{"id":"https://openalex.org/W2122541722","doi":"https://doi.org/10.1007/978-3-642-29231-6_6","title":"Risk and Business Goal Based Security Requirement and Countermeasure Prioritization","display_name":"Risk and Business Goal Based Security Requirement and Countermeasure Prioritization","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2122541722","doi":"https://doi.org/10.1007/978-3-642-29231-6_6","mag":"2122541722"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-29231-6_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29231-6_6","pdf_url":null,"source":{"id":"https://openalex.org/S4210177767","display_name":"Lecture notes in business information processing","issn_l":"1865-1348","issn":["1865-1348","1865-1356"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Business Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022652001","display_name":"Andrea Herrmann","orcid":"https://orcid.org/0000-0002-7850-8344"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Andrea Herrmann","raw_affiliation_strings":["Independent Researcher, Germany"],"affiliations":[{"raw_affiliation_string":"Independent Researcher, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015308371","display_name":"Ay\u015fe Moral\u0131","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayse Morali","raw_affiliation_strings":["Ascure N.V., St. Denijs-Westrem, Belgium"],"affiliations":[{"raw_affiliation_string":"Ascure N.V., St. Denijs-Westrem, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052389888","display_name":"Sandro Etalle","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Sandro Etalle","raw_affiliation_strings":["Eindhoven Technical University, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven Technical University, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000853046","display_name":"Roel Wieringa","orcid":"https://orcid.org/0000-0003-2121-9928"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Roel Wieringa","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022652001"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4345,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.88921072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.8772591352462769},{"id":"https://openalex.org/keywords/prioritization","display_name":"Prioritization","score":0.7254456281661987},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6094601154327393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4973342716693878},{"id":"https://openalex.org/keywords/goal-modeling","display_name":"Goal modeling","score":0.4204520285129547},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.38599830865859985},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.35247209668159485},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.33832836151123047},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16424372792243958},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.10062640905380249},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07425996661186218}],"concepts":[{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.8772591352462769},{"id":"https://openalex.org/C2777615720","wikidata":"https://www.wikidata.org/wiki/Q11888847","display_name":"Prioritization","level":2,"score":0.7254456281661987},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6094601154327393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4973342716693878},{"id":"https://openalex.org/C9586889","wikidata":"https://www.wikidata.org/wiki/Q5575167","display_name":"Goal modeling","level":4,"score":0.4204520285129547},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38599830865859985},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.35247209668159485},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.33832836151123047},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16424372792243958},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.10062640905380249},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07425996661186218},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":8,"locations":[{"id":"doi:10.1007/978-3-642-29231-6_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29231-6_6","pdf_url":null,"source":{"id":"https://openalex.org/S4210177767","display_name":"Lecture notes in business information processing","issn_l":"1865-1348","issn":["1865-1348","1865-1356"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Business Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/cb9008cc-ef57-463f-b4ca-861a6e47e645","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/cb9008cc-ef57-463f-b4ca-861a6e47e645","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Herrmann, A, Morali, A, Etalle, S & Wieringa, R J 2012, Risk and business goal based security requirement and countermeasure prioritization. in L Niedrite, R Strazdina & B Wangler (eds), Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers). Lecture Notes in Business Information Processing, vol. 106, Springer, Berlin, pp. 64-76. https://doi.org/10.1007/978-3-642-29231-6_6","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/b614ab5a-4a5b-42d8-8b85-f23e7ab13104","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/b614ab5a-4a5b-42d8-8b85-f23e7ab13104","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Herrmann, A, Morali, A, Etalle, S & Wieringa, R J 2012, Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. in L Niedrite, R Strazdina & B Wangler (eds), Workshops on Business Informatics Research (BIR 2011). Lecture Notes in Business Information Processing, no. 106, vol. 106, Springer, London, pp. 64-76. https://doi.org/10.1007/978-3-642-29231-6_6","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:733222","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=733222","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.233.628","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.233.628","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprints.eemcs.utwente.nl/21259/01/Herrmann_et_al_-_Risk_and_business_goal_based_security_requirements_and_coutermeasure_specification.pdf","raw_type":"text"},{"id":"pmh:oai:library.tue.nl:733222","is_oa":false,"landing_page_url":"http://repository.tue.nl/733222","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:ris.utwente.nl:publications/b614ab5a-4a5b-42d8-8b85-f23e7ab13104","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/cb9008cc-ef57-463f-b4ca-861a6e47e645","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/cb9008cc-ef57-463f-b4ca-861a6e47e645","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers), 64 - 76","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1555842091","https://openalex.org/W1569111752","https://openalex.org/W1579675502","https://openalex.org/W1588327580","https://openalex.org/W1597386479","https://openalex.org/W1662441884","https://openalex.org/W1683691372","https://openalex.org/W1891044686","https://openalex.org/W1972276999","https://openalex.org/W1981983328","https://openalex.org/W1985858614","https://openalex.org/W1987242689","https://openalex.org/W2019360156","https://openalex.org/W2030015318","https://openalex.org/W2083658929","https://openalex.org/W2110889412","https://openalex.org/W2113237548","https://openalex.org/W2125693787","https://openalex.org/W2150546866","https://openalex.org/W2156198657","https://openalex.org/W3161918289","https://openalex.org/W4237936646"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2506292322","https://openalex.org/W2362741838","https://openalex.org/W622044715","https://openalex.org/W4283209547","https://openalex.org/W2378994067","https://openalex.org/W2347979151","https://openalex.org/W2466517183","https://openalex.org/W2549790432"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
