<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Evidence-based compliance engineering</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Joris</forename><surname>Hulstijn</surname></persName>
							<email>joris.hulstijn@uni.lu</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Luxembourg</orgName>
								<address>
									<settlement>Esch sur Alzette</settlement>
									<country key="LU">Luxembourg</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Evidence-based compliance engineering</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">D47AE00A1F2EE5C8DF1795E283904CBE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:17+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>compliance checking</term>
					<term>evidence</term>
					<term>invariant</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Most research on compliance checking is about business processes, focusing on the order and presence of activities, roles, and temporal properties. However, legislation demands evidence of legal conditions. An organisation is considered to be compliant to a piece of legislation, when it can demonstrate that the corresponding legal requirements continue to hold for the entire set of cases to which the legislation applies. In this paper we propose a new perspective: evidence-based compliance engineering. We sketch how to utilise existing tools for automated theorem proving and natural language understanding, to allow automated verification of legal objectives based on evidence documents. To demonstrate compliance, the system maintains an invariant for the set of cases, that involves legislation, legal requirements, cases and evidence documents. Whenever a change would disrupt this invariant, processes are started to select and analyse documents, update the cases, update the evidence and run the necessary proofs. The compliance status is monitored continuously and can be made visible on a dashboard. The applicability of the approach is illustrated by two examples.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Compliance checking involves a lot of administrative work. For example, legislation against money laundering <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref> demands that financial institutions must 'know their customer' (KYC). For every transaction, they must verify customer identity, trace their funding, and find the ultimate beneficiary. Solving these issues is complex and many banks fail. For example, Rabobank was fined for failing to uphold customer due diligence <ref type="bibr" target="#b3">[4]</ref>. These difficulties in meeting compliance demands are common <ref type="bibr" target="#b4">[5]</ref>. Software tools exist for know-your-customer and for anti-money laundering tasks. For example, Computer Assisted Subject Examination and Investigation Tool (CASEit), Customer Due Diligence Tool (CDD), tools for name-entity matching, data analysis tools for fine-tuning the suspicious activity detection, and a quick reference guide to track the relevant legislation in various countries <ref type="bibr" target="#b5">[6]</ref>. However, each tool only covers part of the investigation task. There is no unifying vision on compliance.</p><p>Compare this varied landscape of compliance tools to the academic literature on compliance checking. We observe that most approaches focus on compliance of business processes <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Compliance is interpreted as a set of formal properties, expressed in a form of logic, which is then verified for all traces generated by the business process. See for example Governatori and colleagues <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>, but also <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref> and later <ref type="bibr" target="#b11">[12]</ref>. Here is a recent overview <ref type="bibr" target="#b12">[13]</ref>.</p><p>In these works, the legal problem of compliance checking -to verify whether the outcome of a process conforms to objectives demanded by law -is reduced to the computer science problem of conformance testing -to verify whether the traces generated by a process specification satisfy formal properties, e.g. <ref type="bibr" target="#b13">[14]</ref>. From a computer science point of view, such a reduction is understandable, but from a legal or business point of view, there are several problems: Consider a conceptual model that involves legislation (text), legal requirements (formal representation), and evidence (documents, traces of verified queries), all linked to a database of cases. Such a model is sketched in Figure <ref type="figure" target="#fig_0">1</ref>. The model maintains a set of invariant properties:</p><p>(i) all cases conform to the legal requirements, (ii) compliance of cases is supported by evidence, and (iii) legal requirements correspond to relevant legislation. Automated reasoning, as well as data base and data analytics queries, allow verification of the legal requirements on the data set that represents all cases. Whenever a change would temporarily disrupt the invariant, for example when laws are changed or when cases are added, semi-automatic processes will start, to restore the invariant. These processes are shown in the diagram as in, out or update arrows. For example, when a new client is entered, due diligence checks are performed and evidence is collected and analysed, to verify the client conforms to the legal requirements, and thus the organisation conforms to the law. Similarly, when a new law is adopted, the interpretation process is supported by tools for natural language processing, to derive legal requirements that correspond to the legal interpretation chosen. At any time, the compliance status can be automatically verified by automated reasoning. Cases are monitored regularly and their status made visible on a dashboard.</p><p>In this exploratory paper we aim to introduce this vision of compliance engineering. Later, the vision must be further worked out, in the form of an architecture, design principles, and a formal semantics, that makes it possible to specify and the invariant properties, and add tools and techniques to verify them. In addition, specific tools and techniques must be selected to 'populate' the various modules in the architecture.</p><p>The research method is a form of design science <ref type="bibr" target="#b28">[29]</ref>. We present an artefact, a conceptual model for evidence-based compliance. The potential usefulness of the approach is illustrated by two scenarios: (1) know-you-customer, and (2) a building permit.</p><p>The remainder of the paper is structured as follows. First, section 2 contains the scenarios. Section 3 provides a theoretical background. Section 4. The paper ends with discussion of the research limitations and suggestions for further research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Scenarios</head><p>We analyse two simplified scenarios: (1) know-your-customer, and (2) building permit. Data was collected from publicly available documents. Summaries are given in Table <ref type="table" target="#tab_0">1</ref> and Table <ref type="table" target="#tab_1">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Know your customer</head><p>In various countries, legislation against anti-money laundering demands that financial institutions must 'know their customer' (KYC) <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b29">30]</ref> . For every transaction, these organisations must verify customer identity, trace their funding, and find the ultimate beneficiary. Subsequently, they must report any suspicious activities to the regulator. There are two main obligations: <ref type="bibr" target="#b0">(1)</ref> to investigate all financial transactions, identify the clients, trace the source of funding, and identify the ultimate beneficiaries of the transaction. Here the main purpose is to establish a proper record of each transaction. (2) On the basis of these records, monitor and report any unusual or suspicious transactions, to the regulator. Note that the unusual nature of a transaction may only be found by comparing series of transactions, by advanced data analysis. Anomaly detection has been used for this purpose <ref type="bibr" target="#b30">[31,</ref><ref type="bibr" target="#b31">32]</ref>.