<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evidence-based compliance engineering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Joris Hulstijn</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Luxembourg</institution>
          ,
          <addr-line>Esch sur Alzette</addr-line>
          ,
          <country country="LU">Luxembourg</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Most research on compliance checking is about business processes, focusing on the order and presence of activities, roles, and temporal properties. However, legislation demands evidence of legal conditions. An organisation is considered to be compliant to a piece of legislation, when it can demonstrate that the corresponding legal requirements continue to hold for the entire set of cases to which the legislation applies. In this paper we propose a new perspective: evidence-based compliance engineering. We sketch how to utilise existing tools for automated theorem proving and natural language understanding, to allow automated verification of legal objectives based on evidence documents. To demonstrate compliance, the system maintains an invariant for the set of cases, that involves legislation, legal requirements, cases and evidence documents. Whenever a change would disrupt this invariant, processes are started to select and analyse documents, update the cases, update the evidence and run the necessary proofs. The compliance status is monitored continuously and can be made visible on a dashboard. The applicability of the approach is illustrated by two examples.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;compliance checking</kwd>
        <kwd>evidence</kwd>
        <kwd>invariant</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Compliance checking involves a lot of administrative work. For example, legislation against
money laundering [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ] demands that financial institutions must ‘know their customer’
(KYC). For every transaction, they must verify customer identity, trace their funding, and find
the ultimate beneficiary. Solving these issues is complex and many banks fail. For example,
Rabobank was fined for failing to uphold customer due diligence [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. These dificulties in
meeting compliance demands are common [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Software tools exist for know-your-customer
and for anti-money laundering tasks. For example, Computer Assisted Subject Examination
and Investigation Tool (CASEit), Customer Due Diligence Tool (CDD), tools for name-entity
matching, data analysis tools for fine-tuning the suspicious activity detection, and a quick
reference guide to track the relevant legislation in various countries [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. However, each tool
only covers part of the investigation task. There is no unifying vision on compliance.
      </p>
      <p>
        Compare this varied landscape of compliance tools to the academic literature on compliance
checking. We observe that most approaches focus on compliance of business processes [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
Compliance is interpreted as a set of formal properties, expressed in a form of logic, which is
then verified for all traces generated by the business process. See for example Governatori and
colleagues [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ], but also [
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ] and later [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Here is a recent overview [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        In these works, the legal problem of compliance checking – to verify whether the outcome of
a process conforms to objectives demanded by law – is reduced to the computer science problem
of conformance testing – to verify whether the traces generated by a process specification
satisfy formal properties, e.g. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. From a computer science point of view, such a reduction is
understandable, but from a legal or business point of view, there are several problems:
1. conformance, not compliance. Compliance with the law is reduced to conformance to
formal properties. These formal properties are defined over the execution traces of
a process specification, so they cover the order of activities, constraints on roles or
resources, and temporal conditions. Other aspects of compliance management, such as
organisational practices, lawfulness of a revenue model, governance, risk and controls
and legal evidence, are not immediately covered, e.g. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
2. no interpretation. In conformance testing, the properties to test are supposed to be specified
upfront. The decision which interpretation of the law must be selected, how that translates
into formal properties, and how these properties must be measured or monitored, are not
taken into account [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16, 17, 18</xref>
        ]. See also recent NLP approaches [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ].
3. process, not cases. In the process-based view, the object of compliance is a specific business
process. Instead, as the know-your-customer example shows, the object of the law is
often a set of cases, representing customers or transactions. These must be shown to
comply to requirements, that correspond to the law, e.g. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The process is only a means
to that end. Of course, there is also procedural law, e.g. [22], that does put constraints on
processes. Still, procedural law is applied to the handling of cases or dossiers.
4. no evidence Many administrative processes collect evidence in a dossier, to demonstrate
that some legal conditions are met. Such evidence usually takes the form of documents,
often in digitised form (proof of income; proof of identity). In the process-based view, no
records are stored after automatic verification of a property.
5. no data analysis. Compliance checking has benefited from process mining [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], but makes
insuficient use of advances in databases, ERP systems (e.g. SAP S4 HANA), and data
analytics [23], especially for compliance testing [24]. Processes can assess properties of
new or updated cases, but only a data-analysis can verify properties for all current cases.
6. no risk management. Compliance is never enough. In interpreting the law and
implementing controls, managers must make a trade-of between the costs of compliance and the
risk of violation [25]. This is a form of risk management. Assisted by compliance oficers,
management is ultimately responsible for the residual risks [26], but, the process-based
view of compliance reduces it to an operational level.
      </p>
      <p>In this exploratory paper, we propose a new perspective: evidence-based compliance engineering,
to address some of these problems. The approach centres on legal interpretation and risk
management, and does account for legal evidence, and it aims to combine process-based and
data-based approaches to compliance management in a unified way. The approach is called
‘compliance engineering’ by analogy with requirements engineering [27]. The central idea is
requirements traceability [28, 27]. All (legal) requirements lead to specific properties of a system
(forward). Conversely, all system properties are motivated by (legal) requirements (backward).</p>
      <p>How to develop an evidence-based approach to compliance engineering?</p>
      <p>Consider a conceptual model that involves legislation (text), legal requirements (formal
representation), and evidence (documents, traces of verified queries), all linked to a database of cases.
