{"id":"https://openalex.org/W2044176459","doi":"https://doi.org/10.1109/pst.2014.6890934","title":"Quantifying the financial impact of it security breaches on business processes","display_name":"Quantifying the financial impact of it security breaches on business processes","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2044176459","doi":"https://doi.org/10.1109/pst.2014.6890934","mag":"2044176459"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029519916","display_name":"Clemens Martin","orcid":null},"institutions":[{"id":"https://openalex.org/I108806672","display_name":"Baden-Wuerttemberg Cooperative State University","ror":"https://ror.org/02xdzy536","country_code":"DE","type":"education","lineage":["https://openalex.org/I108806672"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Clemens Martin","raw_affiliation_strings":["Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]},{"raw_affiliation_string":"Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068017337","display_name":"Amina Kadry","orcid":null},"institutions":[{"id":"https://openalex.org/I108806672","display_name":"Baden-Wuerttemberg Cooperative State University","ror":"https://ror.org/02xdzy536","country_code":"DE","type":"education","lineage":["https://openalex.org/I108806672"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Amina Kadry","raw_affiliation_strings":["Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]},{"raw_affiliation_string":"Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054409465","display_name":"Ghada Abu-Shady","orcid":null},"institutions":[{"id":"https://openalex.org/I108806672","display_name":"Baden-Wuerttemberg Cooperative State University","ror":"https://ror.org/02xdzy536","country_code":"DE","type":"education","lineage":["https://openalex.org/I108806672"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ghada Abu-Shady","raw_affiliation_strings":["Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Business Informatics Duale Hochschule Baden-W\u00fcrttemberg Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]},{"raw_affiliation_string":"Department of Business Informatics, Duale Hochschule Baden-W\u00fcrttemberg, Mannheim, Germany","institution_ids":["https://openalex.org/I108806672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029519916"],"corresponding_institution_ids":["https://openalex.org/I108806672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.17128178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.5832898020744324},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5583766102790833},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5311837196350098},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5132205486297607},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5068386197090149},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4832354485988617},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44863033294677734},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4246535897254944},{"id":"https://openalex.org/keywords/productivity","display_name":"Productivity","score":0.42341309785842896},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4158168435096741},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4136173129081726},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4123297929763794},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.38327425718307495},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.2958104610443115},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.25088751316070557},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16148248314857483},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.15143775939941406}],"concepts":[{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.5832898020744324},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5583766102790833},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5311837196350098},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5132205486297607},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5068386197090149},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4832354485988617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44863033294677734},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4246535897254944},{"id":"https://openalex.org/C204983608","wikidata":"https://www.wikidata.org/wiki/Q2111958","display_name":"Productivity","level":2,"score":0.42341309785842896},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4158168435096741},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4136173129081726},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4123297929763794},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.38327425718307495},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.2958104610443115},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.25088751316070557},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16148248314857483},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.15143775939941406},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2014.6890934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W84450104","https://openalex.org/W162160533","https://openalex.org/W224269084","https://openalex.org/W1501321335","https://openalex.org/W1525451939","https://openalex.org/W1560191683","https://openalex.org/W1605067010","https://openalex.org/W1863670505","https://openalex.org/W1912912142","https://openalex.org/W1945354286","https://openalex.org/W1966875048","https://openalex.org/W1968928304","https://openalex.org/W1997915850","https://openalex.org/W2039648693","https://openalex.org/W2045597897","https://openalex.org/W2069396279","https://openalex.org/W2116815276","https://openalex.org/W2119068246","https://openalex.org/W2131778907","https://openalex.org/W2145835585","https://openalex.org/W2160372331","https://openalex.org/W2161396238","https://openalex.org/W2169343702","https://openalex.org/W3022847872","https://openalex.org/W3144399780","https://openalex.org/W6606497631","https://openalex.org/W6636108511","https://openalex.org/W6682933086"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W4310892428","https://openalex.org/W2777401565","https://openalex.org/W2303053547","https://openalex.org/W2033357182","https://openalex.org/W4232424383","https://openalex.org/W322391649","https://openalex.org/W1502752702","https://openalex.org/W3199571163","https://openalex.org/W2028303111"],"abstract_inverted_index":{"With":[0],"the":[1,4,21,42,49,53,62,70,78,83,89,101,111,129,154,161,172,193,201,204],"rise":[2],"of":[3,6,23,44,51,56,64,69,72,92,100,103,195,231,233,241],"number":[5],"security":[7,38,57,73,104,136,197,243],"breaches":[8,58,105,198],"affecting":[9],"organizations":[10],"nowadays,":[11],"it":[12],"has":[13],"become":[14],"crucial":[15],"for":[16,127],"companies":[17,81],"to":[18,77,200,211],"accurately":[19],"measure":[20],"costs":[22,55,63,102,174,187,194],"such":[24,135],"incidents":[25],"and":[26,35,106,170],"mitigate":[27],"them":[28,66],"in":[29,203,229,239],"order":[30],"quantify":[31],"their":[32],"risk":[33,74],"exposure":[34],"direct":[36],"IT":[37,95,156],"investments.":[39],"However,":[40],"with":[41,134],"absence":[43],"standardized":[45],"cost":[46,208],"calculation":[47],"methods,":[48],"task":[50,235],"quantifying":[52],"internal":[54],"as":[59,61,97,167],"well":[60],"managing":[65],"is":[67,164],"one":[68],"difficulties":[71],"analysis.":[75],"Due":[76],"fact":[79],"that":[80,146,149,180],"consider":[82],"time":[84,163],"spent":[85],"by":[86,110],"employees":[87],"during":[88],"reparation":[90],"process":[91],"an":[93],"affected":[94,155],"resource":[96,157],"idle,":[98],"overestimations":[99],"lost":[107],"productivity,":[108],"represented":[109],"system":[112],"downtime":[113],"from":[114],"employees'":[115,162],"perception,":[116],"occur.":[117],"For":[118],"these":[119],"reasons,":[120],"this":[121],"study":[122,140],"suggests":[123],"a":[124,142],"new":[125],"approach":[126],"measuring":[128],"negative":[130],"economic":[131],"impact":[132],"associated":[133],"attack":[137],"events.":[138],"This":[139],"proposes":[141],"method":[143,183,190],"which":[144],"assumes":[145],"alternative":[147],"tasks":[148],"do":[150],"not":[151,165,217],"rely":[152],"on":[153],"are":[158,215,237],"performed;":[159],"hence,":[160],"considered":[166],"completely":[168],"idle":[169,205],"consequently":[171],"total":[173,186],"decrease.":[175],"Early":[176],"results":[177,222],"have":[178,223],"shown":[179,225],"our":[181],"suggested":[182],"renders":[184],"smaller":[185],"than":[188],"companies'":[189],"when":[191],"calculating":[192],"information":[196,242],"due":[199,210],"decrease":[202],"time;":[206],"whereas":[207],"components":[209],"delayed":[212],"work":[213,234],"products":[214],"typically":[216],"captured":[218],"at":[219],"all.":[220],"Our":[221],"also":[224],"how":[226],"recovery":[227],"procedures,":[228],"terms":[230],"dissolving":[232],"queues,":[236],"performed":[238],"case":[240],"breaches.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