</p><p>In the Netherlands, under the WVWFT [1, §16], businesses must immediately report any unusual transaction to the Financial Intelligence Unit. What is considered unusual is defined by indicators in an administrative decree. Banks and other financial institutions must interpret these indicators and map them onto their data structures and business processes. For companies that violated this reporting obligation <ref type="bibr" target="#b4">[5]</ref>, it appears that a mistake in this interpretation and mapping process is more crucial, than a mistake in the execution of the processes.</p><p>We can make some observations. First, different processes are involved, with different departments (legal; compliance; risk and control; IT). Some processes are more strategic; others are more operational. Second, these processes need different sources of data. Sources can be structured in databases, but can also be textual, or contain outcomes of tests or analytics scripts. Third, these processes run at different time-scales. For example, in executing a transaction, there is an immediate time-scale, but in monitoring trends, there is a long-term time scale. Summarising, in the know-your-customer case, a single business process is the wrong unit of analysis for compliance purposes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Scenario 2. Building permits</head><p>In municipalities, a building permit is required before one is allowed to construct or adjust a building. To get a building permit, a procedure must be followed. A permit is only granted, when it is motivated by documents (building plans; safety assessment), and when these documents indicate that specific quality criteria for the building will be met. The purpose of the procedure is to make sure that (1) the municipality has records of all buildings and their construction, and (2) the municipality can maintain quality and safety criteria for all buildings. Buildings must not collapse under weather influence, be resistant to fire, and increasingly, be energy efficient. The specific quality criteria depend on the development plan for the neighborhood: agriculture, housing, shopping, industry (NL: bestemmingsplan). It is easier to regulate permits, then actual construction of buildings. In case of a mistake in a building permit, the building may have to be demolished or altered. This is the main sanction, although fines may also be used. (5) number and severity of unusual cases &lt; threshold. number and severity of confidentiality breaches &lt; threshold. all known unusual cases found. (1) relevant details of all buildings are recorded (2) all buildings meet quality and safety criteria business objectives:</p><p>(3) unobstructed flow of housing and renewal projects (4) owners demands are respected (some) requirements: (1) Ensure records of identity and residence of owner, architect, and construction company, a detailed blue print and construction plan (2) Ensure that buildings that meet quality and safety criteria get a permit (3) % stalled procedures &lt; threshold; average duration &lt; threshold</p><p>In the Netherlands, the legal framework for permits has changed. After years of delays due to late IT systems, the Omgevingswet (Environment Act) <ref type="bibr" target="#b32">[33]</ref> tries to bundle many types of permits: buildings, safety, national heritage, etc, and harmonize the procedures of municipalities. To accommodate this change, stakeholders have to invest in new ways of working, and in IT.</p><p>Summarizing, for one construction project, often many different procedures are involved, and many types of data are needed (blue prints; safety assessments). These documents must be archived, so they can be retrieved later. Note that the object of compliance is the body of housing, not the permit. The procedure is only a means to maintain quality and safety criteria.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Theoretical background</head><p>In this section, we provide some theoretical background for the vision shown in Figure <ref type="figure" target="#fig_0">1</ref>. Due to lack of space, this overview must necessarily remain sketchy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Information integrity</head><p>The core of the vision is formed by a database of cases, that is designed to uphold integrity constraints <ref type="bibr" target="#b33">[34,</ref><ref type="bibr" target="#b24">25]</ref>. Integrity constraints are conditions on the data or information in a database or information system, that must remain true (invariant), based on their type or meaning. Modern database management systems and ERP systems have built-in tools and techniques to uphold integrity constraints. For example, entry-level controls filter out typing mistakes.</p><p>Some integrity constraints are about data types or syntactic constraints. For example, February 30, is not a valid date. Other integrity constraints are semantic. For example, an interest rate is a percentage, so in principle negative interest rates should not exist. Some integrity constraints are relationships. For example, the total income in a year calculated as the sum of all monthly incomes, should equal the income calculated as the sum of incomes generated per division. In accounting, these relational constraints are called reconciliation relations <ref type="bibr" target="#b24">[25]</ref>.</p><p>According to <ref type="bibr" target="#b34">[35]</ref>, transactions (TPs) on databases are designed and implemented in such a way that (1) they ensure the integrity constraints (IVP) for new input data, and (2) they preserve the integrity constraints (IVP) for existing data. In addition, there are procedural and organizational controls. All transactions must be logged, to allow traceability and thereby foster accountability. Only qualified users are authorized to execute a transaction, further reducing the risk. Similar ideas are built into ERP systems and database management systems <ref type="bibr" target="#b33">[34]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Traceability in requirements engineering</head><p>Another source of inspiration is requirements engineering, in particular traceability <ref type="bibr" target="#b35">[36]</ref>, see also <ref type="bibr" target="#b26">[27]</ref>. Forward traceability is the property that each part of a system specification leads to a configuration of lower-level components that implement it. This requires maintenance of traceability links in the how-direction, which is down the aggregation hierarchy. Backward traceability is the property that for each component of a system at some level, it is clear why it was included, in terms of the specification of the level above. This requires links in the why-direction, which is up the aggregation hierarchy <ref type="bibr">[27, p. 26]</ref>.