Such a model is sketched in Figure 1. The model maintains a set of invariant properties:
(i) all cases conform to the legal requirements,
(ii) compliance of cases is supported by evidence, and
(iii) legal requirements correspond to relevant legislation.</p>
      <p>Automated reasoning, as well as data base and data analytics queries, allow verification of
the legal requirements on the data set that represents all cases. Whenever a change would
temporarily disrupt the invariant, for example when laws are changed or when cases are added,
semi-automatic processes will start, to restore the invariant. These processes are shown in the
diagram as in, out or update arrows. For example, when a new client is entered, due diligence
checks are performed and evidence is collected and analysed, to verify the client conforms to
the legal requirements, and thus the organisation conforms to the law. Similarly, when a new
law is adopted, the interpretation process is supported by tools for natural language processing,
to derive legal requirements that correspond to the legal interpretation chosen. At any time, the
compliance status can be automatically verified by automated reasoning. Cases are monitored
regularly and their status made visible on a dashboard.</p>
      <p>In this exploratory paper we aim to introduce this vision of compliance engineering. Later,
the vision must be further worked out, in the form of an architecture, design principles, and a
formal semantics, that makes it possible to specify and the invariant properties, and add tools
and techniques to verify them. In addition, specific tools and techniques must be selected to
‘populate’ the various modules in the architecture.</p>
      <p>The research method is a form of design science [29]. We present an artefact, a conceptual
model for evidence-based compliance. The potential usefulness of the approach is illustrated by
two scenarios: (1) know-you-customer, and (2) a building permit.</p>
      <p>The remainder of the paper is structured as follows. First, section 2 contains the scenarios.
Section 3 provides a theoretical background. Section 4. The paper ends with discussion of the
research limitations and suggestions for further research.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Scenarios</title>
      <p>We analyse two simplified scenarios: (1) know-your-customer, and (2) building permit. Data
was collected from publicly available documents. Summaries are given in Table 1 and Table 2.</p>
      <sec id="sec-2-1">
        <title>2.1. Know your customer</title>
        <p>
          In various countries, legislation against anti-money laundering demands that financial
institutions must ‘know their customer’ (KYC) [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2, 30</xref>
          ] . For every transaction, these organisations
must verify customer identity, trace their funding, and find the ultimate beneficiary.
Subsequently, they must report any suspicious activities to the regulator. There are two main
obligations: (1) to investigate all financial transactions, identify the clients, trace the source of
funding, and identify the ultimate beneficiaries of the transaction. Here the main purpose is to
establish a proper record of each transaction. (2) On the basis of these records, monitor and
report any unusual or suspicious transactions, to the regulator. Note that the unusual nature of
a transaction may only be found by comparing series of transactions, by advanced data analysis.
Anomaly detection has been used for this purpose [31, 32].
        </p>
        <p>
          In the Netherlands, under the WVWFT [1, §16], businesses must immediately report any
unusual transaction to the Financial Intelligence Unit. What is considered unusual is defined by
indicators in an administrative decree. Banks and other financial institutions must interpret
these indicators and map them onto their data structures and business processes. For companies
that violated this reporting obligation [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], it appears that a mistake in this interpretation and
mapping process is more crucial, than a mistake in the execution of the processes.
        </p>
        <p>We can make some observations. First, diferent processes are involved, with diferent
departments (legal; compliance; risk and control; IT). Some processes are more strategic; others
are more operational. Second, these processes need diferent sources of data. Sources can be
structured in databases, but can also be textual, or contain outcomes of tests or analytics scripts.
Third, these processes run at diferent time-scales . For example, in executing a transaction,
there is an immediate time-scale, but in monitoring trends, there is a long-term time scale.
Summarising, in the know-your-customer case, a single business process is the wrong unit of
analysis for compliance purposes.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Scenario 2. Building permits</title>
        <p>In municipalities, a building permit is required before one is allowed to construct or adjust a
building. To get a building permit, a procedure must be followed. A permit is only granted, when
it is motivated by documents (building plans; safety assessment), and when these documents
indicate that specific quality criteria for the building will be met. The purpose of the procedure
is to make sure that (1) the municipality has records of all buildings and their construction, and
(2) the municipality can maintain quality and safety criteria for all buildings. Buildings must
not collapse under weather influence, be resistant to fire, and increasingly, be energy eficient.
The specific quality criteria depend on the development plan for the neighborhood: agriculture,
housing, shopping, industry (NL: bestemmingsplan). It is easier to regulate permits, then actual
construction of buildings. In case of a mistake in a building permit, the building may have to be
demolished or altered. This is the main sanction, although fines may also be used.</p>
        <p>
          WVWFT [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]
financial
transactions
(1) relevant details of all transactions are recorded
(2) all and only transactions that are deemed unusual according to WVWFT
administrative decrees are identified and reported
(3) uninterrupted flow of transactions
(4) confidentiality of client details is respected
(5) acceptable compliance risk
(1) Ensure records of transaction: identity, bank account, authentication and
authorisation of sender; identity, bank account, and authentication of receiver;
source of funding, identity of ultimate beneficiary.
(2) Maintain indicators of ‘unusual’. Develop corresponding criteria and
automated tests. Run tests before committing transactions. Hits are reviewed
by compliance oficer. Regularly review criteria and tests.
