SlideShare a Scribd company logo
1 of 12
Download to read offline
IESS 1.0 - First International Conference on Exploring Services Sciences
                                    17-18-19 February 2010, Geneva, Switzerland




 Compliance in e-government
 service engineering
 State-of-the-art


 Slim Turki, Marija Bjeković-Obradović
 {slim.turki, marija.bjekovic}@tudor.lu
 CRP Henri Tudor, Luxembourg



2/18/10                             IESS 1.0                                         1
Context


 ➤  Organisations faced with need to conform to various laws and
    regulations governing their domain of activity
 ➤  Obligation of compliance particularly stressed in e-government.
          ➤    e-government: “the use of ICT systems and tools to provide better
               public services to citizens and other businesses” [EC]
          ➤    administrative laws regulate the activities and decision-making of
               governmental institutions.
 ➤  Regulation
          ➤    extensive source of requirements to be respected when designing IS
               that support institutional activities and (e-)services to public.
 ➤  Approaches aiming to achieve and maintain regulatory compliance
    of IS and services with given regulations




2/18/10                                      IESS 1.0                               2
Overview


 ➤  Compliance in the business process research area
 ➤  Extracting compliance requirements from legal texts
          ➤    Deontic logic - Extracting rights and obligations
          ➤    Modeling regulations with goal-oriented models
 ➤  Traceability support for compliance




2/18/10                                   IESS 1.0                 3
Compliance in the business process
                         research area

          ➤    (Kharbili et al., 2008)
                ●    Ontologies for formal modeling of regulations, to resolve
                     inconsistency of legal definitions and regulatory information
                     fragments.
                ●    Coupled with business processes, basis for compliance
                     management framework, to manage evolution in both business
                     process and legislation.
          ➤    (Karagiannis et al., 2007, 2008)
                ●    Meta-modeling based approach: regulatory aspects expressed in
                     models, and included into business processes models, to improve
                     or redesign them for compliance with corresponding regulations.
                ●    Applied to Sarbanes-Oxley (SOX) act.




2/18/10                                       IESS 1.0                               4
Compliance in the business process
                          research area

          ➤    (Rifaut, 2005)
                ●    PRM / PAM
                ●    Support for financial business process design (compliant to Basel
                     II), and for assessment of compliance and its improvement.
                ●    Goal-oriented models and ISO/IEC 15504 process assessment
                     standard used for structuring requirements for business process,
                     and together compose a formal framework according to which
                     compliance of business process is assessed.




2/18/10                                        IESS 1.0                                  5
Deontic logic (1/2)


          ➤    Extracting rights and obligations from regulations
          ➤    (Kiyavitskaya et al., 2007) (Zeni et al., 2008)
                ●    Extraction of “objects of concern” (right, anti-right, obligation, anti-
                     obligation, and exception) from legal texts
                ●    Semantic annotation tool Cerno: Obligations, constraints and
                     condition keywords are highlighted in a regulation and a list of
                     constraints and obligations are obtained (including traceability
                     markers).
          ➤    (Biagioli et al.) (Palmirani, 2003)
                ●    Automated extraction of normative references, such as specific
                     rights and obligations, detailed in legal texts
                ●    Address problem of law’s evolution by tracking changes over time.




2/18/10                                           IESS 1.0                                      6
Deontic logic (2/2)


          ➤    (Breaux and Antón, 2006), (Breaux and Antón , 2008)
                ●    Extract and balance formal descriptions of rules (rights and
                     obligations) that govern actors' actions from regulation.
                ●    Combines goal-oriented analysis of legal documents and
                     techniques for extracting rights, obligations, constraints, rules from
                     natural language statements in legal text.
                ●    Strength: resolving the problems of ambiguity, polysemy, cross-
                     references when analyzing legal text, and maintaining traceability
                     across all the artefacts in the process.
                ●    Has been applied to US regulation governing information privacy
                     in health care domain.