</p><p>In our case, each condition to be tested on the cases, is motivated by a legal requirement, which must in turn be motivated by an interpretation of a legal text or clause (backward). Conversely, each interpretation of a legal text or clause, must lead to some legal requirements, which translate into formal conditions, that can be tested on the cases in the database (forward).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Compliance policies</head><p>Compliance management involves more than operational aspects. A large part of the effort goes into motivating strategic choices about compliance <ref type="bibr" target="#b24">[25]</ref>. Such choices are laid down into company policies <ref type="bibr" target="#b14">[15]</ref>. These policies are what drive subsequent decisions and efforts, for example to invest in IT or in personnel. Part of the strategic choices are driven by legal demands, such as laws and regulations, or by internal controls and measures that are in turn driven by legal demands. Other choices are driven by business objectives, such as cutting costs or adding value to the customer. According to the Lean business process improvement philosophy <ref type="bibr" target="#b36">[37]</ref>, compliance efforts do not seem to add value to the customer. They are necessary, but do not add a competitive edge.</p><p>In the trade-off between compliance and business value, managers, assisted by compliance officers, have to make a specific interpretation of the law (see below) and relate that to the business environment, existing policies, costs of compliance, and business objectives. Typically, a manager will not invest in compliance, unless there is a moral reason to be compliant (solidarity; care for customers), or unless the likelihood of being caught in a violation multiplied by the expected costs (reputation risk; sanctions) are larger than the saved costs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Compliance by design</head><p>In compliance, there are two roles for information systems: (i) source: measure, represent and store data about compliance behaviour, that can be used as a source of evidence, and (ii) analysis: analyse various sources of data, and determine whether the company is compliant. In both cases, the reliability of the system itself must be part of the evaluation. For this reason, the system must be designed with compliance in mind: compliance by design. In particular, internal controls must be implemented, to ensure reliability of evidence <ref type="bibr" target="#b37">[38,</ref><ref type="bibr" target="#b38">39]</ref>. Here reliability means correctness (all data corresponds to reality) and completeness (all relevant aspects of reality are stored as data). The idea is to get the data directly from the source, without possibilities for manipulation, and to put controls on all subsequent processing (see integrity).</p><p>Lu et al <ref type="bibr" target="#b8">[9]</ref> present compliance by design as essentially a preventative approach. Compliance is built into the business processes that support it. We use the term in a broader sense, including trade-offs between compliance risk and other business objectives. To achieve complianceby-design, several steps have to be followed <ref type="bibr" target="#b8">[9]</ref>. (1) Maintain a controls directory: this is a representation of relevant control objectives, and indicators to evaluate them, (2) Analyse, compare actual business processes to (indicators of) the control objectives, (3) Respond, redesign the process to mitigate the risks deficiencies found, or accept deficiencies, and (4) Monitor, regularly test if objectives are still valid. This is similar to the plan-do-check-act cycle <ref type="bibr" target="#b39">[40]</ref>, used in risk and control. See also <ref type="bibr" target="#b40">[41]</ref> for a similar compliance framework. Actually, there are two different time scales: (1) urgent, when a risk is identified, and controls must be designed and implemented, and (2) monitoring, to regularly evaluate the risks and effectiveness of controls.</p><p>We also mention an approach called lawfulness by design <ref type="bibr" target="#b20">[21]</ref>. It suggests design patterns to ensure lawfulness of IT artefacts, specifically data sets. By following design patters that work, the cognitive load on the developers of systems can be reduced, and can be used for other tasks. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Legal interpretation</head><p>Much work on legal informatics (e.g. <ref type="bibr" target="#b41">[42]</ref>), wrongly assumes that the law is captured in a single document, that can be translated into a formal representation, to be checked automatically. In fact, there are many legal documents (e.g. national law, administrative degrees, policies), and per document, many different interpretations (e.g strict versus lenient), that will lead to different implementations <ref type="bibr" target="#b15">[16]</ref> <ref type="bibr" target="#b16">[17]</ref>. To decide about these implementations, it is crucial to maintain an intermediate (formal) representation for each separate interpretation, so different interpretations can be analysed and compared. For example, which alternative is cheaper?</p><p>The law is often ambiguous <ref type="bibr" target="#b17">[18]</ref>. This is deliberate. The law must be future-proof and not be written for a specific technology. This is called the open texture of the law <ref type="bibr" target="#b42">[43]</ref>. Especially terms that express a valuation, are subject to debate. For example, in the GDPR art. 5.1(f), what is meant by 'appropriate security' crucially depends on the context: on the type of data and on purpose for collecting the data. Black <ref type="bibr" target="#b43">[44]</ref> compares the debate about contested terms to regulatory conversations among stakeholders, that settle what is considered acceptable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">Legal rules and evidence</head><p>Data has to be aggregated, cleaned and interpreted, before it has meaning as information. Furthermore, information provides evidence of some legal condition that is relevant to some decision (Figure <ref type="figure" target="#fig_1">2</ref>). For example, a unique footprint in the mud means that a suspect was present at the crime scene, which is enough evidence to hold the suspect in custody. In this diagram, the meaning relationship is 'counts-as' <ref type="bibr" target="#b44">[45]</ref>, see also <ref type="bibr" target="#b45">[46]</ref>. Such counts-as rules are known as constitutional rules, which include legal terms and definitions. In a sense, these rules specify what conditions constitute (generate) the institutional facts. Constitutive rules are contrasted with regulative rules, which specify obligations and permissions, and possibly sanctions in case of a violation. Regulative rules use the terms and conditions, specified in constitutional rules.</p><p>A useful perspective on evidence can be found in assertion-based auditing <ref type="bibr" target="#b46">[47]</ref>. Here, an audit dossier contains the outcomes of various tests, or assertions, that together make up the truth of an audit objective. In a similar way, we aim to add assertions to the evidence dossier. Whenever cases are updated, the assertions have to be re-tested.