=Paper= {{Paper |id=Vol-2049/05paper |storemode=property |title=Legal Compliance by Design (LCbD) and through Design (LCtD): Preliminary Survey |pdfUrl=https://ceur-ws.org/Vol-2049/05paper.pdf |volume=Vol-2049 |authors=Pompeu Casanovas,Jorge González-Conejero,Louis de Koker |dblpUrl=https://dblp.org/rec/conf/jurix/CasanovasGK17 }} ==Legal Compliance by Design (LCbD) and through Design (LCtD): Preliminary Survey== https://ceur-ws.org/Vol-2049/05paper.pdf
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




 Legal Compliance by Design (LCbD) and through Design
              (LCtD): Preliminary Survey


              Pompeu Casanovasabc, Jorge González-Conejeroc, Louis de Kokerab
               aLa Trobe Law School, La Trobe University, Melbourne, Australia
                   bData to Decisions Cooperative Research Centre, Australia
        cInstitute of Law and Technology, Autonomous University of Barcelona, Spain




           Abstract. The purpose of this paper is twofold: (i) carrying out a preliminary survey
           of the literature and research projects on Compliance by Design (CbD); and (ii)
           clarifying the double process of (a) extending business managing techniques to other
           regulatory fields, and (b) converging trends in legal theory, legal technology and
           Artificial Intelligence. The paper highlights the connections and differences we
           found across different domains and proposals. We distinguish three different policy-
           driven types of CbD: (i) business, (ii) regulatory, (iii) and legal. The recent
           deployment of ethical views, and the implementation of general principles of
           privacy and data protection lead to the conclusion that, in order to appropriately
           define legal compliance, Compliance through Design (CtD) should be differentiated
           from CbD.

           Keywords. Compliance Survey, Compliance methodologies, Compliance by
           Design, Legal Compliance through Design, Regulatory Compliance



1. Introduction

     Compliance —and particularly legal compliance— is a popular topic, featuring for
example in research projects on big data analysis, blockchain and other digital ledger
technologies, digital currencies, fintech, regtech, crowdsourcing, tax regulations, smart
cities, cloud computing, normative Multi-Agent Systems, electronic institutions, health,
security, data protection, and privacy. 1 It is the subject research matter of several EU
H2020 Projects.2 Previous projects — especially COMPAS3, OPENLAWS4, EU Cases5
and BO-ECLI 6 — developed conceptual toolkits. Several surveys on regulatory
compliance have been already performed in the last ten years, including a meta-analysis

    1 This paper is based on D2D CRC Deliverable Technical Bases for Compliance by Design

(CbD). While the support of the Data to Decisions Cooperative Research Centre is acknowledged,
the views expressed in this article do not necessarily reflect the views of the Centre.
     2 Cf. especially TRUST (www.trust-project.eu/), e-COMPLIANCE (http://www.e-

compliance-project.eu/), MIREL (http://www.mirelproject.eu/), and LYNX.
     3 http://cordis.europa.eu/fp7/ict/ssai/docs/finalreport-compas.pdf
     4 https://info.openlaws.com/openlaws-eu/
     5 http://eucases.eu/start.html
     6 http://bo-ecli.eu/




                                                   33
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




of peer-reviewed systematic literature reviews on business process compliance [1]. We
have reviewed 280 publications so far. This paper introduces a scheme to perform a
systematic survey in the immediate future [2], focusing on the dimension of legal
enforcement and public law. The application of technology in relation to compliance is
going far beyond the business and corporate fields in which the idea of Compliance by
Design (CbD) was originally coined.
     Different expressions and approaches can be found in the current literature on
compliance, according to different fields and purposes, with different meanings —
mainly Compliance (C), Regulatory Compliance (RC), Compliance by Detection (CbDt),
Compliance by Design (CbD), and Legal Compliance by Design (LCbD). The
Cambridge dictionary equates ‘compliance’ with ‘obedience’: “the act of obeying an
order, rule, or request”. 7 Broadly, compliance can be understood as conformity in
fulfilling requirements, or demonstrating conformity with regulatory constraints. RC is
denoting a previously selected set of requirements. This set can be also defined in many
ways. E.g. ISOs point at conformance of business procedures and processes with laws,
regulations, standards, best practices, or similar requirements.8
     An increasing number of aspects of compliance can be automated to minimise risks,
save resources, and increase management security, efficiency and effectivity.
Compliance with formal rules —i.e. rule compliance— requires the definition of a
language, scope, and information processing specifications. Some compliance systems
have already been patented [3] [4].
      Compliance by Detection (CbDt) entails a conformity check during or after the
runtime stage (in the execution environment). Therefore, if noncompliant behaviour with
a set of rules is detected, the business process needs to be redesigned. Conversely,
Compliance by Design (CbD) means that the set of rules is taken into account in the
design stage of the business process. The conformity check takes place in advance, before
and within the runtime stage.9 This approach has the advantages that: (i) a subsequent
proof and corrections of compliance are not required; (ii) the approach is flexible as the
generation can be repeated when rules are added, removed or changed; (iii) compliance
is not only detected, but actually enforced [5]. Hence, CbD has a preventive side: it means
that compliance “should be embedded into the business practice, rather than be seen as
a distinct activity” [16].
     Legal CbD (LCbD) is a term that was introduced to focus on the legality of the whole
business process, mainly after the enactment of the Sarbanes-Oxley Act (2002), a US
federal law that expanded and created new requirements for all public company boards
and accounting firms. Actually one of the first uses of the term CbD in computer science
occurred having LCbD in mind [29].10 The term Holistic Compliance is also used to point
out that LCbD “stands in contrast to simply complying with the rules, and thus,

    7 https://dictionary.cambridge.org/dictionary/english/compliance
      8
        According to ISO/IEC 27002: “The organization must identify and document its obligations
to external authorities and other third parties in relation to information security, including
intellectual property, [business] records, privacy/personally identifiable information and
cryptography”.
      9
        “When”, “how”, and “what” matter here. CbD and CbDt can be applied to the same system
at different stages. The application of both approaches are usually recommended. The former
during the design of the business process and the later during the running stage.
      10
         There were other interesting uses, e.g. [59], a civil engineering thesis on roundabouts
stated: “Roundabouts encourage speed compliance by design instead of regulatory enforcement”
(2004).




