{"id":"https://openalex.org/W1532564744","doi":"https://doi.org/10.1109/mipro.2015.7160481","title":"Security Risk Management in complex organization","display_name":"Security Risk Management in complex organization","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1532564744","doi":"https://doi.org/10.1109/mipro.2015.7160481","mag":"1532564744"},"language":"en","primary_location":{"id":"doi:10.1109/mipro.2015.7160481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2015.7160481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074073905","display_name":"Ivan Sedinic","orcid":null},"institutions":[{"id":"https://openalex.org/I207169309","display_name":"Cyber University","ror":"https://ror.org/038sdcw17","country_code":"JP","type":"education","lineage":["https://openalex.org/I207169309"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Ivan Sedinic","raw_affiliation_strings":["Croatian Telecom, Cyber & Data Security Section","Croatian Telecom, Cyber & Data Security Section, Croatia"],"affiliations":[{"raw_affiliation_string":"Croatian Telecom, Cyber & Data Security Section","institution_ids":["https://openalex.org/I207169309"]},{"raw_affiliation_string":"Croatian Telecom, Cyber & Data Security Section, Croatia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002789006","display_name":"Tamara Perusic","orcid":null},"institutions":[{"id":"https://openalex.org/I207169309","display_name":"Cyber University","ror":"https://ror.org/038sdcw17","country_code":"JP","type":"education","lineage":["https://openalex.org/I207169309"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tamara Perusic","raw_affiliation_strings":["Croatian Telecom, Cyber & Data Security Section","Croatian Telecom, Cyber & Data Security Section, Croatia"],"affiliations":[{"raw_affiliation_string":"Croatian Telecom, Cyber & Data Security Section","institution_ids":["https://openalex.org/I207169309"]},{"raw_affiliation_string":"Croatian Telecom, Cyber & Data Security Section, Croatia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074073905"],"corresponding_institution_ids":["https://openalex.org/I207169309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.04140945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1331","last_page":"1337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.701587438583374},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.6441993117332458},{"id":"https://openalex.org/keywords/it-risk-management","display_name":"IT risk management","score":0.6123934388160706},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5277441143989563},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.5167412161827087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5016603469848633},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4795486629009247},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4757216274738312},{"id":"https://openalex.org/keywords/itil-security-management","display_name":"ITIL security management","score":0.4740281403064728},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.45677322149276733},{"id":"https://openalex.org/keywords/threat","display_name":"Threat","score":0.44340741634368896},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4180724322795868},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.36284661293029785},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3585193157196045},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.28780514001846313},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.17786595225334167},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.15275272727012634}],"concepts":[{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.701587438583374},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.6441993117332458},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.6123934388160706},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5277441143989563},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.5167412161827087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5016603469848633},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4795486629009247},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4757216274738312},{"id":"https://openalex.org/C114351632","wikidata":"https://www.wikidata.org/wiki/Q5974820","display_name":"ITIL security management","level":5,"score":0.4740281403064728},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.45677322149276733},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.44340741634368896},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4180724322795868},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.36284661293029785},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3585193157196045},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.28780514001846313},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.17786595225334167},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.15275272727012634},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mipro.2015.7160481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2015.7160481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2056794087","https://openalex.org/W201042542","https://openalex.org/W1557523735","https://openalex.org/W2546952811","https://openalex.org/W4256374004","https://openalex.org/W3003573127","https://openalex.org/W40842196","https://openalex.org/W2364480508","https://openalex.org/W2377272910","https://openalex.org/W1532564744"],"abstract_inverted_index":{"Security":[0,32,37,132,159],"Risk":[1,33,38,46,133,143,152,160,181,190],"Management":[2,34,39,161],"is":[3,50,77,103,119],"foundation":[4],"and":[5,16,40,67,183],"starting":[6],"point":[7],"for":[8,91,130],"implementation":[9],"of":[10,52,99,106,136],"security":[11,81,175],"measures":[12],"in":[13,21,63,73,86,109,141,179],"any":[14],"organization":[15,49],"challenge":[17],"by":[18],"itself.":[19],"But":[20],"complex":[22],"organizations":[23],"there":[24],"are":[25,139,177],"additional":[26],"challenges,":[27],"how":[28,173,184],"to":[29,60,65,111,187],"align":[30],"IT":[31],"with":[35,42,149],"overall":[36,45],"later":[41],"the":[43,117,123,125,150,188],"Company's":[44,151,189],"Management.":[47,134,153,191],"When":[48],"part":[51,98],"some":[53],"international":[54],"corporation,":[55],"corporative":[56],"rules":[57],"also":[58,76],"need":[59],"be":[61,84,164],"followed":[62],"addition":[64,110],"legal":[66],"regulation":[68],"rules.":[69],"In":[70,154],"telecom":[71],"industry":[72],"regular":[74],"operations":[75],"very":[78],"important":[79],"that":[80],"assessment":[82],"could":[83],"performed":[85],"short":[87],"timeslot":[88],"as":[89,96,145,147,170,172],"support":[90],"operational":[92],"decisions.":[93],"Croatian":[94],"Telecom":[95,101],"a":[97],"Deutsche":[100],"Group":[102],"facing":[104],"all":[105],"this":[107,155],"issues":[108],"ISO":[112],"27001":[113],"requirements":[114],"against":[115],"which":[116],"Company":[118,126],"certified.":[120],"To":[121],"solve":[122],"challenge,":[124],"developed":[127],"three":[128],"methodologies":[129,138],"Information":[131,158],"All":[135],"these":[137],"merged":[140],"common":[142,180],"Register":[144,182],"well":[146,171],"aligned":[148],"paper":[156],"each":[157],"methodology":[162],"will":[163],"described":[165],"including":[166],"its":[167],"application":[168],"area,":[169],"recognized":[174],"risks":[176],"shown":[178],"they":[185],"relate":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
