Subscribe to our Newsletter and get informed about new publication regulary and special discounts for subscribers!

ILSHS > ILSHS Volume 6 > Attributed Metagraph Modelling to Design Business...
< Back to Volume

Attributed Metagraph Modelling to Design Business Process Security Management

Full Text PDF


Cross organizational process flow is having increasing importance as organizational focus is ooffshoring & outsourcing to develop complex business processes. Utilizing the development otelecommunications frameworks, IT systems are fundamental to collaborating and distributinbusiness processes for both internal as well as external business units. But, this increased dependenexists in an ecosystem of increasing threats to information security along with market sensitivity anregulatory power. Based on recent process flow studies, we explore application of attributmetagraph representation to evaluate process security. Utilizing examples of both risk-analysis andimpact-mitigation, we reveal the effectiveness of attributed metagraph for business process analysMetagraph-based model helps in analysis of as-is processes as well as offers normative direction fprocess remodelling.


International Letters of Social and Humanistic Sciences (Volume 6)
D. Mukherjee, "Attributed Metagraph Modelling to Design Business Process Security Management", International Letters of Social and Humanistic Sciences, Vol. 6, pp. 41-48, 2013
Online since:
September 2013

Basu, Amit, A Metagraph View-Based Approach to Multi-firm Process coordination", Proceedings of the CAiSE, 05 Forum, Porto, Portugal, (2005).

Basu, Amit, Robert Blanning, Management Science 44 (7) (1998) 982-995.

Baskerville Richard, Journal of Information System Security 1(1) (2005) 23-50.

Basu Amit, Robert Blanning, Management Science 40(12) (1994) 1579-1600.

Richardson Karen, Keeping Accounting Close to Home--Firms Shun Outsourcers as Sarbanes-Oxley Fears Outweigh Any Cost Savings, The Wall Street Journal, 19 May, 2006, C3.

Ransbotham Sam, Mitra Sabyasachi, Analyzing Business Process Security using Attributed Metagraphs, 16th Annual Workshop on Information Technologies & Systems (WITS) Paper.

Basu Amit, Robert W. Blanning, Information Systems Research 11(1) (2000) 17-36.

Barkataki Sharad, Mapping Petri Nets and Metagraphs: A Step Towards Inter- Organizational Workflows, Proceedings of the 9th Americas Conference on Information Systems, (2003).

Basu Amit, Robert W. Blanning, Workflow Analysis using Attributed Metagraphs, Proceedings of the 34th Hawaii International Conference on System Sciences, Maui, (2001).

Basu Amit, Robert W. Blanning, Information Systems Research 14(4) (2003) 337-355.

Bhargava Hermant K., Steven O. Kimbrough, Ramayya Krishnan, ORSA Journal on Computing 3(2) (1991) 107-120.

Basu Amit, Akhil Kumar, Information Systems Research 13(1) (2002) 1-14.

Kriplani Manjeet, BusinessWeek 3996(7) (2006) 40.

Van der Aalst W. M. P., The Journal of Circuits, Systems and Computers 8(1) (1998) 21-66.

Federal Bureau of Investigation, IC3 2005 Internet Crime Report, 2005, 1-27.

Hamming Richard W., Bell System Technical Journal 29(2) (1950) 147-160.

http: /www. computer. org/csdl/proceedings/iccsit/2008/3308/00/3308a729-abs. html.

http: /www. ijcaonline. org/archives/volume56/number6/8893-2910 ( Received 10 June 2013; accepted 16 June 2013 ).

Show More Hide
Cited By:

[1] N. Doherty, S. Tajuddin, "Towards a user-centric theory of value-driven information security compliance", Information Technology & People, Vol. 31, p. 348, 2018


[2] P. Wortman, J. Chandy, "SMART: security model adversarial risk-based tool for systems security design evaluation", Journal of Cybersecurity, Vol. 6, 2020


[3] P. Wortman, F. Tehranipoor, J. Chandy, "An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design", 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), p. 1, 2018