Integrating Compliance Management in Service-Driven Computing

Author(s):  
Natallia Kokash

The lack of effective controls over organizational business processes can cause serious consequences for a company's reputation and even jeopardize its existence. There is a need for continuous monitoring of controls and systematic collection and evaluation of relevant data. Compliance management is essential for ensuring that organizational business processes and supporting information system are in compliance with laws, regulations, and various legislative or technical documents pertaining to the place of business. The focus of this chapter is to provide an insight into compliance management and discuss the integration and automation of compliance management in service-driven computing. The chapter elaborates conceptual models for specifying compliance requirements originating from various sources and details aspects such as multi-view process modeling annotated with compliance requirements, annotation of service interfaces and behavioral characteristics, development and reuse of compliant process fragments, architectural patterns to simplify compliance management, and abstract frameworks to ensure compliance in the context of service-driven computing through service adaptation and runtime governance. Finally, approaches to automating compliance management through formalization of compliance requirements, rule- and event-based monitoring, and integration of compliance governance systems with automated reasoning and verification tools are detailed.

2021 ◽  
Vol 27 (2) ◽  
pp. 638-657
Author(s):  
Fredrik Milani ◽  
Luciano Garcia-Banuelos ◽  
Svitlana Filipova ◽  
Mariia Markovska

PurposeBlockchain technology is increasingly positioned as a promising and disruptive technology. Such a promise has attracted companies to explore how blockchain technology can be used to gain significant benefits. Process models play a cardinal role when seeking to improve business processes as they are the foundation of process analysis and redesign. This paper examines how blockchain-oriented processes can be conceptually modelled with activity- (BPMN) and artifact-centric (CMMN) modelling paradigms.Design/methodology/approachThis paper discusses how commonly occurring patterns, specific to block-chain-based applications, can be modelled with BPMN and CMMN. Furthermore, the advantages and disadvantages of both notations for accurately representing blockchain-specific patterns are discussed.FindingsThe main finding of this paper is that neither BPMN nor CMMN can adequately and accurately represent certain patterns specific for blockchain-oriented processes. BPMN, while supporting most of the patterns, does not provide sufficient support to represent tokenization. CMMN, on the other hand, does not provide support to distinguish between activities executed and data stored on-chain versus off-chain.Originality/valueThe paper provides insight into the strengths and weaknesses of BPMN and CMMN for modelling processes to be supported by blockchain. This will serve to aid analysts to produce better process models for communication purposes and, thereby, facilitate development of blockchain-based solutions.


Author(s):  
Angelo Cucinotta ◽  
Antonino Longo Minnolo ◽  
Antonio Puliafito

The downward trend in the cost of RFID technology is producing a strong impact on the industrial world that is using such powerful technology in order to rethink and optimize most of the existing business processes. In this sense, the chipless technology is playing a key role to facilitate the adoption of RFID in enterprises. All this implies the use of solutions that simplify the adoption of the continuously evolving RFID technology and allow keeping a high-level vision versus the specific technical details. In brief, it is mandatory to abstract the technological level and makes transparent the physical devices to the application level. The widespread use of the RFID technology also produces a large volume of data from many objects scattered everywhere, that have to be managed. In these complex scenarios, the RFID middleware represents an ideal solution that favors the technology integration, reducing costs for application development and introducing real benefits to the business processes. In this chapter, the authors describe the main features of our event-based RFID middleware and its powerful architecture. Their middleware is able to assure an effective process of technological abstraction, switching from a vision linked to the specific issues of interfacing devices (chipless tags, readers, sensor networks, GPS, WiFi, etc.) to the management of the event generated by each device. In brief, “event-based” means to integrate the management logic of different devices.


Author(s):  
Marwane El Kharbili ◽  
Elke Pulvermueller

Business process management (BPM) as a paradigm for enterprise planning and governance is nowadays a core discipline of information systems management. Growing up from the first process re-engineering initiatives in the 1980’s, BPM technologies now seek to span all of the organizational silos of enterprises, and also expand vertically from the strategy layers where visions and goals are defined to the lower data transaction layers. Ensuring the compliance of processes to the guidance and control provided to the business by regulations is an obligation to every enterprise. In this work, we motivate the need for automation in compliance management and propose the use of policies as a modeling concept for regulations. We introduce the CASE model for structuring regulatory compliance requirements as policies. Policies shall allow to model regulations at abstraction levels adequate to implementing platform independent mechanisms for policy verification. We describe the CASE model and explain how it can be used to structure and model policies extracted from regulations. This chapter also defines a policy modeling ontology that we propose as a language for formally modeling CASE policies. The basic CASE model and the corresponding policy modeling ontology support compliance of enterprise processes to regulations by enabling automation to compliance checking (verification). The utilization of the CASE method as well as the policy ontology is showcased using an example of resource access control in business processes.


