{"id":"https://openalex.org/W2809883273","doi":"https://doi.org/10.1109/codit.2018.8394847","title":"Using Fault Tree Analysis with Cobit 5 Risk Scenarios","display_name":"Using Fault Tree Analysis with Cobit 5 Risk Scenarios","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2809883273","doi":"https://doi.org/10.1109/codit.2018.8394847","mag":"2809883273"},"language":"en","primary_location":{"id":"doi:10.1109/codit.2018.8394847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2018.8394847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 5th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048556789","display_name":"Shivani Modi","orcid":"https://orcid.org/0000-0003-0406-0281"},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shivani Modi","raw_affiliation_strings":["Concordia University of Edmonton, Edmonton, Alberta, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton, Edmonton, Alberta, Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102964644","display_name":"Sergey Butakov","orcid":"https://orcid.org/0000-0001-6235-8858"},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sergey Butakov","raw_affiliation_strings":["Concordia University of Edmonton, Edmonton, Alberta, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton, Edmonton, Alberta, Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079319898","display_name":"Pavol Zavarsky","orcid":null},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pavol Zavarsky","raw_affiliation_strings":["Concordia University of Edmonton, Edmonton, Alberta, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton, Edmonton, Alberta, Canada","institution_ids":["https://openalex.org/I131564278"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048556789"],"corresponding_institution_ids":["https://openalex.org/I131564278"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07229369,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"385","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cobit","display_name":"COBIT","score":0.965684175491333},{"id":"https://openalex.org/keywords/fault-tree-analysis","display_name":"Fault tree analysis","score":0.8834800124168396},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6480729579925537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6361445188522339},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5968758463859558},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5775623917579651},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.5522385835647583},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4920746684074402},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.43985119462013245},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4377375841140747},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.35806411504745483},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.27411961555480957},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2721535563468933},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13654735684394836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11504307389259338},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.0853046178817749}],"concepts":[{"id":"https://openalex.org/C2776723946","wikidata":"https://www.wikidata.org/wiki/Q544025","display_name":"COBIT","level":3,"score":0.965684175491333},{"id":"https://openalex.org/C107094494","wikidata":"https://www.wikidata.org/wiki/Q428453","display_name":"Fault tree analysis","level":2,"score":0.8834800124168396},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6480729579925537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6361445188522339},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5968758463859558},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5775623917579651},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.5522385835647583},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4920746684074402},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.43985119462013245},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4377375841140747},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.35806411504745483},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.27411961555480957},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2721535563468933},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13654735684394836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11504307389259338},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0853046178817749},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit.2018.8394847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2018.8394847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 5th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W60985696","https://openalex.org/W1488124017","https://openalex.org/W1503306946","https://openalex.org/W1965829435","https://openalex.org/W2138292486","https://openalex.org/W2279996403","https://openalex.org/W2320105767","https://openalex.org/W2469293587"],"related_works":["https://openalex.org/W2267495284","https://openalex.org/W2538333631","https://openalex.org/W2645964110","https://openalex.org/W2480686330","https://openalex.org/W1986237341","https://openalex.org/W2162993842","https://openalex.org/W2157558265","https://openalex.org/W4293075472","https://openalex.org/W4388638843","https://openalex.org/W2809883273"],"abstract_inverted_index":{"Information":[0],"System":[1],"Audit":[2],"and":[3,59,124],"Control":[4],"Association":[5],"(ISACA)":[6],"proposed":[7,60,143],"a":[8,61,114,138],"preliminary":[9],"idea":[10],"on":[11,145,167],"applying":[12],"fault":[13,46,57,92],"tree":[14,58,117],"analysis":[15,69],"to":[16,43,85,89,99,106,113,121,129,153,165,168],"look":[17],"at":[18],"the":[19,23,45,56,91,101,109,142,148],"root":[20],"reasons":[21],"for":[22,54,68],"IT":[24,159],"risks":[25,71],"outlined":[26,72],"in":[27,73,95,151],"COBIT":[28,74,86],"5":[29,75,87],"Risk":[30,76],"Scenarios.":[31],"So":[32],"far,":[33],"there":[34],"was":[35],"no":[36],"prescriptive":[37],"procedure/methodology,":[38],"which":[39,64],"could":[40,65,119],"be":[41,66],"used":[42,67],"build":[44,90],"tree.":[47],"This":[48],"research":[49],"looked":[50],"into":[51],"various":[52],"methodologies":[53],"building":[55],"new":[62],"methodology,":[63],"of":[70,108,132,140,147,158],"Scenarios":[77],"document.":[78],"The":[79,134],"methodology":[80,144],"has":[81],"been":[82],"developed":[83],"specific":[84,170],"processes":[88,110,123],"tree,":[93],"which,":[94],"turn,":[96],"can":[97],"help":[98,120],"outline":[100],"common":[102],"factors":[103],"that":[104,162],"lead":[105],"failure":[107],"subsequently":[111],"leading":[112],"risk.":[115],"Fault":[116],"analysis,":[118],"improve":[122,130],"suggest":[125],"potential":[126],"mitigation":[127],"strategy":[128],"management/governance":[131],"IT.":[133],"paper":[135],"also":[136],"includes":[137],"sample":[139],"using":[141],"one":[146],"risk":[149],"scenarios":[150],"order":[152],"calculate":[154],"minimal":[155],"cut":[156],"set":[157],"management":[160],"practices":[161],"organization":[163],"needs":[164],"focus":[166],"address":[169],"risks.":[171]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
