<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Goa, India, Feb</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Toward (Semi-) Automated End-to-End Model-driven Compliance Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sagar Sunkle</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hadapsar Industrial Estate Pune</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>India</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>sagar.sunkle</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>deepali.kholkar@tcs.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>CCS Concepts</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <volume>18</volume>
      <issue>2016</issue>
      <fpage>33</fpage>
      <lpage>38</lpage>
      <abstract>
        <p>For modern enterprises, compliance to regulations has become increasingly important. Yet, substantial manual interventions and lack of interoperable models of various compliance aspects contribute to an ine ective implementation and rising costs of compliance. We propose a (semi-) automated end-to-end compliance framework that has the potential to address these challenges. Our contributions are twofold. We rst describe how reliance on domain experts and non-holistic treatment of compliance poses severe problems. We then propose a framework on top of our prior work to address the same. Ongoing explorations suggest that such a framework can better equip enterprises for e cient and effective compliance.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Among the change drivers faced by modern enterprises,
compliance to regulations is one of the most complex and
multifaceted. Complexity of regulatory compliance is
aggravated for modern enterprises due to their global footprints
and multiple regulations that they must comply with across
domains and geographies. The cost of compliance rises when
enterprises also have to keep up with the changes in
regulations [
        <xref ref-type="bibr" rid="ref1 ref11">1, 10</xref>
        ]. Non-compliance is usually not an option. Most
likely, non-compliance results in putting the hard earned
reputation of enterprises at stake and may also lead to
personal liability and risk for board directors and top
management.The traditional compliance model has been realized in
Copyright c 2016 for the individual papers by the papers’ authors.
Copying permitted for private and academic purposes. This volume is published
and copyrighted by its editors.
an advisory capacity with limited focus on actual risk
identication and management [
        <xref ref-type="bibr" rid="ref16 ref8">8, 15</xref>
        ]. The emerging best practice
model of compliance hints at understanding business
operations and the underlying risk exposures so that compliance
requirements can be practically translated into management
actions [
        <xref ref-type="bibr" rid="ref12">11</xref>
        ].
      </p>
      <p>
        This indicates that enterprises need compliance
framework using which, enterprises can- (a) accurately and
exhaustively relate compliance requirements to business
operations [
        <xref ref-type="bibr" rid="ref11">10</xref>
        ], (b) carry out compliance management in an
end-to-end fashion, starting right from the regulatory texts
and their business and legal interpretations to carrying out
compliance reporting [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and (c) include suggestive
management actions aimed at handling the related risk exposures
in an organized and deliberate manner [
        <xref ref-type="bibr" rid="ref12">11</xref>
        ].
      </p>
      <p>To address these requirements, we propose that activities
of compliance management should be model-driven. This
implies that activities in compliance should be automated
to the extent possible, with domain experts' role limited to
providing feedback in creating various models to be used for
compliance and ne-tuning them to achieve greater accuracy
and coverage. A conceptual model containing the necessary
and su cient concepts from both the business domain of
the enterprise and the regulation domain can be used to
generate various requisite artifacts. The generation of such
a domain model can be automated using natural language
processing (NLP) and machine learning (ML) techniques.
Once this model is available, the models of rules and facts
as well as other purposive models can be obtain by
modelto-text transformation.</p>
      <p>Our contributions in this position paper are the detailed
descriptions of these problems and our proposal, building
on our previous work, of a model-driven compliance
framework that is designed to address the aforementioned
requirements to enable cost e cient and business e ective
compliance management by enterprises. We review our previous
work in Section 2 and illustrate a generic set of activities
of a compliance framework with clear distinction between
manual and (semi-) automated activities. Most industrial
and academic solutions provide largely expert-driven
specializations of this set of activities in compliance. We put
forth exemplars of specializations of this generic set of
activities based on what the enterprise has to enact compliance,
whether it is business process de nitions or purely data.,
and what the organization's purpose is in managing
compliance. In Section 3, we present another specialization of
generic set of activities in compliance, this time suggesting
(semi-)automation of largely manual activities. This set of
activities is extrapolated from specializations presented in
Section 2. We propose exactly how the (semi-)automation
may be achieved for each activity in the set using
modeldriven techniques. Section 4 discusses how this compliance
framework may lead to cost e ciency and business e
ectiveness. Section 5 concludes the paper.
