Current research in risk-aware business process management―overview, comparison, and gap analysis

S Suriadi, B Weiß, A Winkelmann… - … of the Association for …, 2014 - aisel.aisnet.org
The management of risk in business processes has been the subject of active research in
the past few years. Potentially, many benefits can be obtained by integrating the two …

[HTML][HTML] A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions

M Leitner, S Rinderle-Ma - Information and Software Technology, 2014 - Elsevier
Abstract Context Security in Process-Aware Information Systems (PAIS) has gained
increased attention in current research and practice. However, a common understanding …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

A serious game for eliciting social engineering security requirements

K Beckers, S Pape - 2016 IEEE 24th International …, 2016 - ieeexplore.ieee.org
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach

A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …

Secure business process model specification through a UML 2.0 activity diagram profile

A Rodríguez, E Fernández-Medina, J Trujillo… - Decision Support …, 2011 - Elsevier
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …

Securing business processes using security risk-oriented patterns

N Ahmed, R Matulevičius - Computer Standards & Interfaces, 2014 - Elsevier
Business process modelling and security engineering are two important concerns when
developing information system. However current practices report that security is addressed …

Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases

A Rodríguez, E Fernández-Medina… - … Process Management: 5th …, 2007 - Springer
The software community is currently paying attention to model transformation. The MDA
approach is particularly orientated towards solving the problems of time, cost and quality …

Information security risk assessment: towards a business practice perspective

P Shedden, W Smith, A Ahmad - 2010 - ro.ecu.edu.au
Abstract Information security risk assessments (ISRAs) are of great importance for
organisations. Current ISRA methods identify an organisation's security risks and provide a …

Threat modeling of a mobile device management system for secure smart work

K Rhee, D Won, SW Jang, S Chae, S Park - Electronic Commerce …, 2013 - Springer
To enhance the security of mobile devices, enterprises are developing and adopting mobile
device management systems. However, if a mobile device management system is exploited …