Author(s):  
Sabah Abdullah Al-Somali ◽  
Ben Clegg ◽  
Roya Gholami

Organizations today face intense competitive and economic pressures leading to large scale transformation of existing business operations and transactions. In addition, organizations have adopted automated business processes to deal with partners and customers. E-business diffusion is a multi-phase process, moving from initiation through to routinisation and an insight into the adoption processes helps organizations to adopt e-business more effectively. It is imperative that organizations effectively manage the e-business environment, and all associated changes to accommodate the changing relationships with customers and business partners and more importantly, to improve performance. This chapter discusses the process of e-business implementation, usage and diffusion (routinisation stage) on business performance.


2018 ◽  
Vol 29 (1) ◽  
pp. 308-339 ◽  
Author(s):  
Sirirat Somapa ◽  
Martine Cools ◽  
Wout Dullaert

Purpose The purpose of this paper is to present a literature review that aims to provide insight into the characteristics and effectiveness of supply chain visibility (SCV), as well as to identify metrics that capture these aspects in business processes. Design/methodology/approach A systematic review of the supply chain literature is conducted to identify the characteristics and the effectiveness of SCV. The synthesis of SCV effectiveness and its metrics are based on the process-oriented approach which relates the effectiveness of SCV to improved business performance. Findings This study reveals that the characteristics of SCV can be captured in terms of the accessibility, quality, and usefulness of information. The benefits of SCV are found to extend beyond improvements to operational efficiency of business processes or to the strategic competencies of an organization. Practical implications This study underlines that clear agreements between all players involved in the SC can help to solve problems caused by information completeness (type and amount of information), and unlock the full potential of SCV projects. Originality/value By using a process-oriented approach, this review provides a comprehensive explanation of the functions of SCV, as well as its first-order effects, in terms of automational, informational, and transformational characteristics.


2020 ◽  
Vol 20 (45) ◽  
Author(s):  

This mission advised on strategic options to enhance tax compliance in Armenia. It complements the March 2018 tax administration mission, which provided the State Revenue Committee (SRC) with general guidance to develop and implement a compliance improvement framework.1 At the request of the authorities, this report focuses on the specific issues which continue to hamper effective compliance management, including the tax policy framework and the SRC’s business processes.


Author(s):  
Diogo R. Ferreira

This chapter introduces the principles of sequence clustering and presents two case studies where the technique is used to discover behavioral patterns in event logs. In the first case study, the goal is to understand the way members of a software team perform their daily work, and the application of sequence clustering reveals a set of behavioral patterns that are related to some of the main processes being carried out by that team. In the second case study, the goal is to analyze the event history recorded in a technical support database in order to determine whether the recorded behavior complies with a predefined issue handling process. In this case, the application of sequence clustering confirms that all behavioral patterns share a common trend that resembles the original process. Throughout the chapter, special attention is given to the need for data preprocessing in order to obtain results that provide insight into the typical behavior of business processes.


2011 ◽  
Vol 17 (2) ◽  
Author(s):  
Thomas G. Calderon ◽  
Sooduk Seo ◽  
Il-Woon Kim

<p class="MsoNormal" style="text-align: justify; margin: 0in 37.8pt 0pt 0.5in;"><span style="mso-bidi-font-style: italic;"><span style="font-size: x-small;"><span style="font-family: Batang;">An underlying premise of investments in information technology (IT) for internal business processes is that these investments add value to the enterprise. This study examines the relationship between the effectiveness of IT and financial growth of publicly traded financial companies in South Korea. IT effectiveness is measured through a survey administered to middle managers that focused on user satisfaction, support for internal business processes, and system reliability. The study provides insight into the degree of effectiveness of IT employed in Korean banks as perceived by bank managers, and also demonstrates the link between IT effectiveness and economic performance. Univariate analysis of the data shows a statistically significant association between IT effectiveness and financial growth. The paper offers limited insight into the thesis that enterprises with high business information intensity will show a positive association between effective IT and economic performance.</span></span></span></p>


Author(s):  
Kevin D. Gerla

Whether it is an increasingly engaged public demanding a company’s attention to project requirements and commitments or increased expectations of regulators to have project requirements and commitments documented more explicitly than ever, compliance management has become increasingly important for successful project execution. Ensuring compliance with all regulatory requirements and project commitments is Enbridge’s expectation of all its major pipeline projects. The increased focus on compliance management previously described, combined with the historically high number of major projects currently in execution or planned to be undertaken, has resulted in Enbridge enhancing how it approaches compliance. The key modifications include: 1. Implementing a standard compliance management process across all projects and embedding this process within Enbridge’s major project Lifecycle & Gating Control Process. 2. Leveraging available technology to a greater extent in terms of supporting compliance management. This paper will provide insight into Enbridge’s compliance management process, with particular focus on how software is being used to supplement and enhance the process. Specifically, details with respect to how Enbridge’s compliance software is supporting project planning, reporting and querying, notifications, controls, and documentation, all from the perspective of regulatory compliance.


Sign in / Sign up

Export Citation Format

Share Document