri Nets in: Wil M. P. van der Aalst, Boualem Benatallah, Fabio Casati, and Francisco Curbera (eds.): 3rd International Conference on Business Process Management (BPM 2005), Springer: Berlin et al., 220–235.
Hoffmann, Jörg, Ingo Weber, and Guido Governatori (2012): On Compliance Checking for Clausal Constraints in Annotated Process Models, Information Systems Frontiers, 14 (2): 155–177.
Holzmann, Gerard J. (1997): The Model Checker SPIN, IEEE Transactions on Software Engineering, 23 (5): 279–295.
Keller, Gerhard, Markus Nüttgens, and August-Wilhelm Scheer (1992): Semantische Prozeßmodellierung auf der Grundlage ”Ereignisgesteuerter Prozeßketten (EPK)“, Institut für Wirtschaftsinformatik: Saarbrücken.
Khaluf, Lial, Christian Gerth, and Gregor Engels (2011): Pattern-Based Modeling and Formalizing of Business Process Quality Constraints, in: Haralambos Mouratidis and Colette Rolland (eds.): 23rd International Conference on Advanced Information Systems Engineering (CAiSE 2011), Springer: Berlin et al., 521–535.
Knuplesch, David, Linh Thao Ly, Stefanie Rinderle-Ma, Holger Pfeifer, and Peter Dadam (2010): On Enabling Data-Aware Compliance Checking of Business Process Models, in: Jeffrey Parsons, Motoshi Saeki, Peretz Shoval, Carson Woo, and Yair Wand (eds.): 29th International Conference on Conceptual Modeling (ER 2010), Springer: Berlin et al., 332–346.
Kokash, Natallia and Farhad Arbab (2009): Formal Behavioral Modeling and Compliance Analysis for Service-Oriented Systems, in: Frank S. Boer, Marcello M. Bonsangue, and Eric Madelaine (eds.): Formal Methods for Components and Objects, Springer: Berlin et al., 21–41.
Kuester, Jochen M., Ksenia Ryndina, and Harald Gall (2007): Generation of Business Process Models for Object Life Cycle Compliance, in: Gustavo Alonso, Peter Dadam, and Michael Rosemann (eds.): 5th International Conference on Business Process Management (BPM 2007), Springer: Berlin et al., 165–181.
Kumar, Akhil and Rong Liu (2008): A Rule-Based Framework Using Role Patterns for Business Process Compliance, in: Nick Bassiliades, Guido Governatori, and Adrian Paschke (eds.): Rule Representation, Interchange and Reasoning on the Web (RuleML 2008), Springer: Berlin et al., 58–72.
Lee, Allen S. and Richard L. Baskerville (2003): Generalizing Generalizability in Information Systems Research, Information Systems Research, 14 (3): 221–243.
Levy, Yair and Timothy J. Ellis (2006): A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research, Informing Science, 9: 181–212.
Liu, Ying, Samuel Müller, and Ke Xu (2007): A Static Compliance-Checking Framework for Business Process Models, IBM Systems Journal, 46 (2): 335–361.
Lohmann, Niels and Karsten Wolf (2010): How to Implement a Theory of Correctness in the Area of Business Processes and Services, in: Richard Hull, Jan Mendling, and Stefan Tai (eds.): 8th International Conference on Business Process Management (BPM 2010), Springer: Berlin et al., 61–77.
Lu, Ruopeng, Shazia Sadiq, and Guido Governatori (2008a): Compliance Aware Business Process Design, in: Arthur ter Hofstede, Boualem Benatallah, and Hye-Young Paik (eds.): Business Process Management Workshops (BPM 2007), Springer: Berlin et al., 120–131.
Lu, Ruopeng, Shazia Sadiq, and Guido Governatori (2008b): Measurement of Compliance Distance in Business Processes, Information Systems Management, 25 (4): 344–355.
Lucas Jr., Henry C. (1975): Performance and the Use of an Information System, Management Science, 21 (8): 908–919.
Ly, Linh Thao, Kevin Goeser, Stefanie Rinderle-Ma, and Peter Dadam (2008): Compliance of Semantic Constraints: A Requirements Analysis for Process Management Systems, CEUR Workshop Proceedings, 339: 31–45.
Ly, Linh Thao, Stefanie Rinderle-Ma, and Peter Dadam (2006): Semantic Correctness in Adaptive Process Management Systems, in: Schahram Dustdar, José Luiz Fiadeiro, and Amit P. Sheth (eds.): 4th International Conference on Business Process Management (BPM 2006), Springer: Berlin et al., 193–208.
Ly, Linh Thao, Stefanie Rinderle-Ma, and Peter Dadam (2010): Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems, in: Barbara Pernici (ed.): Advanced Information Systems Engineering, Springer: Berlin et al., 9–23.
Ly, Linh Thao, Stefanie Rinderle-Ma, Kevin Göser, and Peter Dadam (2009): On Enabling Integrated Process Compliance With Semantic Constraints in Process Management Systems: Requirements, Challenges, Solutions, Information Systems Frontiers, 14 (2): 195–219.