2.</p>
    </sec>
    <sec id="sec-2">
      <title>RELATED AND PREVIOUS WORK</title>
      <p>In the following, we consider regulatory requirements from
external regulatory bodies as the key source, although our
discussion is applicable to policies internal to an enterprise.
2.1</p>
    </sec>
    <sec id="sec-3">
      <title>Generic Set of Activities in Compliance</title>
      <p>
        Compliance checking can be classi ed based on whether
it is design-/run-time depending on whether information
required for checking is available only at run-time. It can
also be classi ed as forward or backward checking based on
whether controls are enacted in processes preemptively or
execution traces are checked after business processes have
already executed. Another way to classify compliance
checking is what the granularity of checks is, i.e., whether
business processes, tasks, or attributes or pure data is checked,
and nally whether checking takes place by making use of
an inference engine and/or queries to models of enterprise
information [
        <xref ref-type="bibr" rid="ref13">12</xref>
        ]. Several works have surveyed existing
compliance checking approaches from academia based on similar
classi cation of compliance checking activities [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and also
from industry governance, risk, and compliance (GRC)
approaches [
        <xref ref-type="bibr" rid="ref11">10</xref>
        ].
      </p>
      <p>For the purpose of this paper, we limit the generic set
of activities and artifacts in compliance to those illustrated
in Figure 1. Legal text indicates the source of regulations,
which could be a document from a regulatory body in a
give domain or an interpretation by various stakeholders
of an enterprise. The regulations and/or interpretation are
predominantly natural language texts. Enterprise
information against which regulations speci ed in legal texts are
to be checked can manifest in number of forms including
natural language texts, operational models including
business process de nitions, execution traces, or audit trails, or
databases. Compliance checking and report generation
involves specifying rules from legal text and facts from
enterprise information in a suitable format and performing the
checking activity. Note that industry GRC approaches
primarily use querying mechanisms as opposed to compliance
engines as in academia for checking compliance.</p>
      <p>
        We showed in our earlier works that formal approaches
from academia often assume implicitly that terms in legal
texts and enterprise information artifacts match [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ]. This is
indicated by an optional artifact called vocabulary in Figure
1. Several combinations of rule and operational speci
cations exist in academic literature with implicit assumptions
about terms in both [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ]. Industry GRC approaches use
taxonomy as the collection of prede ned tags available for
enterprises to a x to their nancial data [
        <xref ref-type="bibr" rid="ref4 ref9">4</xref>
        ]. Tags can be
speci c to territories/geographies, time frames, and
business units. Tags either do not leverage semantic meanings
of terms or the support for such semantics is rudimentary
at best in most GRC approaches [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ].
      </p>
      <p>Both kinds of approaches vary based on constituents of
compliance, i.e., the legal and enterprise information
artifacts, their formats, or formalisms and the purpose of
compliance. In the next section, we show variations of both</p>
      <p>Rule Language
Specifica-on
Rules</p>
      <p>Facts</p>
      <p>Opera-ons
Specifica-on
Compliance
Checking
We utilized a specialization of generic set of activities in
Figure 1 as illustrated in Figure 2. This was our attempt
to leverage the holistic perspective of governance, risk, and
compliance from industry GRC approaches along with
formal treatments as in academic approaches. In this case, the
constituents of compliance are legal text and business
process (BP) models. While process models are BP modeling
notation 2.0 compliant, we utilize DR-Prolog as the speci
cation language for both rules obtained from legal texts and
facts extracted from process models. In addition to
compliance checking the specialization in Figure 2 enables natural
language explanation of proofs of (non-) compliance.</p>
      <p>
        We build the vocabulary model based on Semantics of
Business Vocabulary and Rules (SBVR) metamodel from
the SBVR speci cation [
        <xref ref-type="bibr" rid="ref20">19</xref>
        ]. The vocabulary model
repre
      </p>
      <p>Drools</p>
      <p>Java</p>
      <p>Path
Expression</p>
      <p>Query
Language
Datalog and
Proprietary</p>
      <p>Tools</p>
      <p>Facts</p>
      <p>DB
DB1</p>
      <p>DB2</p>
      <p>
        DB3
sents terms from the legal text and BP models. These terms
from legal and business side are reconciled using SEMILAR
similarity measurement API [
        <xref ref-type="bibr" rid="ref21">20</xref>
        ]. We use DR-Prolog
defeasible compliance engine to express rules from legal text
and facts in relational form that we extract from BP
models using a proprietary tool. Specialized algorithms using a
Prolog-based meta-interpreter emit a suitable trace which
is parsed to obtain rules and facts contributing to success
or failure of queries of compliant rules. The terms from this
subset of rules and facts are matched with the vocabulary to
express the natural language explanation using FreeMarker
template API where relevant details of terms under
consideration are inserted into the variable parts of a template.
