{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:15:43Z","timestamp":1743063343271,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030611392"},{"type":"electronic","value":"9783030611408"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61140-8_5","type":"book-chapter","created":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T17:02:50Z","timestamp":1602349370000},"page":"67-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Model for Continuous IT Solution Engineering for Supporting Legal Entity Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1678-9523","authenticated-orcid":false,"given":"Marite","family":"Kirikova","sequence":"first","affiliation":[]},{"given":"Zane","family":"Miltina","sequence":"additional","affiliation":[]},{"given":"Arnis","family":"Stasko","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Pincuka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7328-7490","authenticated-orcid":false,"given":"Marina","family":"Jegermane","sequence":"additional","affiliation":[]},{"given":"Daiga","family":"Kiopa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,11]]},"reference":[{"key":"5_CR1","unstructured":"Twombly, J., Shuman, J.: The Partner Portfolio Manager\u202f: Shining the Spotlight on. Rhythm Bus, vol. 2 (2013)"},{"key":"5_CR2","unstructured":"EUROPA - Competition - List of NACE codes. https:\/\/ec.europa.eu\/competition\/mergers\/cases\/index\/nace_all.html"},{"key":"5_CR3","unstructured":"Law on the Prevention of Money Laundering and Terrorism and Proliferation Financing. https:\/\/likumi.lv\/ta\/en\/en\/id\/178987-law-on-the-prevention-of-money-laundering-and-terrorism-and-proliferation-financing"},{"key":"5_CR4","unstructured":"Directive (EU) 2018\/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015\/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32018L0843"},{"key":"5_CR5","unstructured":"Welcome to LexisNexis Legal & Professional. https:\/\/www.lexisnexis.com\/en-us\/home.page"},{"key":"5_CR6","unstructured":"Accuity | Data & software to control financial risk, compliance & payments. https:\/\/accuity.com\/"},{"key":"5_CR7","unstructured":"Legal acts in the AML\/CFT area \u2013 FKTK. https:\/\/www.fktk.lv\/en\/law\/general\/legal-acts-in-the-aml-cft-area\/"},{"key":"5_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-60048-2_2","volume-title":"Advanced Information Systems Engineering Workshops","author":"K Sandkuhl","year":"2017","unstructured":"Sandkuhl, K.: Aligning software architecture and business strategy with continuous business engineering. In: Metzger, A., Persson, A. (eds.) CAiSE 2017. LNBIP, vol. 286, pp. 14\u201326. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60048-2_2"},{"key":"5_CR9","first-page":"57","volume":"1","author":"P Rudzajs","year":"2014","unstructured":"Rudzajs, P., Kirikova, M.: Conceptual correspondence monitoring: multimode information logistics approach. Complex Syst. Inf. Model. Q. 1, 57 (2014)","journal-title":"Complex Syst. Inf. Model. Q."},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43839-8"},{"key":"5_CR11","volume-title":"Diagnosing the System for Organizations","author":"S Beer","year":"1995","unstructured":"Beer, S.: Diagnosing the System for Organizations. Wiley, New York (1995)"},{"key":"5_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-19270-3_11","volume-title":"Information Systems Engineering in Complex Environments","author":"M Kirikova","year":"2015","unstructured":"Kirikova, M.: Work systems paradigm and frames for fractal architecture of information systems. In: Nurcan, S., Pimenidis, E. (eds.) CAiSE 2014. LNBIP, vol. 204, pp. 165\u2013180. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19270-3_11"},{"key":"5_CR13","unstructured":"The ArchiMate\u00ae Enterprise Architecture Modeling Language. https:\/\/www.opengroup.org\/archimate-forum\/archimate-overview"},{"key":"5_CR14","unstructured":"Archi \u2013 Open Source ArchiMate Modelling. https:\/\/www.archimatetool.com\/"},{"key":"5_CR15","unstructured":"ADOit platform. https:\/\/www.boc-group.com\/en\/adoit\/"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"e1866","DOI":"10.1002\/smr.1866","volume":"29","author":"RV O\u2019Connor","year":"2017","unstructured":"O\u2019Connor, R.V., Elger, P., Clarke, P.M.: Continuous software engineering-a microservices architecture perspective. J. Softw. Evol. Process. 29, e1866 (2017)","journal-title":"J. Softw. Evol. Process."},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jss.2015.06.063","volume":"123","author":"B Fitzgerald","year":"2017","unstructured":"Fitzgerald, B., Stol, K.-J.: Continuous software engineering: a roadmap and agenda. J. Syst. Softw. 123, 176\u2013189 (2017)","journal-title":"J. Syst. Softw."},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.jebo.2017.10.002","volume":"159","author":"N Loayza","year":"2019","unstructured":"Loayza, N., Villa, E., Misas, M.: Illicit activity and money laundering from an economic growth perspective: a model and an application to Colombia. J. Econ. Behav. Organ. 159, 442\u2013487 (2019)","journal-title":"J. Econ. Behav. Organ."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.forsciint.2017.11.008","volume":"282","author":"E Badal-Valero","year":"2018","unstructured":"Badal-Valero, E., Alvarez-Jare\u00f1o, J.A., Pav\u00eda, J.M.: Combining Benford\u2019s Law and machine learning to detect money laundering. An actual Spanish court case. Forensic Sci. Int. 282, 24\u201334 (2018)","journal-title":"Forensic Sci. Int."