Affiliation:
1. University of Trento, Italy
2. Deloitte Conseil, France
3. PricewaterhouseCoopers Accountants, The Netherlands
Abstract
Assessing whether a company’s business practices conform to laws and regulations and follow standards and SLAs, i.e., compliance management, is a complex and costly task. Few software tools aiding compliance management exist; yet, they typically do not address the needs of who is actually in charge of assessing and understanding compliance. We advocate the use of a compliance governance dashboard and suitable root cause analysis techniques that are specifically tailored to the needs of compliance experts and auditors. The design and implementation of these instruments are challenging for at least three reasons: (1) it is fundamental to identify the right level of abstraction for the information to be shown; (2) it is not trivial to visualize different analysis perspectives; and (3) it is difficult to manage and analyze the large amount of involved concepts, instruments, and data. This chapter shows how to address these issues, which concepts and models underlie the problem, and, eventually, how IT can effectively support compliance analysis in Service-Oriented Architectures (SOAs).
Reference33 articles.
1. Apte, C., Bibelnieks, E., Natarajan, R., Pednault, E., Tipu, F., Campbell, D., & Nelson, B. (2001). Segmentation-based modeling for advanced targeted marketing. In the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 408-413). New York, NY: ACM.
2. Awad, A., & Weske, M. (2009). Visualization of compliance violation in business process models. In 5th International Workshop on Business Process Intelligence BPI 09, vol. 43 (pp. 182-193).
3. Seeing is believing: Designing visualizations for managing risk and compliance
4. Mail stream streamlining.;E.Bibelnieks;Catalog Age,2000
5. Brunel, J., Cuppens, F., Cuppens-Boulahia, N., Sans, T., & Bodeveix, J. (2007). Security policy com-pliance with violation management. In 2007 ACM Workshop on Formal Methods in Security Engineering (pp. 31-40).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献