SlideShare a Scribd company logo
1 of 12
Download to read offline
IESS 1.0 - First International Conference on Exploring Services Sciences
                                    17-18-19 February 2010, Geneva, Switzerland




 Compliance in e-government
 service engineering
 State-of-the-art


 Slim Turki, Marija Bjeković-Obradović
 {slim.turki, marija.bjekovic}@tudor.lu
 CRP Henri Tudor, Luxembourg



2/18/10                             IESS 1.0                                         1
Context


 ➤  Organisations faced with need to conform to various laws and
    regulations governing their domain of activity
 ➤  Obligation of compliance particularly stressed in e-government.
          ➤    e-government: “the use of ICT systems and tools to provide better
               public services to citizens and other businesses” [EC]
          ➤    administrative laws regulate the activities and decision-making of
               governmental institutions.
 ➤  Regulation
          ➤    extensive source of requirements to be respected when designing IS
               that support institutional activities and (e-)services to public.
 ➤  Approaches aiming to achieve and maintain regulatory compliance
    of IS and services with given regulations




2/18/10                                      IESS 1.0                               2
Overview


 ➤  Compliance in the business process research area
 ➤  Extracting compliance requirements from legal texts
          ➤    Deontic logic - Extracting rights and obligations
          ➤    Modeling regulations with goal-oriented models
 ➤  Traceability support for compliance




2/18/10                                   IESS 1.0                 3
Compliance in the business process
                         research area

          ➤    (Kharbili et al., 2008)
                ●    Ontologies for formal modeling of regulations, to resolve
                     inconsistency of legal definitions and regulatory information
                     fragments.
                ●    Coupled with business processes, basis for compliance
                     management framework, to manage evolution in both business
                     process and legislation.
          ➤    (Karagiannis et al., 2007, 2008)
                ●    Meta-modeling based approach: regulatory aspects expressed in
                     models, and included into business processes models, to improve
                     or redesign them for compliance with corresponding regulations.
                ●    Applied to Sarbanes-Oxley (SOX) act.




2/18/10                                       IESS 1.0                               4
Compliance in the business process
                          research area

          ➤    (Rifaut, 2005)
                ●    PRM / PAM
                ●    Support for financial business process design (compliant to Basel
                     II), and for assessment of compliance and its improvement.
                ●    Goal-oriented models and ISO/IEC 15504 process assessment
                     standard used for structuring requirements for business process,
                     and together compose a formal framework according to which
                     compliance of business process is assessed.




2/18/10                                        IESS 1.0                                  5
Deontic logic (1/2)


          ➤    Extracting rights and obligations from regulations
          ➤    (Kiyavitskaya et al., 2007) (Zeni et al., 2008)
                ●    Extraction of “objects of concern” (right, anti-right, obligation, anti-
                     obligation, and exception) from legal texts
                ●    Semantic annotation tool Cerno: Obligations, constraints and
                     condition keywords are highlighted in a regulation and a list of
                     constraints and obligations are obtained (including traceability
                     markers).
          ➤    (Biagioli et al.) (Palmirani, 2003)
                ●    Automated extraction of normative references, such as specific
                     rights and obligations, detailed in legal texts
                ●    Address problem of law’s evolution by tracking changes over time.




2/18/10                                           IESS 1.0                                      6
Deontic logic (2/2)


          ➤    (Breaux and Antón, 2006), (Breaux and Antón , 2008)
                ●    Extract and balance formal descriptions of rules (rights and
                     obligations) that govern actors' actions from regulation.
                ●    Combines goal-oriented analysis of legal documents and
                     techniques for extracting rights, obligations, constraints, rules from
                     natural language statements in legal text.
                ●    Strength: resolving the problems of ambiguity, polysemy, cross-
                     references when analyzing legal text, and maintaining traceability
                     across all the artefacts in the process.
                ●    Has been applied to US regulation governing information privacy
                     in health care domain.




2/18/10                                          IESS 1.0                                 7
Modeling regulations with goal-
                          oriented models

          ➤    SecureTropos (Giorgini et al., 2005)
                ●    Goal-oriented techniques to model security requirements
                ●    Assessing organization's compliance with Italian Data Protection
                     Act.
                ●    Manual extraction of concepts from law, coverage of legal
                     documents limited only to security aspect.
          ➤    (Ghanavati et al., 2007)
                ●    Tracking compliance of business processes to legislation,
                ●    Combines goal-oriented requirement language (GRL), user
                     requirements notation (URN), and use case maps (UCM).
                ●    Links between models of legislation, organisation policy and
                     processes, to enable examining the influence of evolving
                     legislations on organizational policies and business processes..
                ●    Applied in the domain of information privacy in healthcare in
                     Canada.


