{"id":"https://openalex.org/W7125414228","doi":"https://doi.org/10.1007/s10207-025-01196-9","title":"Context-based and investment decision-making cyber resilient systems: an empirical approach","display_name":"Context-based and investment decision-making cyber resilient systems: an empirical approach","publication_year":2026,"publication_date":"2026-01-22","ids":{"openalex":"https://openalex.org/W7125414228","doi":"https://doi.org/10.1007/s10207-025-01196-9"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01196-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01196-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01196-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01196-9.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010619713","display_name":"Kousik Barik","orcid":"https://orcid.org/0000-0001-9296-9561"},"institutions":[{"id":"https://openalex.org/I189268942","display_name":"Universidad de Alcal\u00e1","ror":"https://ror.org/04pmn0e78","country_code":"ES","type":"education","lineage":["https://openalex.org/I189268942"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Kousik Barik","raw_affiliation_strings":["Department of Computer Science, Universidad de Alcal\u00e1, Alcal\u00e1 de Henares, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad de Alcal\u00e1, Alcal\u00e1 de Henares, Madrid, Spain","institution_ids":["https://openalex.org/I189268942"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123566203","display_name":"Sanjay Misra","orcid":null},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Sanjay Misra","raw_affiliation_strings":["Department of Digital Sovereignty, Institute for Energy Technology, Halden, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Digital Sovereignty, Institute for Energy Technology, Halden, Norway","institution_ids":["https://openalex.org/I3130438513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044499999","display_name":"Luis Fern\u00e1ndez Sanz","orcid":"https://orcid.org/0000-0003-0778-0073"},"institutions":[{"id":"https://openalex.org/I189268942","display_name":"Universidad de Alcal\u00e1","ror":"https://ror.org/04pmn0e78","country_code":"ES","type":"education","lineage":["https://openalex.org/I189268942"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Luis Fernandez-Sanz","raw_affiliation_strings":["Department of Computer Science, Universidad de Alcal\u00e1, Alcal\u00e1 de Henares, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad de Alcal\u00e1, Alcal\u00e1 de Henares, Madrid, Spain","institution_ids":["https://openalex.org/I189268942"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021161855","display_name":"Sabarathinam Chockalingam","orcid":"https://orcid.org/0000-0001-6003-2360"},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Sabarathinam Chockalingam","raw_affiliation_strings":["Department of Risk and Security, Institute for Energy Technology, Halden, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Risk and Security, Institute for Energy Technology, Halden, Norway","institution_ids":["https://openalex.org/I3130438513"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021161855"],"corresponding_institution_ids":["https://openalex.org/I3130438513"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24995188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.4230000078678131,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.4230000078678131,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.1599999964237213,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.10260000079870224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7371000051498413},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.628000020980835},{"id":"https://openalex.org/keywords/investment","display_name":"Investment (military)","score":0.6225000023841858},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5594000220298767},{"id":"https://openalex.org/keywords/exploratory-research","display_name":"Exploratory research","score":0.5029000043869019},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.40950000286102295},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.3953999876976013},{"id":"https://openalex.org/keywords/exploratory-analysis","display_name":"Exploratory analysis","score":0.3864000141620636}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7371000051498413},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6376000046730042},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.628000020980835},{"id":"https://openalex.org/C27548731","wikidata":"https://www.wikidata.org/wiki/Q88272","display_name":"Investment (military)","level":3,"score":0.6225000023841858},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5594000220298767},{"id":"https://openalex.org/C85973986","wikidata":"https://www.wikidata.org/wiki/Q1091731","display_name":"Exploratory research","level":2,"score":0.5029000043869019},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.46959999203681946},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4652000069618225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4650000035762787},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.3953999876976013},{"id":"https://openalex.org/C3018260909","wikidata":"https://www.wikidata.org/wiki/Q1322871","display_name":"Exploratory analysis","level":2,"score":0.3864000141620636},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.3749000132083893},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3723999857902527},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.35740000009536743},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3050999939441681},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C2778865806","wikidata":"https://www.wikidata.org/wiki/Q6060850","display_name":"Investment decisions","level":3,"score":0.2913999855518341},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C128487930","wikidata":"https://www.wikidata.org/wiki/Q579488","display_name":"Information management","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01196-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01196-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01196-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01196-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01196-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01196-9.