A literature review and classification of electronic commerce research

EWT Ngai, FKT Wat - Information & Management, 2002 - Elsevier
In this paper, we present a literature review and classification scheme for electronic
commerce (EC) research. The former consists of 275 journal articles published between …

A review of information security issues and respective research contributions

MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …

A BPMN extension for the modeling of security requirements in business processes

A Rodríguez, E Fernández-Medina… - IEICE transactions on …, 2007 - search.ieice.org
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …

Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods

MT Siponen - Information and organization, 2005 - Elsevier
Various modern approaches to Information Systems Security (ISS) development, influenced,
eg, by information systems (IS) development methods, have been presented. While we see …

On the exploitation of process mining for security audits: the conformance checking case

R Accorsi, T Stocker - Proceedings of the 27th annual ACM symposium …, 2012 - dl.acm.org
Process mining stands for a set of techniques to analyze business process models and logs.
However, the extent to which it can be used for security auditing has not been investigated …

Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach

A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …

Secure business process model specification through a UML 2.0 activity diagram profile

A Rodríguez, E Fernández-Medina, J Trujillo… - Decision Support …, 2011 - Elsevier
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …

DW-RBAC: A formal security model of delegation and revocation in workflow systems

J Wainer, A Kumar, P Barthelmess - Information Systems, 2007 - Elsevier
One reason workflow systems have been criticized as being inflexible is that they lack
support for delegation. This paper shows how delegation can be introduced in a workflow …

A design theory for secure information systems design methods

J Heikka, R Baskerville, M Siponen - Journal of the Association for …, 2006 - aisel.aisnet.org
Many alternative methods for designing secure information systems (SIS) have been
proposed to ensure system security. However, within all the literature on SIS methods, there …

From goal‐driven security requirements engineering to secure design

H Mouratidis, J Jurjens - International Journal of Intelligent …, 2010 - Wiley Online Library
Security of intelligent software systems is an important area of research. Although security is
traditionally considered a technical issue; security is, in fact, a two‐dimensional problem …