2/18/10                                        IESS 1.0                                 8
Extracting compliance requirements
                          from legal texts - Challenges

          ➤    Modeling regulations and extracting key concepts recognized
               as challenging tasks for requirements engineers, system
               developers and compliance auditors (Otto et Antón, 2007)
               (Kiavitskaya et al., 2008)
                ●    the very nature of language in which laws are written, containing
                     many ambiguities, cross-references, domain-specific definitions,
                     acronyms etc.,
                ●    overlapping or complementing regulations at different level of
                     authority,
                ●    frequent changes or amendment of regulations over time, etc.

          ➤    Law analysis prone to interpretations and misunderstandings




2/18/10                                         IESS 1.0                                 9
Traceability support for compliance


          ➤    Traceability gaining on significance
                ●    Ability to maintain links between originating laws and derived
                     artefacts (requirements, IS specifications etc.) as measure to
                     enable better understanding of legal documents and to prevent
                     non-compliance of produced specifications.
          ➤    (Ghanavati et al., 2007)
                ●    Set of links to establish between legislation and organizational
                     models.
          ➤    (Breaux and Antón)
                ●    Traceability maintained across all the artefacts produced from
                     legal text to the corresponding software requirements.
                ●    Most of the traceability links to be established manually.




2/18/10                                         IESS 1.0                                10
Conclusion
          ➤    RE community
                ●    Elaborated techniques, concepts and tool support.
                ●    Assumption: compliance can be achieved at the requirements
                     level, through the harmonization between IS requirements and
                     those derived from legislation.
                ●    Address compliance regarding specific security and privacy
                     regulations.
          ➤    Approaches centred on business process
                ●    More at the level of organization, its strategy, policies and
                     process, rather than on the underlying IS level.
                ●    Including requirements imposed by specific regulation, to existing
                     business processes, to ensure or assess their compliance.
                ●    Focus on modeling dynamic aspects of organization
                ●    Service engineering requires more aspects, not only business
                     processes, be covered.
          ➤    No method, in the literature, specific to the design of compliant
               e-government services.

2/18/10                                         IESS 1.0                              11
IESS 1.0 - First International Conference on Exploring Services Sciences
                                    17-18-19 February 2010, Geneva, Switzerland




 Compliance in e-government
 service engineering
 State-of-the-art


Thank you for your attention!


 Slim Turki, Marija Bjeković-Obradović
 {slim.turki, marija.bjekovic}@tudor.lu
 CRP Henri Tudor, Luxembourg
2/18/10                             IESS 1.0                                         12

More Related Content

Similar to Iv 4 Sp 12 Presentation 001

Compliance In e-government Service Engineering
Compliance In e-government Service EngineeringCompliance In e-government Service Engineering
Compliance In e-government Service EngineeringSlim Turki, Dr.
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomyannmariewinston
 
Deloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction SummitDeloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction Summitaakash malhotra
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxvrickens
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramLynellBull52
 
Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Jesús Vázquez González
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesIron Mountain
 
Digital Records Management & Preservation
Digital Records Management & PreservationDigital Records Management & Preservation
Digital Records Management & Preservationvictor Nduna
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docxlorainedeserre
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docxRAJU852744
 
Business Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business ApplicationsBusiness Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business Applicationsijmpict
 

Similar to Iv 4 Sp 12 Presentation 001 (20)

Compliance In e-government Service Engineering
Compliance In e-government Service EngineeringCompliance In e-government Service Engineering
Compliance In e-government Service Engineering
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy8 Steps To Develop A Taxomnomy
8 Steps To Develop A Taxomnomy
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
 
Deloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction SummitDeloitte India - Deloitte Construction Summit
Deloitte India - Deloitte Construction Summit
 
IT Control Framework
IT Control FrameworkIT Control Framework
IT Control Framework
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...Framework for information systems adaptation to security policies PCI DSS, SO...
Framework for information systems adaptation to security policies PCI DSS, SO...
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
 
Digital Records Management & Preservation
Digital Records Management & PreservationDigital Records Management & Preservation
Digital Records Management & Preservation
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
 
