<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Legal Compliance Through Design: Preliminary Results of a Literature Survey</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mustafa Hashmi</string-name>
          <email>fmustafa.hashmig@data61.csiro.au</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pompeu Casanovas</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Louis de Koker</string-name>
          <email>l.dekokerg@latrobe.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Data to Decisions Cooperative Research Centre</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Data61, CSIRO</institution>
          ,
          <addr-line>41 Boggo Road, Dutton Park, QLD-4106</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Federation University</institution>
          ,
          <addr-line>Brisbane QLD-4000</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Institute of Law and Technology, Autonomous University of Barcelona</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>La Trobe Law School, La Trobe University</institution>
          ,
          <addr-line>Melbourne</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
      </contrib-group>
      <fpage>59</fpage>
      <lpage>72</lpage>
      <abstract>
        <p>In this paper we present the preliminary results of a literature survey conducted in the context of a larger research project on legal compliance by design (LCbD) and legal compliance through design (LCtD). Even though a rich set of approaches and frameworks are available, our analysis shows that there is less focus on legal compliance in general, and LCbD and LCtD in particular. The technical literature on compliance has been concentrated on speci c aspects of the law, i.e. mainly on those related to corporate and administrative management (including those of law rms and government). Other legal dimensions such as public law, case law, constitutional, virtual ethics etc., have been put aside.</p>
      </abstract>
      <kwd-group>
        <kwd>Law and regulations</kwd>
        <kwd>legal dimensions</kwd>
        <kwd>regulatory com- pliance</kwd>
        <kwd>legal compliance by design</kwd>
        <kwd>legal compliance through design literature survey</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Legal compliance requirements increased signi cantly in recent years.
Environmental concerns, consumer protection, global standard-setting and the political
and social fall-out of large corporate failures, e.g., WorldCom6, Enron7, and the
Global Financial Crisis are some examples of drivers of increased regulatory
complexity. Legislation such as the Sarbanex-Oxley Act [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] and the Foreign
Account Tax Compliance provisions of the US [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and voluntary frameworks such
as the Basel III Accord of the Basel Committee on Banking Supervision [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] are
examples of regulatory responses that have had a global impact on compliance
practices of a ected institutions.
The impact of these compliance requirements captured the interest of a wider
research community as is evident in projects such as COMPAS8, OPENLAW9, EU
Cases10,, etc.
      </p>
      <p>
        Essentially, these projects have been addressing compliance from the regulatory
perspective, which can be understood broadly as \the act and process of ensuring
adherence to the law". Compliance management requires the identi cation of
relevant compliance requirements, the design of processes to ensure compliance
with those requirements and the monitoring of actions to ensure that policies
and processes are appropriately implemented and result in actual compliance.
These compliance projects, however, focused mainly on \discovering, extracting
and representing di erent requirements from laws and regulations that a ect
a business process" [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In addition, they focused on simpler { often binary {
requirements rather than the more complex, value-based requirements. In other
words, existing e orts primarily focus on the identi cation and management of
formal { generally simpler - compliance requirements related to corporations and
public agencies.
      </p>
      <p>
        The term \compliance"11 is however far broader. It is not con ned to compliance
with the law but extends to compliance with ethical and societal norms and
nonbinding soft law such as industry standards and codes. Compliance responses are
therefore more granular regarding the various dimensions of rules and regulations,
for example the social, organizational, ethical, legal, e ectiveness, implementation,
and the validity of legal requirements as discussed in the legal quadrant of the
rule of law [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The legal quadrant has been drawn from a socio-legal approach.
It shows how the type, degree and quality of compliance leans on the di erent
regulatory values of the instruments included in the four di erent sections of the
quadrant (hard law, policies, soft law, and ethics) (see Figure 2(b)).
      </p>
      <p>
        Compliance refers to conformity with rules, i.e. ful lling requirements or
demonstrating conformity with regulatory constraints in an ethical and responsible
manner. Compliance by Design (CbD) refers broadly to the set of formalised rules
that are considered in the design stage of a business or regulatory process. Legal
compliance by design (LCbD) is another general term that is mainly focused on the
legality of the compliant business process as a whole. Compliance through Design
(CtD), on the other hand, explicitly encompasses the social and institutional
aspects of legal compliance (i.e. legal interpretation processes, institutionalization,
the interface between modelling and coordination, and the relation between the
regulated entity and citizens, consumers, and the law). This approach requires us
to view the legal compliance challenge through a socio-legal lens to understand
and properly de ne appropriate compliance responses. By incorporating the
socio8 http://cordis:europa:eu/fp7/ict/ssai/docs/finalreport-compas:pdf
9 https://info:openlaws:com/openlaws-eu/
10 http://eucases:eu/start:html
11 Di erent expressions and approaches can be found in the current literature on
compliance, according to di erent elds and purposes, with di erent meanings |
mainly Compliance (C), Regulatory Compliance (RC), Compliance by Detection
(CbDt), Compliance by Design (CbD), and Legal Compliance by Design (LCbD) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
legal aspect into the compliance problem LCtD takes the compliance problem to
a whole new level of complexity while promising a more appropriate, ethical and
responsible response to complex compliance requirements.
