{"id":"https://openalex.org/W4407430267","doi":"https://doi.org/10.1093/cybsec/tyaf003","title":"The use of simulations in economic cybersecurity decision-making","display_name":"The use of simulations in economic cybersecurity decision-making","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407430267","doi":"https://doi.org/10.1093/cybsec/tyaf003"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf003/61867945/tyaf003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf003/61867945/tyaf003.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043606107","display_name":"Mazaher Kianpour","orcid":"https://orcid.org/0000-0003-2804-4630"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]},{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["NO","SE"],"is_corresponding":true,"raw_author_name":"Mazaher Kianpour","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology , H\u00f8gskoleringen 1, 7034 Trondheim ,","RISE Research Institutes of Sweden , P.O. Box 1263, SE-164 29 Kista ,"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology , H\u00f8gskoleringen 1, 7034 Trondheim ,","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"RISE Research Institutes of Sweden , P.O. Box 1263, SE-164 29 Kista ,","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037374855","display_name":"Ulrik Franke","orcid":"https://orcid.org/0000-0003-2017-7914"},"institutions":[{"id":"https://openalex.org/I101466613","display_name":"Swedish Defence University","ror":"https://ror.org/04mj8af82","country_code":"SE","type":"education","lineage":["https://openalex.org/I101466613"]},{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ulrik Franke","raw_affiliation_strings":["KTH Royal Institute of Technology , SE-100 44 Stockholm ,","RISE Research Institutes of Sweden , P.O. Box 1263, SE-164 29 Kista ,","Swedish Defence University , P.O. Box 278 05, SE-115 93 Stockholm ,"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology , SE-100 44 Stockholm ,","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"RISE Research Institutes of Sweden , P.O. Box 1263, SE-164 29 Kista ,","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"Swedish Defence University , P.O. Box 278 05, SE-115 93 Stockholm ,","institution_ids":["https://openalex.org/I101466613"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043606107"],"corresponding_institution_ids":["https://openalex.org/I204778367","https://openalex.org/I2800664555"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":6.653,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.9529879,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6298497319221497},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4074552059173584}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6298497319221497},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4074552059173584}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyaf003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf003/61867945/tyaf003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:ri-78020","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-78020","pdf_url":"https://ri.diva-portal.org/smash/get/diva2:2000863/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:DiVA.org:fhs-13499","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-13499","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf003/61867945/tyaf003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1357117299","display_name":null,"funder_award_id":"101020259","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G6404980081","display_name":null,"funder_award_id":"SM22-0057","funder_id":"https://openalex.org/F4320320940","funder_display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning"}],"funders":[{"id":"https://openalex.org/F4320311040","display_name":"Norges Teknisk-Naturvitenskapelige Universitet","ror":"https://ror.org/05xg72x27"},{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407430267.pdf","grobid_xml":"https://content.openalex.org/works/W4407430267.grobid-xml"},"referenced_works_count":102,"referenced_works":["https://openalex.org/W620793000","https://openalex.org/W925742927","https://openalex.org/W1412796528","https://openalex.org/W1495768301","https://openalex.org/W1515345759","https://openalex.org/W1548286626","https://openalex.org/W1575072324","https://openalex.org/W1606098658","https://openalex.org/W1775677666","https://openalex.org/W1969727095","https://openalex.org/W1971670344","https://openalex.org/W1989210507","https://openalex.org/W1992352638","https://openalex.org/W1997501517","https://openalex.org/W1997537847","https://openalex.org/W2015026749","https://openalex.org/W2027319489","https://openalex.org/W2028369463","https://openalex.org/W2033082111","https://openalex.org/W2041149981","https://openalex.org/W2056075452","https://openalex.org/W2062493711","https://