(3) % investigated transactions &lt; threshold; duration investigation &lt; threshold;
other monitoring carried out of-line
(4) Access to sensitive data on need-to-know basis only; most data handled
by automated processes; search is blocked; cases reviewed by compliance
oficers are made anonymous (if possible).
(5) number and severity of unusual cases &lt; threshold. number and severity of
confidentiality breaches &lt; threshold. all known unusual cases found.
        </p>
        <p>Municipal Environment plan, Zoning plan, Omgevingswet [33]
construction
buildings
(1) relevant details of all buildings are recorded
(2) all buildings meet quality and safety criteria
(3) unobstructed flow of housing and renewal projects
(4) owners demands are respected
(1) Ensure records of identity and residence of owner, architect, and
construction company, a detailed blue print and construction plan
(2) Ensure that buildings that meet quality and safety criteria get a permit
(3) % stalled procedures &lt; threshold; average duration &lt; threshold</p>
        <p>In the Netherlands, the legal framework for permits has changed. After years of delays due
to late IT systems, the Omgevingswet (Environment Act)[33] tries to bundle many types of
permits: buildings, safety, national heritage, etc, and harmonize the procedures of municipalities.
To accommodate this change, stakeholders have to invest in new ways of working, and in IT.</p>
        <p>Summarizing, for one construction project, often many diferent procedures are involved,
and many types of data are needed (blue prints; safety assessments). These documents must
be archived, so they can be retrieved later. Note that the object of compliance is the body of
housing, not the permit. The procedure is only a means to maintain quality and safety criteria.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Theoretical background</title>
      <p>In this section, we provide some theoretical background for the vision shown in Figure 1. Due
to lack of space, this overview must necessarily remain sketchy.</p>
      <sec id="sec-3-1">
        <title>3.1. Information integrity</title>
        <p>The core of the vision is formed by a database of cases, that is designed to uphold integrity
constraints [34, 25]. Integrity constraints are conditions on the data or information in a database
or information system, that must remain true (invariant), based on their type or meaning.
Modern database management systems and ERP systems have built-in tools and techniques to
uphold integrity constraints. For example, entry-level controls filter out typing mistakes.</p>
        <p>Some integrity constraints are about data types or syntactic constraints. For example, February
30, is not a valid date. Other integrity constraints are semantic. For example, an interest rate is
a percentage, so in principle negative interest rates should not exist. Some integrity constraints
are relationships. For example, the total income in a year calculated as the sum of all monthly
incomes, should equal the income calculated as the sum of incomes generated per division. In
accounting, these relational constraints are called reconciliation relations [25].</p>
        <p>According to [35], transactions (TPs) on databases are designed and implemented in such
a way that (1) they ensure the integrity constraints (IVP) for new input data, and (2) they
preserve the integrity constraints (IVP) for existing data. In addition, there are procedural and
organizational controls. All transactions must be logged, to allow traceability and thereby foster
accountability. Only qualified users are authorized to execute a transaction, further reducing
the risk. Similar ideas are built into ERP systems and database management systems [34].</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Traceability in requirements engineering</title>
        <p>Another source of inspiration is requirements engineering, in particular traceability [36], see
also [27]. Forward traceability is the property that each part of a system specification leads to
a configuration of lower-level components that implement it. This requires maintenance of
traceability links in the how-direction, which is down the aggregation hierarchy. Backward
traceability is the property that for each component of a system at some level, it is clear why
it was included, in terms of the specification of the level above. This requires links in the
why-direction, which is up the aggregation hierarchy [27, p. 26].</p>
        <p>In our case, each condition to be tested on the cases, is motivated by a legal requirement,
which must in turn be motivated by an interpretation of a legal text or clause (backward).
Conversely, each interpretation of a legal text or clause, must lead to some legal requirements,
which translate into formal conditions, that can be tested on the cases in the database (forward).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Compliance policies</title>
        <p>
          Compliance management involves more than operational aspects. A large part of the efort
goes into motivating strategic choices about compliance [25]. Such choices are laid down into
company policies [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. These policies are what drive subsequent decisions and eforts, for
example to invest in IT or in personnel. Part of the strategic choices are driven by legal demands,
such as laws and regulations, or by internal controls and measures that are in turn driven by
legal demands. Other choices are driven by business objectives, such as cutting costs or adding
value to the customer. According to the Lean business process improvement philosophy [37],
compliance eforts do not seem to add value to the customer. They are necessary, but do not
add a competitive edge.