                                              34
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




imperatively requires an integrated design of both relevant elements and the relationships
amongst these” [6]. Regulatory Compliance is also a common notion, often referred in a
broad way to denote “the act and process of ensuring adherence to laws” and involving
analysing, checking, enforcing, and “discovering, extracting and representing different
requirements from laws and regulations that affect a business process” [1].
      Thus, we may distinguish between LCbD approaches focused on business processes
—e.g. through goal-oriented modelling [7]—and those focused on legal knowledge, i.e.
on requirements based on the properties of normative and legal systems (such as
hierarchy, consistency, etc.) [8]. The definition of legal (not only documentary) sources
to select and define requirements deserves some attention. We will suggest the notion of
Compliance through Design (CtD) to explicitly encompass the social and institutional
aspects that are not explicitly included by the regular way of approaching this subject
(i.e. legal interpretation processes —beyond the conversations between experts and
computer scientists—, institutionalisation, the interface between modelling and
coordination, and the relation between citizens and the law).
      In business studies, both CbDt and CbD are focused on regulations and legal texts,
standards, outer policies and inner policies. In this scenario, we can take four different
methodological stances to describe how they have been modelled: (i) deontic logic, (ii)
Petri nets, (iii) graph-based tools, (iv) goal-oriented languages, (v) and semantics.
      The remainder of this paper will be organised as follows. We will briefly summarise
(i) business approaches to compliance, (ii) semantic languages, (iii) the recent synergy
between legal theory, business languages, AI, and Normative Agent Systems (norMAS),
(iv) and compliance methodologies. Finally, in the last section, we will briefly introduce
the notion of CtD. Figure 1 shows the double circuit of sources and formalisation,
following the main technical trends in business process modelling. It will be the basis to
gear the comparative in this area.




    Figure 1. Survey analytical scheme (relation between sources and BC formalisation)




                                            35
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




2. Business process modelling

     2.1. Graph-based Business Process Modelling

     There are many business analyses in the literature about the way companies work
and define business processes. It is a common trend to visualise business processes in a
flow-chart format. 11 However, this creates a technical gap between the format of the
initial design of business processes, and the format of the languages that will execute
these business processes. This gap needs to be bridged with a formal mechanism that
maps the appropriate visualisation to the appropriate execution format. Therefore, there
is a number of graph-based business process modelling languages, for instance Business
Process Modeling Notation (BPMN 2.0.2 Specification, 2016), Event-driven Process
Chain (EPC diagrams), Unified Modeling Language (UML diagrams), and UML activity
diagrams (AD) [9] [10].


     2.2. Business Process Model and Notation (BPMN)

     The Business Process Model and Notation (BPMN) is a graphic representation of
business processes in a business process model. The Business Process Management
Initiative (BPMI) developed BPMN (which has been maintained by the Object
Management Group12 (OMG) since the two organizations merged in 2005). BPMN is a
standard promoted by OMG in order to ease the designing of business process models
within different scenarios. The primary goal of BPMN is to provide a notation that is
readily understandable by all business stakeholders - business analysts, technical
developers responsible for implementing the technology, and business people who will
manage and monitor these processes. Another goal is to ensure that XML languages
designed for the execution of business processes can be visualised with a business-
oriented notation [11].

     2.3. Business Process Modelling and Notation – Query (BPMN-Q)

    The Business Process Model Notation Query (BPMN-Q) is a visual language to
query repositories of business process models. This language has been used in different
scenarios where reuse or retrieval of process models based on a query pattern was needed.
BPMN-Q query is represented as a business process diagram using the BPMN that are
augmented with querying-specific constructs [12].


     2.4. Temporal Deontic Logic and Computational Tree Logic

    Deontic logic (DL) is a logic for representing and reasoning about concepts such as
obligation, permission, prohibition and waived obligation. Various axiomatizations of
DL have been proposed with different extensions: standard DL (SDL), Computational
Tree Logic, and DL based on Event Calculus formalism. Several non-standard DL
approaches have been proposed recently [13], and are experiencing a fast grow due to

    11 https://www.heflo.com/blog/process-mapping/business-process-mapping-methodology/
    12 Object Management Group (OMG): http://omg.org




                                           36
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




Semantic Web and Normative Multi-agent Systems developments. Computational Tree
Logic (CTL) is a language to express properties for model checking. In addition to logical
operators and atomic propositions, CTL provides temporal operators to express
properties that must hold through a number of states that are temporally related.
PENELOPE [Process ENtailment from the Elicitation of Obligations and Permissions]
[14] is a language to express temporal deontic assignments. It is mainly designed to
generate compliant control-flow-based process models from a rule set of permissions and
obligations.


     2.5. Petri Nets

     Petri Nets —or place/transition (P/T) nets— combine a simple graphical
representation with a mathematical basis [15]. They can express locality of actions in
distributed systems and allow modelling the lifecycle of several business processes,
yielding a more compact model compared to explicit state machines. A CbD approach
based on artefact-centric business processes is introduced in [5].


     2.6. LegalRuleML

    LegalRuleML is an effort to create a standard 13 for the representation of norms,
assuming the equivalence between temporal and defeasible logic, and eventually a
general legal unified framework for rule interchange languages [16] [17]. LegalRuleML
documents consist of metadata, statements (rules), and contexts. LegalRuleML is
deemed to represent the particularities of the legal normative rules with an articulated
and meaningful mark-up language, encompassing the following features: (i) defeasibility
of rules and defeasible logic; (ii) deontic operators (e.g., obligations, permissions,
prohibitions, rights); (iii) semantic management of negation; (iv) temporal management
of rules and temporality in rules; (v) classification of norms (i.e., constitutive,
prescriptive); (vi) jurisdiction of norms; (vii) isomorphism between rules and natural
language normative provisions; and (viii) identification of parts of the norms (e.g.,
bearer, conditions); (ix) authorial tracking of rules [17]. Compliance in business
processes and exchanges can be represented and are addressed stemming from this
language of representation [18].

     2.7. Ontologies

      In the compliance framework, ontologies are used to represent the extracted
knowledge from different legal and normative texts in a machine-readable format.
Furthermore, XML Schema allows the execution of a reasoner algorithm against the
ontology structure to determine the compliance status of sensitive assets. Focusing on
compliance, and stemming from existing practices and methods, for example, the
Compliance Management Ontology [CoMOn] [19] proposes a shared conceptualization.
It is based on several core concepts (further linked and organised into two more tiers):
business process management, culture management, obligations, programme, resources,
risk management, and solutions.

    13 https://www.oasis-open.org/committees/legalruleml/charter.php




                                             37
      Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




3. Methodologies and Corporate Governance Models

     Methodologies are related to the broad corporate governance models and standards
that have been developed in the last twenty-five years. There are, for example, several
ISO standards related to corporate and regulatory compliance and security, and several
corporate governance models. Some models for IT Governance stem from COSO,
COBIT, ISO 27002 (ISO 17799) and ISO 38500.14 There is some confusion around the
different models, as they are meant to pursue different objectives that are not always
compatible: (i) stewardship of IT resources on behalf of various stakeholders, (ii)
planning, organizing, and monitoring the use of IT resources; (iii) creating value for the
stakeholders; (iv) complying with national and international laws to avoid regulatory
risks; (v) both protecting consumers and customising consumer experiences; and (vi)
improving market quality.