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7.">Continuous assurance</head><p>Prevention is not enough. No organisation is ever fully compliant, and therefore needs to run regular tests, to find any remaining violations and solve issues. This is the task of compliance monitoring. Our compliance engineering philosophy is inspired by ideas from continuous control monitoring and continuous auditing <ref type="bibr" target="#b47">[48,</ref><ref type="bibr" target="#b48">49,</ref><ref type="bibr" target="#b23">24]</ref>. Kocken and Hulstijn <ref type="bibr" target="#b49">[50]</ref> show that it is possible in principle to provide a continuous assurance service, on the basis of a continuous auditing system (monitoring specific properties of the data stream) combined with a continuous control monitoring system (monitoring operational effectiveness of internal controls), which both feed into a dashboard for showing the current status. Finally, a workflow triggered by a request for a written assurance document, summarises the last months of data in the platform, for those clients who need written proof.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8.">Data analytics and data mining</head><p>Data mining has been used extensively in fraud detection and compliance monitoring <ref type="bibr" target="#b50">[51,</ref><ref type="bibr" target="#b51">52]</ref>. Fraud detection is an analytic task, similar to classification. Based on the attributes of a case, a case is classified as 'fraud' or 'non-fraud'. Monitoring can be seen as repeated detection. A classic problem is to distinguish violations from exceptional cases <ref type="bibr" target="#b52">[53]</ref>. So in practice, suspected violations must first be verified by a human expert ('trained eye').</p><p>Recent approaches to fraud detection, identify outliers or anomalies in the data, as indicators of fraud <ref type="bibr" target="#b31">[32]</ref>. Data is clustered based on similarity. Outliers indicate potential fraud. These techniques have been tested in an audit context <ref type="bibr" target="#b30">[31]</ref>. Anomaly detection is a form of unsupervised learning, which removes the need for human experts to annotate data up front. However, suspected cases must still be verified. So, in a first phase unsupervised techniques select potential fraud cases, which are then filtered down in a second phase, by supervised techniques, trained for a specific application domain <ref type="bibr" target="#b31">[32]</ref>. The remaining suspicious cases are verified by a compliance officer. So these techniques must be deployed as part of an integrated system in which the distribution of human effort and data mining are mutually optimised. Effectiveness of such tools must be frequently verified, as part of organisational learning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.9.">Natural language processing</head><p>As compliance checking is essentially a legal activity, it is no surprise that documents and texts play an important role. Natural Language Processing is a huge area, that has managed to automate basic linguistics tasks: part-of-speech tagging (segment meaningful chunks in text), parsing (translate sentences into a meaning representation), named entity recognition (e.g. to identify parties in a contract), co-reference resolution (e.g. to identify cross references between legal clauses), topic modelling (determine what a text is about) and sentiment analysis (determine the attitude conveyed by a text). These tasks ca be combined into useful tools to support legal reasoning, including compliance checking <ref type="bibr" target="#b52">[53]</ref>.</p><p>In our vision, there are three functionalities that can be supported by natural language processing. First, the interpretation task can be partly automated <ref type="bibr" target="#b15">[16]</ref>, so that various versions of a law or policy can be converted into a meaning representation, which can then be compared, simulated and tested against models of operational systems and business processes, to determine which one is more efficient or more secure, for example. Second, in all kinds of monitoring and verification tasks, NLP techniques can analyse unstructured data that involves text elements. For example, named entity recognition can trace the ultimate beneficiary of a financial transaction, as part of the know-your-customer case. Here, the same caveat holds as above: such components can only predict suspected cases; they still need to be verified. Third, in many administrative tasks, evidence documents can be parsed and tested, if they 'count as' the right type of evidence. For example, identification documents can be scanned for name and social security number.</p><p>Recently, NLP approaches to compliance checking have been proposed, that explicitly address differences in legal interpretation. However, these systems do not require an intermediate meaning representation, removing also the need to maintain such representations, but instead identify changes and differences in the legal texts themselves, before being mapped onto the controls and business processes in which they apply <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b18">19]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.10.">Data quality</head><p>A general problem in compliance checking, is that one depends on the data quality. Data for making compliance decisions is often missing or wrong. For that reason, all automated data-driven decisions must be cross-verified, with the subject or with an expert <ref type="bibr" target="#b52">[53]</ref>.</p><p>This went terribly wrong in the RoboDebt case <ref type="bibr" target="#b53">[54]</ref>, in Australia. Here, a government information system was used to calculate and collect the 'debt' of citizens, meaning the amount of social security benefits, that citizens had received but were not entitled to. When accurate data about a citizen's income was missing, the debt was calculated based on averages. Note that people with low income, who need social benefits, often also have an unstable income. So an average over the previous period, is not a good way to estimate an income. In a large number of cases this resulted in huge debts that were not justified, leading to financial and social harm for the people involved. This situation was made worse by the reluctance of officials to handle complaints. This illustrates the importance of regular checks, and of allowing feedback <ref type="bibr" target="#b54">[55]</ref>.</p><p>Note in this respect, that many compliance applications assume negation-as-failure: absence of data or evidence means that the property is considered to be false. For example, in the building permit case, if no evidence of a safety assessment is recorded, officials may act on the assumption that no assessment was done. This assumption may only be made, if all cases go through a strict entry process, that ensures completeness (see integrity). In practice however, omissions and mistakes are made, so decision making must be made robust to uncertain or incomplete data. That is why frequent monitoring and data analysis remains necessary <ref type="bibr" target="#b55">[56]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Towards an architecture</head><p>We will start with a general vision. After that, we will outline the various components, and finally, detail how these components can be connected.