TY - GEN
T1 - An experimental study on the design and modeling of security concepts in business processes
AU - Leitner, Maria
AU - Schefer-Wenzl, Sigrid
AU - Rinderle-Ma, Stefanie
AU - Strembeck, Mark
PY - 2013
Y1 - 2013
N2 - In recent years, business process models are used to define security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However, because the symbols of process-related security properties are not standardized, different issues concerning the comprehensibility and maintenance of the respective models arise. In this paper, we present the initial results of an experimental study on the design and modeling of 11 security concepts in a business process context. In particular, we center on the semantic transparency of the visual symbols that are intended to represent the different concepts (i.e. the one-to-one correspondence between the symbol and its meaning). Our evaluation showed that various symbols exist which are well-perceived. However, further studies are necessary to dissolve a number of remaining issues.
AB - In recent years, business process models are used to define security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However, because the symbols of process-related security properties are not standardized, different issues concerning the comprehensibility and maintenance of the respective models arise. In this paper, we present the initial results of an experimental study on the design and modeling of 11 security concepts in a business process context. In particular, we center on the semantic transparency of the visual symbols that are intended to represent the different concepts (i.e. the one-to-one correspondence between the symbol and its meaning). Our evaluation showed that various symbols exist which are well-perceived. However, further studies are necessary to dissolve a number of remaining issues.
KW - BPMN
KW - Business processes
KW - Empirical evaluation
KW - Icons
KW - Modeling
KW - Security
KW - Visualization
UR - http://www.scopus.com/inward/record.url?scp=85006049205&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-41641-5_17
DO - 10.1007/978-3-642-41641-5_17
M3 - Conference contribution
AN - SCOPUS:85006049205
SN - 9783642416408
T3 - Lecture Notes in Business Information Processing
SP - 236
EP - 250
BT - Practice of Enterprise Modeling - 6th IFIP WG 8.1 Working Conference, PoEM 2013, Proceedings
PB - Springer Verlag
T2 - 6th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling, PoEM 2013
Y2 - 6 November 2013 through 7 November 2013
ER -