44,309 research outputs found
Theory of Regulatory Compliance for Requirements Engineering
Regulatory compliance is increasingly being addressed in the practice of
requirements engineering as a main stream concern. This paper points out a gap
in the theoretical foundations of regulatory compliance, and presents a theory
that states (i) what it means for requirements to be compliant, (ii) the
compliance problem, i.e., the problem that the engineer should resolve in order
to verify whether requirements are compliant, and (iii) testable hypotheses
(predictions) about how compliance of requirements is verified. The theory is
instantiated by presenting a requirements engineering framework that implements
its principles, and is exemplified on a real-world case study.Comment: 16 page
Risk-Neutral Pricing of Financial Instruments in Emission Markets: A Structural Approach
We present a novel approach to the pricing of financial instruments in
emission markets, for example, the EU ETS. The proposed structural model is
positioned between existing complex full equilibrium models and pure reduced
form models. Using an exogenously specified demand for a polluting good it
gives a causal explanation for the accumulation of CO2 emissions and takes into
account the feedback effect from the cost of carbon to the rate at which the
market emits CO2. We derive a forward-backward stochastic differential equation
for the price process of the allowance certificate and solve the associated
semilinear partial differential equation numerically. We also show that
derivatives written on the allowance certificate satisfy a linear partial
differential equation. The model is extended to emission markets with multiple
compliance periods and we analyse the impact different intertemporal connecting
mechanisms, such as borrowing, banking and withdrawal, have on the allowance
price.Comment: Section 5 in this version is new and contains an asymptotic analysis
of the problem under consideratio
Norm-based and commitment-driven agentification of the Internet of Things
There are no doubts that the Internet-of-Things (IoT) has conquered the ICT industry to the extent that many governments and organizations are already rolling out many anywhere,anytime online services that IoT sustains. However, like any emerging and disruptive technology, multiple obstacles are slowing down IoT practical adoption including the passive nature and privacy invasion of things. This paper examines how to empower things with necessary capabilities that would make them proactive and responsive. This means things can, for instance reach out to collaborative peers, (un)form dynamic communities when necessary, avoid malicious peers, and be “questioned” for their actions. To achieve such empowerment, this paper presents an approach for agentifying things using norms along with commitments that operationalize these norms. Both norms and commitments are specialized into social (i.e., application independent) and business (i.e., application dependent), respectively. Being proactive, things could violate commitments at run-time, which needs to be detected through monitoring. In this paper, thing agentification is illustrated with a case study about missing children and demonstrated with a testbed that uses different IoT-related technologies such as Eclipse Mosquitto broker and Message Queuing Telemetry Transport protocol. Some experiments conducted upon this testbed are also discussed
OperA/ALIVE/OperettA
Comprehensive models for organizations must, on the one hand, be able to specify global goals and requirements but, on the other hand, cannot assume that particular actors will always act according to the needs and expectations of the system design. Concepts as organizational rules (Zambonelli 2002), norms and institutions (Dignum and Dignum 2001; Esteva et al. 2002), and social structures (Parunak and Odell 2002) arise from the idea that the effective engineering of organizations needs high-level, actor-independent concepts and abstractions that explicitly define the organization in which agents live (Zambonelli 2002).Peer ReviewedPostprint (author's final draft
Modeling inertia causatives:validating in the password manager adoption context
Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon
BPM Adoption at Bilfinger
Big size corporate companies that opt for Business ProcessManagement (BPM) adoption invest a lot in BPM initiatives with theprimary focus on the identification and standardization of best practicesin the different phases of the BPM lifecycle. The business processes de-signed are usually seen as the standard way of executing the processesand tend not be adapted to specific customers' need or changing condi-tions. Furthermore, the acceptance of a paradigm shift by the end usersis an added challenge. This case introduces a success story on BPMadoption in complex environments where different organizational unitswith different needs are involved. The projects executed in different unitsrespond to specific customers’ requirements, which affects the set of pro-cesses to be designed and executed within them. We developed a novelapproach inspired by the Cynefin framework and used it to define processarchitectures and the respective business process models for a subset ofthe units. To ensure the applicability and acceptance of the new paradigmwe followed a number of well-known methodologies and practices (e.g.SCRUM and gamification). As a result, we managed to move from thetraditional function orientation to BPM orientation taking into consid-eration the flexibility needs, and we received very positive feedback fromour end users
Expanding research on corporate corruption, management and organizations
In this special issue introduction, we briefly describe a variety of research paths researchers have followed to study the multifaceted phenomenon of corruption. Furthermore, we classify the papers included in this special issue according to their contribution to these research paths and briefly preview them. Finally, drawing on these four research paths and the papers included in this special issue, we propose a six-item agenda for future research on corruption
- …