An experimental study on the design and modeling of security concepts in business processes

Maria Leitner, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

In recent years, business process models are used to define security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However, because the symbols of process-related security properties are not standardized, different issues concerning the comprehensibility and maintenance of the respective models arise. In this paper, we present the initial results of an experimental study on the design and modeling of 11 security concepts in a business process context. In particular, we center on the semantic transparency of the visual symbols that are intended to represent the different concepts (i.e. the one-to-one correspondence between the symbol and its meaning). Our evaluation showed that various symbols exist which are well-perceived. However, further studies are necessary to dissolve a number of remaining issues.

Original languageEnglish
Title of host publicationPractice of Enterprise Modeling - 6th IFIP WG 8.1 Working Conference, PoEM 2013, Proceedings
PublisherSpringer Verlag
Pages236-250
Number of pages15
ISBN (Print)9783642416408
DOIs
StatePublished - 2013
Externally publishedYes
Event6th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling, PoEM 2013 - Riga, Latvia
Duration: 6 Nov 20137 Nov 2013

Publication series

NameLecture Notes in Business Information Processing
Volume165 LNBIP
ISSN (Print)1865-1348

Conference

Conference6th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling, PoEM 2013
Country/TerritoryLatvia
CityRiga
Period6/11/137/11/13

Keywords

  • BPMN
  • Business processes
  • Empirical evaluation
  • Icons
  • Modeling
  • Security
  • Visualization

Fingerprint

Dive into the research topics of 'An experimental study on the design and modeling of security concepts in business processes'. Together they form a unique fingerprint.

Cite this