Privacy in the digital age: a review of information privacy research in information systems
Information privacy refers to the desire of individuals to control or have some influence over
data about themselves. Advances in information technology have raised concerns about …
data about themselves. Advances in information technology have raised concerns about …
Are we done with business process compliance: state of the art and challenges ahead
Literature on business process compliance (BPC) has predominantly focused on the
alignment of the regulatory rules with the design, verification and validation of business …
alignment of the regulatory rules with the design, verification and validation of business …
[PDF][PDF] User requirements notation: the first ten years, the next ten years
The User Requirements Notation (URN), standardized by the International
Telecommunication Union in 2008, is used to model and analyze requirements with goals …
Telecommunication Union in 2008, is used to model and analyze requirements with goals …
Social Modeling and i*
ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …
reflecting the subject matter and the kinds of understanding that is sought in each field …
Four reference models for transparency requirements in information systems
Transparency is a key emerging requirement in modern businesses and their information
systems. Transparency refers to the information which flows amongst stakeholders for the …
systems. Transparency refers to the information which flows amongst stakeholders for the …
Legislative compliance assessment: framework, model and GDPR instantiation
S Agarwal, S Steyskal, F Antunovic… - Privacy Technologies and …, 2018 - Springer
Legislative compliance assessment tools are commonly used by companies to help them to
understand their legal obligations. One of the primary limitations of existing tools is that they …
understand their legal obligations. One of the primary limitations of existing tools is that they …
Current research in risk-aware business process management―overview, comparison, and gap analysis
The management of risk in business processes has been the subject of active research in
the past few years. Potentially, many benefits can be obtained by integrating the two …
the past few years. Potentially, many benefits can be obtained by integrating the two …
Tactical business-process-decision support based on KPIs monitoring and validation
Abstract Key Performance Indicators (KPIs) can be used to evaluate the success of an
organization, facilitating the detection of the deviations and unexpected evolution of the …
organization, facilitating the detection of the deviations and unexpected evolution of the …
Legal goal-oriented requirement language (legal GRL) for modeling regulations
Every year, governments introduce new or revised regulations that are imposing new types
of requirements on software development. Analyzing and modeling these legal …
of requirements on software development. Analyzing and modeling these legal …
Compliance analysis based on a goal-oriented requirement language evaluation methodology
In recent years, many governmental regulations have been introduced to protect the privacy
of personal information. As a result, organizations must take a systematic approach to …
of personal information. As a result, organizations must take a systematic approach to …