the sharing and reuse of knowledge to support
decision making.
Following the Enterprise Model Approach
(Uschold & King, 1995), we build an ontology with
14 top level concepts grouped in four subontologies
(enterprise, security, legal and location) and 14
relationships. We then successfully formalize pieces
of different regulations to test our model. Our model
is capable of precisely and intelligibly representing
the various deontic modalities a firm is confronted to
while attempting to comply with data regulations.
With the ambition of facilitating the apprehension of
business and operational impacts of regulatory
requirements, our ontology is designed to by any type
of firm. We are currently developing the ontology
using Protégé and implementing it at Solvay (Solvay,
2022), a worldwide chemical company subject to
over 30 privacy regulations, 20 export control
regulations and additional data regulations.
To further develop the existing ontology, we also
plan to integrate further existing information security
and risk management ontologies. We believe that
combining them will enable the model to further
facilitate the role of security practitioners and
compliance manager by providing a more holistic risk
management with information knowledge from
traditional information security threats. With a desire
to optimize efforts, we also hope to lead to more
efficient risk management by combining regulatory
risk and information security risk.
REFERENCES
Delorme, G., Talens, G., Disson, E., Collard, G., & Gaget,
E. (2020, December). On the Definition of Data
Regulation Risk. In International Conference on
Service-Oriented Computing (pp. 433-443). Springer,
Cham.
COUNCIL REGULATION (EC) No 428/2009 of 5 May
2009 setting up a Community re-gime for the control of
exports, transfer, brokering and transit of dual-use items
(EU dual-use), last consolidated version 2018/15/12.
Export Administration Regulation (EAR), 15 C.F.R. § 730
et seq, https://www.bis.doc.gov/index.php/regulations/
export-administration-regulations-ear, last accessed
2022/02/20.
Suh, B., & Han, I. (2003). The IS risk analysis based on a
business model. Information & management, 41(2),
149-158.
Tixier, J., Dusserre, G., Salvi, O., & Gaston, D. (2002).
Review of 62 risk analysis methodologies of industrial
plants. Journal of Loss Prevention in the process
industries, 15(4), 291-303.
Jallow, A. K., Majeed, B., Vergidis, K., Tiwari, A., & Roy,
R. (2007). Operational risk analysis in business
processes. BT Technology Journal, 25(1), 168-177.
Donner, M. (2003). Toward a security ontology. IEEE
Security & Privacy, 1(03), 6-7.
Tsoumas, B., & Gritzalis, D. (2006, April). Towards an
ontology-based security management. In 20th
International Conference on Advanced Information
Networking and Applications-Volume 1 (AINA'06)
(Vol. 1, pp. 985-992). IEEE.
Larmande, P., Arnaud, E., Mougenot, I., Jonquet, C.,
Rouge, T. L., & Ruiz, M. (2013, May). Proceedings of
the 1st International Workshop on Semantics for
Biodiversity. In 1. International Workshop on
Semantics for Biodiversity (pp. 001-131).
Visser, P. R., & Bench-Capon, T. J. (1998). A comparison
of four ontologies for the design of legal knowledge
systems. Artificial Intelligence and Law, 6(1), 27-57.
Jones, D., Bench-Capon, T., & Visser, P. (1998).
Methodologies for ontology development.
Gruber, T. R. (1992). Ontolingua: A mechanism to support
portable ontologies.
Uschold, M., & King, M. (1995). Towards a methodology
for building ontologies (pp. 1-13). Edinburgh: Artificial
Intelligence Applications Institute, University of
Edinburgh.
Princeton WordNet , https://wordnet.princeton.edu/ last
accessed 2022/02/20.
Fox, M.S., Chionglo, J., Fadel, F. A Common-Sense Model
of the Enterprise, Proceedings of the Industrial
Engineering Research Conference 1993
Fernández-López, M., Gómez-Pérez, A., & Juristo, N.
(1997). Methontology: from ontological art towards
ontological engineering.
Gruber, T. R. (1992). Ontolingua: A mechanism to support
portable ontologies.
Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., &
Robaldo, L. (2018, October). Pronto: Privacy ontology
for legal compliance. In Proc. 18th Eur. Conf. Digital
Government (ECDG) (pp. 142-151).
Pinto, H. S., & Martins, J. P. (2004). Ontologies: How can
they be built?. Knowledge and information systems,
6(4), 441-464.
Niles, I., & Pease, A. (2003). Mapping WordNet to the
SUMO ontology. In Proceedings of the ieee
international knowledge engineering conference (pp.
23-26).
Boer, A., Di Bello, M., Breuker, J. & Hoekstra, R. (2009).
LKIF core: Principled ontology development for the
legal domain. Law, ontologies and the semantic web:
channelling the legal information flood, 188, 21.
Regulation (EU) 2016/679 of the European Parliament and
of the Council of 27 April 2016 on the protection of
natural persons with regard to the processing of
personal data and on the free movement of such data,
and repealing Directive 95/46/EC (General Data
Protection Regulation) Official Journal L,(2016).
Van Kralingen, R. (1997, June). A conceptual frame-based
ontology for the law. In Proceedings of the first
international workshop on legal ontologies (pp. 6-17).
Blanco, C., Lasheras, J., Valencia-García, R., Fernández-
Medina, E., Toval, A., & Piattini, M. (2008, March). A
systematic review and comparison of security