{"id":"https://openalex.org/W4288535359","doi":"https://doi.org/10.1080/19393555.2022.2104766","title":"Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)","display_name":"Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)","publication_year":2022,"publication_date":"2022-07-29","ids":{"openalex":"https://openalex.org/W4288535359","doi":"https://doi.org/10.1080/19393555.2022.2104766"},"language":"en","primary_location":{"id":"doi:10.1080/19393555.2022.2104766","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2022.2104766","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025720484","display_name":"Lampis Alevizos","orcid":"https://orcid.org/0000-0002-5891-1718"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Lampis Alevizos","raw_affiliation_strings":["Applied Cyber Security Research Laboratory, University of Central Lancashire Cyprus, Larnaka, Cyprus","Applied Cyber Security Research Laboratory University of Central Lancashire Cyprus 12 -14 University Avenue, Pyla 7080 Larnaka, Cyprus"],"affiliations":[{"raw_affiliation_string":"Applied Cyber Security Research Laboratory, University of Central Lancashire Cyprus, Larnaka, Cyprus","institution_ids":["https://openalex.org/I4210108889"]},{"raw_affiliation_string":"Applied Cyber Security Research Laboratory University of Central Lancashire Cyprus 12 -14 University Avenue, Pyla 7080 Larnaka, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["School of Sciences, University of Central Lancashire - Cyprus Campus, Pyla, Cyprus","Applied Cyber Security Research Laboratory University of Central Lancashire Cyprus 12 -14 University Avenue, Pyla 7080 Larnaka, Cyprus"],"affiliations":[{"raw_affiliation_string":"School of Sciences, University of Central Lancashire - Cyprus Campus, Pyla, Cyprus","institution_ids":["https://openalex.org/I4210108889"]},{"raw_affiliation_string":"Applied Cyber Security Research Laboratory University of Central Lancashire Cyprus 12 -14 University Avenue, Pyla 7080 Larnaka, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025720484"],"corresponding_institution_ids":["https://openalex.org/I4210108889"],"apc_list":null,"apc_paid":null,"fwci":1.2126,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83364769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"32","issue":"2","first_page":"134","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6300991773605347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5270631313323975},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49853038787841797},{"id":"https://openalex.org/keywords/institution","display_name":"Institution","score":0.4647729992866516},{"id":"https://openalex.org/keywords/financial-institution","display_name":"Financial institution","score":0.45535707473754883},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.44772225618362427},{"id":"https://openalex.org/keywords/financial-services","display_name":"Financial services","score":0.43872085213661194},{"id":"https://openalex.org/keywords/outcome","display_name":"Outcome (game theory)","score":0.4218478798866272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3482149541378021},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3326249122619629},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3228703439235687},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18768936395645142},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.18000823259353638},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.15816950798034668},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.12407508492469788},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08156976103782654}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6300991773605347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5270631313323975},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49853038787841797},{"id":"https://openalex.org/C2780510313","wikidata":"https://www.wikidata.org/wiki/Q178706","display_name":"Institution","level":2,"score":0.4647729992866516},{"id":"https://openalex.org/C2779601481","wikidata":"https://www.wikidata.org/wiki/Q650241","display_name":"Financial institution","level":2,"score":0.45535707473754883},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.44772225618362427},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.43872085213661194},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.4218478798866272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3482149541378021},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3326249122619629},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3228703439235687},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18768936395645142},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.18000823259353638},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.15816950798034668},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.12407508492469788},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08156976103782654},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/19393555.2022.2104766","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2022.2104766","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},{"id":"pmh:oai:clok.uclan.ac.uk:43356","is_oa":false,"landing_page_url":"http://orcid.org/0000-0002-5891-1718>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402361","display_name":"CLOK (University of Central Lancashire)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185852735","host_organization_name":"University of Lancashire","host_organization_lineage":["https://openalex.org/I185852735"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2758108284","https://openalex.org/W2949271998","https://openalex.org/W3205720099","https://openalex.org/W4205948809","https://openalex.org/W4244983850"],"related_works":["https://openalex.org/W2978999882","https://openalex.org/W2153369162","https://openalex.org/W2119369480","https://openalex.org/W3141031773","https://openalex.org/W1595686156","https://openalex.org/W2181392282","https://openalex.org/W2366039654","https://openalex.org/W2385498535","https://openalex.org/W2957522966","https://openalex.org/W1981266481"],"abstract_inverted_index":{"Financial":[0,181],"institutions":[1],"are":[2,117],"undergoing":[3],"the":[4,27,34,38,45,49,81,91,98,108,113,131,143,155,164,176,193],"so-called":[5],"\u201cde-perimeterization.\u201d":[6],"The":[7,64,86,115],"security":[8],"model":[9],"up":[10],"to":[11,42,70,89,124],"today":[12],"is":[13,30,40,69,88,159],"heavily":[14],"dependent":[15],"on":[16,21],"\u201dborder":[17],"patrols\u201d":[18],"focusing":[19],"mostly":[20],"providing":[22],"a":[23,120,149,169,180,184],"secure":[24,150],"perimeter":[25],"while":[26],"internal":[28],"network":[29],"inherently":[31],"trusted.":[32],"In":[33],"upcoming":[35],"borderless":[36],"networks,":[37],"focus":[39,65],"shifting":[41],"protection":[43],"of":[44,66,172,179],"data":[46],"itself,":[47],"considering":[48,175],"full":[50],"lifecycle":[51],"or":[52,138,151],"switching":[53],"toward":[54],"context-aware":[55],"defensive":[56],"strategies":[57],"also":[58],"known":[59],"as":[60,186,188],"zero":[61],"trust":[62],"networks.":[63],"this":[67],"work":[68],"critically":[71],"discuss":[72],"existing":[73,95],"threat":[74,100,110,133],"modeling":[75],"methodologies,":[76],"available":[77],"and":[78,104,141],"used":[79],"in":[80,112,147,168],"financial":[82],"services":[83],"sector":[84],"(FSS).":[85],"objective":[87],"investigate":[90],"extent":[92],"at":[93],"which":[94],"methodologies":[96],"cover":[97],"different":[99],"actors":[101],"&":[102],"events":[103],"if":[105,126],"they":[106],"reflect":[107,130],"current":[109,132],"landscape":[111,134],"FSS.":[114],"investigations":[116],"supported":[118],"by":[119,162],"real-world":[121],"case":[122,156],"study":[123],"uncover":[125],"any":[127,136],"process":[128],"can":[129],"without":[135],"customizations":[137],"special":[139],"know-how,":[140],"whether":[142],"final":[144],"outcome":[145],"helps":[146],"reaching":[148],"compliance":[152],"state.":[153],"Through":[154],"study,":[157],"it":[158],"evidenced":[160],"that":[161],"utilizing":[163],"IRAM2":[165],"methodology":[166],"resulted":[167],"high":[170],"ratio":[171],"compliance,":[173],"however,":[174],"Crown":[177],"Jewels":[178],"Institution":[182],"(FI),":[183],"secure,":[185],"much":[187],"possible,":[189],"state":[190],"should":[191],"be":[192],"desired":[194],"outcome.":[195]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-07-29T00:00:00"}
