44,309 research outputs found

    Theory of Regulatory Compliance for Requirements Engineering

    Full text link
    Regulatory compliance is increasingly being addressed in the practice of requirements engineering as a main stream concern. This paper points out a gap in the theoretical foundations of regulatory compliance, and presents a theory that states (i) what it means for requirements to be compliant, (ii) the compliance problem, i.e., the problem that the engineer should resolve in order to verify whether requirements are compliant, and (iii) testable hypotheses (predictions) about how compliance of requirements is verified. The theory is instantiated by presenting a requirements engineering framework that implements its principles, and is exemplified on a real-world case study.Comment: 16 page

    Risk-Neutral Pricing of Financial Instruments in Emission Markets: A Structural Approach

    Full text link
    We present a novel approach to the pricing of financial instruments in emission markets, for example, the EU ETS. The proposed structural model is positioned between existing complex full equilibrium models and pure reduced form models. Using an exogenously specified demand for a polluting good it gives a causal explanation for the accumulation of CO2 emissions and takes into account the feedback effect from the cost of carbon to the rate at which the market emits CO2. We derive a forward-backward stochastic differential equation for the price process of the allowance certificate and solve the associated semilinear partial differential equation numerically. We also show that derivatives written on the allowance certificate satisfy a linear partial differential equation. The model is extended to emission markets with multiple compliance periods and we analyse the impact different intertemporal connecting mechanisms, such as borrowing, banking and withdrawal, have on the allowance price.Comment: Section 5 in this version is new and contains an asymptotic analysis of the problem under consideratio

    Norm-based and commitment-driven agentification of the Internet of Things

    Get PDF
    There are no doubts that the Internet-of-Things (IoT) has conquered the ICT industry to the extent that many governments and organizations are already rolling out many anywhere,anytime online services that IoT sustains. However, like any emerging and disruptive technology, multiple obstacles are slowing down IoT practical adoption including the passive nature and privacy invasion of things. This paper examines how to empower things with necessary capabilities that would make them proactive and responsive. This means things can, for instance reach out to collaborative peers, (un)form dynamic communities when necessary, avoid malicious peers, and be “questioned” for their actions. To achieve such empowerment, this paper presents an approach for agentifying things using norms along with commitments that operationalize these norms. Both norms and commitments are specialized into social (i.e., application independent) and business (i.e., application dependent), respectively. Being proactive, things could violate commitments at run-time, which needs to be detected through monitoring. In this paper, thing agentification is illustrated with a case study about missing children and demonstrated with a testbed that uses different IoT-related technologies such as Eclipse Mosquitto broker and Message Queuing Telemetry Transport protocol. Some experiments conducted upon this testbed are also discussed

    OperA/ALIVE/OperettA

    Get PDF
    Comprehensive models for organizations must, on the one hand, be able to specify global goals and requirements but, on the other hand, cannot assume that particular actors will always act according to the needs and expectations of the system design. Concepts as organizational rules (Zambonelli 2002), norms and institutions (Dignum and Dignum 2001; Esteva et al. 2002), and social structures (Parunak and Odell 2002) arise from the idea that the effective engineering of organizations needs high-level, actor-independent concepts and abstractions that explicitly define the organization in which agents live (Zambonelli 2002).Peer ReviewedPostprint (author's final draft

    Modeling inertia causatives:validating in the password manager adoption context

    Get PDF
    Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon

    BPM Adoption at Bilfinger

    Get PDF
    Big size corporate companies that opt for Business ProcessManagement (BPM) adoption invest a lot in BPM initiatives with theprimary focus on the identification and standardization of best practicesin the different phases of the BPM lifecycle. The business processes de-signed are usually seen as the standard way of executing the processesand tend not be adapted to specific customers' need or changing condi-tions. Furthermore, the acceptance of a paradigm shift by the end usersis an added challenge. This case introduces a success story on BPMadoption in complex environments where different organizational unitswith different needs are involved. The projects executed in different unitsrespond to specific customers’ requirements, which affects the set of pro-cesses to be designed and executed within them. We developed a novelapproach inspired by the Cynefin framework and used it to define processarchitectures and the respective business process models for a subset ofthe units. To ensure the applicability and acceptance of the new paradigmwe followed a number of well-known methodologies and practices (e.g.SCRUM and gamification). As a result, we managed to move from thetraditional function orientation to BPM orientation taking into consid-eration the flexibility needs, and we received very positive feedback fromour end users

    Expanding research on corporate corruption, management and organizations

    Get PDF
    In this special issue introduction, we briefly describe a variety of research paths researchers have followed to study the multifaceted phenomenon of corruption. Furthermore, we classify the papers included in this special issue according to their contribution to these research paths and briefly preview them. Finally, drawing on these four research paths and the papers included in this special issue, we propose a six-item agenda for future research on corruption
    • …
    corecore