      3.1. ISO/IEC Standards

     ISO/IEC 2700115 is an information security standard published by the International
Organization for Standardization (ISO) and by the International Electrotechnical
Commission (IEC), entitled Information technology —Security techniques— Code of
practice for information security management. ISO/IEC 27002: 2005 has developed
from BS7799, published in the mid-1990s. The British Standard was adopted by ISO/IEC
as ISO/IEC 17799:2000, revised in 2005, and renumbered (but otherwise unchanged) in
2007 to align with the other ISO/IEC 27000-series standards. ISO/IEC 27001:2013 and
27002:2013 replaces the 2005 standard and highlights the importance of security in the
cloud and the need not only of internal, but external (legal) controls.16
     ISO 17799 (developed today by ISO 27001/02) represents a guide for implementing
a set of policies, practices and procedures in order to consolidate the information security
administered by an organization. ISO/IEC 27002 requires that management
systematically examines the organization's information security risks, taking account of
the threats, vulnerabilities and impacts. Clause 6.1.3 of ISO/27001:2013 describes how
an organisation can respond to risks with a risk treatment plan; an important part of this
is choosing appropriate controls.
     ISO/IEC 27002 seeks the preservation of (i) confidentiality (information accessible
only to those authorized to have access), (ii) integrity (accuracy and completeness of
information and processing methods), (iii) and availability (authorized users have access
to information and associated assets when required). Section 18 points at compliance:

     18.1 Compliance with legal and contractual requirements: “The organization must identify
and document its obligations to external authorities and other third parties in relation to information
security, including intellectual property, [business] records, privacy/personally identifiable
information and cryptography”.

    18.2 Information security reviews: “The organization’s information security arrangements
should be independently reviewed (audited) and reported to management. Managers should also

     14 This standard is based on the AS 8015-2005 Australian Standard for Corporate Governance

of Information and Communication Technology (2005).
     15 http://www.iso27001security.com/html/27002.html
     16

http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54534




                                                  38
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




routinely review employees’ and systems’ compliance with security policies, procedures etc. and
initiate corrective actions where necessary”.

     ISO/IEC 29382, Corporate Governance of Information and Communication
Technology, officially named ISO/IEC 38500 in April 2008, could be added to this list.
It is intended to provide guiding principles to any organization, regardless of size or
sector.17

     3.2. Automated, Semi-automated, Inner, and Outer Compliance

     Governance models and ISOs tend to overlap. Mapping COBIT, COSO and other
audit IT models into ISO/IEC 27001/2 (ISO 17799) and ISO 38500 is now a common
endeavour [20]. Researchers have found empirical evidence to assert that a firms’
effectiveness of IT steering committee-driven IT governance initiatives positively relate
to the level of their IT-related capabilities. Thus, there is a relationship between IT-
related capabilities and internal process-level performance. Improvement in internal
process-level performance will be positively related to improvement in customer service
and firm-level performance [21].
     From the outset automation of security requirements has been one of the objectives
of IT corporate governance. It belongs to the Security Requirements Engineering (SRE)
domain, which falls outside the strict boundaries of corporate governance. The SQUARE
methodology [Security Quality Requirements Engineering] developed at Carnegie
Mellon University in 2005 [22], provides a step-by-step process for “eliciting and
prioritizing” security requirements into software and systems early in the life cycle. The
SQUARE methodology has been recently extended [23], making it useful as a
framework. L-SQUARE addresses legal compliance when developing software,
engineering systems or acquiring software. Complete SRE updated surveys do exist [24],
and several ontologies have been already built, advancing a meta-model for knowledge
reusing in security requirements engineering [25].


4. Legal Compliance by Design (LCbD)

     In this Section, we will describe some trends that brings closer alignment to business
and legal modelling. We will contend however that finding synergies is a more effective
strategy than making transplants. Some methods and tools to restructure and adapt legal
norms, policies and rights to Linked Open Data domains are also referred.

     4.1. Regorous

     Following the Regorous approach, compliance “is a relationship between two sets
of specifications: alignment of formal specifications for business processes and formal
specifications for prescriptive (legal) documents” [26]. The authors view the compliance
ecosystem as the complete lifecycle between domain experts and modellers, including
knowledge acquisition, checking, translation, and monitoring. Hence, modellers behave
proactively and intervene and join in the description of needs, roles and tasks, annotating
and enriching the required business information modelling, for as “compliance is not just

    17 http://www.38500.org/




                                              39
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




about the tasks to be executed in a process but also on what the tasks do, the way they
change the data and the state of the artefacts related to the process, and the resources
linked to it” [ibid.]. Accordingly, process models must be enriched with such information.
     To address the problem of how to get data for data control tags and where to get it
from, a query-based methodology to annotate process models is advanced. This is called
the “Regorous architecture”, extended with the semantics of the LegalRuleML model.
     The authors sequence the Regorous steps as follows: 18 (i) generate an execution
trace of the process; (ii) traverse the trace: for each task in the trace, cumulate the effects
of the task using an update semantics; (iii) use the set of cumulated effects to determine
which obligations enter into force at the current tasks, by calling a reasoner; (iv) add the
obligations obtained from the previous step to the set of obligations carried over from
the previous task; (v) determine which obligations have been fulfilled, violated, or are
pending; (vi) if they are violated, check whether they have been compensated; (vii) repeat
for all traces. “In conclusion, a process is evaluated as compliant if and only if all traces
are compliant (all obligations have been fulfilled or if violated they have been
compensated), or it is evaluated as weakly compliant if there is at least one trace that is
compliant” [18].
     It should be noted that there is a great bulk of descriptive work carried out before,
during, and after modelling. In essence, legal compliance in terms of this approach is
compliance with the extracted conceptual legal model.

      4.2. Mercury

      Cooperation between Subject Matter Experts (SME) and modelers as Semantic
Technology Experts (STE) is also specifically addressed in the Mercury approach [27]
[28]. Mercury is a linguistic tool pointing at legal extraction and interpretation to reach
compliance (e.g. for financial and tax purposes). It is composed of a structured English
vocabulary based on SBVR and represented in a XML Schema capturing rulebook and
vocabulary entries. The rulebook contains regulative and constitutive rules; the
vocabulary encompasses the actions and factors that determine a rule’s applicability and
its legal effect. Thus, Mercury focuses on the extension of linguistic terms complemented
with a regulatory interpretive methodology (RIM): “Mercury represents rule statements
contained in regulations and describes the concepts used in those rules in a terminological
dictionary” [28]. It leans on SBVR, but introduces a different way to manage the logical
formulation of SBVR rules, aligning them with a consistent legal interpretation. This is
a “constructive” trend, representing legal knowledge beforehand as a bridging tool
between SBVR and its effective implementation.

