Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A literature review and classification of electronic commerce research
EWT Ngai, FKT Wat - Information & Management, 2002 - Elsevier
In this paper, we present a literature review and classification scheme for electronic
commerce (EC) research. The former consists of 275 journal articles published between …
commerce (EC) research. The former consists of 275 journal articles published between …
A review of information security issues and respective research contributions
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …
communication, security management, development of secure Information Systems), and …
A BPMN extension for the modeling of security requirements in business processes
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …
the key to maintain competitiveness. Moreover, business processes are important for …
Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods
MT Siponen - Information and organization, 2005 - Elsevier
Various modern approaches to Information Systems Security (ISS) development, influenced,
eg, by information systems (IS) development methods, have been presented. While we see …
eg, by information systems (IS) development methods, have been presented. While we see …
On the exploitation of process mining for security audits: the conformance checking case
R Accorsi, T Stocker - Proceedings of the 27th annual ACM symposium …, 2012 - dl.acm.org
Process mining stands for a set of techniques to analyze business process models and logs.
However, the extent to which it can be used for security auditing has not been investigated …
However, the extent to which it can be used for security auditing has not been investigated …
Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach
A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …
systems development. The basic underlying concept of this approach is the definition of …
Secure business process model specification through a UML 2.0 activity diagram profile
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …
and to enable it to maintain its competitiveness. The languages used for business process …
DW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack
support for delegation. This paper shows how delegation can be introduced in a workflow …
support for delegation. This paper shows how delegation can be introduced in a workflow …
A design theory for secure information systems design methods
Many alternative methods for designing secure information systems (SIS) have been
proposed to ensure system security. However, within all the literature on SIS methods, there …
proposed to ensure system security. However, within all the literature on SIS methods, there …
From goal‐driven security requirements engineering to secure design
Security of intelligent software systems is an important area of research. Although security is
traditionally considered a technical issue; security is, in fact, a two‐dimensional problem …
traditionally considered a technical issue; security is, in fact, a two‐dimensional problem …