A novel secure business process modeling approach and its impact on business performance

2014 ◽  
Vol 277 ◽  
pp. 375-395 ◽  
Author(s):  
Youseef Alotaibi ◽  
Fei Liu
Author(s):  
Ilia Bider ◽  
Erik Perjons

From the practical point of view, the most important parameter that describes the quality of a particular model is its adequacy to the task for which the model will be used. The selection of a “right for the task” modeling approach can substantially increase chances of creating a high quality model. To ensure the “right” choice of modeling approach the following three factors should be considered: (a) properties of the object to be modeled, (b) characteristics of the environment in which the model is being built, (c) intended use of the model. This chapter is devoted to the analysis of these factors for the domain of business process modeling. It presents a simplified classification of the approaches to business process modeling. It lists the most essential properties of business processes, it classifies modeling environments, and it discusses some practical tasks where a business process model can be used. Based on the analysis, practical recommendations on what modeling approach to choose are given dependent on the type of the process under consideration, the task at hand, and the environment in which the model is being built and verified.


2010 ◽  
Vol 1 (2) ◽  
pp. 1-17
Author(s):  
Joseph Barjis

Security requirements must be tackled early in software design and embedded in corresponding business process models. As a blueprint for software design, business process models complemented with security requirements will prevent many security breaches. To accomplish secure business process modeling, the underlying method must adhere to certain capabilities and capture actions, actor roles, and interactions. The resultant models should lend themselves to automatic analysis (simulation) to ensure captured security requirements are correctly aligned with the process flow. Thus, the tradeoff between the level of security and business performance can be studied before actual software design. Since unauthorized actions cause security breaches, the software the system’s social setting could be a cradle for defining security requirements. Security requirements can be identified based on the roles, authorities, and obligations of the social actors using the system. This paper introduces a method for security embedded business process modeling. The proposed method draws on two well-tested theoretical foundations—enterprise ontology and organizational semiotics.


Sign in / Sign up

Export Citation Format

Share Document