=Paper=
{{Paper
|id=Vol-2966/preface
|storemode=property
|title=None
|pdfUrl=https://ceur-ws.org/Vol-2966/preface.pdf
|volume=Vol-2966
|authors=Stephan Kühnel,Stefan Sackmann,Simon Trang
}}
==None==
Preface to the First International Workshop on Current Compliance Issues in Information Systems Research Stephan Kühnel1, Stefan Sackmann1, Simon Trang2 1 Martin Luther University Halle-Wittenberg, 06108 Halle (Saale), Germany {stephan.kuehnel, stefan.sackmann}@wiwi.uni-halle.de 2 Universität Goettingen, 37073 Goettingen, Germany simon.trang@wiwi.uni-goettingen.de 1 General Description of the CIISR Workshop "Compliance" refers to rule adherence, i.e., acting in accordance with applicable rules originating from various sources, including laws, standards, contracts, guidelines, etc. [1, 2]. Compliance has been a relevant topic in Information Systems Research (ISR) for several decades, whose initial focus was primarily on the (semi-)automated support in ensuring and validating rule conformity [3–5]. Nowadays, compliance is approached from a variety of different perspectives. As part of information security management, for instance, it is examined which operational compliance measures result in desired employee behavior [6, 7]. In the context of cloud computing, for instance, it is examined how compliance with service level agreements can be ensured in hybrid cloud architectures [8, 9]. And in the context of business process management, for instance, it is examined how the compliance of business processes can be ensured sustainably and economically in digitalized and electronic markets [10–12]. The first International Workshop on Current Compliance Issues in Information Systems Research (CIISR 2021) was intended as a prelude to an exchange format that will enable a continuous interchange of scientists and also practitioners in this field. The workshop took place on March 9th, 2021, in conjunction with the 16th International Conference on Wirtschaftsinformatik (WI 2021). Based on the conference's main theme– "Innovation through Information Systems - Business & Information Systems Engineering as a Future-Oriented Discipline"–the CIISR workshop discussed current compliance issues with high relevance to the ISR area. 16th International Conference on Wirtschaftsinformatik, March 2021, Essen, Germany Copyright © 2021 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). 1 2 Submission and Paper Selection We invited the scientific community to submit discussion papers and also research results as contributions to the CIISR 2021 workshop. Submissions in numerous subject areas interfacing with compliance were welcome, such as ensuring compliance with information security policies, compliance issues in the context of clouds, ensuring business process compliance, current IT compliance issues, and–for a given current occasion–the impact of the COVID-19 pandemic on compliance in the ISR environment. We called for contributions from the above-mentioned topics that can be assigned to one of the following three submission types: 1. Completed research papers/completed practical reports This submission type includes both advanced research with at least partial evaluation and comprehensive practical contributions. 2. Short papers (research in progress papers/short practical reports) Short papers represent ongoing research or ongoing practical projects. In addition to presenting initial results, these papers should also include an outlook on further research or project progress, including planned future work steps. 3. Extended abstracts Extended abstracts present and discuss high-quality results of already published contributions (or dissertations/postdoctoral theses) relevant to the workshop topic. In the submission version, completed research papers and practical reports must not exceed 12 pages, short papers must not exceed six pages, and extended abstracts must not exceed four pages, including title, abstract, bibliography, author details, and acknowledgments. Possible appendices are not included in the pagination. Each paper submitted to the workshop underwent a rigorous double-blind review by at least two reviewers and was evaluated for five criteria: 1) quality of content, 2) significance for theory and practice, 3) originality and level of innovativeness, 4) fitting to the workshop theme, and 5) quality of presentation. The three workshop chairs subsequently discussed the review results of each paper, resulting in a decision of acceptance or rejection. A total of seven papers were submitted to the workshop, of which four were accepted as full papers and one as a short paper. Accordingly, the acceptance rate of full papers was 57 %. 