      4.3. Eunomos

   Eunomos is a legal knowledge and document management system focused on
identifying (i) norms, (ii) related norms, (iii) legislative modifications, (iv) different
interpretations of the same norms. It “focuses on identifying norms, cross-references and
semantic similarities, with a clear structure for representing multiple interpretations and
normative change.” [30] [31]. The architecture of the system is composed of three levels:

     18 The key aspects of the methodology are: (1) to enrich business process models with

semantic annotations, (2) to extract control objectives from business rules, and (3) to formalise the
control objectives in an appropriate logical formalism.




                                                 40
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




(i) a legal document management system (a database of norms in legislative XML, a
database collecting the network of references between laws, and a database classifying
single articles or items of legislations in different domains); (ii) a legal knowledge
management system (a database of concepts and of relations connecting them, together
with the terms associated to concepts, plus a legal document management system to
associate concepts and articles or items of legislations, and a database of prescriptions;
(iii) an external tier (a database of user profiles for login purposes and for keeping
information about their domains of interest, dispatching alerts concerning updatdes etc.).
Databases are populated by web spiders collecting daily new legislation, identified by
their URN identifier obtained by translating the human language title of the law. 19 The
database architecture is divided into two independent parts: the Legal Taxonomy Sylabus
ontology, and the legal texts repository.
      It is worth noting that compliance, diversity of legal interpretations, and attention to
stakeholders (lawyers, officers, and citizens) are at the core of the Euonomos focus.
Hence, Eunomos is also conceived as a commercial web service —called Menslegis—
for business compliance professionals. It encompasses tracking legislative changes
(through Cosine Text Similarity), enduring traceability from the text of laws and their
application to business processes, and a workflow for designing compliant business
processes [32].

     4.4. Legal-URN and Legal Goal-Oriented Requirement Language (Legal GRL)

    Eunomos is a legal knowledge management system, using lightweight ontologies,
annotations, and created concepts to link legal documents with end-users’ needs. Legal-
URN (URN stands for User Requirements Notation) and Legal GRL focus on a
preliminary stage and on the dimension of Requirement Engineering techniques to carry
out business process modelling and business compliance. A meta-model to assemble and
make compatible both systems has already been proposed [33]. The first one aiming at
legal knowledge management; the latter focusing on goal oriented modelling.
      URN constitutes an IT standard since 2008, as it is a language that visually supports
the elicitation, analysis, specification, and validation of requirements. Legal URN is the
extension of a requirements management framework for business process compliance,
connecting organisations and regulations within three different layers: (i) documentary,
(ii) teleological (organizational and legal goals), (iii) business processes models.20 To
develop Legal GRLmodels from regulations, the Hohfeldian jural classification is
fleshed out and refined for computational objectives. Duty-Claim, Privilege-NoClaim,
Power-Liability and Immunity-Disability are turned up into a format that exploits deontic
modalities at the GRL level. This occurs in two steps: (i) classifying each statement of
the legal document based on Hohfeld's classes of rights and annotate it accordingly


     19
        “Then the text of the norm is automatically translated into legislative XML using a parser.
References in the text of norms, already tagged in XML, are collected in a database. Then norms
are classified semi-automatically, and the collection of concepts can start. The system is
implemented in PHP for the web application, Javascript and Ajax, for the front end, XML and
XSLT for the documents, and C++ for the web spiders retrieving legislations” [31].
     20
        “GRL is tailored here through a lightweight legal profile to capture the elements of law,
including deontic modalities. This new profile is called Legal GRL. Legal GRL is part of the Legal-
URN framework, which includes Legal UCM as well [Use Case Maps (enabling to capture
business processes)]” [34].




                                                41
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




(identifying “subject", “verb", “actions", “preconditions", “exceptions" and “cross-
references" parts in each legal statement); (ii) refining the Hohfeldian classes of rights
into deontic Permission and Obligation goals, developing the goal model of the law, and
annotating the intentional elements with “Permission”, “Obligation”, “Precondition”,
“Exception”, and “XRef” stereotypes [34].

     4.5. Nòmos

Legal GRL and Nòmos share the use of i* modelling language (i-star, distributed
intentionality), and their interest for the Hohfeld jural squares as a semantic solution to
model legal relations. In Nòmos, intentional compliance is defined as “the assignment of
responsibilities to actors such that, if every actor fulfils its goals, then actual compliance
is achieved” [35] [36]. Thus, it intends finding a bridge between two different sets of
concepts (law / requirements) using normative propositions as atomic elements and jural
relations, actors, and actions as components: Laws are about rights and obligations,
privileges and liabilities; requirements, are about stakeholders’ goals and system
behaviours to meet them. This analysis (Nòmos 2) has lately been extended to the
distribution of responsibilities stemming from social and legal roles (Nòmos 3) [37].

     4.6. Rights Expression Languages (REL)

      Rights Expression Languages (REL) are computer languages also created to handle
and manage rights and obligations (permissions and prohibition) about content use, i.e.
a “format for describing rights, i.e. permissions and constraints, related to the use of
content.”21. REL may use Entity-Attribute-Value model, as for RDF, to structure its
description of rights as a list of (i) entities (such as a “work”, or “asset” for a license),
(ii) attributes (properties, such as actions that are permitted or forbidden, as constraints),
(iii) values for these properties, from a pre-defined vocabulary, i.e. using or modifying
the work). Well-known REL are ccREL (Creative Commons language to express their
licenses) 22 , XrML, the eXtensible Rights Markup Language which has also been
standardised as the Rights Expression Language (REL) for MPEG-2123, and W3C Open
Digital Rights Language (ODRL).
      Quite recently, in February 2017, the W3C Permissions and Obligations Expression
(POE) Working Group updated Working Drafts of the ODRL Information Model and
ODRL Vocabulary & Expression. The ODRL Information Model “offers a framework
for the underlying concepts, entities, and relationships that form the foundational basis
for the semantics of ODRL expressions” [38]. The ODRL Vocabulary & Expression
“describes the potential terms used in ODRL Policy expressions and how to serialise
them”. The terms form part of the ODRL Ontology and formalise the semantics.




    21 http://www.igi-global.com/dictionary/rights-expression-language-rel/25400
    22 https://www.w3.org/Submission/ccREL/
      23 MPEG-21 aims at defining an open framework for multimedia applications. MPEG-21 is

ratified in the standards ISO/IEC 21000 - Multimedia framework (MPEG-21). MPEG stands for
Moving Picture Experts Group.




