Visual compliance has emerged as a new paradigm to ensure that employees comply with processes and policies in a business context [1]. In this paper, we focus on videos from retai...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
Abstract. Existing computer science approaches to business modeling offer lowstractions such as data and control flows, which fail to capture the business intent underlying the in...
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Abstract. The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance syste...
Peifung E. Lam, John C. Mitchell, Sharada Sundaram