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5542178153991699,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W7125414228.pdf"},"referenced_works_count":92,"referenced_works":["https://openalex.org/W1412796528","https://openalex.org/W1515345759","https://openalex.org/W1663638353","https://openalex.org/W1925725102","https://openalex.org/W2011303397","https://openalex.org/W2048728386","https://openalex.org/W2070813941","https://openalex.org/W2116065935","https://openalex.org/W2136739561","https://openalex.org/W2167928095","https://openalex.org/W2314105925","https://openalex.org/W2361001234","https://openalex.org/W2590695271","https://openalex.org/W2621190648","https://openalex.org/W2737191587","https://openalex.org/W2740031074","https://openalex.org/W2741500584","https://openalex.org/W2768651693","https://openalex.org/W2804809822","https://openalex.org/W2910462204","https://openalex.org/W2943213436","https://openalex.org/W2979593716","https://openalex.org/W2982205235","https://openalex.org/W2993754257","https://openalex.org/W3006556904","https://openalex.org/W3014589148","https://openalex.org/W3026126000","https://openalex.org/W3061562950","https://openalex.org/W3084169849","https://openalex.org/W3084831628","https://openalex.org/W3110276721","https://openalex.org/W3110983522","https://openalex.org/W3115362282","https://openalex.org/W3122522378","https://openalex.org/W3123397884","https://openalex.org/W3134621558","https://openalex.org/W3134628574","https://openalex.org/W3134966463","https://openalex.org/W3147652411","https://openalex.org/W3194459689","https://openalex.org/W3195745285","https://openalex.org/W3202801741","https://openalex.org/W3207104833","https://openalex.org/W3207761222","https://openalex.org/W3215618166","https://openalex.org/W4206621993","https://openalex.org/W4210344620","https://openalex.org/W4210804094","https://openalex.org/W4220762966","https://openalex.org/W4225422860","https://openalex.org/W4285018249","https://openalex.org/W4285165460","https://openalex.org/W4308295781","https://openalex.org/W4309618162","https://openalex.org/W4309771115","https://openalex.org/W4316664258","https://openalex.org/W4323928813","https://openalex.org/W4324142623","https://openalex.org/W4360841606","https://openalex.org/W4372194354","https://openalex.org/W4378573691","https://openalex.org/W4380533311","https://openalex.org/W4382602104","https://openalex.org/W4385349843","https://openalex.org/W4385366999","https://openalex.org/W4385819961","https://openalex.org/W4386112460","https://openalex.org/W4386356462","https://openalex.org/W4386797499","https://openalex.org/W4386807703","https://openalex.org/W4387639120","https://openalex.org/W4388561958","https://openalex.org/W4389304845","https://openalex.org/W4389670070","https://openalex.org/W4390707893","https://openalex.org/W4391321495","https://openalex.org/W4391446502","https://openalex.org/W4391559759","https://openalex.org/W4391693112","https://openalex.org/W4391999358","https://openalex.org/W4392121222","https://openalex.org/W4392377503","https://openalex.org/W4392450052","https://openalex.org/W4392938478","https://openalex.org/W4397023789","https://openalex.org/W4400391865","https://openalex.org/W4400839403","https://openalex.org/W4403838229","https://openalex.org/W4406518294","https://openalex.org/W4407278884","https://openalex.org/W4408580801","https://openalex.org/W4410000240"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,61,129],"digital":[2],"era":[3],"has":[4],"introduced":[5],"information":[6,25],"technology,":[7],"driving":[8],"the":[9,22,57,76,135,144],"demand":[10],"for":[11,109],"organizations":[12,97,121],"to":[13,32,36,38,64,66,122],"protect":[14],"their":[15],"critical":[16],"assets":[17],"and":[18,52,68,98,140],"resources.":[19],"Cybersecurity":[20],"concerns":[21],"protection":[23],"of":[24,59,78,101,146],"systems":[26],"from":[27],"attack.":[28],"Organizational":[29],"resilience":[30,71],"refers":[31],"a":[33,40,84,107],"system\u2019s":[34],"ability":[35,63],"adapt":[37],"change,":[39],"modern":[41],"concept":[42,77],"that":[43,119,137],"is":[44,53],"increasingly":[45],"significant":[46],"in":[47,56,112,127,143],"our":[48],"continually":[49],"evolving":[50],"society":[51],"particularly":[54],"relevant":[55],"context":[58],"cybersecurity.":[60,128],"organization\u2019s":[62],"respond":[65],"cyberattacks":[67],"its":[69],"mature":[70],"against":[72],"successful":[73],"attacks":[74],"reflect":[75],"resilient":[79],"systems.":[80,148],"This":[81],"study":[82,93],"presents":[83],"cyber-resilience":[85,113],"management":[86],"framework":[87,108],"based":[88,115],"on":[89,116],"an":[90,99],"exploratory":[91],"multiple-case":[92],"analysis":[94,100],"across":[95],"four":[96],"existing":[102],"cybersecurity":[103],"literature.":[104],"We":[105],"propose":[106],"investment":[110,125,141],"decisions":[111,126],"systems,":[114],"derived":[117],"context,":[118],"enables":[120],"make":[123],"informed":[124],"outcomes":[130],"provide":[131],"key":[132],"insights":[133],"into":[134],"factors":[136],"influence":[138],"managerial":[139],"decision-making":[142],"development":[145],"cyber-resilient":[147]},"counts_by_year":[],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2026-01-23T00:00:00"}