                                             42
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




     4.7. Ontology Design Patterns (ODP)

      An ODP is a structural pattern, a reusable successful solution to a recurrent
modelling problem. It brings together expert and engineering knowledge, and can be
used to build other domain or core ontologies for a particular field of knowledge [39].
Focusing on Rights Expression Languages (REL), an Ontology Design Pattern (ODP)
has already been delivered for linked data licenses (from six rights expressions and policy
languages (ODRL, MPEG-21 REL, XACML, ccREL, MPEG-21 MVCO andWAC). "In
particular, the core idea of the pattern is to model: a rights expression which
allows/prohibits/obliges to make an Action (Right) to an Agent over a LD resource under
a condition" [40].24 ODP are semantic regulatory tools with deontic components. They
can be built without an integrated legal architecture. Instead, they are based on extended
vocabularies and a better definition of concepts behind them, structured through different
kind of ontologies. Term banks (lexical datasets) may contain millions of words in many
natural languages.
      There are different methods for approaching this multilingual complexity. In Europe,
e.g., with 28 official languages: (i) controlled vocabularies, implemented in terminology
database (such as IATE run by all the main EU Institutions), (ii) thesauri (as EUROVOC),
(iii) semantic lexicons or lightweight ontologies (as WordNet, EuroWordNet and, in the
legal domain, JurWordNet, EuroVoc Thesaurus). Structural patterns such as Ontolex-
Lemon work as standard to represent lexicons relative to ontologies, and they can be
used to encode term banks as RDF [41]. 25
      However, a standardisation of ontology reuse practices is still missing [42]. Linked
data resources are being introduced to facilitate it, at least partially. E.g. Framester is a
large RDF knowledge graph (currently including about 30 million RDF triples) acting as
a hub between FrameNet, WordNet, VerbNet, BabelNet, Predicate Matrix, etc.
Framester aims at leveraging “this wealth of links to create an interoperable and
homogeneous predicate space represented in a formal rendering of frame semantics” [43].


5. Compliance through Design (CtD)

     5.1. Limits of Compliance Languages

     Compliance is at the crossroads between the linguistic way of conceiving legal
components as requirements, and business modelling. As stated, the business process
and task modelling constitute the first step, a well-trodden path in the specialised
literature right now. The key question is how compliance requirements can be formally
specified to enable the application of automatic analysis and reasoning technique for their
verification [44].
     To find an answer, the COMPAS authors performed a comparative analysis of
compliance request languages, based on the examination of a wide range of compliance
requirements and relevant frameworks such as Basel II, Sarbanes-Oxley, IFRS, FINRA
(NASD/SEC), COSO, COBIT and OCEG. They compared (i) Linear Temporal Logic
(LTL), (ii) Computational Tree Logic (CTL), (iii) Formal Contract Language (FCL), (iv)
Metrical Temporal Logic (MTL), (v) Timed Computable Tree Logic (TCTL).

24 http://ontologydesignpatterns.org/wiki/Submissions:LicenseLinkedDataResources
25 See the core-Lemon structure at http://lemon-model.net/lemon-cookbook/node3.html




                                             43
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




     Although they found a high level of expressiveness, not all relevant rules in a real
setting scenario (use case) could be represented. Their conclusion is that “decision on the
use of a particular formal language is context-dependent and should be based on the
nature, complexity and source of compliance requirements” [44]. They have recently
introduced a compliance-request language meta-model for applying compliance patterns
through Compliance Request Language (CRL) [45]. CRL is formally grounded on
temporal logic and enables the abstract pattern-based specification of most compliance
requirements.

     5.2. Compliance in Normative Multi-Agent Systems [norMAS]

     Sociotechnical systems involve a combination of software systems, people, and
organizations. Norms can be broadly understood as a social device to allocate obligations
and rights. Compliance with social norms related to agency and coordination of agents,
is a classical problem. Legal compliance situates it in an institutional context, in which
legal requirements have to be modelled to bring about acceptable results in social
monitoring and auditing. The question here is not whether legal requirements can be
automatised, but how to define what is law (or what “count as” law). This is the problem
of modelling audits for public services [46]. This case study entails implementing
automated controls in the procurement process for public transport services for the
elderly and disabled in the region of Eindhoven (care-related taxi services) [46].
     The authors show that fully automated control might help to lower control costs, to
prevent contractual misstatements, and to increase the quality of the audit. Nevertheless,
interestingly, they don’t take a de jure approach: their research questions are focused on
evidence, and related to issues such as transaction costs, auditing roles, and
responsibilities. Thus, they use the term ‘compliance by design’ “in a broader sense,
where the design of compliance measures encompasses an integrated view of
organizational, procedural, and technical measures”. The authors acknowledge that tasks
like data collection, monitoring, and triggering warnings can be automated, “but even in
a fully automated control system, an auditor must assess the appropriateness of the design
and verify operating effectiveness of the system as specified.”
     This perspective is quite close to what we mean by CtD (Compliance through
Design), i.e. the practical construction of integrated ecosystems, involving CbD,
community-building, and the implementation of regulatory institutional designs alike, to
increase the levels of transparence and public accountability. This concept will be
unpacked in the next Section.

     5.3. Legal Compliance through Design (LCtD)

     Compliance surveys stressed that main areas for contributions have been in
extracting legal requirements, modelling them with goal modelling languages, and
integrating them with business processes [7]. The authors make clear that “compliance
analysis is based on certification (that business processes comply with regulations) or
auditing (ensuring the continuation of compliance)” [ibid.]. Other studies highlight (i)
that “in practice, existing compliance-checking approaches have rarely been applied”
[47], (ii) and “what is missing permanently except in the peak year 2009 is work geared
towards compliance in the after execution phase” [48]. The recent meta-analysis of the
literature (2016) confirms that —compared to relevant requirements, methodologies, and
guidelines— very few attention has been payed to compliance enactment: “Compliance