</p><p>Take the two views that we have discussed: the data view and the process view. The data view looks at evidence of states of affairs being compliant. The process view looks at newly created states of affairs or at transactions, which update those states of affairs. We believe that these two views can be combined into a unified whole, if we make use of an invariant property <ref type="bibr" target="#b56">[57]</ref>. Compliance, like safety or security, is a property that must always hold. So compliance is specified as an invariant property. Changes or incidents threaten to disrupt compliance. So that triggers a research question: can we ensure by a suitable architecture (system and procedures) that a company remains demonstrably compliant?</p><p>Consider the diagram in Figure <ref type="figure" target="#fig_0">1</ref> again. We start from the set of cases. Now suppose that the organisation is actually compliant: they have evidence to demonstrate that all cases in the database of cases store and retrieve properties of cases, integrity constraints, control mechanisms to maintain integrity constraints 2.</p><p>evidence repository store and retrieve evidence, verify validity of evidence, summarise evidence documents 3.</p><p>requirements repository store and retrieve requirement specifications, trace dependencies 4.</p><p>legislation repository store and retrieve legal sources, trace dependencies</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 4</head><p>Links between components (arrows in Figure <ref type="figure" target="#fig_0">1</ref>) and useful compliance tools to play that role set satisfy the legal requirements. So the invariant property, for all cases legal compliance is demonstrated by evidence, is true. This can be broken down into three sub-properties (page 3):</p><p>(i) all cases conform to the legal requirements, (ii) compliance of cases is supported by evidence, and (iii) legal requirements correspond to relevant legislation. What components are needed to ensure these properties? A summary is given in Table <ref type="table" target="#tab_2">3</ref>. How can such invariant properties be verified and demonstrated? We look at the six arrows in the diagram. (i) To verify compliance, run a set of queries on the cases, that corresponds to the legal requirements (verify and monitor, right to left). The database must be designed in such a way, that it has attributes than can answer such queries (design, left to right). (ii) Moreover, for all claims or assertions stored in the case database, there must be a valid reference to a piece of evidence to support it: a document, a credential, or the outcome of query (support, right-to-left). Conversely, whenever a claim or assertion is tested, either as part of the regular monitoring or as part of processes that handle transactions or changes, outcomes of such tests are recorded (record, left-to-right). (iii) Analogous to forward traceability, for all relevant interpretations of legislation, there must be one or more requirements, that represent them (interpretation, left-to-right). Conversely, for all requirements in the repository, there most be a preferred interpretation of a legal source, that motivates it (validation, right to left). Now consider all the possible ways in which this invariant can be (temporarily) breached. For example, cases may be added, updated or deleted; evidence may be lost; data may be wrong or incomplete; laws may change, or be re-interpreted, and the IT infrastructure in which these processes is maintained, may change too. For all these potential threats to the invariant property of compliance, adequate business processes must be designed, that will restore the invariant.</p><p>In the diagram, these potential changes are shown by three arrows labelled in, out and update, inspired by system input, output and change. In business process management, one often refers to the four basic operations of persistent storage: create, read, update and delete (CRUD). They have a similar role. Ideally, read would not seem to alter the invariant, but that is wrong, if we allow for uncertain or incomplete data. Suppose we do a random check, and it appears data is added or removed. In that case, a read will change the outcome.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>In this paper we have presented a more ambitious and legally more plausible conceptual model for compliance: evidence-based compliance engineering. By contrast to the dominant view in information systems research, compliance is not predominantly about business processes, but rather it is both about processes and about data. Processes collect and update the data that counts as evidence of continued compliance, seen as an invariant property. This may be called the dual nature of compliance: one pertaining to continued adherence to the rules, as shown by data, and the other to the enforced following of legal procedures.</p><p>Such an evidence-based conceptual model of compliance, is more natural for legal experts. It would potentially take trade-offs between compliance and business objectives, into account. It would also allow for differences in legal interpretation, using NLP tools. It allows for the advances in data analytics and data mining to be deployed. If done well, frequent analysis and monitoring should make it robust for incomplete and uncertain data.</p><p>So far, this is only a vision. A lot of work remains to be done. First, the vision must be developed into an enterprise architecture, consisting of components and interfaces. Given a proper semantics of the functionality of the components in terms of assertions (Boolean statements about compliance), and a semantics of the interfaces in terms of transactions, it must in principle be possible to demonstrate, that the invariant can be maintained, when all components continue to function, and when all in, out and update processes, continue to perform. Second, the architecture must be populated with real tools and techniques, that can be used to perform the functionality on the arrows. Here, requirements engineering may be used to pick the best solution for a given component. Third, the usefulness and adequacy may then be demonstrated, for one or more real-life cases, such as the scenarios discussed.</p><p>The vision is promising, but there are also various challenges: data quality (wrong, missing or uncertain data), legal interpretation (comparing various representations), and trade-offs (balancing compliance and business objectives). Each of these challenges will also lead to fruitful research directions.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Conceptual model for Evidence-based Compliance Engineering. The model maintains an invariant: all cases comply to the legal requirements, which correspond to relevant legislation, and where compliance of cases is supported by evidence.</figDesc><graphic coords="3,89.29,84.19,416.69,116.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: From raw data (source), to cleaned up information (propositions and events), to evidence of a legal condition (decision)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Summary of Scenario 1. Know-your-Customer Ensure records of transaction: identity, bank account, authentication and authorisation of sender; identity, bank account, and authentication of receiver; source of funding, identity of ultimate beneficiary. (2) Maintain indicators of 'unusual'. Develop corresponding criteria and automated tests. Run tests before committing transactions. Hits are reviewed by compliance officer. Regularly review criteria and tests.