We redirect the reader to [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ] for details of proof generation
and natural language explanation.
      </p>
      <p>
        This specialization is useful when an enterprise aims at
obtaining explanation of proofs of (non-) compliance in
addition to checking whether its operational practices are
compliant or not with given set of regulations. We demonstrated
the utility of this framework on a real world Know Your
Customer (KYC) regulations by Reserve Bank of India for
Indian Banks [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ]. In this particular case, the bank had
business processes where both backward checking (checking
data generated by processes) and forward checking (realizing
controls on speci c activities) could be achieved.
2.2.2
      </p>
      <p>Report Generation with Multi-source Data</p>
      <p>The second specialization that we illustrate is a
work-inprogress where the enterprise has data instead of process
descriptions. This data is to be obtained from sources in
various business units. Figure 3 shows this use case.</p>
      <p>
        The databases DB1 to DBn hold the data which is
integrated into the database DB. We use our proprietary tooling
for this purpose where a specialization of object query
language called path expression query language is used for
mapping conceptual models of DBs to the integrated DB. The
actual model processing uses Datalog and other proprietary
tools described in detail in [
        <xref ref-type="bibr" rid="ref29">28</xref>
        ]. The rule speci cation
language used in this case is Drools which takes plain old Java
objects (POJOs) as the fact model which is checked against
rules implementing Rete pattern matching. Both the
vocabularies of legal text and the integrated DB are created and
Vocabulary of
Integrated DB
Conceptual
      </p>
      <p>
        Mapping
DBn
reconciled in a manner similar to as detailed in our earlier
work [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ]. The reports are generated using Drools reporting
features, but mostly contain information of checked passed
and failed rather than explanations of the same.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. (SEMI-)AUTOMATED AND END TO END</title>
    </sec>
    <sec id="sec-5">
      <title>COMPLIANCE</title>
      <p>
        Two specializations we described in Figures 2 and 3 show
that depending on the enterprises' purpose and the form
of operational speci cs it has, the generic set of activities
in Figure 1 can be specialized. Referring back to Section
1, our specializations use models for representing rules and
facts and also for expressing semantic similarity between the
vocabularies of legal texts and enterprise information. More
information about how we create SBVR-based models and
how we utilize SEMILAR for contextual similarity
measurement can be found in [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ]. To some extent, this satis es
requirement (a) that of relating compliance requirements to
business operations. These models together enable
end-toend compliance management in various combinations of rule
and operation speci cations as described in the previous
section and thereby satis es requirement (b) to a large extent.
Similarly, we demonstrated in [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ], how risks pertaining to
the compliance of given set of regulations and
corresponding mitigation activities can be modeled and how to utilize
these models. This satis es requirement (c) to some extent.
      </p>
      <p>Yet, most of the activities continue be manual as evident
in Figures 2 and 3, which need to be automated to the
extent possible. Also, to e ectively relate business objectives
to compliance, further modeling and model processing
machinery is required. We propose how this can be done next.
3.1</p>
    </sec>
    <sec id="sec-6">
      <title>Automating Model Generation for Rules and Facts</title>
      <p>To represent rules and facts from legal text and enterprise
information, it might be possible to extract each using
natural language processing (NLP) and machine learning (ML).
There exists sizable literature on extracting conceptual
models of regulation or rules from legal/regulatory texts. Most
of these approaches focus on using either a simpli ed
representations of natural language texts or making assumption
about structural aspects of the texts or both. We review
such proposals next brie y.</p>
      <p>
        An approach presented in [
        <xref ref-type="bibr" rid="ref28">27</xref>
        ] uses a modeling interface
that the domain expert (referred to as a knowledge engineer
in [
        <xref ref-type="bibr" rid="ref28">27</xref>
        ]) can use to build the conceptual model and norms
incrementally. At the back of this interface are a set of NLP
components including a parser, a grammar, a lexicon, and a
lexicon supplementor for identifying grammatical categories,
all of which are speci c to Dutch language. They make a
suitable assumption that a set of possible juridical natural
language constructs (JNLC) can describe categories like
definitions, value assignments, and conditions. If the regulation
text does not contain presumed syntactic structures then it
has to be rewritten to make the syntactic structures explicit.