                                            44
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




analysis tasks and especially compliance enactment tasks have been neglected, as they
are mentioned in only 16% and 4% of the referenced studies reviewed, respectively” [1].
     Besides, beyond business processes, modelling law is not an easy task: “Just as
courts must struggle to interpret the law when ambiguities are present, so must users, be
they requirements engineers or developers, make crucial interpretation decisions during
requirements gathering and software design” [8].
     Especially at the crossroads of liberty and security —e.g. in constitutional principles,
privacy and data protection— legal compliance enactment requires further information
and conditions that can be modelled, but not hard-modelled [49] [50]. Computational
requirements and social conditions as described in social sciences overlap but are not
identical. Decisions have to be made at each stage of the modelling process. Conversely,
legal conceptual models require selecting and using formal languages that are not meant
to capture all relevant elements at the same time [51].
     Still, artificial intelligence techniques enhance legal reasoning. Technology
certainly eases the tasks of annotating, enriching, classifying, clustering and retrieving
content, but also adds complexity to basic legal inferential operations such as
interpretation, application, implementation, and enforcement. This means that there is a
need both for representation languages and for intermediate regulatory models to anchor
them into real settings and organisations. The assumption that laws are embedded in self-
contained documents where their semantics can be automatically or semi-automatically
extracted, applied, and eventually enforced does not hold if it is not complemented with
regulatory instruments especially tailored to blend compliance systems with their human
interfaces, uses and environments. It is our contention that this hybridation process
deserves a closer attention.
     This is not new, and there is a common awareness about the difficulties raised by
algorithmic governance and linked open data analysis in this field. Moving from a natural
language legal text to the respective set of machine-readable conditions is a real
challenge, still under development [52]. “Public information chains” [53] and the notion
of “near-compliance” [54] (applying strategies and tactics from the beginning, at the pre-
conceptual modelling process) have already been advanced to cope with human-machine
interfaces when privacy and public values, policies, and principles are at stake. The
European Legislation Identifier (ELI)26 fosters citizens’ participation in law-making and
regulations [60].
     After having examined the state of the art in law and the web of data [55], and the
regulation of big data [56], we would like to suggest the concept of Legal Compliance
through Design (LCtD) to complement LCbD by recognizing the role of social, political,
and economic conditions (as pre-conditions) and governance and ethical requirements
(as constraints) when designing legal compliance, encompassing norms and principles
that require a balancing of competing rights, obligations or policies.
     LCbD should be complemented by LCtD in these cases, as legal implementation and
compliance enactment is generally not only a technical issue but also a practical and
theoretical one. The relation between different meta-models lies at the core of this
approach: legal compliance cannot be comprehensively automated only by means of
normative and linguistic tools. Implementing rights raises the problem of defining
authority and democratic policies at the social and political level as well. Thus, ensuring
basic compliance with the legal requirement is only one part of the complexity of
designing an institutional compliance response. This brings about both advantages and

    26
         http://publications.europa.eu/mdr/eli/index.html




                                             45
     Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




some risks, because the evolving social conditions of interpreting, fixing, and
implementing the law should be taken into account and explicitly and separately
addressed in specific contexts and environments. In short, legal sources (sources of
authority), should not be confused with documentary resources. Sources require a
previous theoretical identification to build and enact the regulatory model. These
complexities can perhaps be better explained using an example:
     Generally national laws (parliamentary statutes or regulation adopted under such
statutes) require banks to identify and verify the identity of each customer by collecting
a person’s name and other identifying particulars and, depending on risks, verifying some
of all of these against government-issued documents or reliable data. That is what the
law requires. The management of the bank on the other hand must decide how the bank
should respond to that requirement. In cases where the national laws regarding customer
identification and verification were prescriptive banks sometimes decided that they wish
to go beyond the basic legal requirements and actually collect and verify more
information about each customer [57]. In some cases they did so as they thought that
what parliament requires is insufficient to mitigate their identity fraud risk. In other cases
they asked more information because they wanted to profile the customer for marketing
purposes [57]. Bankers looking at such a legal requirement may think: “This Act is 20
years old and predates mobile phones. If we interpret the requirements using the ‘spirit
of the law’ interpretational approach, we believe that Parliament in the context of today
would have required us to get the mobile number and that is why we require that from
the customer”. Another bank may say: “It is costly to collect and store information and
we will not ask mobile phone numbers as it is not required by the text of the Act” (i.e. a
literal interpretation). Practical challenges may also dictate how the management of a
bank would respond to such a legal requirement, for example where they may wish their
institutions to collect more data on each customer, but their dated IT systems do not allow
them to do that. They then have to settle for the time being for what is doable for them,
planning to implement what is desirable when the system is overhauled. [57] Fashioning
a CbD/CtD approach is therefore not only legal or regulatory compliance response to the
general interpretation of a legal text, but rather a process to embed the compliance
response elected by the particular institution.
     It is furthermore important to appreciate that automated or semi-automated legal
compliance is not simply compliance with the text of the requirement. It is instead
compliance with the conceptual models elicited or extracted out of several sources
through a knowledge-acquisition process that is not neutral, but a policy-driven set of
tasks. For example, customer identification and verification practices can support or
hinder a government policy of enhancing broader financial inclusion, especially of
persons from socially marginalised communities. In our example, the management of a
bank may or may not consider a public policy of financial inclusion when considering
how the bank should respond to the legal requirement of customer identification and
verification [58]. Their choice will affect the extracted regulatory model to be embedded
in the design process.
       Turning law into legal knowledge entails a previous step that has often been
incorporated into running systems as a necessary assumption. But decisions and their
underlying rationale should be elucidated and made explicit. The relevance of business
decisions around compliance responses should not be ignored. In short, in more complex
cases, especially where contending rights, obligations or policies are at play, a
compliance response is not merely a response to a legal/regulatory requirement, but to a
more complex set of variables that should be also elucidated and taken into account. This




                                             46
      Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




is related to institutional building and strengthening. Recognising the concept of LCtD,
and distinguishing it from LCbD, would enable designers to respond appropriately to
these complexities, when present.


Acknowledgments. Law and Policy Program of the Australian Government-funded Data to
Decisions Cooperative Research Centre (http://www.d2dcrc.com.au/); Meta-Rule of Law
DER2016-78108-P, Research of Excellence, Spain.


