<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">STATUS: A Low-Code Business Process Compliance Management System</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Álvaro</forename><surname>Bernal</surname></persName>
							<email>abernal3@us.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">SCORE Lab</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francisco</forename><surname>Montero</surname></persName>
							<email>fmontero3@us.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">SCORE Lab</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Cristina</forename><surname>Cabanillas</surname></persName>
							<email>cristinacabanillas@us.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">SCORE Lab</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">I3US Institute</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Pablo</forename><surname>Fernández</surname></persName>
							<email>pablofm@us.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">SCORE Lab</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">I3US Institute</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manuel</forename><surname>Resinas</surname></persName>
							<email>resinas@us.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">SCORE Lab</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">I3US Institute</orgName>
								<orgName type="institution">Universidad de Sevilla</orgName>
								<address>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">STATUS: A Low-Code Business Process Compliance Management System</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">FD514202BF472F16E3D7D53F4B0CD55C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:02+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>business process compliance, compliance checking, compliance dashboard, compliance mashup Orcid 0009-0008-4350-1389 (Á. Bernal)</term>
					<term>0009-0002-4638-1825 (F. Montero)</term>
					<term>0000-0001-9182-8847 (C. Cabanillas)</term>
					<term>0000-0002-8763-0819 (P. Fernández)</term>
					<term>0000-0003-1575-406X (M. Resinas)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Business process compliance management ensures adherence of processes to laws and internal policies. This paper introduces STATUS, a comprehensive Business Process Compliance Management System (BPCMS) developed to meet real organizational needs. STATUS supports compliance management in several phases of the Business Process Management (BPM) lifecycle with low-code compliance mashups for rule specification and checking. This approach allows for flexible rule creation, reuse, and integration with organizational systems, enabling both design-time and run-time compliance checks. Interactive compliance dashboards provide users with clear reporting on compliance results. These characteristics make STATUS a practical tool for the BPM community and process-oriented organizations.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction and Significance to BPM</head><p>Business process compliance (compliance for short) management is the continuous process of monitoring and assessing organizational systems and processes to ensure that there is adherence to relevant laws, regulations, internal policies, guidelines and specifications, e.g., U.S. ' SOX legislation, Germany's DCGK, Australia's CLERP 9, and EU's GDPR. Based on them, a set of compliance controls that must be observed by the organization can be defined. Each compliance control can be further decomposed into a set of compliance rules. These rules are specific checks that must be carried out to evaluate whether the control is being fulfilled and may refer to different process aspects, such as the execution order of activities, the data accessed and produced, or the people that participate in the process.</p><p>Processes must be designed and executed according to the governing rules. Hence, compliance is inherently relevant to Business Process Management (BPM). Compliance management includes various tasks, from rule definition to compliance checking and reporting, which span the BPM lifecycle <ref type="bibr" target="#b0">[1]</ref>. Several approaches and frameworks have been developed to address compliance issues, such as techniques for compliance verification, with limited scopes <ref type="bibr" target="#b1">[2]</ref>, or integrated solutions <ref type="bibr" target="#b2">[3]</ref> that address a larger number of acknowledged Compliance Monitoring Functionalities (CMFs) <ref type="bibr" target="#b3">[4]</ref>. However, they tend to focus on design-time or run-time compliance checking, and they usually use event logs as the only data source for compliance checking.</p><p>This paper presents STATUS, a Business Process Compliance Management System (BPCMS) that supports compliance management in several phases of the BPM lifecycle. For rule specification and checking, it relies on the mashup-based compliance management framework presented in <ref type="bibr" target="#b4">[5]</ref>, a low-code solution that brings several advantages: (i) an open-ended set of types rules can be specified by designing and connecting mashup components; (ii) the definitions of the rules can be reused as needed; and (iii) the mashup-based compliance checking system can retrieve data from different information systems of the organization, enabling the verification of actual facts on actions performed during process execution (e.g., the existence of a specific document in a concrete location). Furthermore, compliance mashups can be used for design-time and run-time compliance checking. Interactive compliance dashboards <ref type="bibr" target="#b5">[6]</ref> are automatically created for results reporting and can be customized by the user. With STATUS, the BPM community will benefit from a BPCMS closer to what organizations usually demand. Moreover, the ability to extend the functionality of the system with custom-made mashup components makes STATUS a good platform in which results from the community can be integrated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Tool Description</head><p>STATUS is accessible through a comprehensive web application, which enables users to define and organize compliance catalogs and controls, construct and configure mashups for rule specification, and display compliance outcomes through interactive dashboards.