2/18/10                                          IESS 1.0                                 7
Modeling regulations with goal-
                          oriented models

          ➤    SecureTropos (Giorgini et al., 2005)
                ●    Goal-oriented techniques to model security requirements
                ●    Assessing organization's compliance with Italian Data Protection
                     Act.
                ●    Manual extraction of concepts from law, coverage of legal
                     documents limited only to security aspect.
          ➤    (Ghanavati et al., 2007)
                ●    Tracking compliance of business processes to legislation,
                ●    Combines goal-oriented requirement language (GRL), user
                     requirements notation (URN), and use case maps (UCM).
                ●    Links between models of legislation, organisation policy and
                     processes, to enable examining the influence of evolving
                     legislations on organizational policies and business processes..
                ●    Applied in the domain of information privacy in healthcare in
                     Canada.


2/18/10                                        IESS 1.0                                 8
Extracting compliance requirements
                          from legal texts - Challenges

          ➤    Modeling regulations and extracting key concepts recognized
               as challenging tasks for requirements engineers, system
               developers and compliance auditors (Otto et Antón, 2007)
               (Kiavitskaya et al., 2008)
                ●    the very nature of language in which laws are written, containing
                     many ambiguities, cross-references, domain-specific definitions,
                     acronyms etc.,
                ●    overlapping or complementing regulations at different level of
                     authority,
                ●    frequent changes or amendment of regulations over time, etc.

          ➤    Law analysis prone to interpretations and misunderstandings




2/18/10                                         IESS 1.0                                 9
Traceability support for compliance


          ➤    Traceability gaining on significance
                ●    Ability to maintain links between originating laws and derived
                     artefacts (requirements, IS specifications etc.) as measure to
                     enable better understanding of legal documents and to prevent
                     non-compliance of produced specifications.
          ➤    (Ghanavati et al., 2007)
                ●    Set of links to establish between legislation and organizational
                     models.
          ➤    (Breaux and Antón)
                ●    Traceability maintained across all the artefacts produced from
                     legal text to the corresponding software requirements.
                ●    Most of the traceability links to be established manually.




2/18/10                                         IESS 1.0                                10
Conclusion
          ➤    RE community
                ●    Elaborated techniques, concepts and tool support.
                ●    Assumption: compliance can be achieved at the requirements
                     level, through the harmonization between IS requirements and
                     those derived from legislation.
                ●    Address compliance regarding specific security and privacy
                     regulations.
          ➤    Approaches centred on business process
                ●    More at the level of organization, its strategy, policies and
                     process, rather than on the underlying IS level.
                ●    Including requirements imposed by specific regulation, to existing
                     business processes, to ensure or assess their compliance.
                ●    Focus on modeling dynamic aspects of organization
                ●    Service engineering requires more aspects, not only business
                     processes, be covered.
          ➤    No method, in the literature, specific to the design of compliant
               e-government services.

2/18/10                                         IESS 1.0                              11
IESS 1.0 - First International Conference on Exploring Services Sciences
                                    17-18-19 February 2010, Geneva, Switzerland




 Compliance in e-government
 service engineering
 State-of-the-art


Thank you for your attention!


 Slim Turki, Marija Bjeković-Obradović
 {slim.turki, marija.bjekovic}@tudor.lu
 CRP Henri Tudor, Luxembourg
2/18/10                             IESS 1.0                                         12

More Related Content

Similar to Iv 4 Sp 12 Presentation 001

Compliance In e-government Service Engineering
Compliance In e-government Service EngineeringCompliance In e-government Service Engineering
Compliance In e-government Service EngineeringSlim Turki, Dr.
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomyannmariewinston
 
Deloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction SummitDeloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction Summitaakash malhotra
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxvrickens
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramLynellBull52
 
Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Jesús Vázquez González
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesIron Mountain
 
Digital Records Management & Preservation
Digital Records Management & PreservationDigital Records Management & Preservation
Digital Records Management & Preservationvictor Nduna
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docxlorainedeserre
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docxRAJU852744
 
Business Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business ApplicationsBusiness Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business Applicationsijmpict
 

Similar to Iv 4 Sp 12 Presentation 001 (20)

Compliance In e-government Service Engineering
Compliance In e-government Service EngineeringCompliance In e-government Service Engineering
Compliance In e-government Service Engineering
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
 
Deloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction SummitDeloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction Summit
 
IT Control Framework
IT Control FrameworkIT Control Framework
IT Control Framework
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
 