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
 
Business Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business ApplicationsBusiness Rule Management Framework for N-Tier E-Business Applications
Business Rule Management Framework for N-Tier E-Business Applications
 
systemic contract EURoMA 2013
 systemic contract EURoMA 2013 systemic contract EURoMA 2013
systemic contract EURoMA 2013
 
A Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT ProjectsA Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT Projects
 

More from IESS

Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needsIESS
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrializationIESS
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment processIESS
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovationIESS
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programsIESS
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...IESS
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for serviceIESS
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa servicesIESS
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityIESS
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service scienceIESS
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systemsIESS
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvementIESS
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 introIESS
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 ClosingIESS
 
Vii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaVii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaIESS
 
Vii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrVii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrIESS
 
Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010IESS
 
Vii 1 Resource Service System
Vii 1 Resource Service SystemVii 1 Resource Service System
Vii 1 Resource Service SystemIESS
 
Vi 3 Iess2010 Vi 3 Xiaofei Xu
Vi 3 Iess2010 Vi 3   Xiaofei XuVi 3 Iess2010 Vi 3   Xiaofei Xu
Vi 3 Iess2010 Vi 3 Xiaofei XuIESS
 
Vi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleVi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleIESS
 

More from IESS (20)

Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment process
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovation
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programs
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 intro
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 Closing
 
Vii 4 Sh17 Sorathia
Vii 4 Sh17 SorathiaVii 4 Sh17 Sorathia
Vii 4 Sh17 Sorathia
 
Vii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta DrVii 3 Iess 2010 Ta Dr
Vii 3 Iess 2010 Ta Dr
 
Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010Vii 2 Z Final Slides Os Gi Iess 2010
Vii 2 Z Final Slides Os Gi Iess 2010
 
Vii 1 Resource Service System
Vii 1 Resource Service SystemVii 1 Resource Service System
Vii 1 Resource Service System
 
Vi 3 Iess2010 Vi 3 Xiaofei Xu
Vi 3 Iess2010 Vi 3   Xiaofei XuVi 3 Iess2010 Vi 3   Xiaofei Xu
Vi 3 Iess2010 Vi 3 Xiaofei Xu
 
Vi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For PeopleVi 2 2010 2 10 Ponencia Services Design For People
Vi 2 2010 2 10 Ponencia Services Design For People
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 

