{"id":"https://openalex.org/W2087499972","doi":"https://doi.org/10.1145/2023607.2023673","title":"Risk analysis supported by information security metrics","display_name":"Risk analysis supported by information security metrics","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2087499972","doi":"https://doi.org/10.1145/2023607.2023673","mag":"2087499972"},"language":"en","primary_location":{"id":"doi:10.1145/2023607.2023673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2023607.2023673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Computer Systems and Technologies - CompSysTech '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052953682","display_name":"Jakub Breier","orcid":"https://orcid.org/0000-0002-7844-5267"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jakub Breier","raw_affiliation_strings":["Institute of Applied Informatics"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Informatics","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038705319","display_name":"Ladislav Hudec","orcid":"https://orcid.org/0000-0002-1443-6118"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ladislav Hudec","raw_affiliation_strings":["Institute of Applied Informatics"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Informatics","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052953682"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6389,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85036149,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.8806999921798706,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.8806999921798706,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.8611999750137329,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8079000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7370254397392273},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6341758966445923},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5351086258888245},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5198274254798889},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5039507746696472},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4886351227760315},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4695129096508026},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4527570903301239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2371533215045929},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11479800939559937},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0919240415096283}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7370254397392273},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6341758966445923},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5351086258888245},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5198274254798889},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5039507746696472},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4886351227760315},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4695129096508026},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4527570903301239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2371533215045929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11479800939559937},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0919240415096283},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2023607.2023673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2023607.2023673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Computer Systems and Technologies - CompSysTech '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1895087","https://openalex.org/W1481695999","https://openalex.org/W1840884391","https://openalex.org/W2064553186","https://openalex.org/W2114033273","https://openalex.org/W2592978845"],"related_works":["https://openalex.org/W1923764247","https://openalex.org/W2114208415","https://openalex.org/W2369233745","https://openalex.org/W2125534874","https://openalex.org/W2611614597","https://openalex.org/W2619501344","https://openalex.org/W4386500624","https://openalex.org/W2899303483","https://openalex.org/W4240788009","https://openalex.org/W2246096879"],"abstract_inverted_index":{"This":[0],"work":[1,50],"presents":[2],"motivation":[3],"for":[4,10,28],"using":[5],"metrics":[6,63],"as":[7,25],"an":[8],"instrument":[9],"the":[11,54,61,66,70],"risk":[12,29,93],"analysis.":[13,94],"There":[14],"are":[15,73],"information":[16],"security":[17],"standards,":[18],"like":[19],"ISO":[20],"27000":[21],"family,":[22],"which":[23,87],"serve":[24],"a":[26,36,79],"reference":[27],"analysis":[30],"and":[31,41],"assessment,":[32],"however":[33],"there":[34],"is":[35,51],"lack":[37],"of":[38,48,82],"formal":[39],"methods":[40],"some":[42],"discrete-scale":[43],"evaluation.":[44],"The":[45],"main":[46],"goal":[47],"this":[49],"to":[52,90],"propose":[53],"metric":[55],"-":[56],"control":[57,71],"objective":[58],"mappings,":[59],"so":[60],"chosen":[62],"will":[64],"help":[65],"management":[67],"decide":[68],"whether":[69],"objectives":[72],"fulfilled":[74],"or":[75],"not.":[76],"We":[77],"present":[78],"mathematical":[80],"model":[81],"evaluation":[83],"based":[84],"on":[85],"metrics,":[86],"should":[88],"lead":[89],"more":[91],"automatized":[92]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
