Service Compliance: Towards Electronic Compliance Programs
Study 5
|
2008
|
G. Koliads and A. Ghose
|
199
|
Towards A Formal Framework for Business Process Compliance
|
Study 5
|
2008
|
K. Namiri and N. Stojanovic
|
200
|
Towards a Framework for Semantic Business Process Compliance Management
|
Study 5
|
2008
|
M. E. Kharbili, S. Stein, I. Markovic and E. Pulvermuller
|
201
|
Towards a framework for tracking legal compliance in healthcare.
|
Study 5
|
2007
|
Ghanavati, S., Amyot, D., Peyton, L.
|
202
|
Towards Resolving Compliance Violations in Business Process Models
|
Study 5
|
2009
|
A. Awad, S. Smirnov and M. Weske
|
203
|
Trust and Compliance Management Models in Emerging Outsourcing Environments
|
Study 5
|
2010
|
A. Pasic, J. Bareño, B. Gallego-Nicasio, R. Torres, and D. Fernandez
|
204
|
Using cobit indicators for measuring scrum-based software development.
|
Study 5
|
2008
|
V. Mahnic and N. Zabkar
|
205
|
Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks
|
Study 5
|
2008
|
A. Rifaut and E. Dubois
|
206
|
A Business process Based Modelling Extension for Regulatory Compliance
|
Study 6
|
2008
|
Karagiannis, D.
|
207
|
A distributed requirements management framework for legal compliance and accountability
|
Study 6
|
2006
|
T. D. Breaux, A. I. Antón and E. H. Spafford
|
208
|
A framework to support alignment of secure software engineering with legal regulations
|
Study 6
|
2010
|
S. Islam, H. Mouratidis and J. Jürjens
|
209
|
A Governance Requirements Extraction Model for Legal Compliance Validation
|
Study 6
|
2009
|
W. Hassan and L. Logrippo
|
210
|
A Legal Perspective on Business: Modeling the Impact of Law
|
Study 6
|
2009
|
S. Ghanavati, A. Siena, A. Perini, D. Amyot, L. Peyton and A. Susi
|
211
|
A meta-model for modelling law-compliant requirements
|
Study 6
|
2008
|
A. Siena, A. Perini, A. Susi and J. Mylopoulos
|
212
|
A Method for Identifying Software Requirements Based on Policy Commitments
|
Study 6
|
2010
|
J. D. Young and A. I. Antón
|
213
|
A method to acquire compliance monitors from regulations
|
Study 6
|
2010
|
T. D. Breaux
|
214
|
A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations
|
Study 6
|
2009
|
X. Liu, L. Peyton and Craig Kuziemsky
|
215
|
A requirements management framework for privacy compliance
|
Study 6
|
2007
|
S. Ghanavati, D. Amyot and L. Peyton
|
216
|
A Requirements-based Comparison of Privacy Taxonomies Others
|
Study 6
|
2005
|
A. K. Massey and A. I. Antón
|
217
|
A Semantic Framework for Compliance Management in Business Process Management
|
Study 6
|
2009
|
M. Elkharbili and E. Pulvermüller
|
218
|
Addressing Legal Requirements in Requirements Engineering
|
Study 6
|
2007
|
Otto, P.N., Antón, A.I.
|
219
|
Addressing privacy requirements in system design: the PriS method
|
Study 6
|
2008
|
C. Kalloniatis, E. Kavakli and S. Gritzalis
|
220
|
Analyzing Goal Semantics for Rights, Permissions, and Obligations
|
Study 6
|
2005
|
T. D. Breaux and A. I. Antón
|
221
|
Analyzing Regulatory Rules for Privacy and Security Requirements
|
Study 6
|
2008
|
T. D. Breaux and A. I. Antón
|
222
|
Architecting and Managing Virtual Learning Networks: A Business Process-orientated Approach to Legal Compliance
|
Study 6
|
2003
|
B. Subirana and M. Bain
|
223
|
Business Process Design as the Basis for Compliance Management, Enterprise Architecture and Business Rules
|
Study 6
|
2006
|
Karl Wagner, Joerg Klueckmann
|
224
|
Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act
|
Study 6
|
2007
|
D. Karagiannis, J. Mylopoulos and M. Schwab
|
225
|
Checking Existing Requirements for Compliance with Law Using a Production Rule Model
|
Study 6
|
2009
|
J. C. Maxwell and A. I. Antón
|
226
|
Commitment analysis to operationalize software requirements from privacy policie
|
Study 6
|
2010
|
J. D. Young
|
227
|
Comparative analysis between document-based and model-based compliance management approaches
|
Study 6
|
2008
|
S. Ghanavati, D. Amyot and L. Peyton
|
228
|
Compliance analysis based on a goal-oriented requirement language evaluation methodology
|
Study 6
|
2009
|
S. Ghanavati, D. Amyot and L. Peyton
|
229
|
Compliance aware business process design
|
Study 6
|
2008
|
R. Lu, S. Sadiq and G. Governatori
|
230
|
Compliance in e-Government Service Engineering: State-of-the-Art
|
Study 6
|
2010
|
Slim Turki, Marija Bjekovic-Obradovic
|
231
|
Compliance Requirements for Business-process driven SOAs
