{"id":"https://openalex.org/W4399728989","doi":"https://doi.org/10.1109/syscon61195.2024.10553517","title":"Enterprise Transformation and Cybersecurity: A Literature Review on Cyberattacks","display_name":"Enterprise Transformation and Cybersecurity: A Literature Review on Cyberattacks","publication_year":2024,"publication_date":"2024-04-15","ids":{"openalex":"https://openalex.org/W4399728989","doi":"https://doi.org/10.1109/syscon61195.2024.10553517"},"language":"en","primary_location":{"id":"doi:10.1109/syscon61195.2024.10553517","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/syscon61195.2024.10553517","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099161722","display_name":"Enoc Ferniza","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Enoc Ferniza","raw_affiliation_strings":["The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA","Industrial, Manufacturing, and Systems Engineering, The University of Texas at El Paso, El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA","institution_ids":["https://openalex.org/I164936912"]},{"raw_affiliation_string":"Industrial, Manufacturing, and Systems Engineering, The University of Texas at El Paso, El Paso, TX, USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089981241","display_name":"Sergio Luna","orcid":"https://orcid.org/0000-0003-3058-410X"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sergio Luna","raw_affiliation_strings":["The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA","Industrial, Manufacturing, and Systems Engineering, The University of Texas at El Paso, El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA","institution_ids":["https://openalex.org/I164936912"]},{"raw_affiliation_string":"Industrial, Manufacturing, and Systems Engineering, The University of Texas at El Paso, El Paso, TX, USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044807724","display_name":"Aditya Akundi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aditya Akundi","raw_affiliation_strings":["University of Wisconsin &#x2013;Milwaukee,Industrial and Manufacturing Engineering,Milwaukee,WI,USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin &#x2013;Milwaukee,Industrial and Manufacturing Engineering,Milwaukee,WI,USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099161722"],"corresponding_institution_ids":["https://openalex.org/I164936912"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11852189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9422000050544739,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9387999773025513,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6946810483932495},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6272754073143005},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.5712366700172424}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6946810483932495},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6272754073143005},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.5712366700172424},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon61195.2024.10553517","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/syscon61195.2024.10553517","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W619460780","https://openalex.org/W2073974488","https://openalex.org/W2336409968","https://openalex.org/W2749982501","https://openalex.org/W3088446467","https://openalex.org/W3198092441","https://openalex.org/W4200431251","https://openalex.org/W4236837640","https://openalex.org/W4251323996","https://openalex.org/W4254028046","https://openalex.org/W4379879628","https://openalex.org/W6799798799"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Complex":[0],"systems":[1,23,49],"are":[2,24,37],"becoming":[3],"more":[4,32,105],"expensive":[5],"and":[6,15,35,46,75,97,131,154,170,174],"difficult":[7],"to":[8,26,43,53,71,100,112,149,162,188],"maintain":[9,47],"with":[10],"traditional":[11],"engineering":[12],"methods,":[13,152],"tools,":[14,153],"processes":[16],"(MTPs).":[17],"To":[18],"complicate":[19],"matters":[20],"further,":[21],"complex":[22],"expected":[25],"continue":[27],"increasing":[28],"in":[29,55,83,89,114,156],"complexity":[30],"since":[31],"capabilities,":[33],"components,":[34],"interfaces":[36],"being":[38],"integrated.":[39],"Therefore,":[40],"organizations":[41,106],"seeking":[42,187],"design,":[44],"develop,":[45],"such":[48],"should":[50],"be":[51,87],"able":[52],"evolve":[54],"their":[56,77,115],"MTPs.":[57],"Enterprises":[58],"could":[59,184],"benefit":[60],"from":[61],"implementing":[62],"technology":[63,82,111],"across":[64],"the":[65,108,142,151,195],"life":[66],"cycle":[67],"of":[68,81,110,133,181],"a":[69,90,126,190],"system":[70],"better":[72],"understand,":[73],"enhance,":[74],"optimize":[76],"processes.":[78],"The":[79,165,179],"implementation":[80],"an":[84,146,158],"organization":[85],"can":[86,201],"observed":[88],"systematic":[91],"perspective":[92,148],"where":[93],"management,":[94],"organizations,":[95],"processes,":[96],"people":[98],"interact":[99],"influence":[101],"its":[102],"behavior.":[103],"As":[104],"explore":[107,150],"benefits":[109],"assist":[113],"digital":[116,191],"transformation":[117,192],"efforts,":[118],"they":[119,200],"also":[120],"face":[121],"new":[122],"challenges.":[123],"For":[124],"example,":[125],"sustainable":[127],"infrastructure,":[128],"workforce":[129],"skillset,":[130],"development":[132],"MTPs":[134],"including":[135],"cyber":[136,163,198],"security.":[137],"This":[138],"article":[139],"elaborates":[140,167],"on":[141,168],"latter;":[143],"it":[144],"takes":[145],"enterprise-level":[147],"solutions":[155],"which":[157],"enterprise":[159],"is":[160],"susceptible":[161],"threats.":[164],"work":[166],"social":[169],"technical":[171],"cybersecurity":[172],"strategies":[173],"explores":[175],"potential":[176],"mitigation":[177],"methods.":[178],"outcomes":[180],"this":[182],"study":[183],"support":[185],"enterprises":[186],"conduct":[189],"by":[193],"mapping":[194],"most":[196],"common":[197],"threats":[199],"face.":[202]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
