{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:03:32Z","timestamp":1773792212588,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:00:00Z","timestamp":1498089600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s10257-017-0354-y","type":"journal-article","created":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:39:51Z","timestamp":1498127991000},"page":"155-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards a compliance requirement management for SMSEs: a model and architecture"],"prefix":"10.1007","volume":"16","author":[{"given":"A. M.","family":"Mustapha","sequence":"first","affiliation":[]},{"given":"O. T.","family":"Arogundade","sequence":"additional","affiliation":[]},{"given":"O. R.","family":"Vincent","sequence":"additional","affiliation":[]},{"given":"O. J.","family":"Adeniran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"issue":"1","key":"354_CR1","first-page":"305","volume":"12","author":"RA Adeleke","year":"2011","unstructured":"Adeleke RA, Halid OY, Ogunwale OD, Olubiyi AO (2011) Application of network analysis to project management. Pac J Sci Technol 12(1):305\u2013313","journal-title":"Pac J Sci Technol"},{"key":"354_CR2","doi-asserted-by":"crossref","unstructured":"Anton AI (1996) Goal based requirements Analysis. In: Proceedings of ICRE. IEEE, pp 136\u2013144","DOI":"10.1109\/ICRE.1996.491438"},{"key":"354_CR3","unstructured":"Barnawi A, Awad A, Elgammal A, Elshawi R, Almalaise A, Sakr S (2015) BP-MaaS: a runtime compliance-monitoring system for business processes. In: Motahari-Nezhad HR, Recker J, Weidlich M (eds) 13th conference in business process management (BPM15). Springer, Innsbruck"},{"key":"354_CR4","doi-asserted-by":"crossref","unstructured":"Becker J, Ahrendt C, Coners A, Wei\u00df B, Winkelmann A (2011) Modeling and analysis of business process compliance. In: Governance and sustainability in information systems. Managing the transfer and diffusion of IT. Springer, Berlin, pp 259\u2013269","DOI":"10.1007\/978-3-642-24148-2_17"},{"key":"354_CR5","unstructured":"Breaux TD, Anton AI (2007) A Systematic method for acquiring regulatory requirements: a frame-based approach. In: 6th international workshop on requirements for high assurance systems (RHAS-6)"},{"key":"354_CR6","doi-asserted-by":"crossref","unstructured":"Cabanillas C, Knuplesch D, Resinas M, Reichert M, Mendling J, Ruiz-Cort\u00e9s A (2015) RALph: a graphical notation for resource assignments in business processes. In: Zdravkovic J, Kirikova M, Johannesson P (eds) Advanced information systems engineering, CAiSE, vol 9097. Springer International Publishing, Cham, pp 53\u201368","DOI":"10.1007\/978-3-319-19069-3_4"},{"key":"354_CR7","unstructured":"CBN (2009) The CBN anti-money laundering\/combating financing of terrorism (AML\/CFT) Regulation 2009 which included the Know Your Customer (KYC) Act"},{"key":"354_CR8","unstructured":"CBN (2010) Revised Guideline for prudential guideline for financial institutions, June 2010"},{"key":"354_CR9","unstructured":"CBN (2012) The CBN revised regulatory and supervisory guidelines for Microfinance Banks (MFB) in Nigeria, December 2012"},{"key":"354_CR10","doi-asserted-by":"crossref","unstructured":"Daniel F, Casati F, D\u2019Andrea V, Strauch S, Schumm D, Leymann F, Mulo E, Zdun U, Dustdar S, Sebahi S, de Marchi F, Hacid M (2009) Business compliance governance in service-oriented architectures. In: Proceedings of the IEEE 23rd international conference on advanced information networking and applications (AINA\u201909). IEEE Press","DOI":"10.1109\/AINA.2009.112"},{"key":"354_CR11","doi-asserted-by":"crossref","unstructured":"Elgammal A, Turetken O (2015) Lifecycle business process compliance management: a semantically-enabled framework. 