      </p>
      <p>
        In our previous survey [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], we brie y touched upon the LCbD and LCtD,
and focused on how these have been discussed in literature to extract, analyse,
represent and validate the legal requirements from a technical perspective. In
this paper, we succinctly present the analysis of results of existing literature that
cover social, ethical, and institutional dimensions to determine to what extent
legal compliance challenges are approached holistically.
      </p>
      <p>The structure of the paper is as follows: next we discuss related work (Section 2)
followed by a precise elaboration on the research methodology (Section 3). Then
clustering of the legal terms required for LCbD and LCtD and preliminary results
are discussed (Section 4) before concluding the paper with some nal remarks
and pointers for future research (Section 5).
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Existing literature on regulatory compliance is diverse, pointing to the fact that
it is a complex topic having deep roots in the compliance domain. However, this
literature is often not focused on the interpretation of the rules regulating the
relevant business processes [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] thus has restricted scope in terms of validity of the
legal requirements used for their veri cation. There are di erent uses of `regulatory
compliance' in the literature. We can group them into two sets. The rst one
points to the conformity of business processes with (i) internal corporate policies
and protocols, (ii) external policies and technical standards (e.g. ISOs, W3C, etc.),
(iii) legal requirements (as a whole), (iv) ethical values (as a whole: deontological
principles or civic virtues), and (v) privacy and data protection requirements (e.g.
fair information practices or, lately, GDPR constraints). The second one refers to
formalised rules after the extraction process, i.e. the automated attribution of
regulatory e ects to certain conditions, requirements or constraints previously
de ned.
      </p>
      <p>Essentially, compared to regulatory compliance, legal compliance is more
granular and have a wider scope for the law to be e ectively implemented.
It encompasses a di erent approach focusing on the implementation of legal
provisions instead of business processes, policies, or principles. There can be a
number of e ective ways of complying with the law but some may be inappropriate
as they are too costly for the business or may have a negative impact on society (e.g.
exposing data to risk). Compliance o cers need to choose the most appropriate
option that is more e cient (cost-wise) and does the least damage (to the entity
and to society). Hence we identi ed eight distinct dimensions (such as hard
law, soft law, policies, and ethics etc.) of legal compliance describing various
aspects that need to be considered when automating the compliance function.
Based on these dimensions, we clustered the available literature into various
classes to gain more understanding on these dimensions. Despite the fact that the
state-of-the-art provides a rich set of approaches and frameworks there is clearly
less focus on legal compliance in general, and LCbD and LCtD { in particular.
Thus, we learned from these approaches and developed a di erent interpretive
framework.</p>
      <p>
        The authors in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], surveyed the rule-based system speci cations modelling
approaches in the context of the semantic web. [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] tries to understand the
relationships between risk management and internal controls to guide the research
agenda in business process risk management, compliance and internal controls. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
studies the existing compliance approaches for extracting the required information
for modelling requirements. In the context of the COMPAS Project [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], the
authors provide an overview of the state-of-the-art in compliance languages with
the emphasis on languages for regulatory and legislative provisions. Their survey
identi es various aspects of compliance, discovery, modelling and reporting.
      </p>
      <p>
        In contrast, [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] studies the challenges faced by the industry and available
solutions. Their survey focuses on the reluctance to address the compliance
problem in the industry sectors and shortcomings of the available solutions. A
rather similar survey on the practice of regulations analysis from an Information
System and eGovernment Services perspective is reported in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        The survey in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], on the other hand, focuses on how modelling languages
are used to align the compliance requirements with business processes. Their
work is somewhat similar to the survey presented in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, this work
focuses on the security policies, trust management in the context of privacy and
inter-organisational compliance requirements modelling. In contrast, [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] surveys
formal languages for modelling business process compliance requirements with the
focus on design-time compliance, and highlight the capabilities and limitations
of the surveyed languages chosen from temporal and deontic families of logics.
