{"id":"https://openalex.org/W1983184582","doi":"https://doi.org/10.2478/acss-2014-0006","title":"Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE","display_name":"Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W1983184582","doi":"https://doi.org/10.2478/acss-2014-0006","mag":"1983184582"},"language":"en","primary_location":{"id":"doi:10.2478/acss-2014-0006","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2014-0006","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2014-0006","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.sciendo.com/pdf/10.2478/acss-2014-0006","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081997563","display_name":"Antanas Mita\u0161i\u016bnas","orcid":null},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Antanas Mitasiunas","raw_affiliation_strings":["Vilnius University"],"affiliations":[{"raw_affiliation_string":"Vilnius University","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064101740","display_name":"Leon\u012bds Novickis","orcid":null},"institutions":[{"id":"https://openalex.org/I201787326","display_name":"Riga Technical University","ror":"https://ror.org/00twb6c09","country_code":"LV","type":"education","lineage":["https://openalex.org/I201787326"]}],"countries":["LV"],"is_corresponding":false,"raw_author_name":"Leonids Novickis","raw_affiliation_strings":["Riga Technical University"],"affiliations":[{"raw_affiliation_string":"Riga Technical University","institution_ids":["https://openalex.org/I201787326"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004100596","display_name":"Rimas Kalpokas","orcid":null},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Rimas Kalpokas","raw_affiliation_strings":["Vilnius University","Vilnius University,"],"affiliations":[{"raw_affiliation_string":"Vilnius University","institution_ids":["https://openalex.org/I173212132"]},{"raw_affiliation_string":"Vilnius University,","institution_ids":["https://openalex.org/I173212132"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081997563"],"corresponding_institution_ids":["https://openalex.org/I173212132"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.14795586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"15","issue":"1","first_page":"36","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7017410397529602},{"id":"https://openalex.org/keywords/spice","display_name":"Spice","score":0.6670610308647156},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5071511268615723},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.47649115324020386},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4755637049674988},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.44314900040626526},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4238790273666382},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4184000790119171},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.41731321811676025},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.41617852449417114},{"id":"https://openalex.org/keywords/process-modeling","display_name":"Process modeling","score":0.41608282923698425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2127532660961151},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.184270441532135},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.17457857728004456},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11487740278244019}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7017410397529602},{"id":"https://openalex.org/C2780077345","wikidata":"https://www.wikidata.org/wiki/Q16891888","display_name":"Spice","level":2,"score":0.6670610308647156},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5071511268615723},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.47649115324020386},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4755637049674988},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.44314900040626526},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4238790273666382},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4184000790119171},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.41731321811676025},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.41617852449417114},{"id":"https://openalex.org/C76956256","wikidata":"https://www.wikidata.org/wiki/Q27610560","display_name":"Process modeling","level":3,"score":0.41608282923698425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2127532660961151},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.184270441532135},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.17457857728004456},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11487740278244019},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/acss-2014-0006","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2014-0006","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2014-0006","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:50dbc47ab3a64b82a7d634281b5d3476","is_oa":true,"landing_page_url":"https://doaj.org/article/50dbc47ab3a64b82a7d634281b5d3476","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Computer Systems, Vol 15, Iss 1, Pp 36-41 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/acss-2014-0006","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2014-0006","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2014-0006","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1983184582.pdf","grobid_xml":"https://content.openalex.org/works/W1983184582.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W97025551","https://openalex.org/W113514435","https://openalex.org/W153195646","https://openalex.org/W1553948782","https://openalex.org/W2035068207","https://openalex.org/W2042703154","https://openalex.org/W2051063356","https://openalex.org/W2209768828","https://openalex.org/W2915095518"],"related_works":["https://openalex.org/W2204879205","https://openalex.org/W1943174035","https://openalex.org/W2096437374","https://openalex.org/W1928481607","https://openalex.org/W3135165657","https://openalex.org/W1485582195","https://openalex.org/W57337972","https://openalex.org/W1561306903","https://openalex.org/W2563702065","https://openalex.org/W2904996773"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"the":[2,13,26,42,71,93,102,106],"context":[3],"of":[4,12,20,28,30,63],"modern":[5],"information":[6,31,75],"systems,":[7],"security":[8,46,76],"has":[9],"become":[10],"one":[11],"most":[14],"critical":[15],"quality":[16,29,57,65],"attributes.":[17],"The":[18],"purpose":[19],"this":[21,37,54],"paper":[22],"is":[23,39,47,80],"to":[24,35,53],"address":[25],"problem":[27,38],"security.":[32],"An":[33],"approach":[34],"solve":[36],"based":[40,81],"on":[41,82],"main":[43],"assumption":[44],"that":[45,100],"a":[48],"process":[49,64,67,77,83,109],"oriented":[50],"activity.":[51],"According":[52],"approach,":[55],"product":[56],"can":[58],"be":[59],"achieved":[60],"by":[61,87],"means":[62],"-":[66],"capability.":[68],"Introduced":[69],"in":[70],"paper,":[72],"SPICE":[73,121],"conformant":[74],"capability":[78,84,103],"model":[79,115],"modeling":[85],"elaborated":[86],"world-wide":[88],"software":[89],"engineering":[90],"community":[91],"during":[92],"last":[94],"25":[95],"years,":[96],"namely":[97],"ISO/IEC":[98],"15504":[99],"defines":[101],"dimension":[104],"and":[105,111,119],"requirements":[107],"for":[108,116],"definition":[110],"domain":[112],"independent":[113],"integrated":[114],"enterprise-wide":[117],"assessment":[118],"Enterprise":[120],"improvement":[122]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