},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"100418","DOI":"10.1016\/j.accinf.2019.06.001","volume":"34","author":"K Singh","year":"2019","unstructured":"Singh, K., Best, P.: Anti-money laundering: using data visualization to identify suspicious activity. Int. J. Account. Inf. Syst. 34, 100418 (2019)","journal-title":"Int. J. Account. Inf. Syst."},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"105856","DOI":"10.1016\/j.irle.2019.105856","volume":"60","author":"M Imanpour","year":"2019","unstructured":"Imanpour, M., Rosenkranz, S., Westbrock, B., Unger, B., Ferwerda, J.: A microeconomic foundation for optimal money laundering policies. Int. Rev. Law Econ. 60, 105856 (2019)","journal-title":"Int. Rev. Law Econ."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.eswa.2007.11.059","volume":"36","author":"S Gao","year":"2009","unstructured":"Gao, S., Xu, D.: Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst. Appl. 36, 1493\u20131504 (2009)","journal-title":"Expert Syst. Appl."},{"key":"5_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1007\/978-3-319-31232-3_88","volume-title":"New Advances in Information Systems and Technologies","author":"C Alexandre","year":"2016","unstructured":"Alexandre, C., Balsa, J.: Integrating client profiling in an anti-money laundering multi-agent based system. New Advances in Information Systems and Technologies. AISC, vol. 444, pp. 931\u2013941. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31232-3_88"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-13820-6_12","volume-title":"Big Data Analytics","author":"GK Palshikar","year":"2014","unstructured":"Palshikar, G.K.: Detecting frauds and money laundering: a tutorial. In: Srinivasa, S., Mehta, S. (eds.) BDA 2014. LNCS, vol. 8883, pp. 145\u2013160. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13820-6_12"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.irle.2014.04.006","volume":"43","author":"KJ McCarthy","year":"2015","unstructured":"McCarthy, K.J., van Santen, P., Fiedler, I.: Modeling the money launderer: microtheoretical arguments on anti-money laundering policy. Int. Rev. Law Econ. 43, 148\u2013155 (2015)","journal-title":"Int. Rev. Law Econ."},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijlcj.2015.03.002","volume":"44","author":"N Gilmour","year":"2016","unstructured":"Gilmour, N.: Understanding the practices behind money laundering - a rational choice interpretation. Int. J. Law Crime Justice 44, 1\u201313 (2016)","journal-title":"Int. J. Law Crime Justice"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.irle.2018.08.001","volume":"56","author":"G Ardizzi","year":"2018","unstructured":"Ardizzi, G., De Franceschis, P., Giammatteo, M.: Cash payment anomalies and money laundering: an econometric analysis of Italian municipalities. Int. Rev. Law Econ. 56, 105\u2013121 (2018)","journal-title":"Int. Rev. Law Econ."},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-21837-3_19","volume-title":"Wireless Algorithms, Systems, and Applications","author":"X Hong","year":"2015","unstructured":"Hong, X., Liang, H., Gao, Z.: Adaptive resource allocation for anti-money laundering based on SMDP. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 190\u2013200. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21837-3_19"},{"key":"5_CR29","first-page":"96","volume":"23","author":"V Jayasree","year":"2017","unstructured":"Jayasree, V., Siva Balan, R.V.: Money laundering regulatory risk evaluation using bitmap index-based decision tree. J. Assoc. Arab. Univ. Basic Appl. Sci. 23, 96\u2013102 (2017)","journal-title":"J. Assoc. Arab. Univ. Basic Appl. Sci."},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S2212-5671(15)01075-8","volume":"28","author":"YM Isa","year":"2015","unstructured":"Isa, Y.M., Sanusi, Z.M., Haniff, M.N., Barnes, P.A.: Money laundering risk: from the bankers\u2019 and regulators perspectives. Procedia Econ. Financ. 28, 7\u201313 (2015)","journal-title":"Procedia Econ. Financ."},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"101080","DOI":"10.1016\/j.ribaf.2019.101080","volume":"51","author":"S Shanaev","year":"2020","unstructured":"Shanaev, S., Sharma, S., Ghimire, B., Shuraeva, A.: Taming the blockchain beast? Regulatory implications for the cryptocurrency market. Res. Int. Bus. Financ. 51, 101080 (2020)","journal-title":"Res. Int. Bus. Financ."},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(19)30105-8","volume":"2019","author":"E Eifrem","year":"2019","unstructured":"Eifrem, E.: How graph technology can map patterns to mitigate money-laundering risk. Comput. Fraud Secur. 2019, 6\u20138 (2019)","journal-title":"Comput. Fraud Secur."},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"A Fronzetti Colladon","year":"2017","unstructured":"Fronzetti Colladon, A., Remondi, E.: Using social network analysis to prevent money laundering. Expert Syst. Appl. 67, 49\u201358 (2017)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61140-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T17:11:00Z","timestamp":1619284260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-61140-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030611392","9783030611408"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61140-8_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Informatics Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bir2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bir2020.omilab.org\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was postponed to be held together with BIR 2021 due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}