Only when the syntactic structures are explicit that a parser
written to identify them can be actually used.
      </p>
      <p>
        A similar approach for Italian language is presented in
[
        <xref ref-type="bibr" rid="ref19">18</xref>
        ] which uses articles, sections, and paragraphs to
identify especially the amendments to original laws. Breaux et
al. propose a systematic manual process [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], in which the
domain expert marks the text using phrase heuristics and a
frame-based model to identify rights or obligations,
associated constraints, and condition keywords including natural
language conjunctions. These rights and obligations are
restated into restricted natural language statements (RNLS).
The RNLS can be modeled as description logic rules using
semantic parameterization process. Kiyavitskaya et al.
proposed to add tool support to this process [
        <xref ref-type="bibr" rid="ref14">13</xref>
        ], which was
carried out in work by Zeni et al. [
        <xref ref-type="bibr" rid="ref30">29</xref>
        ]. In this work, a
document structure is assumed with varying granularity from
words and phrases to sections and documents. Various
syntactic indicators are used to capture deontic concepts and
exceptions. For instance, the concept of right is identi ed
in the text via indicators like may, can, could, permit, to
have a right to, should be able to. Some of the indicators
could be complex patterns that combine literal phrases and
basic concepts. The annotation schema that speci es rules
for identifying domain concepts via indicators is
nevertheless created mostly manually, whereby authors plan to use
clustering techniques to automate the same.
      </p>
      <p>In these approaches, domain experts are required to
annotate the text initially to explicate the core concepts,
syntactic structures, or patterns which are then incorporated in
parsing. Domain experts may also have to rewrite the text
in a simpler form for it to become amenable to specialized
parsing mechanisms. The problem with these approaches is
that they are very speci c to a kind of regulation with
parsing mechanisms specialized around the syntactic structures
of that regulation. A generic set of NLP-ML techniques is
more amenable than coming up with individual set of
techniques for each. There are several pointers for improvement
with this state of the art:</p>
      <p>We may take a clue from taxonomy tagging tools from
industry such as OpenCalais1, Active Tags2, and
Compliance Guardian3 to initially present a list of
important concepts from the text to the domain expert.
These concepts could be top-k concepts frequency
distribution-wise.</p>
      <p>Alternatively, domain experts may suggest a few
concepts core to the regulation which can be used as seeds
to obtain an initial conceptual model which can be
incrementally built to include necessary and su cient
concepts.</p>
      <p>
        Instead of using regulation-speci c heuristics, one could
use phrase heuristics for building domain models based
on identi cation of entities, attributes, and relations
as applied to regular text. There are several works in
NLP-ML, which use a variety of heuristics and training
methods targeted at creating concept hierarchies via
syntactic heuristics, semantic patterns, and un- and
(semi-) supervised methods [
        <xref ref-type="bibr" rid="ref10 ref15 ref2 ref22">2, 9, 21, 14</xref>
        ].
      </p>
      <p>Note that most of works on legal text extraction do not
consider enterprise information against which
regulations are to be checked. The NLP-ML techniques need
to be applied to enterprise information as well,
available in the form of business process de nitions, data, or
audit trails, to obtain a conceptual model with which
to map regulation concepts.</p>
      <p>Once the NLP-ML techniques are applied to obtain
con1OpenCalais (Thomson Reuters) http://new.opencalais.
com/opencalais-api/
2Active Tags http://www.wavetrend.net/activ-tags.php
3Compliance Guardian http://www.avepoint.com/
products/compliance-management/</p>
      <p>Purposive Rule
Language Specifica-on
DR-Prolog/Drools</p>
      <p>Purposive Opera-ons</p>
      <p>Specifica-on</p>
      <p>Business Process
Defini-ons/Data/Audit</p>
      <p>Trails
Rules</p>
      <p>Facts</p>
      <p>
        Simula'on of
Business Opera'ons
Compliance Checking
[+Proof Explana-on]
ceptual models and a mapping between them, this model can
be used to generate rules and facts in the desired speci
cation language. We presented early manifestation of the idea
of generating requisite artifact speci cations from a
conceptual model in [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ]. At this stage, a (semi-)automated
specialization of generic set of activities in Figure 1 could be
imagined as illustrated in Figure 4.