Their survey is somewhat similar to the work of [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] and [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] where authors
survey existing compliance approaches for extracting information to representing
normative requirements.
      </p>
      <p>
        An evaluation of functional and non-functional capabilities of compliance
management frameworks in the context of business process compliance has been
reported in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Their evaluation is based on three assessment criteria, namely:
(i) compliance management solutions, (ii) methodology, and (iii) architecture
of the evaluated compliance solutions. The authors evaluate various functional
areas of regulatory compliance from a business process management perspective,
e.g., the strategy model and the business process model etc. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], on the other
hand, present a literature review based on the generalisability and applicability
of business process frameworks. They only cover the implementation results of
the surveyed frameworks.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] surveys the dominant trends and issues in business compliance over four
dimensions, namely: (a) variables of general business process modelling (for
example, information, location, resources), (b) temporal aspects of process modelling,
and (c) the distinction between formal approaches based on veri cation or
validation. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], on the other hand, analyse business literature from a risk management
perspective. These include risks such as regulatory non-compliance, nancial
frauds, natural disasters, and data leakages to name but a few. In contrast, [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
systematically investigates the holistic view of security in process-aware
information systems along the process life cycle and the type of actions. However, both
surveys put aside regulatory compliance. They exclude in particular approaches
to representing and checking the compliance of regulatory frameworks thus have
a di erent scope. More recently, [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] examined whether existing compliance
management frameworks (CMFs) are able to provide modelling and reasoning
support for various types of normative requirements. They primarily examined
the conceptual foundations of the selected CMFs against pre-de ned evaluation
criteria and the obligation modalities representing various classes of normative
requirements.
      </p>
      <p>Summing up, existing surveys focus mainly on business processes and regulatory
systems. Even those that are more centred on legal services appraise the market
dimension. They do not encompass a broader socio-legal or public aspect.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Literature Methodology</title>
      <p>This survey aims to gain a detailed understanding of the current literature
in the legal compliance domain, investigate how legal compliance is perceived
in literature, identify the areas where legal compliance needs to be correctly
understood, and identify future challenges in regards to LCtD. To achieve this, in
the ongoing work, we will address a main research question: what are the main
characteristics of legal compliance through design (LCtD)? And to gain deeper
insights about legal compliance, we propose two sub-questions: (a) what are the
di erences and similarities between legal compliance by design and regulatory
compliance, and (b) what are the gaps in the existing compliance regime required
to be lled for a successful (semi-) automation of the compliance function?
With the proposed questions, we aim to determine the main characteristics of
legal compliance through design (LCtD ) from a social, ethical and institutional
perspective, which is required to assess the validity of legal requirements, so that
they can adequately re ect the overall compliance problem.</p>
      <p>
        To achieve this, we systematically surveyed a large corpus of existing
literature on regulatory compliance. We began by scrutinizing several structured
literature survey approaches mainly from requirements engineering techniques
for model-driven development [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], software engineering [
        <xref ref-type="bibr" rid="ref21 ref22">22,21</xref>
        ] and information
systems [
        <xref ref-type="bibr" rid="ref31 ref5">31,5</xref>
        ], and adopted a hybrid systematic literature review approach
comprising the hermeneutic circle and the guidelines for conducting literature review
proposed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. We adopted hermeneutic circles as it allowed us to conduct
systematic literature surveys by applying more rigorous methods when searching
for literature compared to the structured surveys (see,[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for shortcoming of
structured literature surveys). The guidelines proposed by [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], on the other hand,
provide a multi-phased methodology as illustrated in Figure 1, to extract, analyze,
and report literature; and embeds a number of tools and procedures within each
phase to manage the related e orts.
