Business Information Processing, volume 215, pages
285–297. Springer.
Meyer, S., Ruppen, A., and Magerkurth, C. (2013). Internet
of things-aware process modeling: Integrating IoT de-
vices as business process resources. In Lecture Notes
in Computer Science, volume 7908 LNCS, pages 84–
98. Springer.
M
¨
ulle, J., Stackelberg, S. v., and B
¨
ohm, K. (2011a). A Secu-
rity Language for BPMN Process Models. Technical
Report 9, KIT.
M
¨
ulle, J., von Stackelberg, S., and B
¨
ohm, K. (2011b).
Modelling and transforming security constraints in
privacy-aware business processes. In SOCA, pages 1–
4.
M
¨
uller, G., Koslowski, T. G., and Accorsi, R. (2013). Re-
silience - A new research field in business information
systems? In Lecture Notes in Business Information
Processing, volume 160, pages 3–14. Springer.
Okoli, C. (2015). A Guide to Conducting a Standalone Sys-
tematic Literature Review. Communications of the As-
sociation for Information Systems, 37(1):43.
OMG (2011). Business Process Model and Notation
(BPMN), Version 2.0.
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron,
I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L.,
Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou,
R., Glanville, J., Grimshaw, J. M., Hr
´
objartsson, A.,
Lalu, M. M., Li, T., Loder, E. W., Mayo-Wilson, E.,
McDonald, S., McGuinness, L. A., Stewart, L. A.,
Thomas, J., Tricco, A. C., Welch, V. A., Whiting, P.,
and Moher, D. (2021). The prisma 2020 statement:
an updated guideline for reporting systematic reviews.
BMJ, 372.
Petrasch, R. and Hentschke, R. (2015). Towards an Internet-
of-Things-aware Process Modeling Method An Ex-
ample for a House Suveillance System Process Model.
In MITiCON), pages 168–172.
Petrasch, R. and Hentschke, R. (2016). Process modeling
for industry 4.0 applications: Towards an industry 4.0
process modeling language and method. In JCSSE,
pages 1–5. IEEE.
Pierre Kobes (2016). Leitfaden Industrial Security
IEC62443 einfach erkl
¨
art. VDE Verlag, Berlin.
Pullonen, P., Tom, J., Matulevi
ˇ
cius, R., and Toots, A.
(2019). Privacy-enhanced BPMN: enabling data pri-
vacy analysis in business processes models. Software
and Systems Modeling, 18(6):3235–3264.
Ramadan, Q., Str
¨
uber, D., Salnitri, M., Riediger, V., and
J
¨
urjens, J. (2018). Detecting Conflicts Between Data-
Minimization and Security Requirements in Business
Process Models. In Pierantonio, A. and Trujillo,
S., editors, Modelling Foundations and Applications,
pages 179–198, Cham. Springer International Pub-
lishing.
Ribeiro, V., Barata, J., and Rupino Da Cunha, P. (2021). A
BPMN Extension to Model Inter-Organizational Pro-
cesses in Industry 4.0. In ISD.
Salnitri, M., Dalpiaz, F., and Giorgini, P. (2017). Designing
secure business processes with SecBPMN. Software
& Systems Modeling, 16(3):737–757.
Salnitri, M., Paja, E., and Giorgini, P. (2016). Main-
taining Secure Business Processes in Light of Socio-
Technical Systems’ Evolution. In REW, pages 155–
164. IEEE.
Sandhu, R. and Samarati, P. (1996). Authentication, access
control, and audit. ACM Computing Surveys (CSUR),
28(1):241–243.
Sang, K. S. and Zhou, B. (2015). BPMN Security Ex-
tensions for Healthcare Process. In ICCIT; UBICC;
DASC; PICom, pages 2340–2345.
Sch
¨
onig, S., Ackermann, L., Jablonski, S., and Ermer, A.
(2020). Iot meets BPM: a bidirectional communi-
cation architecture for iot-aware process execution.
Softw. Syst. Model., 19(6):1443–1459.
Sch
¨
onig, S., Aires, A. P., Ermer, A., and Jablonski, S.
(2018). Workflow support in wearable production in-
formation systems. In Information Systems in the Big
Data Era, volume 317, pages 235–243.
Sch
¨
onig, S., Hornsteiner, M., and Stoiber, C. (2022).
Towards process-oriented iiot security management:
Perspectives and challenges. In Enterprise, Business-
Process and Information Systems Modeling.
Stanton, B., Theofanos, M. F., Prettyman, S. S., and Fur-
man, S. (2016). Security Fatigue. IT Professional,
18(5):26–32.
Stoiber, C. and Sch
¨
onig, S. (2021). Process-aware decision
support model for integrating internet of things appli-
cations using AHP. In Proceedings of the 23rd Inter-
national Conference on Enterprise Information Sys-
tems, ICEIS, pages 869–876.
Stoiber, C. and Sch
¨
onig, S. (2022a). Digital transformation
and improvement of business processes with internet
of things: A maturity model for assessing readiness.
In 55th Hawaii International Conference on System
Sciences, HICSS.
Stoiber, C. and Sch
¨
onig, S. (2022b). Patterns for iot-based
business process improvements: Developing a meta-
model. In Proceedings of the 24th International Con-
ference on Enterprise Information Systems, ICEIS,
pages 655–666.
Sungur, C. T., Spiess, P., Oertel, N., and Kopp, O. (2013).
Extending BPMN for Wireless Sensor Networks. In
2013 IEEE 15th Conf. Business Informatics, pages
109–116.
Tange, K., De Donno, M., Fafoutis, X., and Dragoni, N.
(2020). A Systematic Survey of Industrial Inter-
net of Things Security: Requirements and Fog Com-
puting Opportunities. IEEE Commun. Surv. Tutor.,
22(4):2489–2520.
Turki, S. H., Bellaaj, F., Charfi, A., and Bouaziz, R.
(2012). Modeling Security Requirements in Service
Based Business Processes. In Enterprise, Business-
Process and Information Systems Modeling, pages
76–90, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
Yousfi, A., Bauer, C., Saidi, R., and Dey, A. K. (2016).
uBPMN: A BPMN extension for modeling ubiquitous
business processes. Inf. Softw. Technol., 74:55–68.
Zareen, S., Akram, A., and Ahmad Khan, S. (2020).
Security Requirements Engineering Framework with
Towards Security- and IIoT-Aware BPMN: A Systematic Literature Review
55