Ly, Linh Thao, Stefanie Rinderle-Ma, and Peter Dadam (2008): Integration and Verification of Semantic Constraints in Adaptive Process Management Systems, Data & Knowledge Engineering, 64 (1): 3–23.
March, Salvatore T. and Gerald F. Smith (1995): Design and Natural Science Research on Information Technology, Decision Support Systems, 15 (4): 251–266.
Monakova, Ganna, Oliver Kopp, Frank Leymann, Simon Moser, and Klaus Schäfers (2009): Verifying Business Rules Using an SMT Solver for BPEL Processes, in: Witold Abramowicz, Leszek A. Maciaszek, Ryszard Kowalczyk, and Andreas Speck (eds.): Business Process, Services Computing and Intelligent Service Management (BPSC 2009), Gesellschaft für Informatik: Bonn, 81–94.
Mueller, Jens (2010): Strukturbasierte Verifikation von BPMN-Modellen, Dissertation, University of Tübingen: Tübingen, http://www-ti.informatik.uni-tuebingen.de/~spruth/DiplArb/DissMueller.pdf (Access date: 2012-09-27).
Namiri, Kioumars and Nenad Stojanovic (2007): Pattern-Based Design and Validation of Business Process Compliance, in: Robert Meersman and Zahir Tari (eds.): On the Move to Meaningful Internet Systems: OTM 2007, Springer: Berlin et al., 59–76.
Object Management Group (2005): Unified Modeling Language: Infrastructure, http://www.omg.org/spec/UML/2.0/Infrastructure/PDF (Access date: 2012-04-10).
Object Management Group (2011): Business Process Model and Notation (BPMN), http://www.omg.org/spec/BPMN/2.0/PDF (Access date: 2012-04-10).
Organization for the Advancement of Structured Information Standards (2007): Web Services Business Process Execution Language Version 2.0, http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.pdf (Access date: 2012-09-18).
Orriëns, Bart and Jian Yang (2005): Specification and Management of Policies in Service Oriented Business Collaboration, in: Wil M. P. van der Aalst, Boualem Benatallah, Fabio Casati, and Francisco Curbera (eds.): 3rd International Conference on Business Process Management (BPM 2005), Springer: Berlin et al., 422–427.
Österle, Hubert, Jörg Becker, Ulrich Frank, Thomas Hess, Dimitris Karagiannis, Helmut Krcmar, Peter Loos, Peter Mertens, Andreas Oberweis, and Elmar J. Sinz (2010): Memorandum zur gestaltungsorientierten Wirtschaftsinformatik, Schmalenbachs Zeitschrift für betriebswirtschaftliche Forschung, 62 (6): 664–672.
Peffers, Ken, Tuure Tuunanen, Marcus A. Rothenberger, and Samir Chatterjee (2007): A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems, 24 (3): 45–77.
Peterson, James L. (1977): Petri Nets, ACM Computing Surveys, 9 (3): 223–252.
Raduescu, Corina, Hui Min Tan, Malini Jayaganesh, Wasana Bandara, Michael zur Muehlen, and Sonja Lippe (2006): A Framework of Issues in Large Process Modeling Projects, in: Jan Ljungberg (ed.): 14th European Conference on Information Systems (ECIS 2006), Göteborg, 1–12.
Recker, Jan, Michael Rosemann, Marta Indulska, and Peter Green (2009): Business Process Modeling: A Comparative Analysis, Journal of the Association for Information Systems, 10 (4): 333–363.
Riege, Christian, Jan Saat, and Tobias Bucher (2009): Systematisierung von Evaluationsmethoden in der gestaltungsorientierten Wirtschaftsinformatik, in: Jörg Becker, Helmut Krcmar, and Björn Niehaves (eds.): Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik, Physica: Heidelberg, 69–86.
Rosemann, Michael and Iris Vessey (2008): Toward Improving the Relevance of Information Systems Research to Practice: The Role of Applicability Checks, MIS Quarterly, 32 (1): 1–22.
Sadiq, Shazia, Guido Governatori, and Kioumars Namiri (2007): Modeling Control Objectives for Business Process Compliance, in: Gustavo Alonso, Peter Dadam, and Michael Rosemann (eds.): 5th International Conference on Business Process Management (BPM 2007), Springer: Berlin et al., 149–164.
Sarbanes-Oxley Act (2002): Public Law 107-204 107th Congress, http://www.gpo.gov/fdsys/pkg/PLAW-107publ204 /pdf/PLAW-107publ204.pdf (Access date: 2012-04-10).
Schleicher, Daniel, Tobias Anstett, Frank Leymann, and David Schumm (2010): Compliant Business Process Design Using Refinement Layers, in: Robert Meersman, Tharam Dillon, and Pilar Herrero (eds.): On the Move to Meaningful Internet Systems: OTM 2010, Springer: Berlin et al., 114–131.
Schmidt, Karsten (2000): LoLA: A Low Level Analyser, in: Mogens Nielsen and Dan Simpson (eds.): 21st International Conference on Application and Theory of Petri Nets. (ICATPN 2000), Springer: Berlin et al., 465–476.