      </p>
      <p>
        Compared to the generic set of activities for compliance
management and its specializations presented in Section 2,
the framework illustrated in Figure 4, restricts the role of
domain experts in conceptual model making. The process
of generation of model is (semi-)automated since we envision
that such a model will be built incrementally along the lines
of approach presented in [
        <xref ref-type="bibr" rid="ref28">27</xref>
        ] which we reviewed earlier. This
conceptual model needs to incorporate concepts of risks and
governance as we indicated in [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ]. With this set of concepts,
it might be possible to simulate operations of enterprise to
get a better t between compliance and business objectives
as described next.
3.2
      </p>
    </sec>
    <sec id="sec-7">
      <title>Simulating Operations with Compliance</title>
    </sec>
    <sec id="sec-8">
      <title>Controls</title>
      <p>
        According to the recent Mckinsey report on global risk
practice [
        <xref ref-type="bibr" rid="ref12">11</xref>
        ], in the traditional compliance management,
business managers are left to their own devices to gure
out speci c controls required to address regulatory
requirements, leading to build up of labor-intensive control
activities with uncertain e ectiveness. Compliance activities tend
to be isolated, lacking a clear link to the broader framework
of underlying risks and business goals with a dramatic
increase in compliance and control spend with either limited
or unproved impact on the residual risk pro le of given
enterprise.
      </p>
      <p>
        In our prior work, we modeled existing operational
practices of enterprises using enterprise architecture and business
motivation models [
        <xref ref-type="bibr" rid="ref27">26</xref>
        ]. We also showed how to incorporate
directives such as internal policies and external regulations
in enterprises' to-be architecture [
        <xref ref-type="bibr" rid="ref26">25</xref>
        ]. An enterprise needs
to maintain both its business as usual state and to keep
it optimum with regards certain criteria and it is also
involved in transformational activities in the presence of other
change drivers in its environment. When making the
enterprise compliant to certain regulations, it has to change its
operations. This results in systemic change ripples across all
of its concerns. This is why it is often desirable to play out
change scenarios in the presence of compliance to regulations
by linking them to business goals.
      </p>
      <p>
        In an ongoing work within our group, on arriving at a
language called Enterprise Simulation Language (ESL), we
provide a coordinated simulation facility for models
representing why, what, how, and who aspects of enterprise [
        <xref ref-type="bibr" rid="ref17">16</xref>
        ].
The core abstraction used in ESL is that of actor model of
computation. We believe that ESL is appropriate in
simulating enactment of compliance and checking how to optimally
implement compliance such that it does not negatively
affect an enterprises' business goals. In ESL, actors are used to
represent various levels of abstractions in enterprise models
in terms of systems, subsystems, and components. Events
capture various events expected by and output by these
systems as well as the events internal to the systems. If
various conditions under which regulatory rules become active
are imagined as compliance events, then we can model such
events at appropriate abstraction levels. The data and traces
required for compliance can be modeled as state variables of
actors. Finally, remediation behaviors can be modeled as
expressions over compliance events and states. ESL
models business goals in terms of various measures and levers
wherein levers can be events, structures, state variables, and
expressions over these that can be tuned for simulating the
optimum measures.
      </p>
      <p>Figure 4 shows this as simulation of business operations,
where regulatory rules and operational facts are transformed
into ESL speci cations which can be simulated to obtain
insights into how compliance or non-compliance of certain
regulations will a ect the enterprise's risk pro le and business
goals at large.</p>
    </sec>
    <sec id="sec-9">
      <title>DISCUSSION</title>
      <p>
        In practice, enterprises rely on domain experts to enact
compliance controls in their business operations. This
introduces a major bottleneck in compliance because manual
treatment of compliance requirements lacks substantially in
accuracy and coverage of compliance requirements [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. We
believe that with a model-driven framework we proposed
in Section 3.1, wherein domain experts' role is restricted to
model making on top of NLP-ML techniques, the accuracy
and coverage can be imparted at the right juncture in
compliance management.
      </p>
      <p>
        Enterprises also often implement compliance after the fact
using point solutions in combination, which restrict their
ability to address regulatory changes [
        <xref ref-type="bibr" rid="ref1 ref11">1, 10</xref>
        ]. Also,
enterprises implement compliance mostly in content rather than
in intent, wherein neither enactment nor remediation results
in substantive management actions. This leaves certain
business operations exposed to underlying risks in spite of being
compliant in word [
        <xref ref-type="bibr" rid="ref12">11</xref>
        ]. We believe that an end-to-end
compliance framework with the ability to simulate compliance
along with risks and business goals as proposed in Section
3.2 can achieve coordinated compliance.