2 3 CIISR 2021 Workshop Papers In line with the WI 2021, the CIISR 2021 workshop was held completely online. Despite its virtual form, we are pleased to report that it was well received by the research community. 42 conference attendees were registered for the workshop, and finally, more than 50 attended. The CIISR 2021 workshop and the CIISR 2021 workshop proceedings at hand contain six contributions, including one paper on the keynote speech of the workshop chairs, the four accepted full papers, and one accepted short paper: 1. The paper Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures accompanies the keynote and particularly focuses on the ProBITS project, which is funded by the German Federal Ministry of Education and Research (BMBF) since April 2021 and deals with the economic assessment and analysis of IT security measures in business processes. 2. The full paper Analysis of Public Cloud Service Level Agreements–An Evaluation of Leading Software as a Service Providers by Michael Seifert analyses compliance in the context of cloud computing. His research is devoted to comparing service level agreements and reducing their heterogeneity. In this context, the paper also sheds light on the management of compliance with agreed-upon requirements. 3. The full paper Software Compliance in Different Industries: A Systematic Literature Review by Mohammed Mubarkoot and Joern Altmann analyses compliance of software and software services. Based on a systematic literature review, existing frameworks of software compliance management are identified and compared to the needs of different industries. The results show heterogeneity in terms of approaches and industries, especially regarding priorities, specifics, and compliance requirements, so further research seems to be vital. 4. The full paper Reviewing the Interrelation Between Information Security and Culture: Toward an Agenda for Future Research by Sebastian Hengstler and Natalya Pryazhnykova is dedicated to analyzing the relevance of culture to information security on different levels. Their results show that cultural aspects are relevant in different areas of information security, namely in information security governance, in awareness programs, in its influence on compliance behavior, and when designing an organizational security culture. They propose to further analyze the connection between culture and information security in the light of their identified research areas to better understand the impact of culture on security compliance. 3 5. The full paper Culture Matters–A Cross-Cultural Examination of Information Security Behavior Theories by Sebastian Hengstler empirically compares different theories for ensuring information security compliance behavior with respect to different cultures. Protection motivation and deterrence theory are tested in Germany, India, and the USA and compared by invariance tests and determination of predictive power. The conclusion suggests that taking a differentiated view on culture might improve information security policy compliance behavior in the future. 6. The short paper MIA–A Method for Achieving Compliance in Flexible and IT Supported Business Processes by Tobias Seyffarth presents a holistic framework for managing business process compliance in flexible environments. His research models relations between compliance requirements, business process activities, and underlying IT components. Thus, the approach allows interesting analyses of these relations, especially when changes become necessary. 4 Organization and Acknowledgement The main person responsible for the workshop was Dr. Stephan Kühnel (general workshop and web chair), who was supported by Prof. Dr. Stefan Sackmann and Prof. Dr. Simon Trang (workshop co-chairs). Stephan Kühnel and Stefan Sackmann are researchers in the field of business process management at the Chair for Information Systems, esp. Business Information Management at the Martin Luther University Halle-Wittenberg. Both are actively researching in the field of economic evaluation of business process compliance and security. Simon Trang is a researcher in the field of information security management and holds the Chair for Information Security and Compliance at the Georg August University of Goettingen. His research focuses on the economic