LEADER 00000cam 2200565 i 4500 001 on1338233014 003 OCoLC 005 20221108213017.0 006 m o d 007 cr cnu|||unuuu 008 220803s2022 gw a ob 000 0 eng d 019 1337855554 020 9783658381547|q(electronic book) 020 365838154X|q(electronic book) 020 |z9783658381530 020 |z3658381531 024 7 10.1007/978-3-658-38154-7|2doi 035 (OCoLC)1338233014|z(OCoLC)1337855554 040 GW5XE|beng|erda|epn|cGW5XE|dYDX|dOCLCF 041 0 eng|bger 049 STJJ 050 4 HF5548.2 072 7 UR|2bicssc 072 7 UTN|2bicssc 072 7 COM053000|2bisacsh 072 7 UR|2thema 072 7 UTN|2thema 082 04 658/.05|223/eng/20220803 100 1 Holderer, Julius,|eauthor. 245 10 Obstructions in security-aware business processes : |banalysis, detection, and handling /|cJulius Holderer. 264 1 Wiesbaden :|bSpringer Vieweg,|c[2022] 264 4 |c©2022 300 1 online resource (xxi, 341 pages) :|billustrations (chiefly color) 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 505 0 Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process- Aware Information Systems -- Obstruction Modeling -- OLive -M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography. 506 0 Open access|5GW5XE 520 This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining. 546 Includes abstracts in English and German. 588 0 Online resource; title from PDF title page (SpringerLink, viewed August 3, 2022). 590 Springer Nature|bSpringer Nature Open Access eBooks 650 0 Business|xData processing|xSecurity measures. 650 7 Business|xData processing|xSecurity measures.|2fast |0(OCoLC)fst00842307 776 08 |cOriginal|z3658381531|z9783658381530|w(OCoLC)1322366654 914 on1338233014 947 MARCIVE Processed 2023/02/10 994 92|bSTJ
|