<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>to the First International Workshop on Current Compliance Issues in Information Systems Research</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stephan Kühnel</string-name>
          <email>stephan.kuehnel@wiwi.uni-halle.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Sackmann</string-name>
          <email>stefan.sackmann@wiwi.uni-halle.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Trang</string-name>
          <email>simon.trang@wiwi.uni-goettingen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Martin Luther University Halle-Wittenberg</institution>
          ,
          <addr-line>06108 Halle (Saale)</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universität Goettingen</institution>
          ,
          <addr-line>37073 Goettingen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>General Description of the CIISR Workshop "Compliance" refers to rule adherence, i.e., acting in accordance with applicable rules originating from various sources, including laws, standards, contracts, guidelines, etc. [1, 2]. Compliance has been a relevant topic in Information Systems Research (ISR) for several decades, whose initial focus was primarily on the (semi-)automated support in ensuring and validating rule conformity [3-5]. Nowadays, compliance is approached from a variety of different perspectives. As part of information security management, for instance, it is examined which operational compliance measures result in desired employee behavior [6, 7]. In the context of cloud computing, for instance, it is examined how compliance with service level agreements can be ensured in hybrid cloud architectures [8, 9]. And in the context of business process management, for instance, it is examined how the compliance of business processes can be ensured sustainably and economically in digitalized and electronic markets [10-12]. The first International Workshop on Current Compliance Issues in Information Systems Research (CIISR 2021) was intended as a prelude to an exchange format that will enable a continuous interchange of scientists and also practitioners in this field. The workshop took place on March 9th, 2021, in conjunction with the 16th International Conference on Wirtschaftsinformatik (WI 2021). Based on the conference's main theme"Innovation through Information Systems - Business &amp; Information Systems Engineering as a Future-Oriented Discipline"-the CIISR workshop discussed current compliance issues with high relevance to the ISR area.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Submission and Paper Selection</title>
      <p>We invited the scientific community to submit discussion papers and also research
results as contributions to the CIISR 2021 workshop. Submissions in numerous subject
areas interfacing with compliance were welcome, such as ensuring compliance with
information security policies, compliance issues in the context of clouds, ensuring
business process compliance, current IT compliance issues, and–for a given current
occasion–the impact of the COVID-19 pandemic on compliance in the ISR
environment. We called for contributions from the above-mentioned topics that can be
assigned to one of the following three submission types:
1.</p>
      <sec id="sec-1-1">
        <title>Completed research papers/completed practical reports</title>
        <p>This submission type includes both advanced research with at least partial
evaluation and comprehensive practical contributions.</p>
      </sec>
      <sec id="sec-1-2">
        <title>2. Short papers (research in progress papers/short practical reports)</title>
        <p>Short papers represent ongoing research or ongoing practical projects. In
addition to presenting initial results, these papers should also include an
outlook on further research or project progress, including planned future work
steps.</p>
      </sec>
      <sec id="sec-1-3">
        <title>Extended abstracts</title>
        <p>Extended abstracts present and discuss high-quality results of already
published contributions (or dissertations/postdoctoral theses) relevant to the
workshop topic.</p>
        <p>In the submission version, completed research papers and practical reports must not
exceed 12 pages, short papers must not exceed six pages, and extended abstracts must
not exceed four pages, including title, abstract, bibliography, author details, and
acknowledgments. Possible appendices are not included in the pagination.
Each paper submitted to the workshop underwent a rigorous double-blind review by at
least two reviewers and was evaluated for five criteria: 1) quality of content, 2)
significance for theory and practice, 3) originality and level of innovativeness, 4) fitting
to the workshop theme, and 5) quality of presentation. The three workshop chairs
subsequently discussed the review results of each paper, resulting in a decision of
acceptance or rejection. A total of seven papers were submitted to the workshop, of
which four were accepted as full papers and one as a short paper. Accordingly, the
acceptance rate of full papers was 57 %.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>CIISR 2021 Workshop Papers</title>
      <p>In line with the WI 2021, the CIISR 2021 workshop was held completely online.
