<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">BCIT: A Tool to Recommend Compliant Business Processes based on Process Adaption</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Tobias</forename><surname>Seyffarth</surname></persName>
							<email>tobias.seyffarth@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kai</forename><surname>Raschke</surname></persName>
							<email>kai.raschke@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">BCIT: A Tool to Recommend Compliant Business Processes based on Process Adaption</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">7C850060A23445C987D26243499A946C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T09:07+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Adaptation</term>
					<term>Business process compliance</term>
					<term>Change</term>
					<term>Compliance process</term>
					<term>IT component</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Business process compliance (BPC) denotes the execution of business processes in adherence to applicable compliance requirements. Compliance requirements can be satisfied by compliance processes that are integrated into the business process. There are numerous relations between compliance requirements, business processes, compliance processes, and supporting IT components. Thus, the change of one of those elements can lead to the nonexecutability of a compliance process and thus lead to a violation of BPC. To further ensure BPC, the business process has to be adapted by a compliance process that is still executable. Consequently, we extended our prototype BCIT (Business Process Compliance and IT) through a feature to recommend compliant business processes. The adaptation is based on previously modeled alternative compliance processes that satisfy the same compliance requirement.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Business process compliance (BPC) denotes the execution of business processes to applicable compliance requirements <ref type="bibr" target="#b0">[1]</ref>. On top of that, information technology (IT) that supports business activities may also be affected by compliance requirements. Thus, a change of one of those elements can lead to a violation of BPC <ref type="bibr" target="#b1">[2]</ref>. In dynamic markets, both the fast identification of a compliance violation and the adaptation of a business process to avoid these violations are important tasks. However, due to complex relations between compliance requirements, business processes, and IT components, the manual adaptation of business processes is a time-consuming task.</p><p>There are numerous process modeling tools, such as ARIS Architect, Bizagi Studio, Camunda Modeler, and Signavio Process Manager or flexible workflow management systems, such as AristaFlow and KitCom. However, to the best of our knowledge, there is a lack of a tool that recommends compliant business processes despite changes to business processes and IT components.</p><p>Thus, the goal is a software prototype that recommends compliant business processes in case of an identified compliance violation due to change. In order to reach this goal, we have added the feature of recommending compliant business processes when determining a compliance violation to our existing prototype BCIT <ref type="bibr" target="#b2">[3]</ref>.</p><p>In Section 2, we motivate the problem statement and briefly describe the method to recommend compliant business processes. In Section 3, we describe our tool before we discuss the maturity in Section 4. Finally, Section 5 concludes the contribution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>Business Process Compliance and Change</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Identify Compliance Violations</head><p>Figure <ref type="figure">1</ref> shows a simplified purchase-to-pay process in which some business activities are supported by IT components, such as a material management (ERP MM) and a financial module (ERP FI) of an ERP system. Furthermore, both business activities and IT components are affected by compliance requirements. In this example, the compliance requirement "legal obligations to keep records" demands the accounting obligation for merchants in Germany. It is also related to the proper operation of IT that supports the accounting activities. The compliance requirements "physical access," "logical access," and "internal payments policy" are prerequisites for "legal obligations to keep records." In order to ensure BPC, we integrate compliance processes into the business process, which are modeled and stored separately from the business process <ref type="bibr" target="#b3">[4]</ref>. In the motivation scenario, the compliance process "check invoice" satisfies the compliance requirement "internal payments policy," and is therefore integrated in the purchase to pay process. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Motivation scenario [5]</head><p>Removing either an IT component or compliance process may result in a compliance violation <ref type="bibr" target="#b4">[5]</ref>. In this example, the removal of the IT component "ERP MM" means the compliance process can no longer be executed. Consequently, the compliance requirements "internal payments policy" and "legal obligations to keep records" are violated, and the compliance requirement "logical access" becomes obsolete. In order to further ensure BPC, the business process must be adapted by a compliance process that also satisfies the violated compliance requirements and is still executable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Recommend Compliant Business Processes</head><p>The elaboration of proposals for business process adaptation to further ensure BPC is based on three main ideas <ref type="bibr" target="#b4">[5]</ref>. First, compliance processes are modeled and stored separately from the business process and integrated into the business process at design time. Second, alternative compliance processes that meet the same requirements are modeled. Third, alternative compliance processes are differentiated by their characteristics, such as type of execution, which can be manual or automatic <ref type="bibr" target="#b3">[4]</ref>.</p><p>As shown in Figure <ref type="figure" target="#fig_0">2</ref>, the compliance requirement "internal payments policy" is satisfied by the compliance process pattern "N-way-match." The compliance process pattern is specialized by three different compliance process: "check invoice," "manually check invoice," and "check payment order." They differ by the trigger and the IT component that may be necessary for the execution of the compliance process. Each alternative compliance process can satisfy the compliance requirement, which results in three recommendations for compliant business processes.