Digital Records Management & Preservation
Digital Records Management & PreservationDigital Records Management & Preservation
Digital Records Management & Preservation
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
 
Business Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business ApplicationsBusiness Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business Applications
 
systemic contract EURoMA 2013
 systemic contract EURoMA 2013 systemic contract EURoMA 2013
systemic contract EURoMA 2013
 
A Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT ProjectsA Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT Projects
 

More from IESS

Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needsIESS
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrializationIESS
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment processIESS
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovationIESS
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programsIESS
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...IESS
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for serviceIESS
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa servicesIESS
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityIESS
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service scienceIESS
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systemsIESS
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvementIESS
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 introIESS
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 ClosingIESS
 
Vii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaVii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaIESS
 
Vii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrVii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrIESS
 
Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010IESS
 
Vii 1 Resource Service System
Vii 1 Resource Service SystemVii 1 Resource Service System
Vii 1 Resource Service SystemIESS
 
Vi 3 Iess2010 Vi 3 Xiaofei Xu
Vi 3 Iess2010 Vi 3   Xiaofei XuVi 3 Iess2010 Vi 3   Xiaofei Xu
Vi 3 Iess2010 Vi 3 Xiaofei XuIESS
 
Vi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleVi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleIESS
 

More from IESS (20)

Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment process
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovation
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programs
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 intro
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 Closing
 
Vii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaVii 4 Sh17 Sorathia
Vii 4 Sh17 Sorathia
 
Vii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrVii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta Dr
 
Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010
 
Vii 1 Resource Service System
Vii 1 Resource Service SystemVii 1 Resource Service System
Vii 1 Resource Service System
 
Vi 3 Iess2010 Vi 3 Xiaofei Xu
Vi 3 Iess2010 Vi 3   Xiaofei XuVi 3 Iess2010 Vi 3   Xiaofei Xu
Vi 3 Iess2010 Vi 3 Xiaofei Xu
 
Vi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleVi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For People
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Iv 4 Sp 12 Presentation 001