Despite its virtual form, we are pleased to report that it was well received by the
research community. 42 conference attendees were registered for the workshop, and
finally, more than 50 attended. The CIISR 2021 workshop and the CIISR 2021
workshop proceedings at hand contain six contributions, including one paper on the
keynote speech of the workshop chairs, the four accepted full papers, and one accepted
short paper:</p>
      <sec id="sec-2-1">
        <title>1. The paper Towards a Business Process-based Economic Evaluation and</title>
        <p>Selection of IT Security Measures accompanies the keynote and particularly
focuses on the ProBITS project, which is funded by the German Federal
Ministry of Education and Research (BMBF) since April 2021 and deals with
the economic assessment and analysis of IT security measures in business
processes.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2. The full paper Analysis of Public Cloud Service Level Agreements–An</title>
      </sec>
      <sec id="sec-2-3">
        <title>Evaluation of Leading Software as a Service Providers by Michael Seifert</title>
        <p>analyses compliance in the context of cloud computing. His research is
devoted to comparing service level agreements and reducing their
heterogeneity. In this context, the paper also sheds light on the management
of compliance with agreed-upon requirements.</p>
      </sec>
      <sec id="sec-2-4">
        <title>3. The full paper Software Compliance in Different Industries: A Systematic</title>
        <p>Literature Review by Mohammed Mubarkoot and Joern Altmann analyses
compliance of software and software services. Based on a systematic literature
review, existing frameworks of software compliance management are
identified and compared to the needs of different industries. The results show
heterogeneity in terms of approaches and industries, especially regarding
priorities, specifics, and compliance requirements, so further research seems
to be vital.</p>
      </sec>
      <sec id="sec-2-5">
        <title>4. The full paper Reviewing the Interrelation Between Information Security and Culture: Toward an Agenda for Future Research by Sebastian</title>
        <p>Hengstler and Natalya Pryazhnykova is dedicated to analyzing the relevance
of culture to information security on different levels. Their results show that
cultural aspects are relevant in different areas of information security, namely
in information security governance, in awareness programs, in its influence on
compliance behavior, and when designing an organizational security culture.
They propose to further analyze the connection between culture and
information security in the light of their identified research areas to better
understand the impact of culture on security compliance.</p>
      </sec>
      <sec id="sec-2-6">
        <title>5. The full paper Culture Matters–A Cross-Cultural Examination of</title>
        <p>Information Security Behavior Theories by Sebastian Hengstler empirically
compares different theories for ensuring information security compliance
behavior with respect to different cultures. Protection motivation and
deterrence theory are tested in Germany, India, and the USA and compared by
invariance tests and determination of predictive power. The conclusion
suggests that taking a differentiated view on culture might improve
information security policy compliance behavior in the future.</p>
      </sec>
      <sec id="sec-2-7">
        <title>6. The short paper MIA–A Method for Achieving Compliance in Flexible and</title>
        <p>IT Supported Business Processes by Tobias Seyffarth presents a holistic
framework for managing business process compliance in flexible
environments. His research models relations between compliance
requirements, business process activities, and underlying IT components.
Thus, the approach allows interesting analyses of these relations, especially
when changes become necessary.
4</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Organization and Acknowledgement</title>
      <p>The main person responsible for the workshop was Dr. Stephan Kühnel (general
workshop and web chair), who was supported by Prof. Dr. Stefan Sackmann and Prof.
Dr. Simon Trang (workshop co-chairs). Stephan Kühnel and Stefan Sackmann are
researchers in the field of business process management at the Chair for Information
Systems, esp. Business Information Management at the Martin Luther University
Halle-Wittenberg. Both are actively researching in the field of economic evaluation of
business process compliance and security. Simon Trang is a researcher in the field of
information security management and holds the Chair for Information Security and
Compliance at the Georg August University of Goettingen. His research focuses on the
economic aspects of information security measures and human aspects of information
security.</p>
      <p>Although the number of submissions to the workshop was manageable, establishing a
new workshop in the community would not have been possible without the help of
others. Thus, we are very thankful for all the support we received from the teams of the
respective chairs. Furthermore, we are very thankful for all the support we got during
the review process. We were happy to have so many researchers supporting us in the
program committee, namely (in alphabetic order of the last name):



</p>
      <sec id="sec-3-1">
        <title>Michael Fellmann (University of Rostock, Germany),</title>
      </sec>
      <sec id="sec-3-2">
        <title>Barbara Gallina (Maelardalen University, Sweden),</title>
      </sec>
      <sec id="sec-3-3">
        <title>Nadine Guhr (Leibniz University Hannover, Germany), Simon Hacks (KTH Royal Institute of Technology Stockholm, Sweden), 4</title>
        <p>Martin Schultz (HAW University of Applied Sciences Hamburg, Germany),</p>
      </sec>
      <sec id="sec-3-4">
        <title>Michael Seifert (GISA GmbH, Germany),</title>
        <p>Tobias Seyffarth (Martin Luther University Halle-Wittenberg, Germany),</p>
      </sec>
      <sec id="sec-3-5">
        <title>Frank Teuteberg (Osnabrueck University, Germany), and</title>
      </sec>
      <sec id="sec-3-6">
        <title>Nils Urbach (University of Bayreuth, Germany).</title>
        <p>In addition, we thank Peter Hofmann (University of Bayreuth, Germany) and Sebastian
Hengstler (Georg August University of Goettingen, Germany) for their work as
(sub)reviewers. Last but not least, our thanks also belong to Sebastian Lindner (Martin
Luther University Halle-Wittenberg, Germany) for his work as a web co-chair and to
the WI 2021 team for their support in organizational and technical matters.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delfmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
          </string-name>
          , H.-A.,
          <string-name>
            <surname>Steinhorst</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eggert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Business Process Compliance Checking - Applying and Evaluating a generic Pattern Matching Approach for Conceptual Models in the Financial Sector</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>18</volume>
          , pp.