ltssooooupp litsseyaanh lifrrtteeaou
T
sssceer
o
P
ts/ tsu
Inpu tupO
      </p>
      <p>Adobe Acrobat
Professional</p>
      <p>JEBREF
PHASE 1:
Identi cation
and Extraction
of Articles</p>
      <p>PHASE 2:
Preparing
for Analysis</p>
      <p>NVIVO
PHASE 3:
Actual Coding
Relevant
Databases</p>
      <p>JebRef
Library</p>
      <p>Primary &amp;
Secondary
Papers</p>
      <p>Proposed High Level
Pre-Condi cation</p>
      <p>Scheme</p>
      <p>Sources</p>
      <p>Tree-Level
Nodes</p>
      <p>Coded
Content</p>
      <p>PHASE 4:
Analysis and
Write-up
Literature
Review
Report</p>
      <p>We conducted our survey in three phases namely: (i) identi cation and
extraction of articles, (ii) preparation for analysis and coding, and (iii) analysis and
write-up.</p>
      <p>Phase-1 (Identi cation and extraction of articles): The literature identi cation
and extraction process started by querying prominent scholarly databases
such as Google Scholar, SpringerLink, ScienceDirect, ACM Digital Library, Web
of Science, IEEEXplore and free search database DBLP with the keywords to
extract literature related to the scope of our survey. To this e ect, we rst
identi ed a list of terms, concepts, and keywords related to the questions
such as \legal compliance", \law enforcement", \hard law", \legal compliance
management" to name a few, and then combined the identi ed terms by using
logical operators to restrict our search right from the beginning to compliance
publications. Moreover, we observed that there are several concepts/terms
that are used in literature representing the same themes|for example,
\conformance" for \compliance", and therefore we also included them in the
search queries. Our queries resulted in more than 100 hits each time but
to keep the collected literature manageable, we employed various ltering
techniques such as proximity operators and lemmatization to ne grain our
search results. We collected 324 articles highly related to the questions of our
survey. We then created a JabRef12 library containing all the collected 324
articles in portable document format (PDF).</p>
      <p>
        Phase-2 (Preparing for analysis and coding)13: In the next phase, we prepared
the collected literature for actual coding and analysis in later stages. The
preparation was carried out in two sub-phases. In the rst sub-phase, a
rigorous assessment of each collected article following the guidelines from [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
was conducted. This sub-phase aimed to ensure that the collected articles
are relevant, credible, and of high quality. It involved assessing the quality of
the article by looking at its contents, identifying di erences and similarities
12 http://www:jabref:org/
13 Phase 2 and Phase 3 of the adopted approach [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] are complementary to each other
hence, we combined them into one phase.
between articles and recording them. Also, we evaluated the traction that the
article has received using the Google Scholar citation index. This allowed us
to ascertain the scienti c relevance and impact of the article. The described
procedure resulted in discarding 35 articles and selecting 289 articles for the
nal analysis.
      </p>
      <p>
        In the preparation phase for the actual coding, we derived a pre-codi cation
protocol addressing the main goals of the survey according to the criteria
described in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In this step, we rst de ned (and collected the commonly
used) de nitions of the concepts which helped us to align such de nitions
with the main concepts/themes of the clustering created at an earlier stage.
In addition, we also gained a thorough understanding of the objectives and
key concepts and their relevant characteristics (as de ned in the clustering)
in order to better position our survey among mainly focusing regulatory
compliance. After this, we started actual coding of the collected literature
using a qualitative analysis tool NVivo 12 plus (version 12.2.0.443) on an Intel
5 Core 2.00 GHz machine. The objective of coding was to gain more insights
from the collected articles about speci c concepts, terms or themes. For the
coding purpose, we used a sample of mostly commonly used concepts from
the clustering and created 126 nodes across 4 main themes namely: ethics,
hard law, soft law and policy each with varied level of hierarchy. We did not
consider creating the coding depth more than 5 levels of hierarchy to keep
the complexity of the analysis manageable.
      </p>
      <p>Phase-3 (Analysis and write-up): In the nal phase, we analysed the coded concepts
and derived the descriptive overview of the selected literature, painting a
more vivid picture of the overall status of the compliance domain. In addition,
to gain deeper insights, we also analysed the relationships between various
concepts|and/or even across the concepts and themes. In addition, we
applied matrix interaction|a boolean search to evaluate the correlation
between di erent passages and coded themes to detect if some theme had
been already coded. This helped us to remove redundancies and achieve a
clean analysis for nal a write-up.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Clustering and Analysis Results</title>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] posited that (semi-) automated legal compliance is not merely
complying with the applicable text of the requirements but complying with
the conceptual models extracted from various sources covering a multitude of
requirements stemming from various social, political and legal aspects such as
negotiations, compromises, agreements, privacy, institutional power etc.
Essentially, this re ects that legal compliance has a strong relation with these aspects.
Hence, the role of social, political and economic conditions (as pre-conditions),
and governance and ethical requirements and enactment processes for the rule of
law must be aligned when designing legal compliance systems to achieve LCtD.