</p><p>Catalog and Control Editor. This is a foundational component of STATUS as it enables users to define and manage catalogs of compliance controls systematically. Each control within a catalog is configured to check specific compliance rules, facilitating organized and comprehensive compliance management.</p><p>To create a catalog and its associated controls, users interact with a form-based User Interface (UI). This UI simplifies the process of defining controls by allowing users to specify its parameters and to link the control to a compliance mashup, which implements the rules that the control should monitor. When a user selects a mashup using the "Check" field of the UI, the system displays the required input parameters for that mashup, ensuring that the necessary data is available for accurate compliance evaluation. The integration of mashups with controls not only enhances the flexibility and specificity of compliance checks but also supports the modular and reusable nature of control definitions. This approach ensures that compliance controls and rules can be easily updated and adapted to meet evolving regulatory requirements. Figure <ref type="figure" target="#fig_0">1</ref> shows a new catalog called "Documents" that applies from January 1 to July 13, 2024. It includes a control to check if document "Invoice123" exists. The check is performed monthly from May to July 13, using the "existsDocument" compliance mashup, which receives the document's name. The document location is defined within the mashup itself but it could also be parameterized.  Compliance Mashup Editor. This component allows users to create visual data-driven workflows (i.e., dataflows) to extract and manipulate data for compliance rule checking. Pipes are the elements in charge of extracting and operating on data. Most of them have inputs and outputs that represent the streams of data going in and out of the pipe, respectively. These pipes operate on the input data to produce output data (e.g., check the execution of an activity in the traces of an event log). The pipes without an input flow retrieve data from a data source, such as a process event log, a repository (e.g., Github), a document management system (e.g., OneDrive) or a project management system (e.g., Trello). The pipe without an output flow returns the outcome of the compliance mashup, i.e., the result of rule checking.</p><p>Node-RED's visual programming approach has been used to implement compliance mashups. To further simplify the creation of compliance mashups, STATUS includes custom Node-RED pipes specifically designed for compliance rule modeling. Moreover, the system can be easily extended with additional custom-made pipes to integrate it with ad-hoc information systems or to include additional functionalities like new process mining techniques. Figure <ref type="figure" target="#fig_1">2</ref> depicts a compliance mashup that checks that for those purchase items that do not require a reception confirmation message, the cost shown on the invoice is the same as that recorded when the item was created. The brown-colored pipes are part of our collection of custom components. The other pipes come pre-installed with the tool and are part of its standard set of functionalities <ref type="foot" target="#foot_0">1</ref> .</p><p>Compliance Dashboard Monitor. The dashboards in STATUS provide a comprehensive view of the results of the compliance mashups. A compliance dashboard aggregates data from various compliance checks and presents it in a series of customizable charts and graphs. This visual representation makes it easy for users to monitor the overall compliance status, identify rule violations, and track trends over time. The dashboards' interactive features allow users to drill down into specific controls and mashups, gaining deeper insights into the compliance performance of individual processes. Governify <ref type="bibr" target="#b6">[7]</ref> <ref type="foot" target="#foot_1">2</ref> serves as the infrastructure that processes the responses of mashups according to each created catalog, facilitating the creation of interactive dashboards. The results of a rule checking shown in Figure <ref type="figure" target="#fig_2">3</ref> determine that the rule is met, on average, in 44.3% of the projects. The bar chart informs about the percentage of projects compliant with the rule over time.</p><p>The STATUS software, a video that screencasts the system and further information are available at https://github.com/statuscompliance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Maturity and Future Work</head><p>STATUS is a general-purpose solution that can be adapted to specific scenarios by adding pipes to the compliance mashups to connect to new data sources and perform other operations on data. A preliminary implementation of the system has already been successfully used to address compliance checking at both design time and run time for the IT department of a multinational company from the energy supply domain as part of an R&amp;D project <ref type="bibr" target="#b4">[5]</ref>. The project covered more than 20 processes and 122 controls that had been obtained after analyzing the implication of three well-known regulations (SOX, SCIIF and L262) plus additional controls that responded to internal business policies. To implement them, a total of 11 mashups based on five data sources and 18 domain-specific pipes were defined. The data sources included process models from an enterprise modeling tool for design-time rules, project and process documents from a Document Management System (DMS), data about projects status from a project management tool, and data about incidents and claims from a helpdesk system. This case study showed the feasibility and usefulness of STATUS for compliance checking in organizations.