IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v13y2011i2d10.1007_s10796-009-9190-z.html
   My bibliography  Save this article

Integrating constraints to support legally flexible business processes

Author

Listed:
  • Yuqing Sun

    (Shandong University)

  • Joshua Zhexue Huang

    (University of Hong Kong)

  • Xiangxu Meng

    (Shandong University)

Abstract

Flexible collaboration is a notable attribute of Web 2.0, which is often in the form of multiple users participating different activities that together complete a whole business process. In such an environment, business processes may be dynamically customized or adjusted, as well as the participants may be selected or attend uncertainly. So how to ensure the legitimacy of a business process for both security and business is increasingly critical. In this paper, we investigate this problem and introduce a novel method to support legally flexible business processes. The proposed Constraint-based Business Process Management Model incorporates constraints into the standard activities composing a business process, where the security constraints place restrictions on participants performing the activities and business constraints restrict the dependencies between multiple activities. By the assembly operations, business processes can be dynamically generated and adjusted with activities, that are obliged to the specified constraints. Several algorithms are presented to verify the consistency of constraints and the soundness of the generated business processes, as well as to perform the execution planning to guarantee the correct execution of a business process on the precondition of satisfying all constraints. We present an illustrative example and implement a prototype for the proposed model that is an application of property rights exchange for supporting legal business processes.

Suggested Citation

  • Yuqing Sun & Joshua Zhexue Huang & Xiangxu Meng, 2011. "Integrating constraints to support legally flexible business processes," Information Systems Frontiers, Springer, vol. 13(2), pages 171-189, April.
  • Handle: RePEc:spr:infosf:v:13:y:2011:i:2:d:10.1007_s10796-009-9190-z
    DOI: 10.1007/s10796-009-9190-z
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-009-9190-z
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-009-9190-z?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Wil van der Aalst & Kees van Hee, 2004. "Workflow Management: Models, Methods, and Systems," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262720469, April.
    2. Xiaofeng Yu & Yan Zhang & Tian Zhang & Linzhang Wang & Jun Hu & JianHua Zhao & Xuandong Li, 2007. "A model-driven development framework for enterprise Web services," Information Systems Frontiers, Springer, vol. 9(4), pages 391-409, September.
    3. Lawrence A. Gordon & Martin P. Loeb, 2006. "Economic aspects of information security: An emerging field of research," Information Systems Frontiers, Springer, vol. 8(5), pages 335-337, December.
    4. Frederica Paci & Elisa Bertino & Jason Crampton, 2008. "An Access-Control Framework for WS-BPEL," International Journal of Web Services Research (IJWSR), IGI Global, vol. 5(3), pages 20-43, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re, 2018. "Business process flexibility - a systematic literature review with a software systems perspective," Information Systems Frontiers, Springer, vol. 20(2), pages 343-371, April.
    3. Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re, 0. "Business process flexibility - a systematic literature review with a software systems perspective," Information Systems Frontiers, Springer, vol. 0, pages 1-29.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Simon Gorecki & Jalal Possik & Gregory Zacharewicz & Yves Ducq & Nicolas Perry, 2020. "A Multicomponent Distributed Framework for Smart Production System Modeling and Simulation," Sustainability, MDPI, vol. 12(17), pages 1-26, August.
    3. Sagnika Sen & T. S. Raghu, 2013. "Interdependencies in IT Infrastructure Services: Analyzing Service Processes for Optimal Incentive Design," Information Systems Research, INFORMS, vol. 24(3), pages 822-841, September.
    4. Guoxin Su & Li Liu, 2024. "Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification," Future Internet, MDPI, vol. 16(9), pages 1-19, September.
    5. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
    6. Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
    7. Pereira José Luís & e Sá Jorge Oliveira, 2017. "Process-Based Information Systems Development: Taking Advantage of a Component-Based Infrastructure," Business Systems Research, Sciendo, vol. 8(2), pages 71-83, September.
    8. Tyson R. Browning & Ernst Fricke & Herbert Negele, 2006. "Key concepts in modeling product development processes," Systems Engineering, John Wiley & Sons, vol. 9(2), pages 104-128, June.
    9. Daehyoun Choi & Hind R’bigui & Chiwoon Cho, 2021. "Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation," Sustainability, MDPI, vol. 13(16), pages 1-18, August.
    10. Christian Engel & Philipp Ebel & Jan Marco Leimeister, 2022. "Cognitive automation," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 339-350, March.
    11. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    12. Reijers, H.A. & Vanderfeesten, I. & van der Aalst, W.M.P., 2016. "The effectiveness of workflow management systems: A longitudinal study," International Journal of Information Management, Elsevier, vol. 36(1), pages 126-141.
    13. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    14. Tyrychtr, Jan, 2017. "Economic Value of Information Systems in Agriculture: Cohesion and Coupling of Information Elements," AGRIS on-line Papers in Economics and Informatics, Czech University of Life Sciences Prague, Faculty of Economics and Management, vol. 9(3), September.
    15. Alex K. S. Wong & Lawrence W. C. Chan & Ying Liu, 2009. "Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model," Information Systems Frontiers, Springer, vol. 11(4), pages 369-379, September.
    16. D. Venkatesan & S. Sridhar, 2017. "A novel programming framework for architecting next generation enterprise scale information systems," Information Systems and e-Business Management, Springer, vol. 15(2), pages 489-534, May.
    17. Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
    18. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    19. D. Venkatesan & S. Sridhar, 0. "A novel programming framework for architecting next generation enterprise scale information systems," Information Systems and e-Business Management, Springer, vol. 0, pages 1-46.
    20. Daniel S. Soper & Haluk Demirkan & Michael Goul, 2007. "An interorganizational knowledge-sharing security model with breach propagation detection," Information Systems Frontiers, Springer, vol. 9(5), pages 469-479, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:2:d:10.1007_s10796-009-9190-z. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.