Iv 4 Sp 12 Presentation 001

  • 1. IESS 1.0 - First International Conference on Exploring Services Sciences 17-18-19 February 2010, Geneva, Switzerland Compliance in e-government service engineering State-of-the-art Slim Turki, Marija Bjeković-Obradović {slim.turki, marija.bjekovic}@tudor.lu CRP Henri Tudor, Luxembourg 2/18/10 IESS 1.0 1
  • 2. Context ➤  Organisations faced with need to conform to various laws and regulations governing their domain of activity ➤  Obligation of compliance particularly stressed in e-government. ➤  e-government: “the use of ICT systems and tools to provide better public services to citizens and other businesses” [EC] ➤  administrative laws regulate the activities and decision-making of governmental institutions. ➤  Regulation ➤  extensive source of requirements to be respected when designing IS that support institutional activities and (e-)services to public. ➤  Approaches aiming to achieve and maintain regulatory compliance of IS and services with given regulations 2/18/10 IESS 1.0 2
  • 3. Overview ➤  Compliance in the business process research area ➤  Extracting compliance requirements from legal texts ➤  Deontic logic - Extracting rights and obligations ➤  Modeling regulations with goal-oriented models ➤  Traceability support for compliance 2/18/10 IESS 1.0 3
  • 4. Compliance in the business process research area ➤  (Kharbili et al., 2008) ●  Ontologies for formal modeling of regulations, to resolve inconsistency of legal definitions and regulatory information fragments. ●  Coupled with business processes, basis for compliance management framework, to manage evolution in both business process and legislation. ➤  (Karagiannis et al., 2007, 2008) ●  Meta-modeling based approach: regulatory aspects expressed in models, and included into business processes models, to improve or redesign them for compliance with corresponding regulations. ●  Applied to Sarbanes-Oxley (SOX) act. 2/18/10 IESS 1.0 4
  • 5. Compliance in the business process research area ➤  (Rifaut, 2005) ●  PRM / PAM ●  Support for financial business process design (compliant to Basel II), and for assessment of compliance and its improvement. ●  Goal-oriented models and ISO/IEC 15504 process assessment standard used for structuring requirements for business process, and together compose a formal framework according to which compliance of business process is assessed. 2/18/10 IESS 1.0 5
  • 6. Deontic logic (1/2) ➤  Extracting rights and obligations from regulations ➤  (Kiyavitskaya et al., 2007) (Zeni et al., 2008) ●  Extraction of “objects of concern” (right, anti-right, obligation, anti- obligation, and exception) from legal texts ●  Semantic annotation tool Cerno: Obligations, constraints and condition keywords are highlighted in a regulation and a list of constraints and obligations are obtained (including traceability markers). ➤  (Biagioli et al.) (Palmirani, 2003) ●  Automated extraction of normative references, such as specific rights and obligations, detailed in legal texts ●  Address problem of law’s evolution by tracking changes over time. 2/18/10 IESS 1.0 6
  • 7. Deontic logic (2/2) ➤  (Breaux and Antón, 2006), (Breaux and Antón , 2008) ●  Extract and balance formal descriptions of rules (rights and obligations) that govern actors' actions from regulation. ●  Combines goal-oriented analysis of legal documents and techniques for extracting rights, obligations, constraints, rules from natural language statements in legal text. ●  Strength: resolving the problems of ambiguity, polysemy, cross- references when analyzing legal text, and maintaining traceability across all the artefacts in the process. ●  Has been applied to US regulation governing information privacy in health care domain. 2/18/10 IESS 1.0 7
  • 8. Modeling regulations with goal- oriented models ➤  SecureTropos (Giorgini et al., 2005) ●  Goal-oriented techniques to model security requirements ●  Assessing organization's compliance with Italian Data Protection Act. ●  Manual extraction of concepts from law, coverage of legal documents limited only to security aspect. ➤  (Ghanavati et al., 2007) ●  Tracking compliance of business processes to legislation, ●  Combines goal-oriented requirement language (GRL), user requirements notation (URN), and use case maps (UCM). ●  Links between models of legislation, organisation policy and processes, to enable examining the influence of evolving legislations on organizational policies and business processes.. ●  Applied in the domain of information privacy in healthcare in Canada. 2/18/10 IESS 1.0 8
  • 9. Extracting compliance requirements from legal texts - Challenges ➤  Modeling regulations and extracting key concepts recognized as challenging tasks for requirements engineers, system developers and compliance auditors (Otto et Antón, 2007) (Kiavitskaya et al., 2008) ●  the very nature of language in which laws are written, containing many ambiguities, cross-references, domain-specific definitions, acronyms etc., ●  overlapping or complementing regulations at different level of authority, ●  frequent changes or amendment of regulations over time, etc. ➤  Law analysis prone to interpretations and misunderstandings 2/18/10 IESS 1.0 9
  • 10. Traceability support for compliance ➤  Traceability gaining on significance ●  Ability to maintain links between originating laws and derived artefacts (requirements, IS specifications etc.) as measure to enable better understanding of legal documents and to prevent non-compliance of produced specifications. ➤  (Ghanavati et al., 2007) ●  Set of links to establish between legislation and organizational models. ➤  (Breaux and Antón) ●  Traceability maintained across all the artefacts produced from legal text to the corresponding software requirements. ●  Most of the traceability links to be established manually. 2/18/10 IESS 1.0 10
  • 11. Conclusion ➤  RE community ●  Elaborated techniques, concepts and tool support. ●  Assumption: compliance can be achieved at the requirements level, through the harmonization between IS requirements and those derived from legislation. ●  Address compliance regarding specific security and privacy regulations. ➤  Approaches centred on business process ●  More at the level of organization, its strategy, policies and process, rather than on the underlying IS level. ●  Including requirements imposed by specific regulation, to existing business processes, to ensure or assess their compliance. ●  Focus on modeling dynamic aspects of organization ●  Service engineering requires more aspects, not only business processes, be covered. ➤  No method, in the literature, specific to the design of compliant e-government services. 2/18/10 IESS 1.0 11
  • 12. IESS 1.0 - First International Conference on Exploring Services Sciences 17-18-19 February 2010, Geneva, Switzerland Compliance in e-government service engineering State-of-the-art Thank you for your attention! Slim Turki, Marija Bjeković-Obradović {slim.turki, marija.bjekovic}@tudor.lu CRP Henri Tudor, Luxembourg 2/18/10 IESS 1.0 12