978-1-4673-6618-2\/15\/$31.00 \u00a92015. IEEE","DOI":"10.1109\/CLOUDCOMP.2015.7149646"},{"key":"354_CR12","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10270-014-0395-3","volume":"15","author":"A Elgammal","year":"2014","unstructured":"Elgammal A, Turetken O, van den Heuvel WJ, Papazoglou M (2014) Formalizing and applying compliance patterns for business process compliance. Softw Syst Model 15:119\u2013146","journal-title":"Softw Syst Model"},{"key":"354_CR13","unstructured":"Ernst & Young A (2010) The Ernst & Young business risk Report 2010\u2014the top 10 risks for global business. Found at www.ey.com\/au. 6:47"},{"issue":"1","key":"354_CR102","first-page":"19","volume":"6","author":"S Iqbal","year":"2012","unstructured":"Iqbal S, Khan MNA (2012) Yet another set of requirement metrics for software projects. Int J Software Eng Appl 6(1):19","journal-title":"Int J Software Eng Appl"},{"key":"354_CR103","doi-asserted-by":"crossref","unstructured":"Koetter F, Kochanowski M, Weisbecker A, Fehling C, Leymann F (2014) Integrating compliance requirements across business and it. In: Enterprise distributed object computing conference (EDOC), IEEE 18th International, pp 218\u2013225","DOI":"10.1109\/EDOC.2014.37"},{"issue":"2","key":"354_CR14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10796-009-9185-9","volume":"14","author":"LT Ly","year":"2012","unstructured":"Ly LT, Rinderle-Ma S, G\u00f6ser K, Dadam P (2012) On enabling integrated process compliance with semantic constraints in process management systems. Inf Syst Fron 14(2):195\u2013219","journal-title":"Inf Syst Fron"},{"issue":"2","key":"354_CR104","first-page":"2","volume":"17","author":"LEM Morales","year":"2014","unstructured":"Morales LEM (2014) Business process verification: the application of model checking and timed automata. CLEI Electron J 17(2):2","journal-title":"CLEI Electron J"},{"key":"354_CR15","unstructured":"OMG (2011) Business Process Model and Notation (BPMN)\u2014version 2.0. Object Management Group (OMG)"},{"key":"354_CR16","unstructured":"Open Group Source. http:\/\/www.opengroupsource.com . Accesses Nov 2015"},{"key":"354_CR17","doi-asserted-by":"crossref","unstructured":"Papazoglou M (2011) Making business processes compliant to standards and regulations. In: 15th EDOC 2011 conference, held in August\u2013September (2011) in Helsinki, Finland","DOI":"10.1109\/EDOC.2011.37"},{"key":"354_CR18","unstructured":"Pham TA, Le Thanh N (2015) Checking the compliance of business processes and business rules using OWL2 ontology and SWRL. In: Proceedings of the 2nd international Afro-European conference for industrial advancement AECIA 2015. Springer, pp 11\u201320"},{"key":"354_CR19","doi-asserted-by":"crossref","unstructured":"Solaiman E, Sun W, Molina-Jimenez C (2015) Tool for the automatic verification of BPMN choreographies. In: 2015 IEEE international conference on services computing. pp 728\u2013735","DOI":"10.1109\/SCC.2015.103"},{"key":"354_CR20","unstructured":"Turetken O, Elgammal A, van den Heuvel WJ, Papazoglou MP (2011) Enforcing compliance on business processes through the use of patterns. In: 19th European conference on information systems, Finland, June 2011"},{"key":"354_CR21","unstructured":"Wenzhong S (2012) Design and implementation of a BPMN to PROMELA Translator. MSc Dissertation in Advanced Computer Science. School of Computing Science, Newcastle University, UK, August 2012"},{"key":"354_CR22","volume-title":"Introduction to mathematical programming","author":"WL Winston","year":"2003","unstructured":"Winston WL, Venkataramanan M, Goldberg JB (2003) Introduction to mathematical programming, vol 1. Thomson\/Brooks\/Cole, Pacific Grove"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-017-0354-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-017-0354-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-017-0354-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T14:38:06Z","timestamp":1569508686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-017-0354-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,22]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["354"],"URL":"https:\/\/doi.org\/10.1007\/s10257-017-0354-y","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,22]]}}}