LEADER 02802nam 22005653 450 001 996483156803316 005 20220921215432.0 010 $a3-658-38154-X 035 $a(CKB)5720000000019209 035 $a(MiAaPQ)EBC7049442 035 $a(Au-PeEL)EBL7049442 035 $a(OCoLC)1338836989 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/91298 035 $a(PPN)263903079 035 $a(EXLCZ)995720000000019209 100 $a20220919d2022 fy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aObstructions in security-aware business processes $eanalysis, detection, and handling /$fJulius Holderer 210 $aWiesbaden$cSpringer Nature$d2022 210 1$aWiesbaden :$cSpringer Fachmedien Wiesbaden GmbH,$d2022. 210 4$dİ2022. 215 $a1 online resource (xxi, 341 pages) $cillustrations (chiefly color) 300 $aIncludes abstracts in English and German 311 1 $a3-658-38153-1 327 $aWhy the Automation of Regulation Can Obstruct Business Processes Security-Related Obstructability in Process-Aware Information Systems Obstruction Modeling OLive-M: A SecANet Use Case for Model-Based Obstruction Solving OLive-L: SecANet Use Case for Log-Based Obstruction Solving Towards Intelligent Security- and Process-Aware Information Systems Bibliography 330 $aThis Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. 606 $aBusiness$xData processing$xSecurity measures 610 $aIT-Security 610 $aBusiness Process Management 610 $aSecurity and Privacy 610 $aProcess Security 610 $aCompliance 610 $aProcess Automation 610 $aProcess Modeling 610 $aPetri Net 610 $aProcess Mining 610 $aData Mining 615 0$aBusiness$xData processing$xSecurity measures. 700 $aHolderer$b Julius$01255109 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996483156803316 996 $aObstructions in security-aware business processes$92910187 997 $aUNISA