      </p>
      <p>
        Contrary to approaches in the literature on compliance
management, instead of focusing just on extraction of rules
from legal text, or compliance checking with a speci c set of
speci cations for rules and operations, we propose a
framework that carries out all of these activities and leaves room
for any combination of speci cations for rules and
operations. Additionally, simulation abilities imparted by ESL
enable a more holistic treatment of compliance by linking it
to underlying risks and business goals. The proposed
framework builds on our earlier works [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ] by adding
NLP-MLbased automation in conceptual model making and
ESLbased simulation. Compared to industrial GRC solutions,
the proposed approach provides an end-to-end compliance
management framework.
5.
      </p>
    </sec>
    <sec id="sec-10">
      <title>CONCLUSION</title>
      <p>In spite of considerable research in academia and the
advent of industry GRC solutions, much of the state of the
art and practice relies heavily on experts for manually
conducting various activities within compliance management.
(Semi-) automation that we proposed aims at reducing the
burden of relying on domain experts; when applied to
endto-end activities, also has the potential to reduce costs of
compliance and improve accuracy and coverage.
Furthermore, holistic treatment of GRC facets and simulation thereof
ensure that compliance activities are not a bottleneck to
business goals. We believe that our ongoing work with
KYC4 as well as MiFID5 and HIPAA6 regulations will
enable us to actually realize these bene ts on ground.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Accelus</surname>
          </string-name>
          .
          <article-title>Regulatory change management: the critical compliance competence</article-title>
          ,
          <year>Sep 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L. A. E.</given-names>
            <surname>Al-Safadi</surname>
          </string-name>
          .
          <article-title>Natural language processing for conceptual modeling</article-title>
          .
          <source>JDCTA</source>
          ,
          <volume>3</volume>
          (
          <issue>3</issue>
          ):
          <volume>47</volume>
          {
          <fpage>59</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alberth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Babel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Becker</surname>
          </string-name>
          , G. Kaltenbrunner,
          <string-name>
            <given-names>T.</given-names>
            <surname>Poppensieker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Stegemann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Wegner</surname>
          </string-name>
          .
          <source>Compliance and control 2</source>
          .
          <article-title>0: Unlocking potential through compliance and quality-control activities</article-title>
          .
          <source>McKinsey Working Papers on Risk</source>
          ,
          <volume>33</volume>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>AvePoint.</surname>
          </string-name>
          <article-title>AvePoint compliance guardian product brochure</article-title>
          , Oct.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Bartley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. A.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. Z.</given-names>
            <surname>Taylor</surname>
          </string-name>
          .
          <article-title>A Comparison of XBRL Filings to Corporate 10-Ks - Evidence from the Voluntary Filing Program</article-title>
          . Social Science Research Network,
          <year>Feb 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Delfmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Eggert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Schwittay</surname>
          </string-name>
          .
          <article-title>Generalizability and applicability of modelbased business process compliance-checking approaches | a state-of-the-art analysis and research roadmap</article-title>
          .
          <source>BuR | Business Research</source>
          ,
          <volume>5</volume>
          (
          <issue>2</issue>
          ):
          <volume>221</volume>
          {
          <fpage>247</fpage>
          ,
          <year>2012</year>
          . Publication status: Published.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Breaux</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Vail</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Anton</surname>
          </string-name>
          .
          <article-title>Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations</article-title>
          .
          <source>In 14th (RE Conference</source>
          <year>2006</year>
          ),
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
          September 2006, Minneapolis/St.Paul, Minnesota, USA, pages
          <volume>46</volume>
          {
          <fpage>55</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Cau</surname>
          </string-name>
          .
          <article-title>Governance, risk and compliance (GRC) software business needs and market trends</article-title>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>4Reserve Bank of India KYC https://rbi.org.in/scripts/BS ViewMasCirculardetails.aspx?id=8179 5MiFID http://ec.europa.eu/ nance/securities/isd/index en.htm 6HIPAA http://www.hhs.gov/hipaa/index.html</mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Fader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Soderland</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Etzioni</surname>
          </string-name>
          .
          <article-title>Identifying relations for open information extraction</article-title>
          .
