Figures & data
Figure 1. Compliance meta-model (based on (Seyffarth et al., Citation2016; Citation2017a)).
![Figure 1. Compliance meta-model (based on (Seyffarth et al., Citation2016; Citation2017a)).](/cms/asset/a7a63d7d-35a7-4815-8c67-9fc4f1d69256/tjds_a_1861920_f0001_b.gif)
Figure 2. Simplified purchase to pay process (based on (Frank et al., Citation2009; Namiri & Stojanovic, Citation2007; Seyffarth et al., Citation2018; Citation2019)).
![Figure 2. Simplified purchase to pay process (based on (Frank et al., Citation2009; Namiri & Stojanovic, Citation2007; Seyffarth et al., Citation2018; Citation2019)).](/cms/asset/1150a704-a7eb-4a67-b937-cb34a995992f/tjds_a_1861920_f0002_b.gif)
Table 1. Author centric concept matrix
Figure 3. Our design science research approach based on (Peffers et al., Citation2006).
![Figure 3. Our design science research approach based on (Peffers et al., Citation2006).](/cms/asset/cb1049d7-35ef-4832-8069-610c52395ad9/tjds_a_1861920_f0003_b.gif)
Figure 5. Algorithm to automatically determine compliance requirements when replacing an IT component.
![Figure 5. Algorithm to automatically determine compliance requirements when replacing an IT component.](/cms/asset/d5afc2a3-bdb4-4af6-a3d3-80641ba14cdf/tjds_a_1861920_f0005_b.gif)
Figure 6. Algorithm to automatically determine compliance violations and obsolete compliance requirements when deleting an IT component.
![Figure 6. Algorithm to automatically determine compliance violations and obsolete compliance requirements when deleting an IT component.](/cms/asset/1c25951e-adc7-418b-9f2d-558dab2fc59b/tjds_a_1861920_f0006_b.gif)
Figure 7. Alternative compliance processes and proposed compliantpurchase to pay processes (based on (Seyffarth et al., Citation2019)).
![Figure 7. Alternative compliance processes and proposed compliantpurchase to pay processes (based on (Seyffarth et al., Citation2019)).](/cms/asset/831d3a02-91f0-4a1e-8b0c-3b20de01466c/tjds_a_1861920_f0007_b.gif)
Table 2. Evaluation episodes in the research project
Figure 10. Compliant business process including thealternative compliance process ‘manually check invoice’.
![Figure 10. Compliant business process including thealternative compliance process ‘manually check invoice’.](/cms/asset/168c2503-62f4-4581-95ee-5a7cbfc9d24e/tjds_a_1861920_f0010_oc.jpg)
Table 3. Statements and aggregated results of the perceived usefulness evaluation