However, in the context of legal compliance, there is a limited understanding
of which legal concepts are relevant for deploying the rule of law. To address
      </p>
      <p>
        Fig. 2: Legal quadrant and clustering of legal concepts
(a) fragment of clustering; and (b) legal quadrant of rule of law [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ];
this|in the context of our survey, we clustered14 365 distinct legal concepts
and terms divided across 8 sub-sets of concepts as illustrated in Figure 2(a).
The clustering is based on the legal quadrant for the rule of law [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] comprising
the notion of implementation of the rule of law which involves concepts such as
binding power, social dialogue, privacy and trust, sanctions etc.|and sources
for the validity of the legal norms (i.e., legality) that emerge from four di erent
types of regulatory sources|hard law, policy, soft law, and ethics|with some
distinctive properties15.
      </p>
      <p>The developed clustering provided the basis for a deeper analysis to map and
frame the pre-processed literature on legal and regulatory compliance. We created
126 nodes in NVivo software for coding purposes from 40 important and most
commonly used legal terms selected from 8 sub-sets of the clustering. The intuition
behind coding was to know how these concepts have been used in the literature
and investigate their relationships. We applied a number of coding strategies and
compared various nodes representing legal concepts through di erent mapping
schemes such as one-to-one mapping, symmetrical and association etc., to study
the correspondence between them and degree of relationship, if any. Figure 3
illustrates the example of coding comparison of legal concepts related to hard
law. We created a coding comparison matrix for each sub-set of legal concepts
for example ethics, policy and soft law etc.</p>
      <p>
        For each coding we used the Pearson's correlation coe cient [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] `r' to measure
the strength of the relationship (linear correlation) between legal concepts that
14 Due to con dentiality reasons we only provide a short explanation and fragment of
the clustering.
15 As the detailed discussion on the legal quadrant is out of the scope of this paper, we
refer interested readers to [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ] for further details.
appear in the matrix. The value of association `r' varies between 1 r +1 [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ],
where +1 is positive linear correlation, 0 is neutral or no linear correlation, and
1 is negative linear correlation.
      </p>
      <p>The Pearson correlation coe cient for the sample data set is computed as:
r = rxy =
n P xiyi</p>
      <p>P xi P yi
pn P x2
i
(P xi)2pn P yi2
(P yi)2
where x is the sample size; and xiyi are the individual sample points indexed
with i. Figure 3 illustrates, the correlation (strength) of relationship of various
legal concepts in hard law that tends to be positive; for example, the Pearson
correlation for judicial systems and case law r = 1; and for acts and enforcement
is r = 0:66575 which clearly indicates that these terms have signi cant relevance
to the implementation of the rule law.</p>
      <p>
        In contrast, we employed Jaccard's coe cient [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] to compare the similarity,
diversity, and distance of the legal concept from the selected sub-sets in the
collected literate to understand which and how frequently a legal concept had
been discussed in the collected literature. The Jaccard's similarity coe ent and
distance for the sample are computed as:
      </p>
      <p>J =</p>
      <p>M10</p>
      <p>M01 + M10 + M11
where M11 is the total number of attributes with both attributes having the
same value 1; M01 is the total number of attributes with attribute of A is 0, and
attribute of B is 1; M10 is the total number of attributes with attribute of A is
(1)
(2)
dj = 1</p>
      <p>J
(3)
Figure 3 illustrates that several legal terms have been discussed in the literature
in the context of hard law but the density of their appearance varies. For example,
the concept of judicial system and case law has been more discussed (J = 0:571429)
compared to acts and enforcement (J = 0:138462) and sanctions and enforcement
(J = 0:090909), respectively. In measuring the presence of several legal concepts
in hard law, we noted 52% of 106 coded concepts had 0 similarity index, which
means these concepts have not been discussed in the analysed literature.</p>
      <p>Figure 4 re ects the overall results of the analysis of collected literature across
the four themes of the legal quadrant. Figure 4(a) exhibits that for the most,
legal concepts have a strongly positive relation with the 1541 references16 found
in literature, which re ects their signi cance for the implementation of the rule of
law, and only a few concepts exhibit a negative relation. However, legal concepts
in the context of hard law have been only marginally considered in existing
literature. This means that the fundamental interpretative procedures, liberties,
and constitutional principles (e.g., proportionality, interpretation, and reasonable
standard) are scarcely cited, because the technical literature mainly focuses on
the relevant aspects of CbD for business process management.</p>
      <p>In contrast Figure 4(b) and Figure 4(c), respectively, provide interesting results
for both the strength and appearance of the legal concepts for ethics and policy
where several concepts in the context of ethics have not been considered, and
the degree of relationship for the legal concepts for policy is signi cantly weak
compared to hard law. For example, we observed that virtue ethics, which are
a fundamental pillar for political theories of republicanism, is put aside. Again,
authors prioritize the principle of what is relevant for the elds in which CbD is
developed.</p>
      <p>Finally, Figure 4(d) also exhibit somewhat mixed results for soft law which
shows a slightly higher degree of relationship between various terms/concepts
but less presence in the literature. Essentially, our literature analysis results
validate that the existing body of knowledge does not fully cover majority of the
concepts/themes that are important to properly address the legal compliance
problem in general, and legal compliance by design (LCbD) and through design
(LCtD) |in particular.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        In this follow-up paper of the pre-survey that we carried out on regulatory and
legal compliance [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], we tested the idea that legal compliance and LCtD have a
broader scope and complexity than regulatory compliance and LCbD. We do not
16 Here references refer to the number of times the term has been referred in various
articles.
