{"id":"https://openalex.org/W4384517721","doi":"https://doi.org/10.1109/sose59841.2023.10178677","title":"Navigating the Cyber-Security Risks and Economics of System-of-Systems","display_name":"Navigating the Cyber-Security Risks and Economics of System-of-Systems","publication_year":2023,"publication_date":"2023-06-14","ids":{"openalex":"https://openalex.org/W4384517721","doi":"https://doi.org/10.1109/sose59841.2023.10178677"},"language":"en","primary_location":{"id":"doi:10.1109/sose59841.2023.10178677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose59841.2023.10178677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 18th Annual System of Systems Engineering Conference (SoSe)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029439546","display_name":"Terese Besker","orcid":"https://orcid.org/0000-0002-9811-000X"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Terese Besker","raw_affiliation_strings":["RISE Research Institutes of Sweden AB,Systems Engineering,Gothenburg,Sweden","Systems Engineering, RISE Research Institutes of Sweden AB, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden AB,Systems Engineering,Gothenburg,Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"Systems Engineering, RISE Research Institutes of Sweden AB, Gothenburg, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037374855","display_name":"Ulrik Franke","orcid":"https://orcid.org/0000-0003-2017-7914"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ulrik Franke","raw_affiliation_strings":["RISE Research Institutes of Sweden AB and KTH Royal Institute of Technology,Systems Engineering,Sweden","Systems Engineering, RISE Research Institutes of Sweden AB and KTH Royal Institute of Technology, Sweden","KTH Royal Institute of Technology, Kista, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden AB and KTH Royal Institute of Technology,Systems Engineering,Sweden","institution_ids":["https://openalex.org/I2800664555","https://openalex.org/I86987016"]},{"raw_affiliation_string":"Systems Engineering, RISE Research Institutes of Sweden AB and KTH Royal Institute of Technology, Sweden","institution_ids":["https://openalex.org/I2800664555","https://openalex.org/I86987016"]},{"raw_affiliation_string":"KTH Royal Institute of Technology, Kista, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039106133","display_name":"Jakob Axelsson","orcid":"https://orcid.org/0000-0002-3986-1196"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jakob Axelsson","raw_affiliation_strings":["M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"M&#x00E4;lardalen University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029439546"],"corresponding_institution_ids":["https://openalex.org/I2800664555"],"apc_list":null,"apc_paid":null,"fwci":0.3657,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57909497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7956182956695557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6185356378555298},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5326682329177856},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4918101131916046},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4408728778362274},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.43013566732406616},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4300987422466278},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1470949947834015}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7956182956695557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6185356378555298},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5326682329177856},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4918101131916046},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4408728778362274},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.43013566732406616},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4300987422466278},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1470949947834015},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sose59841.2023.10178677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose59841.2023.10178677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 18th Annual System of Systems Engineering Conference (SoSe)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W9931275","https://openalex.org/W1498372581","https://openalex.org/W1607912078","https://openalex.org/W1946110239","https://openalex.org/W1985240760","https://openalex.org/W1989838967","https://openalex.org/W1992119556","https://openalex.org/W2045446942","https://openalex.org/W2058107586","https://openalex.org/W2059262214","https://openalex.org/W2062493711","https://openalex.org/W2062498061","https://openalex.org/W2075514563","https://openalex.org/W2077186478","https://openalex.org/W2156109180","https://openalex.org/W2158894011","https://openalex.org/W2523880444","https://openalex.org/W2549564909","https://openalex.org/W2567607894","https://openalex.org/W2609980528","https://openalex.org/W2744457088","https://openalex.org/W2791001121","https://openalex.org/W2800085194","https://openalex.org/W2805633244","https://openalex.org/W2887384844","https://openalex.org/W2897451483","https://openalex.org/W2949845992","https://openalex.org/W2963848448","https://openalex.org/W2970078476","https://openalex.org/W2972553703","https://openalex.org/W2972902221","https://openalex.org/W2990518741","https://openalex.org/W3005216181","https://openalex.org/W3042726346","https://openalex.org/W3090106152","https://openalex.org/W3115362282","https://openalex.org/W3132822841","https://openalex.org/W4205125320","https://openalex.org/W4284675924","https://openalex.org/W4284694263","https://openalex.org/W4322505540","https://openalex.org/W6629876275","https://openalex.org/W6767438262"],"related_works":["https://openalex.org/W2149537132","https://openalex.org/W2018871932","https://openalex.org/W641279757","https://openalex.org/W4210648132","https://openalex.org/W2142515455","https://openalex.org/W2481421941","https://openalex.org/W2049188895","https://openalex.org/W4285359482","https://openalex.org/W2263437148","https://openalex.org/W2394303444"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1],"an":[2,23,36],"important":[3],"concern":[4],"in":[5,100,118],"systems-of-systems":[6],"(SoS),":[7],"where":[8],"the":[9,29,33,44,55,63,69,77,86,106,109,121],"effects":[10],"of":[11,35,46,62,92,113,120],"cyber":[12,78,95],"incidents,":[13],"whether":[14],"deliberate":[15],"attacks":[16],"or":[17],"unintentional":[18],"mistakes,":[19],"can":[20,97],"propagate":[21],"from":[22],"individual":[24],"constituent":[25],"system":[26],"(CS)":[27],"throughout":[28],"entire":[30],"SoS.":[31],"Unfortunately,":[32],"security":[34,45,81],"SoS":[37,56,70,102,124],"cannot":[38],"be":[39,52,98,132],"guaranteed":[40],"by":[41],"separately":[42],"addressing":[43],"each":[47,119],"CS.":[48],"Security":[49],"must":[50],"also":[51],"addressed":[53,99,133],"at":[54],"level.":[57],"This":[58,84],"paper":[59,107],"reviews":[60],"some":[61],"most":[64],"prominent":[65],"cybersecurity":[66,115,129],"risks":[67,96,130],"within":[68],"research":[71],"field":[72],"and":[73,79,111,126,138],"combines":[74],"this":[75],"with":[76],"information":[80],"economics":[82],"perspective.":[83],"sets":[85],"scene":[87],"for":[88],"a":[89],"structured":[90],"assessment":[91],"how":[93],"various":[94],"different":[101],"architectures.":[103],"More":[104],"precisely,":[105],"discusses":[108],"effectiveness":[110],"appropriateness":[112],"five":[114],"policy":[116],"options":[117],"four":[122],"assessed":[123],"archetypes":[125],"concludes":[127],"that":[128],"should":[131],"using":[134],"both":[135],"traditional":[136],"design-focused":[137],"more":[139],"novel":[140],"policy-oriented":[141],"tools.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