          <source>In Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, EMNLP</source>
          <year>2011</year>
          ,
          <volume>27</volume>
          -
          <issue>31</issue>
          <year>July 2011</year>
          , John McIntyre Conference Centre, Edinburgh,
          <string-name>
            <surname>UK</surname>
          </string-name>
          ,
          <article-title>A meeting of SIGDAT, a Special Interest Group of the ACL</article-title>
          , pages
          <volume>1535</volume>
          {
          <fpage>1545</fpage>
          .
          <string-name>
            <surname>ACL</surname>
          </string-name>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J. A. W. French</given-names>
            <surname>Caldwell</surname>
          </string-name>
          .
          <article-title>Magic quadrant for enterprise governance, risk</article-title>
          and compliance platforms,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kaminski</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Robu</surname>
          </string-name>
          .
          <source>Compliance and control 2</source>
          .
          <article-title>0: Emerging best practice model</article-title>
          .
          <source>McKinsey Working Papers on Risk</source>
          ,
          <volume>33</volume>
          ,
          <year>Oct 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Kharbili</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. A. de Medeiros</surname>
            , S. Stein, and
            <given-names>W. M. P. van der Aalst.</given-names>
          </string-name>
          <article-title>Business process compliance checking: Current state and future challenges</article-title>
          . In P. Loos,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Nuttgens, K. Turowski</article-title>
          , and D. Werth, editors,
          <source>MobIS</source>
          , volume
          <volume>141</volume>
          <source>of LNI</source>
          , pages
          <volume>107</volume>
          {
          <fpage>113</fpage>
          .
          <string-name>
            <surname>GI</surname>
          </string-name>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiyavitskaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zeni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Breaux</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Anton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Cordy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mich</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Automating the extraction of rights and obligations for regulatory compliance</article-title>
          . In Q. Li,
          <string-name>
            <given-names>S.</given-names>
            <surname>Spaccapietra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. S. K.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Olive, editors,
          <source>Conceptual Modeling - ER</source>
          <year>2008</year>
          , Barcelona, Spain, volume
          <volume>5231</volume>
          of Lecture Notes in Computer Science, pages
          <volume>154</volume>
          {
          <fpage>168</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Klapaftis</surname>
          </string-name>
          .
          <article-title>Unsupervised concept hierarchy induction: learning the semantics of words</article-title>
          . University of York, Department of Computer Science,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <surname>KPMG</surname>
          </string-name>
          .
          <article-title>The convergence evolution: Global survey into the integration of governance, risk, and compliance</article-title>
          ,
          <source>Feb</source>
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Barat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Clark</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. S.</given-names>
            <surname>Barn</surname>
          </string-name>
          .
          <article-title>Toward overcoming accidental complexity in organisational decision-making</article-title>
          .
          <source>In Lethbridge et al. [17]</source>
          , pages
          <fpage>368</fpage>
          {
          <fpage>377</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lethbridge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cabot</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Egyed, editors.
          <source>18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MoDELS</source>
          <year>2015</year>
          , Ottawa, ON, Canada,
          <source>September 30 - October 2</source>
          ,
          <year>2015</year>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mercatali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Romano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Boschi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Spinicci</surname>
          </string-name>
          .
          <article-title>Automatic translation from textual representations of laws to formal models through UML</article-title>
          . In M. Moens and P. Spyns, editors,
          <source>Legal Knowledge and Information Systems - JURIX 2005: The Eighteenth Annual Conference on Legal Knowledge and Information Systems</source>
          , Brussels, Belgium,
          <fpage>8</fpage>
          -
          <issue>10</issue>
          <year>December 2005</year>
          , volume
          <volume>134</volume>
          of Frontiers in
          <source>Arti cial Intelligence and Applications</source>
          , pages
          <volume>71</volume>
          {
          <fpage>80</fpage>
          . IOS Press,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [19]
          <string-name>
            <surname>OMG</surname>
          </string-name>
          .
          <article-title>Semantics of business vocabulary and business rules (SBVR)</article-title>
          ,
          <year>v1</year>
          .3. May
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Lintean</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Banjade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Niraula</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Stefanescu</surname>
          </string-name>
          .
          <article-title>SEMILAR: the semantic similarity toolkit. In 51st Annual Meeting of the Association for Computational Linguistics</article-title>
          ,
          <string-name>
            <given-names>ACL</given-names>
            ,
            <surname>So</surname>
          </string-name>
          <string-name>
            <surname>a</surname>
          </string-name>
          ,
          <source>Bulgaria</source>
          , pages
          <volume>163</volume>
          {
          <fpage>168</fpage>
          . The Association for Computer Linguistics,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [21]
          <string-name>
            <surname>I. Serra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Girardi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Novais</surname>
          </string-name>
          .
