{"id":"https://openalex.org/W2034000848","doi":"https://doi.org/10.1109/isias.2010.5604039","title":"A causal model for information security risk assessment","display_name":"A causal model for information security risk assessment","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2034000848","doi":"https://doi.org/10.1109/isias.2010.5604039","mag":"2034000848"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035074437","display_name":"S\u00fcleyman Kondakci","orcid":"https://orcid.org/0000-0001-5150-3220"},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Suleyman Kondakci","raw_affiliation_strings":["Faculty of Engineering & Computer Sciences, Izmir University of Economics, Izmir, Turkey","Izmir University of Economics, Faculty of Engineering & Computer Sciences, 35330 Balcova, Turkey"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering & Computer Sciences, Izmir University of Economics, Izmir, Turkey","institution_ids":["https://openalex.org/I15059493"]},{"raw_affiliation_string":"Izmir University of Economics, Faculty of Engineering & Computer Sciences, 35330 Balcova, Turkey","institution_ids":["https://openalex.org/I15059493"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5035074437"],"corresponding_institution_ids":["https://openalex.org/I15059493"],"apc_list":null,"apc_paid":null,"fwci":3.48221308,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93650156,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7247883081436157},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.6742830276489258},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.601428747177124},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.554751992225647},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5170322060585022},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5039014220237732},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.503668487071991},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4906090795993805},{"id":"https://openalex.org/keywords/causality","display_name":"Causality (physics)","score":0.46962761878967285},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4461711347103119},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.44043824076652527},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.44000041484832764},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4319016933441162},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.4270396828651428},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.42242273688316345},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17211124300956726},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1498306691646576},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.14650556445121765},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11015018820762634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7247883081436157},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6742830276489258},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.601428747177124},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.554751992225647},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5170322060585022},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5039014220237732},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.503668487071991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4906090795993805},{"id":"https://openalex.org/C64357122","wikidata":"https://www.wikidata.org/wiki/Q1149766","display_name":"Causality (physics)","level":2,"score":0.46962761878967285},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4461711347103119},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.44043824076652527},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.44000041484832764},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4319016933441162},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.4270396828651428},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.42242273688316345},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17211124300956726},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1498306691646576},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14650556445121765},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11015018820762634},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1609489402","https://openalex.org/W2009073491","https://openalex.org/W2012030444","https://openalex.org/W2048584594","https://openalex.org/W2049561176","https://openalex.org/W2056075452","https://openalex.org/W2057553235","https://openalex.org/W2062830664","https://openalex.org/W2087952459","https://openalex.org/W2110505891","https://openalex.org/W2112257544","https://openalex.org/W2140455318","https://openalex.org/W2142919106","https://openalex.org/W2164539034","https://openalex.org/W2369295637","https://openalex.org/W2395819297","https://openalex.org/W4238226847","https://openalex.org/W4247822198","https://openalex.org/W6666329524","https://openalex.org/W6712072082"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W4310892428","https://openalex.org/W2777401565","https://openalex.org/W2033357182","https://openalex.org/W2303053547","https://openalex.org/W3199571163","https://openalex.org/W4232424383","https://openalex.org/W322391649","https://openalex.org/W1502752702","https://openalex.org/W2177472258"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,33,50,63,82,91,137],"probabilistic":[4],"approach":[5,37],"to":[6,19,31,39,62,85,121,132],"encode":[7],"causal":[8],"relationships":[9],"among":[10],"various":[11],"threat":[12],"sources":[13],"and":[14,22,73,88,107,110,117],"victim":[15],"systems":[16],"in":[17,45],"order":[18,120],"facilitate":[20,127],"quantitative":[21],"relational":[23],"security":[24,103,128],"assessment":[25,135],"of":[26,65,93],"information":[27,66],"systems.":[28,77],"In":[29,119],"addition":[30],"providing":[32],"simple":[34],"risk":[35,97,134],"analysis":[36],"compared":[38],"qualitative":[40],"methods,":[41],"it":[42,47,58],"is":[43,99],"unique":[44,83],"that":[46,125],"makes":[48],"no":[49],"priori":[51],"assumptions":[52],"regarding":[53],"the":[54],"test":[55,106],"domain.":[56],"Therefore,":[57],"applies":[59],"equally":[60],"well":[61],"variety":[64],"systems,":[67],"software":[68],"development":[69],"projects,":[70],"IT":[71],"products,":[72],"other":[74],"decision":[75],"making":[76],"The":[78],"entire":[79],"framework":[80],"proposes":[81],"concept":[84],"analyse":[86],"dependence":[87],"causality":[89],"within":[90],"network":[92],"interdependent":[94],"assets.":[95],"Security":[96],"management":[98],"mostly":[100],"considered":[101],"by":[102],"certification":[104],"authorities,":[105],"evaluation":[108,142],"facilities,":[109],"some":[111],"organizations":[112],"such":[113],"as":[114,136],"CC,":[115],"CCITT,":[116],"ISACA.":[118],"invent":[122],"new":[123],"methods":[124],"can":[126],"management,":[129],"we":[130],"need":[131],"consider":[133],"major":[138],"research":[139],"topic":[140],"for":[141],"facilities.":[143]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
