more aspects of an existing model. In some
situations, a workaround could indicate new, and
innovative, ways of actors performing their duties. It
is not necessarily harmful for the organization.
The control framework separates the operation
from the prescribed models, and establishes three
horizontal layers: enterprise governance, business
rules and access control. The core focus of this
framework is studying which are the control
concepts and how do they interrelate between each
other. The enterprise governance controller sends
feed forward information to the business rules and to
the business transaction models. By its turn, the
business rules and the access controller observe the
operation and act in the models. In addition, the
integration between RBAC model and business
transaction models is discussed. The benefit of such
integration is to fine-grain enforce the access
policies in the business transactions artifacts. This
framework has the advantage of narrowing the
design freedom restrictions of the organizational
control issue and facilitates the related discussions
between peers. Future work will include a
comprehensive taxonomic study focusing on the
relationship that exists between the workarounds and
the business transaction redesigns.
REFERENCES
Alter S., 2013, Theory of Workarounds. Communications
of the Association for Information Systems.
Alter, S., 2013. Work System Theory: Overview of Core
Concepts, Extensions, and Challenges for the Future,
Journal of the Association for Information Systems, 14
(2), article 1.
Beer, S., 1979. The Heart of the Enterprise, John Wiley &
Sons Inc. New York, NY.
Beer, S., 1981. Brain of the Firm: The Managerial
Cybernetics of Organization. John Wiley & Sons Inc.
New York, NY.
Bertalanffy, L., 1969. General Systems Theory. George
Braziller, New York, NY.
Bertino, E., Ferrari, E., and Atluri, V., 1999. The
specification and enforcement of authorization
constraints in workflow management systems. ACM
Trans. Inf. Syst. Secur., 2(1):65–104.
Davison, R., & Ou, C., 2013. Sharing Knowledge In
Technology Deficient Environments: Individual
Workarounds Amid Corporate Restrictions. In 21th
European Conference on Information Systems,
Utrecht.
DHS, 2013. Department of homeland security strategic
plan fiscal years 2008-2013. Homeland Security, USA,
retrieved from http://www.dhs.org.
Dietz, J., 2006. Enterprise Ontology – Theory and
Methodology. Berlin, Heidelberg, Springer-Verlag.
Dietz, J., Hoogervorst, J., Albani, A., Aveiro, D., Babkin,
E., Barjis, J., Caetano, A., Huysmans, P., Iijima, J.,
van Kervel, S., Mulder, H., Op 't Land, M., Proper, H.,
Sanz, J., Terlouw, L., Tribolet, J., Verelst, J., &
Winter, R., 2013. The discipline of enterprise
engineering. International Journal of Organisational
Design and Engineering, 3 (1), 86-114.
ENISA, 2013. European network and information security
agency. Retrieved September 20, 2013, from
http://www.enisa.europa.eu/.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R., 2001. Proposed NIST standard for
role-based access control. ACM Trans. Inf. Syst.
Secur., 4(3):224–274.
Franklin, F., Powell, D., & Emami-Naeini, A., 2009.
Feedback control of dynamic systems. 6th ed.
Addison-Wesley Publishing Company.
Guerreiro, S., Vasconcelos, A, & Tribolet, J., 2012.
Enterprise dynamic systems control enforcement of
run-time business transactions. In EEWC 2012, series
Lecture Notes in Business Information Processing,
volume 110, part 2, Delft, Netherlands pp.46-60.
Guerreiro, S., & Tribolet, J., 2013. Conceptualizing
Enterprise Dynamic Systems Control for Run-Time
Business Transactions. In 21th European Conference
on Information Systems, Utrecht.
Herwig, M. & Verelst, J. 2009. Normalized Systems: Re-
creating Information Technology based on Laws for
Software Evolvability. Koppa.
Hoogervorst, J., & Dietz, J., 2008. Enterprise architecture
in enterprise engineering. Enterprise Modelling and
Information Systems Architecture, 3 (1), 3-11.
Hoogervorst, J., 2009. Enterprise governance and
enterprise engineering. Springer-Verlag.
IBM, 2012. Fast track to the future, IBM Center for
Applied Insights, The 2012 IBM Tech Trends Report.
ISACA, 2013. Control Objectives for Information and
related Technology, COBIT 5.
Kang, M. H., Park, J. S., and Froscher, J. N., 2001. Access
control mechanisms for interorganizational workflow.
In SACMAT ’01: Proceedings of the sixth ACM
symposium on Access control models and
technologies, pp. 66–74, New York, NY, USA. ACM.
Land, M., Proper, E., Waage, M., Cloo, J., and Steghuis,
C., 2009. Enterprise Architecture Creating Value by
Informed Governance. Springer-Verlag.
Muehlen, M. & Indulska, M., 2010. Modeling languages
for business processes and business rules: A
representational analysis. Information Systems
Journal, 35 (4), 379-390.
Nordberg, T., 2009. Security and trust, the foundation for
building an eunion. Paper presented at the Proceedings
of the 5th Ministerial eGovernment Conference,
Malmö.
OGC, 2011. Office for Government Commerce, ITIL v3,
Information Technology Infrastructure Library.
OMG, 2013. Object management group. Semantics of
business vocabulary and business rules. Retrieved
from http://www.omg.org/spec/SBVR/1.0/PDF.
TowardsMulti-levelOrganizationalControlFrameworktoManagetheBusinessTransactionWorkarounds
293