          <article-title>Evaluating techniques for learning non-taxonomic relationships of ontologies from text</article-title>
          .
          <source>Expert Syst. Appl.</source>
          ,
          <volume>41</volume>
          (
          <issue>11</issue>
          ):
          <volume>5201</volume>
          {
          <fpage>5211</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sunkle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kholkar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          .
          <article-title>Explanation of proofs of regulatory (non-)compliance using semantic vocabularies</article-title>
          . In N. Bassiliades,
          <string-name>
            <given-names>G.</given-names>
            <surname>Gottlob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sadri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Paschke</surname>
          </string-name>
          , and D. Roman, editors,
          <source>Rule Technologies: Foundations</source>
          , Tools, and Applications - 9th
          <source>International Symposium, RuleML</source>
          <year>2015</year>
          , Berlin, Germany,
          <source>August 2-5</source>
          ,
          <year>2015</year>
          , Proceedings, volume
          <volume>9202</volume>
          of Lecture Notes in Computer Science, pages
          <volume>388</volume>
          {
          <fpage>403</fpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sunkle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kholkar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          .
          <article-title>Model-driven regulatory compliance: A case study of "know your customer" regulations</article-title>
          . In Lethbridge et al. [
          <volume>17</volume>
          ], pages
          <fpage>436</fpage>
          {
          <fpage>445</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sunkle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kholkar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          .
          <article-title>Toward better mapping between regulations and operations of enterprises using vocabularies and semantic similarity</article-title>
          .
          <source>CSIMQ</source>
          ,
          <volume>5</volume>
          :
          <fpage>39</fpage>
          {
          <fpage>60</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sunkle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kholkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Rathod</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          .
          <article-title>Incorporating directives into enterprise TO-BE architecture</article-title>
          . In G. Grossmann,
          <string-name>
            <given-names>S.</given-names>
            <surname>Halle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Karastoyanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          , and S. Rinderle-Ma, editors,
          <source>18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations</source>
          ,
          <source>EDOC Workshops</source>
          <year>2014</year>
          , Ulm, Germany, September 1-
          <issue>2</issue>
          ,
          <year>2014</year>
          , pages
          <fpage>57</fpage>
          {
          <fpage>66</fpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sunkle</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Rathod</surname>
          </string-name>
          .
          <article-title>Visual and ontological modeling and analysis support for extended enterprise models</article-title>
          . In S. Nurcan and E. Pimenidis, editors,
          <source>Information Systems Engineering in Complex Environments - CAiSE Forum</source>
          <year>2014</year>
          , Thessaloniki, Greece, June 16-20,
          <year>2014</year>
          , Selected Extended Papers, volume
          <volume>204</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , pages
          <volume>233</volume>
          {
          <fpage>249</fpage>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [27]
          <string-name>
            <surname>T. M. van Engers</surname>
            ,
            <given-names>R. van Gog</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Sayah</surname>
          </string-name>
          .
          <article-title>A case study on automated norm extraction</article-title>
          . In T. Gordon, editor,
          <source>Legal Knowledge and Information Systems. Jurix</source>
          <year>2004</year>
          :
          <article-title>The Seventeenth Annual Conference</article-title>
          .,
          <source>Frontiers in Arti cial Intelligence and Applications</source>
          , pages
          <volume>49</volume>
          {
          <fpage>58</fpage>
          , Amsterdam,
          <year>2004</year>
          . IOS Press.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Yeddula</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. Das</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Reddy</surname>
          </string-name>
          .
          <article-title>A model-driven approach to enterprise data migration</article-title>
          . In J. Zdravkovic,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kirikova</surname>
          </string-name>
          , and P. Johannesson, editors,
          <source>Conference on Advanced Information Systems Engineering (CAISE)</source>
          , Stockholm, Sweden, volume
          <volume>9097</volume>
          of Lecture Notes in Computer Science, pages
          <volume>230</volume>
          {
          <fpage>243</fpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zeni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiyavitskaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Cordy</surname>
          </string-name>
          , and
          <string-name>
            <surname>J. Mylopoulos.</surname>
          </string-name>
          <article-title>GaiusT: supporting the extraction of rights and obligations for regulatory compliance</article-title>
          .
          <source>Requir</source>
          . Eng.,
          <volume>20</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>22</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>