</p><p>In terms of functionalities, at this moment, STATUS supports CMFs 1-7 and CMF 10. Currently, there is no support for pro-active compliance checking (CMF 8) and partial support for root-cause analysis (CMF 9). We are working towards the development and integration of functionalities for predictive compliance monitoring <ref type="bibr" target="#b7">[8]</ref> and advanced root-cause analysis for a full coverage of the CMFs. Furthermore, we plan to create a marketplace that allows developers to upload custom-made mashup pipes that provide additional functionality to the system.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Catalog and control creation</figDesc><graphic coords="3,151.80,84.19,291.68,253.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Compliance mashup visualization</figDesc><graphic coords="3,89.29,377.23,416.68,119.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Compliance dashboard</figDesc><graphic coords="4,89.29,84.19,416.69,89.86" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Note that the split and join pipes have different semantics than they usually have in process models. In our case, we use split to sequentially send an array of any objects, and then regroup them with join to work at trace level.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">https://governify.io</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Grants PDC2022-133521-I00 (STATUS) and TED2021-131023B-C22 (ORCHID) funded by MCIN/AEI/10.13039/501100011033/ and by the European Union NextGenerationEU/PRTR; and grants PID2021-126227NB-C21 (PERSEO), PID2021-126227NB-C22 and PID2022-140221NB-I00 (TAPIOCA) funded by MCIN/AEI/10.13039/501100011033/ and by ERDF/EU.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Exploring Features of a Full-Coverage Integrated Solution for Business Process Compliance</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cabanillas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Resinas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ruiz-Cortés</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CAiSE Workshops</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">83</biblScope>
			<biblScope unit="page" from="218" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Verifying Resource Compliance Requirements from Natural Language Text over Event Logs</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mustroph</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Barrientos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Winter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int. Conf. on Business Process Management (BPM)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">14159</biblScope>
			<biblScope unit="page" from="249" to="265" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A framework for visually monitoring business process compliance</title>
		<author>
			<persName><forename type="first">D</forename><surname>Knuplesch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="381" to="409" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Compliance Monitoring in Business Processes</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="209" to="234" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Mashup-Based Framework for Business Process Compliance Checking</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cabanillas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Resinas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ruiz-Cortés</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Serv. Comput</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="1564" to="1577" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">On the Design of Compliance Governance Dashboards for Effective Compliance and Audit Management</title>
		<author>
			<persName><forename type="first">P</forename><surname>Silveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rodriguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Casati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Daniel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>D'andrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Worledge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Taheri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSOC Workshops</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="208" to="217" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An agreementbased service governance framework</title>
		<author>
			<persName><forename type="first">R</forename><surname>Fresno-Aranda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ojeda-Perez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Fernandez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ruiz-Cortés</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Governify</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Softw. Impacts</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page">100629</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Predictive compliance monitoring in process-aware information systems: State of the art, functionalities, research directions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Winter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Benzin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="page">102210</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
