428
Views
40
CrossRef citations to date
0
Altmetric
Themed Articles: A Compass for Business Process Redesign

Measurement of Compliance Distance in Business Processes

, &
Pages 344-355 | Published online: 31 Oct 2008

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Sabine Nagel, Carl Corea & Patrick Delfmann. (2021) Cognitive Effects of Visualization Techniques for Inconsistency Metrics on Monitoring Data-Intensive Processes. Information Systems Management 38:4, pages 342-357.
Read now
Marco Comuzzi. (2017) Alignment of process compliance and monitoring requirements in dynamic business collaborations. Enterprise Information Systems 11:6, pages 884-908.
Read now

Articles from other publishers (37)

Ugo Pagallo. (2022) The Politics of Data in EU Law: Will It Succeed?. Digital Society 1:3.
Crossref
Robert Muthuri, Sara Capecchi, Emilio Sulis, Ilaria Angela Amantea & Guido Boella. (2021) Integrating value modeling and legal risk management: an IT case study. Information Systems and e-Business Management 20:1, pages 27-55.
Crossref
Ho-Pun Lam, Mustafa Hashmi & Akhil Kumar. 2021. AI Approaches to the Complexity of Legal Systems XI-XII. AI Approaches to the Complexity of Legal Systems XI-XII 90 105 .
Louise Manning. (2020) Moving from a compliance‐based to an integrity‐based organizational climate in the food supply chain. Comprehensive Reviews in Food Science and Food Safety 19:3, pages 995-1017.
Crossref
Kjersti Berg Danilova. (2018) Process owners in business process management: a systematic literature review. Business Process Management Journal 25:6, pages 1377-1412.
Crossref
Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani & Iakovos S. Venieris. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 596 618 .
Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani & Iakovos S. Venieris. 2019. Censorship, Surveillance, and Privacy. Censorship, Surveillance, and Privacy 1845 1866 .
Stephan Kuehnel, Simon Thanh-Nam Trang & Sebastian Lindner. 2019. Conceptual Modeling. Conceptual Modeling 378 386 .
Hanifa Abdullah. (2018) A Structural and Navigational Method for Integrated Organizational Information Privacy Protection. A Structural and Navigational Method for Integrated Organizational Information Privacy Protection.
Naoual Ezzamouri & Joris Hulstijn. (2018) Continuous monitoring and auditing in municipalities. Continuous monitoring and auditing in municipalities.
Stefan Sackmann, Stephan Kuehnel & Tobias Seyffarth. 2018. Business Process Management. Business Process Management 409 425 .
Marcel Hofeditz, Ann-Marie Nienaber, Anders Dysvik & Gerhard Schewe. (2017) “Want to” Versus “Have to”: Intrinsic and Extrinsic Motivators as Predictors of Compliance Behavior Intention. Human Resource Management 56:1, pages 25-49.
Crossref
Norris Syed Abdullah, Marta Indulska & Shazia Sadiq. (2016) Compliance management ontology – a shared conceptualization for research and practice in compliance management. Information Systems Frontiers 18:5, pages 995-1020.
Crossref
Jörg Becker, Patrick Delfmann, Hanns-Alexander Dietrich, Matthias Steinhorst & Mathias Eggert. (2014) Business process compliance checking – applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. Information Systems Frontiers 18:2, pages 359-405.
Crossref
Rogerio Tadeu de Oliveira Lacerda, Leonardo Ensslin, Sandra Rolim Ensslin, Luana Knoff & Claudelino Martins Dias Junior. (2016) Research Opportunities in Business Process Management and Performance Measurement from a Constructivist View. Knowledge and Process Management 23:1, pages 18-30.
Crossref
Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani & Iakovos S. Venieris. 2015. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance 157 177 .
Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos Dellas, Dimitra I. Kaklamani & Iakovos S. Venieris. 2015. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 95 113 .