        </p>
        <p>In the trade-of between compliance and business value, managers, assisted by compliance
oficers, have to make a specific interpretation of the law (see below) and relate that to the
business environment, existing policies, costs of compliance, and business objectives. Typically, a
manager will not invest in compliance, unless there is a moral reason to be compliant (solidarity;
care for customers), or unless the likelihood of being caught in a violation multiplied by the
expected costs (reputation risk; sanctions) are larger than the saved costs.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Compliance by design</title>
        <p>In compliance, there are two roles for information systems: (i) source: measure, represent and
store data about compliance behaviour, that can be used as a source of evidence, and (ii) analysis:
analyse various sources of data, and determine whether the company is compliant. In both
cases, the reliability of the system itself must be part of the evaluation. For this reason, the
system must be designed with compliance in mind: compliance by design. In particular, internal
controls must be implemented, to ensure reliability of evidence [38, 39]. Here reliability means
correctness (all data corresponds to reality) and completeness (all relevant aspects of reality are
stored as data). The idea is to get the data directly from the source, without possibilities for
manipulation, and to put controls on all subsequent processing (see integrity).</p>
        <p>
          Lu et al [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] present compliance by design as essentially a preventative approach. Compliance
is built into the business processes that support it. We use the term in a broader sense, including
trade-ofs between compliance risk and other business objectives. To achieve
complianceby-design, several steps have to be followed [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. (1) Maintain a controls directory: this is a
representation of relevant control objectives, and indicators to evaluate them, (2) Analyse,
compare actual business processes to (indicators of) the control objectives, (3) Respond, redesign
the process to mitigate the risks deficiencies found, or accept deficiencies, and (4) Monitor,
regularly test if objectives are still valid. This is similar to the plan-do-check-act cycle [40], used
in risk and control. See also [41] for a similar compliance framework. Actually, there are two
diferent time scales: (1) urgent, when a risk is identified, and controls must be designed and
implemented, and (2) monitoring, to regularly evaluate the risks and efectiveness of controls.
        </p>
        <p>
          We also mention an approach called lawfulness by design [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. It suggests design patterns to
ensure lawfulness of IT artefacts, specifically data sets. By following design patters that work,
the cognitive load on the developers of systems can be reduced, and can be used for other tasks.
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. Legal interpretation</title>
        <p>
          Much work on legal informatics (e.g. [42]), wrongly assumes that the law is captured in a single
document, that can be translated into a formal representation, to be checked automatically.
In fact, there are many legal documents (e.g. national law, administrative degrees, policies),
and per document, many diferent interpretations (e.g strict versus lenient), that will lead to
diferent implementations [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ][
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. To decide about these implementations, it is crucial to
maintain an intermediate (formal) representation for each separate interpretation, so diferent
interpretations can be analysed and compared. For example, which alternative is cheaper?
        </p>
        <p>
          The law is often ambiguous [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. This is deliberate. The law must be future-proof and not
be written for a specific technology. This is called the open texture of the law [43]. Especially
terms that express a valuation, are subject to debate. For example, in the GDPR art. 5.1(f), what
is meant by ‘appropriate security’ crucially depends on the context: on the type of data and
on purpose for collecting the data. Black [44] compares the debate about contested terms to
regulatory conversations among stakeholders, that settle what is considered acceptable.
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>3.6. Legal rules and evidence</title>
        <p>Data has to be aggregated, cleaned and interpreted, before it has meaning as information.
Furthermore, information provides evidence of some legal condition that is relevant to some
decision (Figure 2). For example, a unique footprint in the mud means that a suspect was present
at the crime scene, which is enough evidence to hold the suspect in custody. In this diagram,
the meaning relationship is ‘counts-as’ [45], see also [46]. Such counts-as rules are known as
constitutional rules, which include legal terms and definitions. In a sense, these rules specify
what conditions constitute (generate) the institutional facts. Constitutive rules are contrasted
with regulative rules, which specify obligations and permissions, and possibly sanctions in case
of a violation. Regulative rules use the terms and conditions, specified in constitutional rules.</p>
        <p>A useful perspective on evidence can be found in assertion-based auditing [47]. Here, an
audit dossier contains the outcomes of various tests, or assertions, that together make up the
truth of an audit objective. In a similar way, we aim to add assertions to the evidence dossier.
Whenever cases are updated, the assertions have to be re-tested.</p>
      </sec>
      <sec id="sec-3-7">
        <title>3.7. Continuous assurance</title>
        <p>Prevention is not enough. No organisation is ever fully compliant, and therefore needs to run
regular tests, to find any remaining violations and solve issues. This is the task of compliance
monitoring. Our compliance engineering philosophy is inspired by ideas from continuous
control monitoring and continuous auditing [48, 49, 24].</p>
        <p>Kocken and Hulstijn [50] show that it is possible in principle to provide a continuous assurance
service, on the basis of a continuous auditing system (monitoring specific properties of the
data stream) combined with a continuous control monitoring system (monitoring operational
efectiveness of internal controls), which both feed into a dashboard for showing the current
status. Finally, a workflow triggered by a request for a written assurance document, summarises
the last months of data in the platform, for those clients who need written proof.</p>
      </sec>
      <sec id="sec-3-8">
        <title>3.8. Data analytics and data mining</title>
        <p>Data mining has been used extensively in fraud detection and compliance monitoring [51, 52].
Fraud detection is an analytic task, similar to classification. Based on the attributes of a case,
a case is classified as ‘fraud’ or ‘non-fraud’. Monitoring can be seen as repeated detection. A
classic problem is to distinguish violations from exceptional cases [53]. So in practice, suspected
violations must first be verified by a human expert (‘trained eye’).</p>
        <p>Recent approaches to fraud detection, identify outliers or anomalies in the data, as
indicators of fraud [32]. Data is clustered based on similarity. Outliers indicate potential fraud.
These techniques have been tested in an audit context [31]. Anomaly detection is a form of
unsupervised learning, which removes the need for human experts to annotate data up front.