aspects of information security measures and human aspects of information security. Although the number of submissions to the workshop was manageable, establishing a new workshop in the community would not have been possible without the help of others. Thus, we are very thankful for all the support we received from the teams of the respective chairs. Furthermore, we are very thankful for all the support we got during the review process. We were happy to have so many researchers supporting us in the program committee, namely (in alphabetic order of the last name): Michael Fellmann (University of Rostock, Germany), Barbara Gallina (Maelardalen University, Sweden), Nadine Guhr (Leibniz University Hannover, Germany), Simon Hacks (KTH Royal Institute of Technology Stockholm, Sweden), 4 Martin Schultz (HAW University of Applied Sciences Hamburg, Germany), Michael Seifert (GISA GmbH, Germany), Tobias Seyffarth (Martin Luther University Halle-Wittenberg, Germany), Frank Teuteberg (Osnabrueck University, Germany), and Nils Urbach (University of Bayreuth, Germany). In addition, we thank Peter Hofmann (University of Bayreuth, Germany) and Sebastian Hengstler (Georg August University of Goettingen, Germany) for their work as (sub)reviewers. Last but not least, our thanks also belong to Sebastian Lindner (Martin Luther University Halle-Wittenberg, Germany) for his work as a web co-chair and to the WI 2021 team for their support in organizational and technical matters. References 1. Becker, J., Delfmann, P., Dietrich, H.-A., Steinhorst, M., Eggert, M.: Business Process Compliance Checking – Applying and Evaluating a generic Pattern Matching Approach for Conceptual Models in the Financial Sector. Information Systems Frontiers 18, pp. 359–405, (2016). 2. Rinderle-Ma, S., Ly, L.T., Dadam, P.: Business Process Compliance (Aktuelles Schlagwort). EMISA Forum, pp. 24–29, (2008). 3. Sackmann, S., Kuehnel, S., Seyffarth, T.: Using Business Process Compliance Approaches for Compliance Management with Regard to Digitization: Evidence from a Systematic Literature Review. In: Weske M., Montali M., Weber I., vom Brocke J. (eds) Business Process Management. BPM 2018. Lecture Notes in Computer Science, vol 11080. Springer, Cham, pp 409-425, (2018). 4. Fellmann, M., Zasada, A.: State-of-the-art of Business Process Compliance Approaches: A Survey. Proceedings of the 22nd European Conference on Information Systems (ECIS'14), pp. 1–17, (2014) 5. Schultz, M.: Towards an Empirically Grounded Conceptual Model for Business Process Compliance. In: Ng W., Storey V.C., Trujillo J.C. (eds) Conceptual Modeling. ER 2013. Lecture Notes in Computer Science, vol 8217. Springer, Berlin, Heidelberg, pp 138-145, (2013). 6. Trang, S., Brendel, B.: A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research. Information Systems Frontiers 21, pp. 1265–1284, (2019) 7. Lembcke, T.-B., Masuch, K., Trang, S., Hengstler, S., Plics, P., Pamuk, M.: Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory. Americas Conference on Information Systems (AMCIS), (2019). 8. Xiaoyong, Y., Ying, L., Tong, J., Tiancheng, L., Zhonghai, W.: An Analysis on Availability Commitment and Penalty in Cloud SLA. In: Computer Software and Applications Conference (COMPSAC), pp. 914–919, (2015). 5 9. Morin, J.-H., Aubert, J., Gateau, B.: Towards Cloud Computing SLA Risk Management: Issues and Challenges. In: Sprague, R.H. (ed.) 45th Hawaii International Conference on System Sciences. (HICSS) ; USA, 4 - 7 Jan. 2012, pp. 5509–5514, (2012). 10. Seyffarth, T., Kuehnel, S., Sackmann, S.: Business Process Compliance Despite Change: Towards Proposals for a Business Process Adaptation. In: Cappiello C., Ruiz M. (eds) Information Systems Engineering in Responsible Information Systems. CAiSE 2019. Lecture Notes in Business Information Processing, vol 350. Springer, Cham, pp. 227-239, (2019). 11. Kuehnel, S., Trang, S., Lindner, S.: Conceptualization, Design, and Implementation of EconBPC – A Software Artifact for the Economic Analysis of Business Process Compliance. In: Laender A., Pernici B., Lim EP., de Oliveira J. (eds) Conceptual Modeling. ER 2019. Lecture Notes in Computer Science, vol 11788. Springer, Cham, pp. 378-386, (2019). 12. Knuplesch, D., Reichert, M., Fdhila, W., Rinderle-Ma, S.: On Enabling Compliance of Cross-Organizational Business Processes, In: Daniel F., Wang J., Weber B. (eds) Business Process Management. Lecture Notes in Computer Science, vol 8094. Springer, Berlin, Heidelberg, pp. 146-154, (2013). 6