</figDesc><table><row><cell>law:</cell><cell>WVWFT [1]</cell></row><row><cell>domain:</cell><cell>financial</cell></row><row><cell cols="2">object of compliance: transactions</cell></row><row><cell>legal objectives:</cell><cell>(1) relevant details of all transactions are recorded</cell></row><row><cell></cell><cell>(2) all and only transactions that are deemed unusual according to WVWFT</cell></row><row><cell></cell><cell>administrative decrees are identified and reported</cell></row><row><cell>business objectives:</cell><cell>(3) uninterrupted flow of transactions</cell></row><row><cell></cell><cell>(4) confidentiality of client details is respected</cell></row><row><cell></cell><cell>(5) acceptable compliance risk</cell></row><row><cell cols="2">(some) requirements: (1)</cell></row></table><note>(3) % investigated transactions &lt; threshold; duration investigation &lt; threshold; other monitoring carried out off-line (4) Access to sensitive data on need-to-know basis only; most data handled by automated processes; search is blocked; cases reviewed by compliance officers are made anonymous (if possible).</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Summary of Scenario 2. Building Permit</figDesc><table><row><cell>law:</cell><cell>Municipal Environment plan, Zoning plan, Omgevingswet [33]</cell></row><row><cell>domain:</cell><cell>construction</cell></row><row><cell cols="2">object of compliance: buildings</cell></row><row><cell>legal objectives:</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 Components</head><label>3</label><figDesc></figDesc><table><row><cell>Components</cell><cell>Purpose</cell></row><row><cell>1.</cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">K</forename><surname>Der Staten Generaal</surname></persName>
		</author>
		<title level="m">Wet ter voorkoming van witwassen en het financieren van terrorisme (Wwft)</title>
				<imprint>
			<publisher>Koninkrijk der Nederlanden</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<author>
			<persName><surname>Parliament</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Money Laundering and Terrorist Financing (Amendment)</title>
		<title level="s">Technical Report</title>
		<meeting><address><addrLine>United Kingdom</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m">Beneficial Ownership Information Reporting Requirements</title>
				<imprint>
			<publisher>Financial Crimes Enforcement Network, US Treasury</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
		<respStmt>
			<orgName>FinCEN</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><surname>Reuters</surname></persName>
		</author>
		<title level="m">Rabobank faces punishment over customer anti-money-laundering checks</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">it could have been us</title>
		<author>
			<persName><forename type="first">A</forename><surname>Merz</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10611-023-10120-y</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1007/s10611-023-10120-y" />
	</analytic>
	<monogr>
		<title level="m">peer responses to money-laundering violations in the dutch banking industry</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.pwc.com/us/en/industries/financial-services/financial-crimes/anti-money-laundering/compliance-tools.html" />
		<title level="m">Pwc, Using the right tools for anti-money laundering compliance</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Process-Aware Information Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Ter Hofstede Arthur</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>John Wiley and Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Formalizing and applying compliance patterns for business process compliance</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F S A</forename><surname>Elgammal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Türetken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">J A M</forename><surname>Van Den</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Heuvel</surname></persName>
		</author>
		<author>
			<persName><surname>Papazoglou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software and Systems Modeling</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="119" to="146" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Measurement of Compliance Distance in Business Work Practice</title>
		<author>
			<persName><forename type="first">R</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Management</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="344" to="355" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The journey to business process compliance</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Research on Business Process Management</title>
				<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="426" to="445" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Compliance monitoring in business processes: Functionalities, application, and tool-support</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P V D</forename><surname>Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="209" to="234" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Are we done with business process compliance: state of the art and challenges ahead</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hashmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-P</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Wynn</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10115-017-1142-1</idno>
	</analytic>
	<monogr>
		<title level="j">Knowledge and Information Systems</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="79" to="133" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Conformance checking: Foundations, milestones and challenges</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Process Mining Handbook, LNBIP</title>
				<editor>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</editor>
		<meeting>ess Mining Handbook, LNBIP</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">448</biblScope>
			<biblScope unit="page" from="155" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Business process regulatory compliance is hard</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Tosatto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kelsen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Service Computing</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="958" to="970" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Eggert</surname></persName>
		</author>
		<title level="m">Compliance Management in Financial Industries</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Managing Legal Interpretation in Regulatory Compliance</title>
		<author>
			<persName><forename type="first">G</forename><surname>Boella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Janssen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hulstijn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Humphreys</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Torre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the XIV-th International Conference on Artificial Intelligence and Law (ICAIL 2013)</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Verheij</surname></persName>