However, suspected cases must still be verified. So, in a first phase unsupervised techniques
select potential fraud cases, which are then filtered down in a second phase, by supervised
techniques, trained for a specific application domain [ 32]. The remaining suspicious cases are
verified by a compliance oficer. So these techniques must be deployed as part of an integrated
system in which the distribution of human efort and data mining are mutually optimised.
Efectiveness of such tools must be frequently verified, as part of organisational learning.</p>
      </sec>
      <sec id="sec-3-9">
        <title>3.9. Natural language processing</title>
        <p>As compliance checking is essentially a legal activity, it is no surprise that documents and
texts play an important role. Natural Language Processing is a huge area, that has managed
to automate basic linguistics tasks: part-of-speech tagging (segment meaningful chunks in
text), parsing (translate sentences into a meaning representation), named entity recognition
(e.g. to identify parties in a contract), co-reference resolution (e.g. to identify cross references
between legal clauses), topic modelling (determine what a text is about) and sentiment analysis
(determine the attitude conveyed by a text). These tasks ca be combined into useful tools to
support legal reasoning, including compliance checking [53].</p>
        <p>
          In our vision, there are three functionalities that can be supported by natural language
processing. First, the interpretation task can be partly automated [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], so that various versions
of a law or policy can be converted into a meaning representation, which can then be compared,
simulated and tested against models of operational systems and business processes, to determine
which one is more eficient or more secure, for example. Second, in all kinds of monitoring and
verification tasks, NLP techniques can analyse unstructured data that involves text elements. For
example, named entity recognition can trace the ultimate beneficiary of a financial transaction,
as part of the know-your-customer case. Here, the same caveat holds as above: such components
can only predict suspected cases; they still need to be verified. Third, in many administrative
tasks, evidence documents can be parsed and tested, if they ‘count as’ the right type of evidence.
For example, identification documents can be scanned for name and social security number.
        </p>
        <p>
          Recently, NLP approaches to compliance checking have been proposed, that explicitly address
diferences in legal interpretation. However, these systems do not require an intermediate
meaning representation, removing also the need to maintain such representations, but instead
identify changes and diferences in the legal texts themselves, before being mapped onto the
controls and business processes in which they apply [
          <xref ref-type="bibr" rid="ref19 ref20">20, 19</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-10">
        <title>3.10. Data quality</title>
        <p>A general problem in compliance checking, is that one depends on the data quality. Data
for making compliance decisions is often missing or wrong. For that reason, all automated
data-driven decisions must be cross-verified, with the subject or with an expert [53].</p>
        <p>This went terribly wrong in the RoboDebt case [54], in Australia. Here, a government
information system was used to calculate and collect the ‘debt’ of citizens, meaning the amount
of social security benefits, that citizens had received but were not entitled to. When accurate
data about a citizen’s income was missing, the debt was calculated based on averages. Note that
people with low income, who need social benefits, often also have an unstable income. So an
average over the previous period, is not a good way to estimate an income. In a large number
of cases this resulted in huge debts that were not justified, leading to financial and social harm
for the people involved. This situation was made worse by the reluctance of oficials to handle
complaints. This illustrates the importance of regular checks, and of allowing feedback [55].</p>
        <p>Note in this respect, that many compliance applications assume negation-as-failure: absence
of data or evidence means that the property is considered to be false. For example, in the
building permit case, if no evidence of a safety assessment is recorded, oficials may act on the
assumption that no assessment was done. This assumption may only be made, if all cases go
through a strict entry process, that ensures completeness (see integrity). In practice however,
omissions and mistakes are made, so decision making must be made robust to uncertain or
incomplete data. That is why frequent monitoring and data analysis remains necessary [56].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Towards an architecture</title>
      <p>We will start with a general vision. After that, we will outline the various components, and
ifnally, detail how these components can be connected.</p>
      <p>Take the two views that we have discussed: the data view and the process view. The data view
looks at evidence of states of afairs being compliant. The process view looks at newly created
states of afairs or at transactions, which update those states of afairs. We believe that these
two views can be combined into a unified whole, if we make use of an invariant property [57].
Compliance, like safety or security, is a property that must always hold. So compliance is
specified as an invariant property. Changes or incidents threaten to disrupt compliance. So that
triggers a research question: can we ensure by a suitable architecture (system and procedures)
that a company remains demonstrably compliant?</p>
      <p>Consider the diagram in Figure 1 again. We start from the set of cases. Now suppose that
the organisation is actually compliant: they have evidence to demonstrate that all cases in the
1-2
2-1
2-3
3-2
3-4
4-3</p>
      <p>Purpose
store and retrieve properties of cases, integrity constraints,
control mechanisms to maintain integrity constraints
store and retrieve evidence, verify validity of evidence, summarise
evidence documents
store and retrieve requirement specifications, trace dependencies
store and retrieve legal sources, trace dependencies
set satisfy the legal requirements. So the invariant property, for all cases legal compliance is
demonstrated by evidence, is true. This can be broken down into three sub-properties (page 3):
(i) all cases conform to the legal requirements, (ii) compliance of cases is supported by evidence,
and (iii) legal requirements correspond to relevant legislation.</p>
      <p>What components are needed to ensure these properties? A summary is given in Table 3.</p>
      <p>How can such invariant properties be verified and demonstrated? We look at the six arrows
in the diagram. (i) To verify compliance, run a set of queries on the cases, that corresponds to
the legal requirements (verify and monitor, right to left). The database must be designed in such
a way, that it has attributes than can answer such queries (design, left to right). (ii) Moreover, for
all claims or assertions stored in the case database, there must be a valid reference to a piece of
evidence to support it: a document, a credential, or the outcome of query (support, right-to-left).