d
) n d
c
( a n
      </p>
      <p>a
e L
r
J is</p>
      <p>)
n c</p>
      <p>(
p h</p>
      <p>t
4 x
. e
view them as discrete categories, but as an overlapping conceptual continuum.
The formalisation of legal compliance is possible, but through institutional
regulatory models bringing together both machine and human interfaces. There
is however still some work to be done. The link between concepts stemming from
the practical dimension (such as legal services, legal professions, law rms etc.)
and the normative and institutional one (legal norms and systems) should be
better known and understood, as technological studies have tended to prioritize
market-driven strategies over the social construction of a public space. In future
works we will address the overlaps between LCtD and LCbD, explaining the added
complexity of LCtD both from the public and private domains. We will reformulate
the problem as a challenge stemming not only from regulatory systems but also
from the broader spectrum of the rule of law in order to develop new functional,
conceptual and computational models for interpreting, representing and (semi-)
automating compliance.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This research was partially funded by the Australian Government-funded Data
to Decisions Cooperative Research Centre (http://www:d2dcrc:com:au/), and
Meta-Rule of Law (DER2016-78108-P, Spain). Views expressed herein are not
necessarily representative of the views held by the funders.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Basel Committee on Banking Supervision, Basel III:
          <article-title>A global regulatory framework for more resilient banks and banking systems, Bank for International Settlements (</article-title>
          <year>2010</year>
          , revised in
          <year>2011</year>
          ). https://www.bis.org/publ/bcbs189.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <article-title>Hiring incentives to restore employment act, pub</article-title>
          . l. no.
          <issue>111-147</issue>
          , 124 stat 71 (
          <year>2010</year>
          )
          <article-title>(adding internal revenue code (irc</article-title>
          ) xx
          <fpage>1471</fpage>
          -1474;
          <fpage>6038d</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Abdullah</surname>
            ,
            <given-names>N.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Indulska</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Emerging challenges in Information Systems Research for Regulatory Compliance Management</article-title>
          .
          <source>In: Proceedings of CAiSE'10</source>
          . pp.
          <volume>251</volume>
          {
          <fpage>265</fpage>
          . Springer-Verlag (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Akhigbe</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amyot</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richards</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Information technology artifacts in the regulatory compliance of business processes: A meta-analysis</article-title>
          . In: Benyoucef,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Weiss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Mili</surname>
          </string-name>
          , H. (eds.) E-Technologies. pp.
          <volume>89</volume>
          {
          <fpage>104</fpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bandara</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miskon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fielt</surname>
          </string-name>
          , E.:
          <article-title>A systematic, tool-supported method for conducting literature reviews in information systems</article-title>
          .
          <source>In: 19th European Conference on Information Systems, ECIS</source>
          <year>2011</year>
          , Helsinki, Finland, June 9-11,
          <year>2011</year>
          . p.
          <volume>221</volume>
          (
          <year>2011</year>
          ), http://aisel:aisnet:org/ecis2011/221
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delfmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eggert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schwittay</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Generalizability and Applicability of Model-Based Business Process Compliance-Checking Approaches { A State-of-the-Art Analysis and Research Roadmap</article-title>
          . BuR - Business
          <source>Research Journal</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <volume>221</volume>
          {
          <fpage>247</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Boell</surname>
            ,
            <given-names>S.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cecez-Kecmanovic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Literature reviews and the hermeneutic circle</article-title>
          .