Schrader, Ulf and Thorsten Hennig-Thurau (2009): VHB-JOURQUAL2: Method, Results, and Implications of the German Academic Association for Business Research’s Journal Ranking, BuR — Business Research, 2 (2): 180–204.
Schumm, David, Oktay Turetken, Natallia Kokash, Amal Elgammal, Frank Leymann, and Willem-Jan van den Heuvel (2010): Business Process Compliance Through Reusable Units of Compliant Processes in: Florian Daniel and Federico Michele Facca (eds.): Current Trends in Web Engineering, Springer: Berlin et al., 325–337.
Simon, Herbert A. (1996): The Sciences of the Artificial, MIT Press: Cambridge, MA.
Soffer, Pnina and Yair Wand (2004): Goal-Driven Analysis of Process Model Validity, in: Anne Persson and Janis Stirna (eds.): 16th International Conference on Advanced Information Systems Engineering (CAiSE 2004), Springer: Berlin et al., 229–319.
Stewart, David W., Prem N. Shamdasani, and Dennis W. Rook (2007): Focus groups: Theory and practice, Sage: Thousand Oaks, CA, et al.
Swanson, E. Burton (1987): Information Channel Disposition and Use, Decision Sciences, 18 (1): 131–145.
Thomas, Oliver and Michael Fellmann (2009): Semantic Process Modeling — Design and Implementation of an Ontology-Based Representation of Business Processes, Business & Information Systems Engineering, 1 (6): 438–451.
Trčka, Nikola, Wil M. P. van der Aalst, and Natalia Sidorova (2009): Data-Flow Anti-patterns: Discovering Data-Flow Errors in Workflows, in: Pascal van Eck, Jaap Gordijn, and Roel Wieringa (eds.): 21st International Conference on Advanced Information Systems Engineering (CAiSE 2009), Springer: Berlin et al., 425–439.
Ullmann, Julian R. (1976): An Algorithm for Subgraph Isomorphism, Journal of the ACM, 23 (1): 31–42.
Vom Brocke, Jan, Alexander Simons, Björn Niehaves, Kai Riemer, Ralf Plattfaut, and Anne Cleven (2009): Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process, in: S. Newell (ed.): 17th European Conference on Information Systems (ECIS 2009), Verona, 2206–2217.
Wang, Harry Jiannan and J. Leon Zhao (2011): Constraint-Centric Workflow Change Analytics, Decision Support Systems, 51 (3): 562–575.
Webster, Jane and Richard T. Watson (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review, MIS Quarterly, 26 (2): xiii–xxiii.
Woerzberger, René, Thomas Kurpick, and Thomas Heer (2008a): Checking Correctness and Compliance of Integrated Process Models, in: Viorel Negru, Tudor Jebelean, Dana Petcu, and Daniela Zaharie (eds.): 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, IEEE Computer Society: Los Alamitos, CA, 576–583.
Woerzberger, René, Thomas Kurpick, and Thomas Heer (2008b): On Correctness, Compliance and Consistency of Process Models, in: 2008 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE Computer Society: Los Alamitos, CA, 251–252.
Wolter, Christian and Christoph Meinel (2010): An Approach to Capture Authorisation Requirements in Business Processes, Requirements Engineering, 15 (4): 359–373.
Wolter, Christian, Philip Miseldine, and Christoph Meinel (2009): Verification of Business Process Entailment Constraints Using SPIN, in: Fabio Massacci, Samuel T. Redwine, and Nicola Zannone (eds.): Engineering Secure Software and Systems, Springer: Berlin et al., 1–15.
Xiangpeng, Zhao, Antonio Cerone, and Padmanabhan Krishnan (2006): Verifying BPEL Workflows Under Authorisation Constraints, in: Schahram Dustdar, José Luiz Fiadeiro, and Amit P. Sheth (eds.): 4th International Conference on Business Process Management (BPM 2006), Springer: Berlin et al., 439–444.
Zairi, Mohamed (1997): Business Process Management: A Boundaryless Approach to Modern Competitiveness, Business Process Management Journal, 3 (1): 64–80.
Zur Muehlen, Michael, Marta Indulska, and Gerrit Kamp (2007): Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in: John Grundy, Sven Hartmann, Alberto H. F. Laender, Leszek A. Maciaszek, and John F. Roddick (eds.): Tutorials, Posters, Panels and Industrial Contributions at the 26th International Conference on Conceptual Modeling (ER 2007), Australian Computer Society: Auckland, 127–132.
Zur Muehlen, Michael and Jan Recker (2008): How Much Language is Enough? Theoretical and Practical Use of the Business Process Modeling Notation, in: Zohra Bellahsène and Michel Léonard (eds.): 20th International Conference on Advanced Information Systems Engineering (CAiSE 2008), Springer: Berlin et al., 465–479
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Becker, J., Delfmann, P., Eggert, M. et al. Generalizability and Applicability of Model-Based Business Process Compliance-Checking Approaches — A State-of-the-Art Analysis and Research Roadmap. Bus Res 5, 221–247 (2012). https://doi.org/10.1007/BF03342739
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/BF03342739