{"id":"https://openalex.org/W4312392669","doi":"https://doi.org/10.1145/3524489.3527304","title":"Better security assessment communication","display_name":"Better security assessment communication","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4312392669","doi":"https://doi.org/10.1145/3524489.3527304"},"language":"en","primary_location":{"id":"doi:10.1145/3524489.3527304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3524489.3527304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088897450","display_name":"Fabien Sechi","orcid":"https://orcid.org/0000-0001-7788-560X"},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]},{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Sechi Fabien","raw_affiliation_strings":["Institute for Energy Technology, Halden, \u00d8stfold, Norway"],"affiliations":[{"raw_affiliation_string":"Institute for Energy Technology, Halden, \u00d8stfold, Norway","institution_ids":["https://openalex.org/I19923696","https://openalex.org/I3130438513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053635835","display_name":"Gran Bj\u00f8rn Axel","orcid":null},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]},{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Gran Bj\u00f8rn Axel","raw_affiliation_strings":["Institute for Energy Technology, Halden, \u00d8stfold, Norway"],"affiliations":[{"raw_affiliation_string":"Institute for Energy Technology, Halden, \u00d8stfold, Norway","institution_ids":["https://openalex.org/I19923696","https://openalex.org/I3130438513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079882333","display_name":"Per-Arne J\u00f8rgensen","orcid":"https://orcid.org/0000-0001-9480-738X"},"institutions":[{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]},{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"J\u00f8rgensen Per-Arne","raw_affiliation_strings":["Institute for Energy Technology, Halden, \u00d8stfold, Norway"],"affiliations":[{"raw_affiliation_string":"Institute for Energy Technology, Halden, \u00d8stfold, Norway","institution_ids":["https://openalex.org/I19923696","https://openalex.org/I3130438513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074807936","display_name":"Kilyukh Oleh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121894","display_name":"Rivne State University of Humanities","ror":"https://ror.org/02bn3q971","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210121894"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Kilyukh Oleh","raw_affiliation_strings":["Rivne Nuclear Power Plant, Varash, Oblast, Ukraine"],"affiliations":[{"raw_affiliation_string":"Rivne Nuclear Power Plant, Varash, Oblast, Ukraine","institution_ids":["https://openalex.org/I4210121894"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088897450"],"corresponding_institution_ids":["https://openalex.org/I19923696","https://openalex.org/I3130438513"],"apc_list":null,"apc_paid":null,"fwci":0.9094,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80722741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7199262380599976},{"id":"https://openalex.org/keywords/sequence-diagram","display_name":"Sequence diagram","score":0.6670824289321899},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.5045777559280396},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.45550537109375},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4350741505622864},{"id":"https://openalex.org/keywords/applications-of-uml","display_name":"Applications of UML","score":0.41005176305770874},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3864644765853882},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3577660322189331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3420369625091553},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1752660572528839},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14450562000274658},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10580101609230042},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.1026853621006012}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7199262380599976},{"id":"https://openalex.org/C153185123","wikidata":"https://www.wikidata.org/wiki/Q1391624","display_name":"Sequence diagram","level":4,"score":0.6670824289321899},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.5045777559280396},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.45550537109375},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4350741505622864},{"id":"https://openalex.org/C41298492","wikidata":"https://www.wikidata.org/wiki/Q4781506","display_name":"Applications of UML","level":4,"score":0.41005176305770874},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3864644765853882},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3577660322189331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3420369625091553},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1752660572528839},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14450562000274658},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10580101609230042},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.1026853621006012},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3524489.3527304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3524489.3527304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W624266443","https://openalex.org/W1524147119","https://openalex.org/W2009429512","https://openalex.org/W2021078794","https://openalex.org/W2031789886","https://openalex.org/W2076439340","https://openalex.org/W2096395465","https://openalex.org/W2492688925","https://openalex.org/W2769297643","https://openalex.org/W2788061084","https://openalex.org/W3132503728","https://openalex.org/W4238680313"],"related_works":["https://openalex.org/W2005249640","https://openalex.org/W2113658123","https://openalex.org/W2083641877","https://openalex.org/W2387087283","https://openalex.org/W2368891820","https://openalex.org/W2034072658","https://openalex.org/W207211690","https://openalex.org/W4256577339","https://openalex.org/W1841453811","https://openalex.org/W2044961552"],"abstract_inverted_index":{"Security":[0],"of":[1,77,99,113,164,218],"complex":[2,105,220],"process":[3,15,106],"plants,":[4,9],"such":[5],"as":[6],"nuclear":[7],"power":[8],"requires":[10],"assessing":[11],"the":[12,17,47,89,96,111,114,125,135,141,145,152,157,161,176,184,191,208,215],"information":[13,100],"technology":[14,19],"and":[16,24,40,43,53,80,83,91,129,212,225],"operation":[18],"process.":[20,221],"When":[21],"business":[22,39],"processes":[23],"humans":[25],"are":[26],"included,":[27],"it":[28],"becomes":[29],"challenging":[30],"to":[31,94,140],"identify":[32,95],"all":[33],"possible":[34],"consequences":[35],"arising":[36],"from":[37],"different":[38,50,97,170],"technical":[41],"threats":[42],"communicate":[44],"them,":[45],"when":[46],"case":[48],"involves":[49],"languages,":[51],"cultures,":[52],"competence":[54],"backgrounds.":[55],"This":[56],"paper":[57],"presents":[58],"a":[59,69,104,121,165,219,229,239],"four-step":[60],"concept":[61],"for":[62,188,235],"supporting":[63],"an":[64,233],"ISO27002":[65],"security":[66,101,138,199,226,240],"assessment":[67],"using":[68,202],"unified":[70],"model":[71],"language":[72],"(UML)":[73],"sequence":[74,147,204,223],"diagram":[75,205],"capable":[76],"modeling":[78],"actors":[79],"systems":[81],"objects":[82],"their":[84],"messages.":[85],"First,":[86],"we":[87,116,133,150],"used":[88],"ISO27001":[90],"RASCI":[92],"table":[93],"levels":[98],"responsibility":[102],"within":[103],"plant.":[107],"Secondly,":[108],"together":[109,159],"with":[110,144,160],"stakeholders":[112],"plant,":[115],"built":[117],"scenarios":[118,142,206],"by":[119,201],"making":[120,183],"reference":[122,173],"architecture":[123,174],"including":[124],"connection":[126],"between":[127,210],"IT":[128,211],"OT":[130],"systems.":[131],"Thirdly,":[132],"mapped":[134],"ISO":[136],"27002":[137],"controls":[139,200,227],"exemplified":[143],"UML":[146,203],"diagram.":[148],"Lastly,":[149],"assessed":[151],"maturity":[153],"level.":[154],"We":[155],"tested":[156],"method":[158],"ICT":[162],"team":[163],"Ukrainian":[166],"NPP":[167],"on":[168,190],"four":[169],"scenarios.":[171],"The":[172,194],"included":[175],"plant":[177,185],"data":[178,186],"storage":[179],"system":[180],"that":[181,197],"is":[182,232],"accessible":[187],"users":[189],"enterprise":[192],"network.":[193],"results":[195],"indicate":[196],"communicating":[198],"displaying":[207],"bridge":[209],"OT,":[213],"ease":[214],"stakeholder's":[216],"understanding":[217],"Visualizing":[222],"diagrams":[224],"in":[228],"combined":[230],"way":[231],"enabler":[234],"better":[236],"communication":[237],"during":[238],"assessment.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