Conversely, whenever a claim or assertion is tested, either as part of the regular monitoring or
as part of processes that handle transactions or changes, outcomes of such tests are recorded
(record, left-to-right). (iii) Analogous to forward traceability, for all relevant interpretations
of legislation, there must be one or more requirements, that represent them (interpretation,
left-to-right). Conversely, for all requirements in the repository, there most be a preferred
interpretation of a legal source, that motivates it (validation, right to left).</p>
      <p>Now consider all the possible ways in which this invariant can be (temporarily) breached.
For example, cases may be added, updated or deleted; evidence may be lost; data may be wrong
or incomplete; laws may change, or be re-interpreted, and the IT infrastructure in which these
processes is maintained, may change too. For all these potential threats to the invariant property
of compliance, adequate business processes must be designed, that will restore the invariant.</p>
      <p>In the diagram, these potential changes are shown by three arrows labelled in, out and update,
inspired by system input, output and change. In business process management, one often refers
to the four basic operations of persistent storage: create, read, update and delete (CRUD). They
have a similar role. Ideally, read would not seem to alter the invariant, but that is wrong, if we
allow for uncertain or incomplete data. Suppose we do a random check, and it appears data is
added or removed. In that case, a read will change the outcome.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>In this paper we have presented a more ambitious and legally more plausible conceptual model
for compliance: evidence-based compliance engineering. By contrast to the dominant view in
information systems research, compliance is not predominantly about business processes, but
rather it is both about processes and about data. Processes collect and update the data that
counts as evidence of continued compliance, seen as an invariant property.</p>
      <p>This may be called the dual nature of compliance: one pertaining to continued adherence to
the rules, as shown by data, and the other to the enforced following of legal procedures.</p>
      <p>Such an evidence-based conceptual model of compliance, is more natural for legal experts. It
would potentially take trade-ofs between compliance and business objectives, into account.
It would also allow for diferences in legal interpretation, using NLP tools. It allows for the
advances in data analytics and data mining to be deployed. If done well, frequent analysis and
monitoring should make it robust for incomplete and uncertain data.</p>
      <p>So far, this is only a vision. A lot of work remains to be done. First, the vision must be
developed into an enterprise architecture, consisting of components and interfaces. Given
a proper semantics of the functionality of the components in terms of assertions (Boolean
statements about compliance), and a semantics of the interfaces in terms of transactions, it
must in principle be possible to demonstrate, that the invariant can be maintained, when all
components continue to function, and when all in, out and update processes, continue to
perform. Second, the architecture must be populated with real tools and techniques, that can be
used to perform the functionality on the arrows. Here, requirements engineering may be used
to pick the best solution for a given component. Third, the usefulness and adequacy may then
be demonstrated, for one or more real-life cases, such as the scenarios discussed.</p>
      <p>The vision is promising, but there are also various challenges: data quality (wrong, missing
or uncertain data), legal interpretation (comparing various representations), and trade-ofs
(balancing compliance and business objectives). Each of these challenges will also lead to
fruitful research directions.
development and evaluation of lawful design patterns to consider legal requirements,
European Journal of Information Systems 0 (2023) 1–28.
[22] U. Parliament, Criminal procedure and investigations act 1996, 1996.
[23] H. Chen, R. H. L. Chiang, V. C. Storey, Business intelligence and analytics: From big data
to big impact, MIS Quarterly 36 (2012) 1165 – 1188.
[24] F. Huang, W. G. No, M. A. Vasarhelyi, Z. Yan, Audit data analytics, machine learning, and
full population testing, The Journal of Finance and Data Science 8 (2022) 138–144.
[25] R. Christiaanse, J. Hulstijn, Control automation to reduce costs of control, International</p>
      <p>Journal of Information System Modeling and Design 4 (2013) 27 – 47.
[26] IIA, The three lines of defense in efective risk management and control, 2013.
[27] R. J. Wieringa, Requirements Engineering: Frameworks for Understanding, Wiley, 1996.
[28] J. D. Palmer, Traceability, in: R. H. Thayer, M. Dorfman (Eds.), Software Requirements</p>
      <p>Engineering, IEEE Computer Society Press, 1997, p. 364–374.
[29] R. J. Wieringa, Design science methodology for information systems and software
engineering, Springer Verlag, London, 2014.
[30] U. K. Parliament, Proceeds of crime act, 2002.
[31] M. Schreyer, T. Sattarov, D. Borth, A. Dengel, B. Reimer, Detection of anomalies in large
scale accounting data using deep autoencoder networks, CoRR abs/1709.05254 (2017).
[32] T. Pourhabibi, K.-L. Ong, B. H. Kam, Y. L. Boo, Fraud detection: A systematic literature
review of graph-based anomaly detection approaches, Decision Support Systems 133
(2020) 113303. URL: https://www.sciencedirect.com/science/article/pii/S0167923620300580.
doi:https://doi.org/10.1016/j.dss.2020.113303.
[33] T. K. der Staten Generaal, Omgevingswet 2016, 2016.