		</editor>
		<meeting>the XIV-th International Conference on Artificial Intelligence and Law (ICAIL 2013)<address><addrLine>Rome</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="23" to="32" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Ghanavati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hulstijn</surname></persName>
		</author>
		<title level="m">Impact of legal interpretation in business process compliance</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Modeling regulatory ambiguities for requirements analysis</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Massey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Holtgrefe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghanavati</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 36th International Conference on Conceptual Modeling (ER 2017)</title>
				<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
		</editor>
		<meeting>the 36th International Conference on Conceptual Modeling (ER 2017)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">10650</biblScope>
			<biblScope unit="page" from="231" to="238" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Verifying resource compliance requirements from natural language text over event logs</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mustroph</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Barrientos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Winter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management (BPM 2023</title>
				<meeting><address><addrLine>Utrecht, The Netherlands</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">LNCS14159. 2023</date>
			<biblScope unit="page" from="249" to="265" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Verification of quantitative temporal compliance requirements in process descriptions over event logs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Barrientos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Winter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mangler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Information Systems Engineering</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">13901</biblScope>
			<biblScope unit="page" from="417" to="433" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Lawfulness by designdevelopment and evaluation of lawful design patterns to consider legal requirements</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Ernestine Dickhaut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andreas</forename><surname>Janson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Leimeister</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="page" from="1" to="28" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">U</forename><surname>Parliament</surname></persName>
		</author>
		<title level="m">Criminal procedure and investigations act</title>
				<imprint>
			<date type="published" when="1996">1996. 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Business intelligence and analytics: From big data to big impact</title>
		<author>
			<persName><forename type="first">H</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H L</forename><surname>Chiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Storey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="1165" to="1188" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Audit data analytics, machine learning, and full population testing</title>
		<author>
			<persName><forename type="first">F</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">G</forename><surname>No</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Vasarhelyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Finance and Data Science</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="138" to="144" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Control automation to reduce costs of control</title>
		<author>
			<persName><forename type="first">R</forename><surname>Christiaanse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hulstijn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Information System Modeling and Design</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="27" to="47" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">The three lines of defense in effective risk management and control</title>
		<author>
			<persName><surname>Iia</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Requirements Engineering: Frameworks for Understanding</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Wieringa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Traceability</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Palmer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Requirements Engineering</title>
				<editor>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Thayer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Dorfman</surname></persName>
		</editor>
		<imprint>
			<publisher>IEEE Computer Society Press</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="364" to="374" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Design science methodology for information systems and software engineering</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Wieringa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer Verlag</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">U</forename><forename type="middle">K</forename><surname>Parliament</surname></persName>
		</author>
		<title level="m">Proceeds of crime act</title>
				<meeting>eeds of crime act</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Detection of anomalies in large scale accounting data using deep autoencoder networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schreyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sattarov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Borth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dengel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Reimer</surname></persName>
		</author>
		<idno>CoRR abs/1709.05254</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Fraud detection: A systematic literature review of graph-based anomaly detection approaches</title>
		<author>
			<persName><forename type="first">T</forename><surname>Pourhabibi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-L</forename><surname>Ong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">H</forename><surname>Kam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">L</forename><surname>Boo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.dss.2020.113303</idno>
		<ptr target="https://doi.org/10.1016/j.dss.2020.113303" />
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">133</biblScope>
			<biblScope unit="page">113303</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">K</forename><surname>Der Staten Generaal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Omgevingswet</title>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Integrity control in relational database systems-an overview</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">W P J</forename><surname>Grefen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M G</forename><surname>Apers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="187" to="223" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">A comparison of commercial and military computer security policies</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Wilson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy, IEEE</title>
