Skip to main content

Delegation of Control in Administrative Procedures

  • Conference paper
Deontic Logic in Computer Science (DEON 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5076))

Included in the following conference series:

  • 564 Accesses

Abstract

Norms are implemented by administrative procedures. This paper addresses the delegation of control in administrative procedures. Instead of having to check all details, a controlling actor can trust the data provided by other actors, provided they can demonstrate to be ‘in control’. In this paper we provide a conceptual analysis of situations in which control has been delegated. The approach is based on an analysis of the dependencies between activities performed by the actors involved and on evidence documents. To motivate and illustrate the approach, we discuss a case study about the redesign of EU customs procedures for collecting excise duties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baida, Z., Liu, J., Tan, Y.-H.: Towards a methodology for designing e-government control procedures. In: Wimmer, M., Scholl, H., Grönlund, A. (eds.) EGOV. LNCS, vol. 4656, pp. 56–67. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Boella, G., van der Torre, L.: A game theoretic approach to contracts in multiagent systems. IEEE Transactions on Systems, Man and CyBernetics - Part C 36(1), 68–79 (2006)

    Article  Google Scholar 

  3. Bons, R.W.H., Lee, R.M., Wagenaar, R.W.: Designing trustworthy interorganizational trade procedures for open electronic commerce. International Journal of Electronic Commerce 2(3), 61–83 (1998)

    Google Scholar 

  4. Cardoso, H.L., Oliveira, E.: Electronic institutions for b2b: dynamic normative environments. Artificial Intelligence and Law 10.1007/s10506-007-9044-2 (2007)

    Google Scholar 

  5. Chen, K.: Schematic Evaluation of Internal Accounting Control Systems. PhD thesis, University of Texas at Austin (1992)

    Google Scholar 

  6. Davenport, T., Short, J.: The new industrial engineering: Information technology and business process redesign. Sloan Management Review, 11–27 (summer 1990)

    Google Scholar 

  7. Eisenhardt, K.M.: Agency theory: An assessment and review. Academy of Management Review 14(1), 57–74 (1989)

    Article  Google Scholar 

  8. European Commission. Regulation no 648/2005 of the European Parliament and of the Council, amending regulation no 2913/92 establishing the community customs code (2005)

    Google Scholar 

  9. Hammer, M.: Reengineering work: Dont automate, obliterate. Harvard Business Review, 104–112 (July/August 1990)

    Google Scholar 

  10. Hu, X., Lin, Z., Whinston, A., Zhang, H.: Hope or hype: On the viability of Escrow services as trusted third parties in online auction environments. Information Systems Research 15(3), 236–249 (2004)

    Article  Google Scholar 

  11. Kartseva, V., Gordijn, J., Tan, Y.-H.: Towards a modelling tool for designing control mechanisms in network organisations. International Journal of Electronic Commerce 10(2), 57–84 (2005)

    Google Scholar 

  12. Kolp, M., Giorgini, P., Mylopoulos, J.: Multi-agent architectures as organizational structures. Auton Agent Multi-Agent Sys. 23, 3–25 (2006)

    Article  Google Scholar 

  13. Lee, R.: Automated generation of electronic procedures: Procedure constraint grammars. ecision Support Systems 33, 291–308 (2002)

    Article  Google Scholar 

  14. Liu, J., Baida, Z., Tan, Y.-H.: e-Customs control procedures redesign methodology: Model-based application. In: Österle, H., Schelp, J., Winter, R. (eds.) 15th European Conference of Information Systems (ECIS 2007), pp. 93–105 (2007)

    Google Scholar 

  15. Mayer, R., Davis, J., Schoorman, F.: An integrative model of organizational trust. Academy of Management Review 20(3), 709–734 (1995)

    Article  Google Scholar 

  16. Moffett, J.D.: Control principles and role hierarchies. In: Proceedings of the third ACM workshop on Role-based access control, pp. 63–69. ACM, New York (1998)

    Chapter  Google Scholar 

  17. Ronmey, M., Steinbart, P.: Accounting Information Systems, 10e. Prentice Hall, NJ (2006)

    Google Scholar 

  18. Schaad, A.: A Framework for Organisational Control Principles. PhD thesis, Department of Computer Science, University of York (2003)

    Google Scholar 

  19. Starreveld, R., de Mare, B., Joels, E.: Bestuurlijke Informatieverzorging (in Dutch), 4th edn., Samsom, Alphen aan den Rijn, vol. 1 (1994)

    Google Scholar 

  20. Tan, Y.-H., Thoen, W.: Formal aspects of a generic model of trust for electronic commerce. Decision Support Systems 33(3), 233–246 (2002)

    Article  Google Scholar 

  21. TAXUD. Electronic customs multi-annual strategic plan (2006)

    Google Scholar 

  22. TAXUD. Authorised economic operators guidelines (2007)

    Google Scholar 

  23. Williamson, O.E.: Transaction cost economics: The governance of contractual relations. Journal of Law and Economics 22, 3–61 (1979)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ron van der Meyden Leendert van der Torre

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hulstijn, J., Liu, J., Tan, YH. (2008). Delegation of Control in Administrative Procedures. In: van der Meyden, R., van der Torre, L. (eds) Deontic Logic in Computer Science. DEON 2008. Lecture Notes in Computer Science(), vol 5076. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70525-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70525-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70524-6

  • Online ISBN: 978-3-540-70525-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics