A method is described for facilitating implementation of an automated system
for
transacting business, where the system users are subject to predetermined rules
governing business conduct. Each user is assigned a user ID and has a security
profile, which lists the transactions that user is authorized to perform. A list
is prepared of pairs of incompatible transactions (transactions which, if performed
by the same user, would violate the predetermined rules). Each security profile
is compared with the list, to identify security profiles including at least one
pair of incompatible transactions. A report is then generated indicating those
security profiles which include incompatible transactions and the user identifiers
associated with those security profiles.