6. References

[1] Akhigbe, O., Amyot, D. and Richards, G., 2015, May. Information Technology Artifacts in the Regulatory
     Compliance of Business Processes: A Meta-Analysis. In International Conference on E-Technologies
     (pp. 89-104). Springer International Publishing.
[2] Loniewski, G., Insfran, E. and Abrahão, S., 2010. A systematic review of the use of requirements
     engineering techniques in model-driven development. 13th Conference on Model driven engineering
     languages and systems, Norwey, pp.213-227.
[3] Barrett, M.J., Cason, S.P., D'andria, K.M., Gearing, M.W., Ho, K.K.T., Miller, H.E., Paradis, R.D. and
     Woisard, E., International Business Machines Corporation, 2000. Compliance-to-policy detection
     method and system. U.S. Patent 6,029,144.
[4] Kogan, I., Kraskin, M. and Kanevskiy, B., Banker Systems, Inc., 2004. Rule compliance system and a rule
     definition language. U.S. Patent 6,820,069.
[5] Lohmann, N. 2013. Compliance by Design for Artifact-Centric Business Processes. Information Systems,
     Special section on BPM 2011 conference, 38 (4): 606–18. doi:10.1016/j.is.2012.07.003,
[6] Cleven, A., Winter, R., 2009. Regulatory compliance in information systems research–literature analysis
     and research agenda. Enterprise, Business-Process and Information Systems Modeling, pp.174-186.
[7] Ghanavati, S., Amyot, D. and Peyton, L., 2011, August. A systematic review of goal-oriented requirements
     management frameworks for business process compliance. In Requirements Engineering and Law
     (RELAW), 2011 Fourth International Workshop on (pp. 25-34). IEEE.
[8] Otto, P.N., Antón, A.I. Addressing Legal Requirements in Requirements Engineering. 15th IEEE
     International Requirements Engineering Conference (2007).
[9] Sakr, S., Awad, A. A framework for querying graph-based business process models. In Proceedings of the
     19th international conference on World wide web, pp. 1297-1300. ACM, 2010.
[10] Awad, A., Sakr, S., Elgammal., A. Compliance Monitoring as a Service: Requirements, Architecture and
     Implementation. In 2015 International Conference on Cloud Computing (ICCC), 1–7.
     doi:10.1109/CLOUDCOMP.2015.7149636.
[11] Harmon, P. 2016. The State of Business Process Management - A BPTrends Report.
     http://www.bptrends.com/bpt/wp-content/uploads/2015-BPT-Survey-Report.pdf.
[12] Awad, Ahmed, and Sherif Sakr. 2012. On Efficient Processing of BPMN-Q Queries. Computers in
     Industry 63 (9): 867–81. doi:10.1016/j.compind.2012.06.002.
[13] Gabbay, D., Horty, J., Parent, X., van der Meyden, R., van der Torre, L. (Eds.). 2013. Handbook of
     Deontic Logic and Normative Systems, UK: College Publications.
[14] Goedertier, S., Vanthienen, J. 2006. Designing Compliant Business Processes with Obligations and
     Permissions.” In Business Process Management Workshops, J. Eder and S. Dustdar (eds), 5–14. LNCS
     4103. Springer Berlin Heidelberg. http://link.springer.com/chapter/10.1007/11837862_2.
[15] Reisig, W. 1985. Petri Nets. Berlin, Heidelberg: Springer Berlin Heidelberg.
     http://link.springer.com/10.1007/978-3-642-69968-9.
[16] Sadiq, Shazia, and Guido Governatori. A methodological framework for aligning business processes and
     regulatory compliance. Handbook of business process management 2 (2009): 159-176.
[17] Athan, T., Governatori, G., Palmirani, M., Paschke,A., and Wyner, A. LegalRuleML: Design principles
     and foundations. In Reasoning Web International Summer School, pp. 151-188. Springer International
     Publishing, 2015.
[18] Governatori, G., Hashmi,M., Lam, H.P, Villata, S., and Palmirani, M. Semantic Business Process
     Regulatory Compliance Checking Using LegalRuleML. In Proc. of the 20th International Conference on
     Knowledge Engineering and Knowledge Management (EKAW2016).
[19] Abdullah, N.S., Sadiq, S.W. and Indulska, M., 2012, June. A Compliance Management Ontology:
     Developing Shared Understanding through Models. In CAiSE, LNCS 7328, Springer (pp. 429-444)




                                                    47
      Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




[20] Sheikhpour, R.; Modiri, N. (2012). An Approach to Map COBIT Processes to ISO/IEC 27001
     Information Security Management Controls, International Journal of Security and Its Applications 6 (2)
     April (13-18)
[21] Prasad, A., Green, P. and Heales, J., 2012. On governing collaborative information technology (IT): A
     relational perspective. Journal of Information Systems, 27 (1), pp.237-259.
[22] Mead, N.R., Stehney., T. 2005. Security Quality Requirements Engineering (SQUARE) Methodology.”
     In Proceedings of the 2005 Workshop on Software Engineering for Secure Systems—Building
     Trustworthy Applications, 1–7. SESS ’05. New York, NY, USA: ACM. doi:10.1145/1082983.1083214.
[23] Alva, A., Young, L. 2014. L-SQUARE: Preliminary Extension of the SQUARE Methodology to Address
     Legal Compliance. In 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements
     Engineering (ESPRE), 25–30. doi:10.1109/ESPRE.2014.6890524
[24] Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.. A systematic review of security
     requirements engineering. Computer Standards & Interfaces 32, no. 4 (2010): 153-165.
[25] Souag, A., Mazo, R., Salinesi, C., and Comyn-Wattiau, I. Reusable knowledge in security requirements
     engineering: a systematic mapping study. Requirements Engineering 21, no. 2 (2016): 251-283.
[26] Governatori, G., Indulska, M., zu Muehlen, M. Formal models of business process compliance. JURIX,
     Rotterdam (2009). http://www.governatori.net/talks/Jurix09tutorial.pdf
[27] Ceci, M., Al Khalil, F. O'Brien, L. 2016. Making Sense of Regulations with SBVR. In RuleML
     (Supplement).
[28] Ceci, M., Butler, T., O’Brien, L. and Al Khalil, F., Legal Patterns for Different Constitutive Rules., MIrel
     Project, 2017
[29] Sadiq, S, Governatori, G., Naimiri, K. (2007). Modelling of Control Objectives for Business Process
     Compliance. 5th International Conference on Business Process Management (BPM 2007). LNCS 4714.
     Springer, Heidelberg (2007), pp. 149–164.
[30] Boella, G., Di Caro, L., Humphreys, L., Robaldo, L., Rossi, P., van der Torre. L. Eunomos, a legal
     document and knowledge management system for the Web to provide relevant, reliable and up-to-date
     information on the law. Artificial Intelligence and Law 24, no. 3 (2016): 245-283.
[31] Boella, G., Tosatto, S.C., Ghanavati, S., Hulstijn, J., Humphreys, L., Muthuri, R., Rifaut, A., van der
     Torre, L., 2014. Integrating Legal-urn and Eunomos: Towards a comprehensive compliance management
     solution. In Casanovas et al., AI Approaches to the Complexity of Legal Systems. AICOL-2013. LNAI
     8929 (pp. 130-144). Springer, Berlin, Heidelberg.
[32] Boella, G., Janssen, M., Hulstijn, J., Humphreys, L. and Van Der Torre, L., 2013, June. Managing legal
     interpretation in regulatory compliance. In Proceedings of the Fourteenth International Conference on
     Artificial Intelligence and Law (pp. 23-32). ACM.
[33] Boella, G., Humphreys, L., Muthuri, R., Rossi, P., van der Torre, L. A critical analysis of legal
     requirements engineering from the perspective of legal practice. In Requirements Engineering and Law
     (RELAW), 2014 IEEE 7th International Workshop on, pp. 14-21. IEEE, 2014.
[34] Ghanavati, S., Amyot, D. , Rifaut, A., 2014, June. Legal goal-oriented requirement language (legal GRL)
     for modeling regulations. In Proceedings of the 6th international workshop on modeling in software
     engineering (pp. 1-6). ACM.
[35] Siena, A., Mylopoulos, J., Perini, A. and Susi, A., 2008, September. From laws to requirements. In
     Requirements Engineering and Law, 2008. RELAW'08. (pp. 6-10). IEEE.
[36] Siena, A., Perini, A., Susi, A. and Mylopoulos, J., 2009. A meta-model for modelling law-compliant
     requirements. In Requirements Engineering and Law (RELAW), 2009 Second International Workshop
     on (pp. 45-51). IEEE.
[37] Siena, A., Jureta, I., Ingolfo, S., Susi, A., Perini, A. and Mylopoulos, J., 2012. Capturing Variability of
     Law with Nómos 2. ER, 7532, pp.383-396.
[38] Iannella, R. et al. ODRL Vocabulary & Expression. W3C https://www.w3.org/TR/2017/WD-odrl-
     vocab-20170223/ [Working Draft 23 February 2017
[39] Gangemi, A., Presutti. V. Ontology design patterns. In Handbook on ontologies, pp. 221-243. Springer
     Berlin Heidelberg, 2009, pp. 221-243.
[40] Rodriguez-Doncel, V., Figueroa, M.S., Gómez-Perez, A., Villalon, M.P., "License linked data resources
     pattern". Proceedings of the 4th International Workshop on Ontology Patterns http://ceur-ws.org/Vol-
     1188/paper_7.pdf
[41] Rodríguez-Doncel, V., Santos, C., Casanovas, P., Gómez-Pérez, A. A Linked Term Bank of Copyright-
     Related Terms. In JURIX, IOS Press, Amsterdam, 2015, pp. 91-100.
[42] Gangemi, A., Peroni, S., Asprino, L.. The Role of Ontology Design Patterns in Linked Data Projects.
     Conceptual Modeling, I. Comyn-Wattiau et al. (Eds.), ER 2016, LNCS 9974, pp. 113–121.
[43] Gangemi, A., Alam, M., Asprino, L., Presutti, V., Recupero, D. R. Framester: A Wide Coverage
     Linguistic Linked Data Hub. In EKAW 2016, Bologna, Italy, November 19-23, 2016, Proceedings (pp.
     239-254). Springer, 2016.




                                                      48
      Proceedings of the 1st Workshop on Technologies for Regulatory Compliance




[44] Elgammal, A., Turetken, O., van den Heuvel, W.J. Papazoglou, M. On the formal specification of
     regulatory compliance: a comparative analysis. In International Conference on Service-Oriented
     Computing, ICSOC-2011, LNCS 7084, pp. 27-38. Springer, Heidelberg, 2011.
[45] Elgammal, A., Turetken, O., van den Heuvel, W.J.,Papazoglou, M. Formalizing and applying compliance
     patterns for business process compliance. Software & Systems Modeling 15, no. 1 (2016): 119-146.
[46] Christiaanse , R. Hulstijn, Control automation to reduce costs of control. In M. Indulska, Muehlen, M.
     Sadiq, S., Tan,Y.H (ed.) Proceedings of CAISE workshops – (GRCIS’2012), volume LNBIP XYZ, pages
     x – y. Springer Verlag, Berlin, 2012.
[47] Becker, J., Delfmann, P., Eggert, M. and Schwittay, S., 2012. Generalizability and applicability of model-
     based business process compliance-checking approaches—a state-of-the-art analysis and research
     roadmap. Business Research, 5(2), pp.221-247.
[48] Fellmann, M., Zasada, A. State-of-the-art of business process compliance approaches.. Osnabrück
     University, 2014 [Self-archive]
[49] Koops, J., Leenes, R. Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by
     design’ provision in data-protection Law, International Review of Law, Computers & Technology, 2014,
     28, 2: 159-171.
[50] Colesky, M., Hoepman, J. H., Hillen. A Critical Analysis of Privacy Design Strategies. In Security and
     Privacy Workshops (SPW), 2016 IEEE, pp. 33-40. .
[51] Gordon, T.F., Governatori, G. and Rotolo, A. Rules and norms: Requirements for rule interchange
     languages in the legal domain. In International Workshop on Rules and Rule Markup Languages for the
     Semantic Web, pp. 282-296. LNCS 5858. Springer Berlin Heidelberg, 2009.
[52] Dragoni M, Villata S, Rizzi W, Governatori G. Combining NLP Approaches for Rule Extraction from
     Legal Documents. In1st Workshop on MIning and REasoning with Legal texts (MIREL 2016) 2016 Dec.
[53] Fokkema W., Hulstijn. J. Process compliance in public information chains. In Proceedings of the Tenth
     Conference on Electronic Government (EGOV 2011) LNCS 5184, pp. p. 223-230 Springer, Hidelberg,
     2011.
[54] Colesky, M. and Ghanavati, S., 2016, September. Privacy Shielding by Design—A Strategies Case for
     Near-Compliance. In Requirements Engineering Conference Workshops (REW), IEEE International (pp.
     271-275). IEEE.
[55] Casanovas, P., de Koker, L., Mendelson, D., Watts, D. Regulation of Big Data: Perspectives on Strategy,
     Policy, Law and Privacy’ (2017). Health and Technology, 1-15; La Trobe Law School - Law & Justice
     Research Paper Series Paper No. 1712. Available at SSRN: https://ssrn.com/abstract=3035675
[56] Casanovas, P., Palmirani, M., Peroni, S., van Engers, T., Vitali, F. Special Issue on the Semantic Web
     for the Legal Domain Guest Editors’ Editorial: The Next Step. Semantic Web Journal, vol. 7, 2 (2016):
     213-227.
[57] De Koker, L. and Symington, J. Conservative corporate compliance: Reflections on a study of
     compliance responses by South African banks. Law Context: A Socio-Legal J., 2014, 30, p. 228.
[58] De Koker, L. Aligning anti-money laundering, combating of financing of terror and financial inclusion:
     Questions to consider when FATF standards are clarified. Journal of Financial Crime, 2011, 18
     (4), pp.361-386.
[59] Eickman, T.J. The evaluation of modern roundabouts as an alternative to signalized and two-way stop
     controlled intersections in a urban and rural environment (Doctoral dissertation, Montana State
     University-Bozeman, College of Engineering, 2004).
[60] Schmitz, P., Francesconi, E., Landercy, S.P., Batouche, B. and Touly, V. A Knowledge Organization
     System for e-Participation in Law-Making. ICAIL ’17, June 12-16, 2017, London, UK, ACM. DOI
     10.1145/3086512.3086539.




                                                     49