- document
-
Heijmann, F. (author), Lutterop, M (author), Tan, Y.H. (author), Giesbers, B (author), Zuidwijk, RA (author), Hulstijn, J. (author)Are there ways to improve compliance, safety, security,<br/>operational efficiency and information quality in<br/>international trade? Reduce the administrative burden<br/>for business and government? Foster the uniform<br/>application of Customs legislation? Encourage mutual<br/>understanding between the public and private sector,<br/>and even...journal article 2015
- document
-
Singh, M.P. (author), Arrott, M. (author), Balke, T. (author), Chopra, A. (author), Christiaanse, R.M.J. (author), Cranefield, S. (author), Dignum, F. (author), Eynard, D. (author), Farcas, E. (author), Fornare, N. (author), Gandon, F. (author), Governatori, G. (author), Dam, H.K. (author), Hulstijn, J. (author), Krueger, I. (author), Lam, H.P. (author), Meisinger, M. (author), Noriega, P. (author), Tony, B. (author), Savarimuthu, R. (author), Tadanki, K. (author), Verhagen, H. (author), Villata, S. (author)This chapter presents a variety of applications of norms. These applications include governance in sociotechnical systems, data licensing and data collection, understanding software development teams, requirements engineering, assurance, natural resource allocation, wireless grids, autonomous vehicles, serious games, and virtual worlds.book chapter 2013
- document
-
Christiaanse, R.M.J. (author), Hulstijn, J. (author)Developments in auditing, such as continuous auditing or compliance by design, presuppose detailed models of economic transactions, often modelled as value cycles using a money measure. Automated control environments require an automated mechanism to ensure data integrity. Data integrity is not a given, but needs to be established. From a model...conference paper 2013
- document
-
Veenstra, A.W. (author), Hulstijn, J. (author), Christiaanse, R.M.J. (author), Tan, Y. (author)An integrated data pipeline has been proposed to meet requirements for visibility, supervision and control in global supply chains. How can data integration be used for risk assessment, monitoring and control in global supply chains? We argue that concepts from model-based auditing can be used to model the ‘ideal’ flow of money and goods, and by...conference paper 2013
- document
-
Veenstra, A.W. (author), Hulstijn, J. (author), Christiaanse, R. (author), Tan, Y. (author)An integrated data pipeline has been proposed to meet requirements for supply chain visibility and control. How can data integration be used for risk assessment, monitoring and control in global supply chains? We argue that concepts from model-based auditing can be used to model the ‘ideal’ flow of money and goods, and by identifying...conference paper 2013
- document
-
Veenstra, A.W. (author), Hulstijn, J. (author), Christiaanse, R. (author), Tan, Y.-H. (author)An integrated data pipeline has been proposed to meet requirements for supply chain visibility and control. How can data integration be used for risk assessment, monitoring and control in global supply chains? We argue that concepts from model-based auditing can be used to model the ideal flow of money and goods, and by identifying...conference paper 2013
- document
-
Boella, G. (author), Hulstijn, J. (author), Humphreys, L. (author), Janssen, M.F.W.H.A. (author), Van der Torre, L. (author)Maintaining regulatory compliance is an increasing concern. Legal Knowledge Management systems could support the work of compliance managers. However, there are challenges to overcome, of interpreting legal knowledge and mapping it onto business processes. In this discussion paper we determine requirements for Legal Knowledge Management systems...conference paper 2012
- document
-
Christiaanse, R. (author), Hulstijn, J. (author)Abstract: For inter-organizational systems, integrity of information is crucial: how to make sure that the information represented in a system will continue to faithfully represent business reality? In this paper we present a neo-classical approach to information integrity. We apply classic? principles of administrative organization and...report 2011
- document
-
Vermaas, P.E. (author), Tan, Y.H. (author), Van den Hoven, J. (author), Burgemeestre, B. (author), Hulstijn, J. (author)In this paper, we consider the meaning, roles, and uses of trust in the economic and public domain, focusing on the task of designing systems for trust in information technology. We analyze this task by means of a survey of what trust means in the economic and public domain, using the model proposed by Lewicki and Bunker, and using the emerging...journal article 2010