David Heise, Stefan Strecker & Ulrich Frank. (2014) ControlML: A domain-specific modeling language in support of assessing internal controls and the internal control system. International Journal of Accounting Information Systems 15:3, pages 224-245.
Crossref
Guido Boella, Llio Humphreys, Robert Muthuri, Piercarlo Rossi & Leendert van der Torre. (2014) A critical analysis of legal requirements engineering from the perspective of legal practice. A critical analysis of legal requirements engineering from the perspective of legal practice.
Guido Boella, Silvano Colombo Tosatto, Sepideh Ghanavati, Joris Hulstijn, Llio Humphreys, Robert Muthuri, André Rifaut & Leendert van der Torre. 2014. AI Approaches to the Complexity of Legal Systems. AI Approaches to the Complexity of Legal Systems 130 144 .
Marco Comuzzi. 2014. On the Move to Meaningful Internet Systems: OTM 2014 Conferences. On the Move to Meaningful Internet Systems: OTM 2014 Conferences 166 183 .
Patrick Delfmann & Michael Hübers. 2014. Dienstleistungsmodellierung 2014. Dienstleistungsmodellierung 2014 201 222 .
M. S. H. Omar, P. W. H. Chung & C. W. Dawson. (2013) A Novel Workflow Management System for Handling Process Adaptation and Compliance. A Novel Workflow Management System for Handling Process Adaptation and Compliance.
Jörg Becker, Patrick Delfmann, Mathias Eggert & Sebastian Schwittay. (2014) Generalizability and Applicability of Model-Based Business Process Compliance-Checking Approaches — A State-of-the-Art Analysis and Research Roadmap. Business Research 5:2, pages 221-247.
Crossref
Margit Schwab. (2012) Process-based compliance: Probabilities. Process-based compliance: Probabilities.
AMAL ELGAMMAL, OKTAY TURETKEN & WILLEM-JAN VAN DEN HEUVEL. (2012) USING PATTERNS FOR THE ANALYSIS AND RESOLUTION OF COMPLIANCE VIOLATIONS. International Journal of Cooperative Information Systems 21:01, pages 31-54.
Crossref
Antonio Folgueras Marcos, José Carlos Alva Tello, Belén Ruiz-Mezcua & Ángel García Crespo. 2012. Business Strategy and Applications in Enterprise IT Governance. Business Strategy and Applications in Enterprise IT Governance 260 279 .
Mustafa Hashmi, Guido Governatori & Moe Thandar Wynn. 2012. Rules on the Web: Research and Applications. Rules on the Web: Research and Applications 32 46 .
Azalia Shamsaei, Daniel Amyot & Alireza Pourshahid. 2014. Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 228 237 .
Azalia Shamsaei, Alireza Pourshahid & Daniel Amyot. 2011. Business Process Management Workshops. Business Process Management Workshops 73 84 .
Antonio Folgueras Marcos, José Carlos Alva Tello, Belén Ruiz-Mezcua & Ángel García Crespo. (2010) Detection of Strategies in IT Organizations through an Integrated IT Compliance Model. International Journal of IT/Business Alignment and Governance 1:4, pages 40-57.
Crossref
Amal Elgammal, Oktay Turetken, Willem-Jan van den Heuvel & Mike Papazoglou. 2010. Service-Oriented Computing. Service-Oriented Computing 17 31 .
Ahmed Awad, Matthias Weidlich & Mathias Weske. 2010. Business Information Systems. Business Information Systems 106 118 .
Ahmed Awad & Mathias Weske. 2010. Business Process Management Workshops. Business Process Management Workshops 182 193 .
Ahmed Awad, Matthias Weidlich & Mathias Weske. 2007. Service-Oriented Computing – ICSOC 2007. Service-Oriented Computing – ICSOC 2007 500 515 .
Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan. 2009. Engineering Societies in the Agents World X. Engineering Societies in the Agents World X 68 83 .
Ahmed Awad, Sergey Smirnov & Mathias Weske. 2009. On the Move to Meaningful Internet Systems: OTM 2009. On the Move to Meaningful Internet Systems: OTM 2009 6 23 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.