[34] P. W. P. J. Grefen, P. M. G. Apers, Integrity control in relational database systems- an
overview, Data and Knowledge Engineering 10 (1993) 187–223.
[35] D. D. Clark, D. R. Wilson, A comparison of commercial and military computer security
policies, in: IEEE Symposium on Security and Privacy, IEEE, 1987, pp. 184–194.
[36] A. Egyed, P. Grbacher, Supporting software understanding with automated requirements
traceability, International Journal of Software Engineering and Knowledge Engineering
15 (2005) 783–810.
[37] J. P. Womack, D. T. Jones, Lean Thinking: Banish Waste and Create Wealth in Your</p>
      <p>Corporation, Free Press, 1996.
[38] COSO, Internal Control - Integrated Framework, Technical Report, Committee of
Sponsoring Organizations of the Treadway Commission, 1992.
[39] M. B. Romney, P. J. Steinbart, Accounting Information Systems, 14th ed., Pearson Education,
2018.
[40] W. E. Deming, Out of the Crisis, MIT Center for Advanced Engineering Study, 1986.
[41] J. Hulstijn, Compliance by design: Het inbouwen van regelgeving in bedrijfsprocessen en
informatiesystemen, RegelMaat 27 (2012) 88–100.
[42] T. Breaux, A. Anton, Analyzing regulatory rules for privacy and security requirements,</p>
      <p>IEEE Transactions on Software Engineering 34 (2008) 5–20.
[43] H. L. A. Hart, The Concept of Law, Clarendon Press, Oxford, 1961.
[44] J. Black, Regulatory conversations, Journal of Law and Society 29 (2002) 163–196.
[45] J. R. Searle, The Construction of Social Reality, The Free Press, 1995.
[46] A. J. I. Jones, M. Sergot, A formal characterisation of institutionalised power, Journal of
the Interest Group in Pure and Applied Logic 3 (1996) 427–443.
[47] D. A. Leslie, S. J. Aldersley, D. J. Cockburn, C. J. Reiter, An Assertion Based Approach to</p>
      <p>Auditing, University of Kansas, Kansas, 1986, pp. 31–64.
[48] M. Alles, G. Brennan, A. Kogan, M. A. Vasarhelyi, Continuous monitoring of business
process controls: A pilot implementation of a continuous auditing system at Siemens,
International Journal of Accounting Information Systems 7 (2006) 137–161.
[49] A. Kogan, M. G. Alles, M. A. Vasarhelyi, Design and evaluation of a continuous data level
auditing system., Auditing: A Journal of Practice and Theory 33 (2014) 221–245.
[50] J. Kocken, J. Hulstijn, Providing Continuous Assurance, in: H. Weigand (Ed.), Proceedings
of the 11th International Workshop on Value Modeling and Business Ontologies (VMBO
2017), Luxembourg Institute of Science and Technology (LIST), Luxembourg, 2017.
[51] E. Ngai, Y. Hu, Y. Wong, Y. Chen, X. Sun, The application of data mining techniques in
ifnancial fraud detection: A classification framework and an academic review of literature,
Decision Support Systems (2011) 559–569.
[52] B. Baesens, S. Höppner, T. Verdonck, Data engineering for fraud detection, Decision</p>
      <p>Support Systems 150 (2021) 113492.
[53] K. D. Ashley, Artificial Intelligence and Legal Analytics: New Tools for Law Practice in the</p>
      <p>Digital Age, Cambridge University Press, 2017.
[54] C. Holmes, Report of the Royal Commission into the Robodebt Scheme, Report,
Commonwealth of Australia, 2023.
[55] K. Orr, Data quality and systems theory, Communications of the ACM 41 (1988) 66–71.
[56] L. P. English, Improving Data Warehouse and Business Information Quality, John Wiley &amp;</p>
      <p>Sons, Inc., New York, 1999.