openalex.org/W2089659956","https://openalex.org/W2093628349","https://openalex.org/W2120969335","https://openalex.org/W2121805588","https://openalex.org/W2134112680","https://openalex.org/W2137404164","https://openalex.org/W2138766682","https://openalex.org/W2151269705","https://openalex.org/W2152118002","https://openalex.org/W2155620859","https://openalex.org/W2158894011","https://openalex.org/W2174159946","https://openalex.org/W2272595054","https://openalex.org/W2294152563","https://openalex.org/W2339166448","https://openalex.org/W2550780206","https://openalex.org/W2563568402","https://openalex.org/W2565682512","https://openalex.org/W2567607894","https://openalex.org/W2596185890","https://openalex.org/W2609980528","https://openalex.org/W2611914388","https://openalex.org/W2741843546","https://openalex.org/W2777663212","https://openalex.org/W2804568546","https://openalex.org/W2808844959","https://openalex.org/W2901734850","https://openalex.org/W2932766455","https://openalex.org/W2982343992","https://openalex.org/W2986648950","https://openalex.org/W2988359971","https://openalex.org/W2990292214","https://openalex.org/W3000263495","https://openalex.org/W3002981277","https://openalex.org/W3013932226","https://openalex.org/W3014589148","https://openalex.org/W3042830668","https://openalex.org/W3088431595","https://openalex.org/W3093454618","https://openalex.org/W3107766616","https://openalex.org/W3123331292","https://openalex.org/W3130617488","https://openalex.org/W3132822841","https://openalex.org/W3139151242","https://openalex.org/W3152926153","https://openalex.org/W3156588337","https://openalex.org/W3204819333","https://openalex.org/W3214445149","https://openalex.org/W4200391154","https://openalex.org/W4205406814","https://openalex.org/W4205864927","https://openalex.org/W4210869528","https://openalex.org/W4213292645","https://openalex.org/W4221015844","https://openalex.org/W4231016000","https://openalex.org/W4238210511","https://openalex.org/W4246062337","https://openalex.org/W4283643001","https://openalex.org/W4283657717","https://openalex.org/W4289225773","https://openalex.org/W4292136393","https://openalex.org/W4295846950","https://openalex.org/W4296130135","https://openalex.org/W4298872063","https://openalex.org/W4304013667","https://openalex.org/W4321480393","https://openalex.org/W4322505540","https://openalex.org/W4362600656","https://openalex.org/W4389148887","https://openalex.org/W4394573296","https://openalex.org/W6606496035","https://openalex.org/W6638129538","https://openalex.org/W6660880694","https://openalex.org/W6682976791","https://openalex.org/W6693951076","https://openalex.org/W6736986895","https://openalex.org/W6760451199","https://openalex.org/W6769673198","https://openalex.org/W6804477702","https://openalex.org/W6826174168"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"This":[1,90,106],"paper":[2],"presents":[3],"an":[4],"in-depth":[5],"examination":[6],"of":[7,10,20,38,67,74,98,132,156,169],"the":[8,17,24,36,49,65,72,84,128,154,166],"use":[9,155],"simulations":[11,39,103,157],"in":[12,40,48,55,104,126,149,165],"economic":[13],"cybersecurity":[14,50],"decision-making,":[15],"highlighting":[16],"dual":[18],"nature":[19],"their":[21,88],"potential":[22],"and":[23,46,57,60,69,82,122,130,163],"challenges":[25],"they":[26,78,160],"present.":[27],"Drawing":[28],"on":[29,145],"examples":[30],"from":[31],"existing":[32],"studies,":[33],"we":[34,63],"explore":[35],"role":[37],"generating":[41],"new":[42],"knowledge":[43],"about":[44],"probabilities":[45],"consequences":[47],"domain,":[51],"which":[52],"is":[53,108],"essential":[54],"understanding":[56],"managing":[58],"risk":[59],"uncertainty.":[61],"Additionally,":[62],"introduce":[64],"concepts":[66],"\u201cbookkeeping\u201d":[68],"\u201cabstraction\u201d":[70],"within":[71],"context":[73],"simulations,":[75],"discussing":[76],"how":[77],"can":[79],"sometimes":[80],"fail":[81],"exploring":[83],"underlying":[85],"reasons":[86],"for":[87,100,119,136],"failures.":[89],"discussion":[91],"leads":[92],"us":[93],"to":[94,158],"suggest":[95],"a":[96,112,117,133,137],"framework":[97,107,148],"considerations":[99],"effectively":[101],"utilizing":[102],"cybersecurity.":[105,170],"designed":[109],"not":[110],"as":[111,116],"rigid":[113],"checklist":[114],"but":[115],"guide":[118],"critical":[120],"thinking":[121],"evaluation,":[123],"aiding":[124],"users":[125],"assessing":[127],"suitability":[129],"reliability":[131],"simulation":[134],"model":[135],"particular":[138],"decision-making":[139],"context.":[140],"Future":[141],"work":[142],"should":[143],"focus":[144],"applying":[146],"this":[147],"real-world":[150],"settings,":[151],"continuously":[152],"refining":[153],"ensure":[159],"remain":[161],"effective":[162],"relevant":[164],"dynamic":[167],"field":[168]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