				<imprint>
			<date type="published" when="1987">1987</date>
			<biblScope unit="page" from="184" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Supporting software understanding with automated requirements traceability</title>
		<author>
			<persName><forename type="first">A</forename><surname>Egyed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grbacher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Software Engineering and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="783" to="810" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Womack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Jones</surname></persName>
		</author>
		<title level="m">Lean Thinking: Banish Waste and Create Wealth in Your Corporation</title>
				<imprint>
			<publisher>Free Press</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m">Committee of Sponsoring Organizations of the Treadway Commission</title>
				<imprint>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
	<note>Internal Control -Integrated Framework</note>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<title level="m" type="main">Accounting Information Systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Romney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Steinbart</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Pearson Education</publisher>
		</imprint>
	</monogr>
	<note>14th ed</note>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<title level="m" type="main">Out of the Crisis</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">E</forename><surname>Deming</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1986">1986</date>
		</imprint>
		<respStmt>
			<orgName>MIT Center for Advanced Engineering Study</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Compliance by design: Het inbouwen van regelgeving in bedrijfsprocessen en informatiesystemen</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hulstijn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">RegelMaat</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="88" to="100" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Analyzing regulatory rules for privacy and security requirements</title>
		<author>
			<persName><forename type="first">T</forename><surname>Breaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Anton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="5" to="20" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<monogr>
		<title level="m" type="main">The Concept of Law</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">L A</forename><surname>Hart</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1961">1961</date>
			<publisher>Clarendon Press</publisher>
			<pubPlace>Oxford</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Regulatory conversations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Black</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Law and Society</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="163" to="196" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Searle</surname></persName>
		</author>
		<title level="m">The Construction of Social Reality</title>
				<imprint>
			<publisher>The Free Press</publisher>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">A formal characterisation of institutionalised power</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J I</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sergot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Interest Group in Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="427" to="443" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<monogr>
		<title level="m" type="main">An Assertion Based Approach to Auditing</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Leslie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Aldersley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Cockburn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Reiter</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1986">1986</date>
			<biblScope unit="page" from="31" to="64" />
			<pubPlace>Kansas</pubPlace>
		</imprint>
		<respStmt>
			<orgName>University of Kansas</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Brennan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Vasarhelyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Accounting Information Systems</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="137" to="161" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Design and evaluation of a continuous data level auditing system</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Alles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Vasarhelyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Auditing: A Journal of Practice and Theory</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="221" to="245" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Providing Continuous Assurance</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kocken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hulstijn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th International Workshop on Value Modeling and Business Ontologies (VMBO 2017)</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</editor>
		<meeting>the 11th International Workshop on Value Modeling and Business Ontologies (VMBO 2017)<address><addrLine>Luxembourg</addrLine></address></meeting>
		<imprint>
			<publisher>Luxembourg Institute of Science and Technology (LIST)</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature</title>
		<author>
			<persName><forename type="first">E</forename><surname>Ngai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="page" from="559" to="569" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Data engineering for fraud detection</title>
		<author>
			<persName><forename type="first">B</forename><surname>Baesens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Höppner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Verdonck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">150</biblScope>
			<biblScope unit="page">113492</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">D</forename><surname>Ashley</surname></persName>
		</author>
		<title level="m">Artificial Intelligence and Legal Analytics: New Tools for Law Practice in the Digital Age</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Holmes</surname></persName>
		</author>
		<title level="m">Report of the Royal Commission into the Robodebt Scheme, Report, Commonwealth of Australia</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Data quality and systems theory</title>
		<author>
			<persName><forename type="first">K</forename><surname>Orr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="page" from="66" to="71" />
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<monogr>
		<title level="m" type="main">Improving Data Warehouse and Business Information Quality</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">P</forename><surname>English</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>John Wiley &amp; Sons, Inc</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">A new approach to proving the correctness of multiprocess programs</title>
		<author>
			<persName><forename type="first">L</forename><surname>Lamport</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Programming Languages and Systems</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="84" to="97" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
