1. Jakoubi, S., Neubauer, T. and Tjoa, S., 2009. A roadmap to risk-aware business process management. In 2009 IEEE Asia-Paci c Services Computing Conference (APSCC). pp.23-27. IEEE. https://doi.org/10.1109/APSCC.2009.5394145
2. Jakoubi, S. and Tjoa, S., 2009, October. A reference model for risk-aware business process management. In
2009 Fourth International Conference on Risks and Security of Internet and Systems. pp. 82-89. IEEE.
https://doi.org/10.1109/CRISIS.2009.5411973.
3. Dumas, M., Rosa, L.M., Mendling, J. and Reijers, A.H., 2018. Fundamentals of business process management.
Springer-Verlag.
https://doi.org/10.1007/978- 3-662-56509-4.
5. Dixon, J., 2011. BPM survey insights: Maturity advances as BPM goes mainstream. Gartner: Stamford, CT, USA.
6. Searle, S., 2011. BPM survey insights: Organizations using BPM to reduce costs and improve process quality.
G002137785.
7. Van Der Aalst, W.M., Adams, M. and Russell, N.,2009. Modern Business Process Automation. Springer-
Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-642-03121-2.
8. Harmon, P. and Wolf, C., 2016. The state of business process management. BP Trends.
9. Veyrat, P., 2016. Customer centric processes: how to implement them using BPM.
10. Vom Brocke, J. and Mendling, J., 2018. Frameworks for business process management: A taxonomy for business
process management cases. Business process management cases: Digital innovation and business transformation
in practice. pp.1-17.
https://doi.org/10.1007/978-3- 319-58307-5 1.
11. Leitch, M., 2010. ISO 31000: 2009-The new international standard on risk management. Risk Analysis, 30(6), p.887.
https://doi.org/10.1111/j.1539- 6924.2010.01397.x.
12. Suriadi, S., WeiB, B., Winkelmann, A., ter Hofstede, A.H., Adams, M., Conforti, R., Fidge, C., La Rosa, M., Ouyang, C., Pika, A. and Rosemann, M., 2014. Current research in risk-aware business process managementoverview, comparison,
and gap analysis.Communications of the Association for Information Systems, 34(1), p.52.
http://dx.doi.org/10.17705/1CAIS.03452.
13. Kilimnik, J. and Pavlovski, C., 2014, July. Core banking modernization. In the 9th International Conference on
Information Technology and Applications.
14. Van der Aalst, W.M., 2004. Business process management: A personal view. Business Process Management Journal, 10(2). https: //doi.org/10.1108/bpmj.2004.15710baa.001.
15. Alonso, G., Agrawal, D., El Abbadi, A. and Mohan, C., 1997. Functionality and limitations of current work ow
management systems. IEEE Expert, 12(5), pp.105-111. https://doi.org/10.1007/978-3-540-28631-8 32.
16. Glykas, M., Valiris, G., Kokkinaki, A. and Koutsoukou, Z., 2018. Banking business process management implementation. International Journal of Productivity Management and Assessment Technologies (IJPMAT), 6(1), pp.50-69.
http://dx.doi.org/10.4018/IJPMAT.2018010104.
17. Becker, J., Breuker, D., WeiB, B. and Winkelmann, A., 2010. Exploring the status quo of business process
modelling languages in the banking sector-an empirical insight into the usage of methods in banks. https://
https://aisel.aisnet.org/acis2010/8/.
18. Engstler, M., Praeg, C.P. and Vocke, C., 2007. Bank & Zukunft 2007. Mit Prozessexzellenz und Vertriebsinnovationen
die Bank der Zukunft gestalten. https://doi.org/10.1007/978-3-8349-9880-4 1.
19. Zakeri, A., 2009. A brief overview on risk management in banking system, Statistics and Planning Oce of Sina
Bank. [In Persian].
20. Wigand, R.T., Stein eld, C.W. and Markus, M.L., 2005. Information technology standards choices and industry structure outcomes: The case of the US home mortgage industry. Journal of Management Information Systems, 22(2), pp.165-191. http: //dx.doi.org/10.1080/07421222.2005.11045843.
24. Argyropoulos, N., Mouratidis, H. and Fish, A., 2017. Supporting secure business process design via security process patterns. In Enterprise, Business- Process and Information Systems Modeling: 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017, Proceedings 18 (pp. 19-33). Springer International Publishing.
https://doi.org/10.1007/s10270-019-00743-y.
25. Ahmed, N., Matulevicius, R. and Khan, N.H., 2012. Eliciting security requirements for business processes using
patterns. In Proceedings of the 9th International Workshop on Security in Information Systems, pp. 49-58.
http://dx.doi.org/10.1515/itit.2013.2002.