[57] L. Lamport, A new approach to proving the correctness of multiprocess programs, ACM
Transactions on Programming Languages and Systems 1 (1977) 84–97.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>T. K. der Staten</surname>
            <given-names>Generaal</given-names>
          </string-name>
          ,
          <article-title>Wet ter voorkoming van witwassen en het financieren van terrorisme (Wwft)</article-title>
          ,
          <source>Technical Report, Koninkrijk der Nederlanden</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Parliament</surname>
          </string-name>
          ,
          <source>The Money Laundering and Terrorist Financing (Amendment) (No. 2)</source>
          ,
          <source>Technical Report No. 860</source>
          ,
          <string-name>
            <surname>United</surname>
            <given-names>Kingdom</given-names>
          </string-name>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] FinCEN, Beneficial Ownership Information Reporting Requirements,
          <source>Technical Report, Financial Crimes Enforcement Network, US Treasury</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Reuters</surname>
          </string-name>
          ,
          <article-title>Rabobank faces punishment over customer anti-money-laundering checks</article-title>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Merz</surname>
          </string-name>
          , '
          <article-title>it could have been us'. peer responses to money-laundering violations in the dutch banking industry</article-title>
          , Crime, Law and Social
          <string-name>
            <surname>Change</surname>
          </string-name>
          (
          <year>2023</year>
          ). doi:https://doi.org/ 10.1007/s10611-023-10120-y.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Pwc</surname>
          </string-name>
          ,
          <article-title>Using the right tools for anti-money laundering compliance</article-title>
          ,
          <year>2023</year>
          . URL: https://www.pwc.com/us/en/industries/financial-services/
          <article-title>financial-crimes/ anti-money-laundering/compliance-tools</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          , W. van der Aalst, H. M. ter Hofstede Arthur,
          <string-name>
            <surname>Process-Aware Information</surname>
            <given-names>Systems</given-names>
          </string-name>
          , John Wiley and Sons.,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. F. S. A.</given-names>
            <surname>Elgammal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Türetken</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. J. A. M.</surname>
          </string-name>
          <article-title>van den Heuvel, M. Papazoglou, Formalizing and applying compliance patterns for business process compliance</article-title>
          .,
          <source>Software and Systems Modeling</source>
          <volume>15</volume>
          (
          <year>2014</year>
          )
          <fpage>119</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sadiq</surname>
          </string-name>
          , G. Governatori,
          <source>Measurement of Compliance Distance in Business Work Practice, Information Systems Management</source>
          <volume>25</volume>
          (
          <year>2009</year>
          )
          <fpage>344</fpage>
          -
          <lpage>355</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Governatori</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Sadiq,</surname>
          </string-name>
          <article-title>The journey to business process compliance</article-title>
          ,
          <source>in: Handbook of Research on Business Process Management, IGI Global</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>426</fpage>
          -
          <lpage>445</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L. T.</given-names>
            <surname>Ly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rinderle-Ma</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P.</surname>
          </string-name>
          v. d. Aalst,
          <article-title>Compliance monitoring in business processes: Functionalities, application</article-title>
          , and tool-support,
          <source>Information Systems</source>
          <volume>54</volume>
          (
          <year>2015</year>
          )
          <fpage>209</fpage>
          -
          <lpage>234</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hashmi</surname>
          </string-name>
          , G. Governatori,
          <string-name>
            <given-names>H.-P.</given-names>
            <surname>Lam</surname>
          </string-name>
          , M. T. Wynn,
          <article-title>Are we done with business process compliance: state of the art and challenges ahead</article-title>
          ,
          <source>Knowledge and Information Systems</source>
          <volume>57</volume>
          (
          <year>2018</year>
          )
          <fpage>79</fpage>
          -
          <lpage>133</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10115-017-1142-1.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          ,
          <article-title>Conformance checking: Foundations, milestones and challenges</article-title>
          , in: W.
          <string-name>
            <surname>M. P. van der Aalst</surname>
          </string-name>
          , J. Carmona (Eds.),
          <source>Process Mining Handbook, LNBIP 448</source>
          , Springer,
          <year>2022</year>
          , p.
          <fpage>155</fpage>
          -
          <lpage>190</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Tosatto</surname>
          </string-name>
          , G. Governatori,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kelsen</surname>
          </string-name>
          ,
          <article-title>Business process regulatory compliance is hard</article-title>
          ,
          <source>IEEE Transactions on Service Computing</source>
          <volume>8</volume>
          (
          <year>2014</year>
          )
          <fpage>958</fpage>
          -
          <lpage>970</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eggert</surname>
          </string-name>
          , Compliance Management in Financial Industries, Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Janssen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hulstijn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Humphreys</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. van der Torre</surname>
          </string-name>
          ,
          <article-title>Managing Legal Interpretation in Regulatory Compliance</article-title>
          , in: B.
          <string-name>
            <surname>Verheij</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of the XIV-th International Conference on Artificial Intelligence and Law (ICAIL</source>
          <year>2013</year>
          ), ACM, Rome,
          <year>2013</year>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghanavati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hulstijn</surname>
          </string-name>
          ,
          <article-title>Impact of legal interpretation in business process compliance</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>A. K. Massey</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Holtgrefe</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Ghanavati</surname>
          </string-name>
          ,
          <article-title>Modeling regulatory ambiguities for requirements analysis</article-title>
          , in: H.
          <string-name>
            <surname>C. Mayr</surname>
          </string-name>
          , et al. (Eds.),
          <source>Proceedings of the 36th International Conference on Conceptual Modeling (ER</source>
          <year>2017</year>
          ),
          <source>LNCS 10650</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>238</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Mustroph</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Barrientos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Winter</surname>
          </string-name>
          , S. Rinderle-Ma,
          <article-title>Verifying resource compliance requirements from natural language text over event logs</article-title>
          ,
          <source>in: Business Process Management (BPM</source>
          <year>2023</year>
          ), Utrecht,
          <source>The Netherlands, LNCS14159</source>
          , Springer,
          <year>2023</year>
          , pp.
          <fpage>249</fpage>
          -
          <lpage>265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Barrientos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Winter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mangler</surname>
          </string-name>
          , S. Rinderle-Ma,
          <article-title>Verification of quantitative temporal compliance requirements in process descriptions over event logs</article-title>
          ,
          <source>in: Advanced Information Systems Engineering</source>
          , volume
          <volume>13901</volume>
          LNCS,
          <year>2023</year>
          , p.
          <fpage>417</fpage>
          -
          <lpage>433</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Ernestine</surname>
          </string-name>
          <string-name>
            <surname>Dickhaut</surname>
          </string-name>
          , Andreas Janson,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Leimeister</surname>
          </string-name>
          , Lawfulness by design -
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>