  • 1. IESS 1.0 - First International Conference on Exploring Services Sciences 17-18-19 February 2010, Geneva, Switzerland Compliance in e-government service engineering State-of-the-art Slim Turki, Marija Bjeković-Obradović {slim.turki, marija.bjekovic}@tudor.lu CRP Henri Tudor, Luxembourg 2/18/10 IESS 1.0 1
  • 2. Context ➤  Organisations faced with need to conform to various laws and regulations governing their domain of activity ➤  Obligation of compliance particularly stressed in e-government. ➤  e-government: “the use of ICT systems and tools to provide better public services to citizens and other businesses” [EC] ➤  administrative laws regulate the activities and decision-making of governmental institutions. ➤  Regulation ➤  extensive source of requirements to be respected when designing IS that support institutional activities and (e-)services to public. ➤  Approaches aiming to achieve and maintain regulatory compliance of IS and services with given regulations 2/18/10 IESS 1.0 2
  • 3. Overview ➤  Compliance in the business process research area ➤  Extracting compliance requirements from legal texts ➤  Deontic logic - Extracting rights and obligations ➤  Modeling regulations with goal-oriented models ➤  Traceability support for compliance 2/18/10 IESS 1.0 3
  • 4. Compliance in the business process research area ➤  (Kharbili et al., 2008) ●  Ontologies for formal modeling of regulations, to resolve inconsistency of legal definitions and regulatory information fragments. ●  Coupled with business processes, basis for compliance management framework, to manage evolution in both business process and legislation. ➤  (Karagiannis et al., 2007, 2008) ●  Meta-modeling based approach: regulatory aspects expressed in models, and included into business processes models, to improve or redesign them for compliance with corresponding regulations. ●  Applied to Sarbanes-Oxley (SOX) act. 2/18/10 IESS 1.0 4
  • 5. Compliance in the business process research area ➤  (Rifaut, 2005) ●  PRM / PAM ●  Support for financial business process design (compliant to Basel II), and for assessment of compliance and its improvement. ●  Goal-oriented models and ISO/IEC 15504 process assessment standard used for structuring requirements for business process, and together compose a formal framework according to which compliance of business process is assessed. 2/18/10 IESS 1.0 5
  • 6. Deontic logic (1/2) ➤  Extracting rights and obligations from regulations ➤  (Kiyavitskaya et al., 2007) (Zeni et al., 2008) ●  Extraction of “objects of concern” (right, anti-right, obligation, anti- obligation, and exception) from legal texts ●  Semantic annotation tool Cerno: Obligations, constraints and condition keywords are highlighted in a regulation and a list of constraints and obligations are obtained (including traceability markers). ➤  (Biagioli et al.) (Palmirani, 2003) ●  Automated extraction of normative references, such as specific rights and obligations, detailed in legal texts ●  Address problem of law’s evolution by tracking changes over time. 2/18/10 IESS 1.0 6
  • 7. Deontic logic (2/2) ➤  (Breaux and Antón, 2006), (Breaux and Antón , 2008) ●  Extract and balance formal descriptions of rules (rights and obligations) that govern actors' actions from regulation. ●  Combines goal-oriented analysis of legal documents and techniques for extracting rights, obligations, constraints, rules from natural language statements in legal text. ●  Strength: resolving the problems of ambiguity, polysemy, cross- references when analyzing legal text, and maintaining traceability across all the artefacts in the process. ●  Has been applied to US regulation governing information privacy in health care domain. 2/18/10 IESS 1.0 7
  • 8. Modeling regulations with goal- oriented models ➤  SecureTropos (Giorgini et al., 2005) ●  Goal-oriented techniques to model security requirements ●  Assessing organization's compliance with Italian Data Protection Act. ●  Manual extraction of concepts from law, coverage of legal documents limited only to security aspect. ➤  (Ghanavati et al., 2007) ●  Tracking compliance of business processes to legislation, ●  Combines goal-oriented requirement language (GRL), user requirements notation (URN), and use case maps (UCM). ●  Links between models of legislation, organisation policy and processes, to enable examining the influence of evolving legislations on organizational policies and business processes.. ●  Applied in the domain of information privacy in healthcare in Canada. 2/18/10 IESS 1.0 8
  • 9. Extracting compliance requirements from legal texts - Challenges ➤  Modeling regulations and extracting key concepts recognized as challenging tasks for requirements engineers, system developers and compliance auditors (Otto et Antón, 2007) (Kiavitskaya et al., 2008) ●  the very nature of language in which laws are written, containing many ambiguities, cross-references, domain-specific definitions, acronyms etc., ●  overlapping or complementing regulations at different level of authority, ●  frequent changes or amendment of regulations over time, etc. ➤  Law analysis prone to interpretations and misunderstandings 2/18/10 IESS 1.0 9
  • 10. Traceability support for compliance ➤  Traceability gaining on significance ●  Ability to maintain links between originating laws and derived artefacts (requirements, IS specifications etc.) as measure to enable better understanding of legal documents and to prevent non-compliance of produced specifications. ➤  (Ghanavati et al., 2007) ●  Set of links to establish between legislation and organizational models. ➤  (Breaux and Antón) ●  Traceability maintained across all the artefacts produced from legal text to the corresponding software requirements. ●  Most of the traceability links to be established manually. 2/18/10 IESS 1.0 10
  • 11. Conclusion ➤  RE community ●  Elaborated techniques, concepts and tool support. ●  Assumption: compliance can be achieved at the requirements level, through the harmonization between IS requirements and those derived from legislation. ●  Address compliance regarding specific security and privacy regulations. ➤  Approaches centred on business process ●  More at the level of organization, its strategy, policies and process, rather than on the underlying IS level. ●  Including requirements imposed by specific regulation, to existing business processes, to ensure or assess their compliance. ●  Focus on modeling dynamic aspects of organization ●  Service engineering requires more aspects, not only business processes, be covered. ➤  No method, in the literature, specific to the design of compliant e-government services. 2/18/10 IESS 1.0 11
  • 12. IESS 1.0 - First International Conference on Exploring Services Sciences 17-18-19 February 2010, Geneva, Switzerland Compliance in e-government service engineering State-of-the-art Thank you for your attention! Slim Turki, Marija Bjeković-Obradović {slim.turki, marija.bjekovic}@tudor.lu CRP Henri Tudor, Luxembourg 2/18/10 IESS 1.0 12