|
Study 6
|
2008
|
M. P. Papazoglou
|
232
|
Compliant Business Process Design Using Refinement Layers
|
Study 6
|
2010
|
D. Schleicher, T. Anstett, F. Leymann and D. Schumm
|
233
|
Complying with Law for RE in the Automotive Domain
|
Study 6
|
2008
|
B. Penzenstadler and J. Leuser
|
234
|
Designing Compliant Business Processes with Obligations and Permissions
|
Study 6
|
2006
|
S. Goedertier and J. Vanthienen
|
235
|
Designing Law-Compliant Software Requirements
|
Study 6
|
2009
|
A. Siena, J. Mylopoulos, A. Perini and A. Susi
|
236
|
Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts
|
Study 6
|
2009
|
J. C. Maxwell and A. I. Antón
|
237
|
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance
|
Study 6
|
2009
|
T. D. Breaux and C. Powers
|
238
|
Emerging Challenges in Information Systems Research for Regulatory Compliance Management
|
Study 6
|
2010
|
N. S. Abdullah, S. Sadiq and M. Indulska
|
239
|
Establishing Regulatory Compliance for Information System Requirements: An Experience Report from the Health Care Domain
|
Study 6
|
2010
|
A. Siena, G. Armellin, G. Mameli, J. Mylopoulos, A. Perini and A. Susi
|
240
|
Evaluating existing security and privacy requirements for legal compliance
|
Study 6
|
2010
|
A. Massey, P. Otto, L. Hayward, and A. I. Antón
|
241
|
Exercising Due Diligence in Legal Requirements Acquisition: A Tool-supported, Frame-Based Approach
|
Study 6
|
2009
|
T. D. Breaux
|
242
|
Exploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability
|
Study 6
|
2008
|
A. Siena, N. Maiden, J. Lockerbie, K. Karlsen, A. Perini and A. Susi
|
243
|
From laws to requirements
|
Study 6
|
2008
|
A. Siena, J. Mylopoulos, A. Perini and A. Susi
|
244
|
Hints on how to face business process compliance
|
Study 6
|
2010
|
C. Cabanillasa, M. Resinas, and A. Ruiz-Cortés
|
245
|
Identifying Commitment-based Requirements to Thwart Unfair and Deceptive Practices
|
Study 6
|
2010
|
J. D. Young and A. I. Antón
|
246
|
Industry trends in business process management: getting ready for prime time
|
Study 6
|
2005
|
F. Casati
|
247
|
Integrating business strategies with requirement models of legal compliance
|
Study 6
|
2010
|
S. Ghanavati, A. Siena, D. Amyot, A. Perini, L. Peyton, and A. Susi
|
248
|
Law, Logic and Business Processes
|
Study 6
|
2010
|
G. Governatori
|
249
|
Law, Metadata and Semantics
|
Study 6
|
2010
|
G. Governatori
|
250
|
Legal compliance by design: technical solutions for future distributed electronic markets
|
Study 6
|
2008
|
M. Conrad, O. Waldhorst, O. Raabe, C. Funk
|
251
|
Legal Compliant Business Processes
|
Study 6
|
|
|
252
|
Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals
|
Study 6
|
2009
|
A. Krausova, F. Massacci and A. Saidane
|
253
|
Legally “Reasonable” Security Requirements: A 10-year FTC Retrospective
|
Study 6
|
2010
|
T. D. Breaux and D. L. Baumer
|
254
|
Leveraging Goal Models and Performance Indicators to Assess Health Care Information Systems
|
Study 6
|
2010
|
C. Kuziemsky, X. Liu and L. Peyton
|
255
|
Making Business Processes Law Compliant
|
Study 6
|
2010
|
S. Ghanavati, A. Siena, D. Amyot, A. Susi, and A. Perini
|
256
|
Managing Legal Texts in Requirements Engineering
|
Study 6
|
2009
|
P. N. Otto and A. I. Antón
|
257
|
Managing the Alignment between Business and Software Services Requirements from a Capability Model Perspective
|
Study 6
|
2008
|
E. Grandry, E. Dubois, M. Picard and A. Rifaut
|
258
|
Mining and analysing security goal models in health information systems
|
Study 6
|
2009
|
J. H. Weber-Jahnke and A. Onabajo
|
259
|
Model Based IT-Governance Compliance Analysis
|
Study 6
|
2009
|
J. Helge Deutscher and C. Felden
|
260
|
Modeling and Analysis of Laws using BPR and Goal-Oriented Framework
|
Study 6
|
2010
|
A. Villafiorita, K. Weldemariam, A. Susi and A. Siena
|
261
|
Modeling, analyzing and weaving legal interpretations in goaloriented requirements engineering
|
Study 6
|
2009
|
F. Ishikawa, R. Inoue and S. Honiden
|
262
|
Modelling security goals in business processes
|
Study 6
|
2008
|
C. Wolter, M. Menzel and C. Meinel
|
263
|
On the identification of data related compliance problems in business processes
|
Study 6
|
2010
|
C. Cabanillas, M. Resina and A. Ruiz-Cortes
|
264
|
On the Risk Management and Auditing of SOA Based Business Processes
|
Study 6
|
2008
|
B. Orriens, H. Willem-Jan v/d and M. Papazoglou
|
265
|
|