          <source>Australian Academic &amp; Research Libraries</source>
          <volume>41</volume>
          (
          <issue>2</issue>
          ),
          <volume>129</volume>
          {
          <fpage>144</fpage>
          (
          <year>2010</year>
          ). https://doi.org/10.1080/00048623.
          <year>2010</year>
          .
          <volume>10721450</volume>
          , https://doi:org/10:1080/ 00048623:2010:
          <fpage>10721450</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shahmehri</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duma</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olmedilla</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejdl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baldoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baroglio</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martelli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coraggio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peer</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fuchs</surname>
            ,
            <given-names>N.E.</given-names>
          </string-name>
          :
          <article-title>Rulebased Policy Speci cation: State of the Art and Future Work</article-title>
          .
          <source>Rewerse project report-i2-d1</source>
          ,
          <article-title>Universita di Napoli Fedrecio II (</article-title>
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cabanillas</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Resinas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz-Cortes</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On the identi cation of data-related compliance problems in business processes</article-title>
          .
          <source>In: Jornadas Cient co-Tecnicas En Servicios Web Y SOA (JSWEB'10)</source>
          . vol.
          <volume>1</volume>
          , pp.
          <volume>89</volume>
          {
          <fpage>102</fpage>
          .
          <string-name>
            <surname>Valencia</surname>
          </string-name>
          , Espan~a (
          <issue>09</issue>
          /
          <year>2010</year>
          2010)
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Casanovas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Semantic web regulatory models: Why ethics matter</article-title>
          .
          <source>Philosophy and Technology</source>
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <volume>33</volume>
          {
          <fpage>55</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Casanovas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Linked Democracy, chap. Socio-legal ecosystems and the rule of law</article-title>
          . Cham: Springer Briefs (
          <year>2019</year>
          ), [In Press]
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Casanovas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gonzalez-Conejero</surname>
          </string-name>
          , J., de Koker, L.:
          <article-title>Legal compliance by design (lcbd) and through design (lctd): Preliminary survey</article-title>
          .
          <source>In: Proceedings of the 1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX</source>
          <year>2017</year>
          ), Luxembourg, December
          <volume>13</volume>
          ,
          <year>2017</year>
          . pp.
          <volume>33</volume>
          {
          <issue>49</issue>
          (
          <year>2017</year>
          ), http://ceur-ws:org/ Vol-2049/05paper:pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>COMPAS-Project: D2.1 State-of-the-art in the eld of compliance languages|Compliance-driven Models, Languages, and Architectures for Services</article-title>
          .
          <source>Deliverable D2.1v1.0</source>
          ,
          <string-name>
            <surname>Tilburg</surname>
            <given-names>University</given-names>
          </string-name>
          , The Netherlands (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>El Kharbili</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Business Process Regulatory Compliance Management Solution Frameworks:A Comparative Evaluation</article-title>
          .
          <source>In: APCCM 2012</source>
          . pp.
          <volume>23</volume>
          {
          <issue>32</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Elgammal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turetken</surname>
          </string-name>
          , O., van den Heuvel, W.J.,
          <string-name>
            <surname>Papazoglou</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>On the Formal Speci cation of Regulatory Compliance: A Comparative Analysis</article-title>
          .
          <source>In: Proceedings of ICSOC'10</source>
          . pp.
          <volume>27</volume>
          {
          <issue>38</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fellmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zasada</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>State-of-the-Art of Business Process Compliance Approaches</article-title>
          .
          <source>In: Proceedings of European Conference on Information System (ECIS'14)</source>
          . Tel Aviv,
          <string-name>
            <surname>Israel</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hashmi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
          </string-name>
          , G.:
          <article-title>Norms Modelling Constructs for Business Process Compliance Management Frameworks: A Conceptual Evaluation</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          Journal pp.
          <volume>1</volume>
          {
          <issue>55</issue>
          (
          <year>2017</year>
          ). https://doi.org/10.1007/s10506-017-9215-8
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Hashmi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>H.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
          </string-name>
          , M.T.:
          <article-title>Are we done with business process compliance: state of the art and challenges ahead</article-title>
          .
          <source>Knowledge and Information Systems</source>
          <volume>57</volume>
          (
          <issue>1</issue>
          ),
          <volume>79</volume>
          {133 (Oct
          <year>2018</year>
          ). https://doi.org/10.1007/s10115-017-1142-1, https://doi:org/10:1007/s10115-017-1142-1
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Jaccard</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Distribution de la ore alpine dans le bassin des dranses et dans quelques regions voisines</article-title>
          .