          <fpage>359</fpage>
          -
          <lpage>405</lpage>
          , (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Business Process Compliance (Aktuelles Schlagwort)</article-title>
          .
          <source>EMISA Forum</source>
          , pp.
          <fpage>24</fpage>
          -
          <lpage>29</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuehnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seyffarth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Using Business Process Compliance Approaches for Compliance Management with Regard to Digitization: Evidence from a Systematic Literature Review</article-title>
          . In:
          <string-name>
            <surname>Weske</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            <given-names>I.</given-names>
          </string-name>
          , vom Brocke J. (eds)
          <article-title>Business Process Management</article-title>
          .
          <source>BPM 2018. Lecture Notes in Computer Science</source>
          , vol
          <volume>11080</volume>
          . Springer, Cham, pp
          <fpage>409</fpage>
          -
          <lpage>425</lpage>
          , (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Fellmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zasada</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>State-of-the-art of Business Process Compliance Approaches: A Survey</article-title>
          .
          <source>Proceedings of the 22nd European Conference on Information Systems (ECIS'14)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          , (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Schultz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards an Empirically Grounded Conceptual Model for Business Process Compliance</article-title>
          . In: Ng W.,
          <string-name>
            <surname>Storey</surname>
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trujillo</surname>
            <given-names>J.C.</given-names>
          </string-name>
          <article-title>(eds) Conceptual Modeling</article-title>
          .
          <source>ER 2013. Lecture Notes in Computer Science</source>
          , vol
          <volume>8217</volume>
          . Springer, Berlin, Heidelberg, pp
          <fpage>138</fpage>
          -
          <lpage>145</lpage>
          , (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brendel</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>21</volume>
          , pp.
          <fpage>1265</fpage>
          -
          <lpage>1284</lpage>
          , (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lembcke</surname>
          </string-name>
          , T.-B.,
          <string-name>
            <surname>Masuch</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hengstler</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plics</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pamuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory</article-title>
          .
          <source>Americas Conference on Information Systems (AMCIS)</source>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Xiaoyong</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ying</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tiancheng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhonghai</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>An Analysis on Availability Commitment and Penalty in Cloud SLA</article-title>
          .
          <source>In: Computer Software and Applications Conference (COMPSAC)</source>
          , pp.
          <fpage>914</fpage>
          -
          <lpage>919</lpage>
          , (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Morin</surname>
            ,
            <given-names>J.-H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aubert</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gateau</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Towards Cloud Computing SLA Risk Management: Issues and Challenges</article-title>
          . In: Sprague,
          <string-name>
            <surname>R.H</surname>
          </string-name>
          . (ed.)
          <source>45th Hawaii International Conference on System Sciences. (HICSS) ; USA</source>
          ,
          <fpage>4</fpage>
          -
          <lpage>7</lpage>
          Jan.
          <year>2012</year>
          , pp.
          <fpage>5509</fpage>
          -
          <lpage>5514</lpage>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Seyffarth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuehnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Business Process Compliance Despite Change: Towards Proposals for a Business Process Adaptation</article-title>
          . In: Cappiello C.,
          <string-name>
            <surname>Ruiz</surname>
            <given-names>M</given-names>
          </string-name>
          .
          <article-title>(eds) Information Systems Engineering in Responsible Information Systems</article-title>
          .
          <source>CAiSE 2019. Lecture Notes in Business Information Processing</source>
          , vol
          <volume>350</volume>
          . Springer, Cham, pp.
          <fpage>227</fpage>
          -
          <lpage>239</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kuehnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lindner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Conceptualization, Design, and
          <article-title>Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance</article-title>
          . In: Laender A.,
          <string-name>
            <surname>Pernici</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lim</surname>
            <given-names>EP</given-names>
          </string-name>
          ., de Oliveira J. (eds)
          <article-title>Conceptual Modeling</article-title>
          .
          <source>ER 2019. Lecture Notes in Computer Science</source>
          , vol
          <volume>11788</volume>
          . Springer, Cham, pp.
          <fpage>378</fpage>
          -
          <lpage>386</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Knuplesch</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fdhila</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Rinderle-Ma, S.:
          <article-title>On Enabling Compliance of Cross-Organizational Business Processes</article-title>
          , In: Daniel F.,
          <string-name>
            <surname>Wang</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            <given-names>B</given-names>
          </string-name>
          . (eds) Business
          <source>Process Management. Lecture Notes in Computer Science</source>
          , vol
          <volume>8094</volume>
          . Springer, Berlin, Heidelberg, pp.
          <fpage>146</fpage>
          -
          <lpage>154</lpage>
          , (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>