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Tool Description</head><p>BCIT is a single-page application based on React.js and Node.js. A tutorial document, a video, and the tool are available at: https://github.com/tobiasseyffarth/bcit From a user perspective, BCIT offers the following four features:</p><p>Model compliance requirements, business process model, and IT components in one common model. The compliance requirements, business process model, and IT architecture model are imported as XML files, BPMN process models, and TOGAF architecture models. The interrelations between them must be modeled manually by the user. The resulting model is technically represented as a directed graph, as explained in <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Model alternative compliance processes. The user must model alternative compliance processes that satisfy the same compliance requirement, too. Alternative compliance processes specify a generic compliance process pattern and are differentiated by both their required IT components and predecessor business activity <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>Identify compliance violations. In order to identify compliance violations, the user can define every compliance requirement, IT component, or process activity as the element to be removed. Based on a graph search, BCIT automatically identifies violated compliance requirements and presents the cause-effect relation <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Recommend compliant business processes. In case of a compliance violation, BCIT queries automatically for alternative compliance processes, checks whether they can be executed, and, if possible, integrates them in the business process model <ref type="bibr" target="#b4">[5]</ref>. Basically, three different results are possible. First, there is exactly one alternative compliance process. Second, there is more than one alternative compliance process. In this case, BCIT recommends all resulting compliant business processes. Third, there is no alternative compliance process. In this case, BCIT replaces the violated compliance process by its related compliance process pattern.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Maturity</head><p>We conducted several case studies in order to evaluate the perceived usefulness of BCIT. Each case study had the same structure. First, we presented a scenario to motivate the challenge of business process compliance and change that can be solved by BCIT. Second, we briefly presented the main ideas of our methods to recommend compliant business processes in order to solve the scenario. Third, we presented a solution to the challenge through BCIT. Lastly, we collected the opinions on the perceived usefulness of BCIT by means of a questionnaire. The questionnaire includes the statements of the technology acceptance model <ref type="bibr" target="#b5">[6]</ref> on the perceived usefulness. The case study participants were domain experts in the field of compliance management, business process management, and IT architecture management. Finally, we got an overall 24 responses. The questionnaire and the responses are available at: https://github.com/tobiasseyffarth/bcit/tree/master/resources/3-evaluation.</p><p>Overall, BCIT was evaluated to be useful and helpful. The participants liked the feature for the fast identification of cause-effect relations and getting recommendations for compliant business processes. The latter point was also considered as a competitive advantage. Nevertheless, some participants expressed their concern that the effort of modeling of both business/compliance process and IT architecture may exceed the benefit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion and Future Work</head><p>In this paper, we presented BCIT, a tool to recommend compliant business processes based on process adaption. The recommendations for compliant business processes are based on alternative compliance processes that are modeled and stored separately from the business process.</p><p>In a next step, we plan to add the data and resource perspective on a business process to our algorithm. Further, we plan to integrate unsupervised machine learning techniques, such as frequent pattern analysis (e.g., an FP-Growth algorithm), into BCIT to propose possible alternative compliance processes without explicit prior modeling.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2.Alternative compliance processes and their integration into the business process<ref type="bibr" target="#b4">[5]</ref> </figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Journey to Business Process Compliance</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of research on business process modeling</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="426" to="454" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Business Process Compliance and Business Process Change. An Approach to Analyze the Interactions</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Information Systems</title>
		<imprint>
			<biblScope unit="page" from="176" to="189" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
	<note type="report_type">BIS</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">BCIT. A Tool for Analyzing the Interactions between Business Process Compliance and Business Process Change</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Raschke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Dissertation Award and Demonstration</title>
				<meeting>the Dissertation Award and Demonstration</meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="81" to="85" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A Taxonomy of Compliance Processes for Business Process Compliance</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">15th International Conference on Business Process Management, Business Process Management Forum</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="71" to="87" />
		</imprint>
	</monogr>
	<note>Lecture Notes in Business Information Processing (LNBIP)</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Business Process Compliance despite Change. Towards Proposals for a Business Process Adaption</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CAiSE 2019</title>
		<title level="s">Lecture Notes in Business Information Processing</title>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">350</biblScope>
			<biblScope unit="page" from="227" to="239" />
		</imprint>
	</monogr>
	<note>Information Systems Engineering in Responsible Information Systems</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">319</biblScope>
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