          <source>Bull Soc Vaudoise Sci Nat</source>
          <volume>37</volume>
          ,
          <issue>241</issue>
          {
          <fpage>272</fpage>
          (
          <year>1901</year>
          ), https: //ci:nii:ac:jp/naid/10027880482/en/
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kirch</surname>
          </string-name>
          , W. (ed.):
          <article-title>Pearson's Correlation Coe cient</article-title>
          , pp.
          <volume>1090</volume>
          {
          <fpage>1091</fpage>
          . Springer Netherlands, Dordrecht (
          <year>2008</year>
          ), https://doi:org/10:1007/
          <fpage>978</fpage>
          -1-
          <fpage>4020</fpage>
          -5614-7 2569
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kitchenham</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Procedure for peforming systematic reviews</article-title>
          .
          <source>Technical Report TR/SE-401</source>
          , Software Engineering Group, Department of Computer Science, Keele University, Keele UK (
          <year>July 2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kitchenham</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brereton</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A systematic review of systematic review process research in software engineering</article-title>
          .
          <source>Information and Software Technologytr</source>
          <volume>55</volume>
          (
          <issue>12</issue>
          ),
          <year>2049</year>
          {
          <year>2075</year>
          (
          <year>2013</year>
          ). https://doi.org/https://doi.org/10.1016/j.infsof.
          <year>2013</year>
          .
          <volume>07</volume>
          .010
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A systematic review on security in Process-Aware Information Systems { Constitution, challenges, and future directions</article-title>
          .
          <source>Information and Software Technology</source>
          <volume>56</volume>
          (
          <issue>3</issue>
          ),
          <volume>273</volume>
          {
          <fpage>293</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Loniewski</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Insfran</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , Abrah~ao,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>A systematic review of the use of requirements engineering techniques in model-driven development</article-title>
          . In: Petriu,
          <string-name>
            <given-names>D.C.</given-names>
            ,
            <surname>Rouquette</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Haugen</surname>
          </string-name>
          , . (eds.)
          <source>Model Driven Engineering Languages and Systems</source>
          . pp.
          <volume>213</volume>
          {
          <fpage>227</fpage>
          . Springer Berlin Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Otto</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anton</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Addressing Legal Requirements in Requirements Engineering</article-title>
          .
          <source>In: Proceedings of RE'07</source>
          . pp.
          <volume>5</volume>
          {
          <fpage>14</fpage>
          . IEEE Computer Society (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Rikhardsson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Best</surname>
            ,
            <given-names>P.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Green</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosemann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Business Process Risk Management and Internal Control: A proposed Research Agenda in the context of Compliance and ERP systems</article-title>
          . In: Second Asia/Paci c Research Symposium on Accounting Information Systems. Melbourne (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Steele</surname>
            ,
            <given-names>J.M.:</given-names>
          </string-name>
          <article-title>The Cauchy-Schwarz Master Class: An Introduction to the Art of Mathematical Inequalities</article-title>
          . Cambridge University Press (
          <year>2004</year>
          ). https://doi.org/10.1017/CBO9780511817106
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Suriadi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkelmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>La</surname>
            <given-names>Rosa</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ouyang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Pika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Rosemann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Current Research in Risk-aware Business Process Management|Overview, Comparison, and Gap Analysis</article-title>
          .
          <source>Communications of the Associations of Information Systems</source>
          <volume>34</volume>
          (
          <issue>52</issue>
          ) (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Turki</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marija</surname>
            ,
            <given-names>B.O.</given-names>
          </string-name>
          :
          <article-title>Compliance in e-Government Service Engineering: Stateof-the-Art</article-title>
          .
          <source>In: 1st International Conference on Exploring Services Science (IESS</source>
          <year>2010</year>
          ), pp.
          <volume>270</volume>
          {
          <fpage>275</fpage>
          . Springer, Geneva,
          <source>Switzerland (Feb</source>
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>US-Government</surname>
          </string-name>
          :
          <article-title>The public company accounting reforms and investors protection act (sarbanes-oxley) (</article-title>
          <year>2002</year>
          ),
          <source>public Law 107-204</source>
          , 116 Stat.
          <volume>745</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Webster</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watson</surname>
          </string-name>
          , R.T.:
          <article-title>Analyzing the past to prepare for the future: Writing a literature review</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>26</volume>
          (
          <issue>2</issue>
          ), xiii{xxiii (
          <year>2002</year>
          ), http://www:jstor:org/ stable/4132319
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>