{"id":"https://openalex.org/W89911379","doi":"https://doi.org/10.3233/978-1-58603-900-4-453","title":"Towards a knowledge-sharing approach for Information Security Risk Management","display_name":"Towards a knowledge-sharing approach for Information Security Risk Management","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W89911379","doi":"https://doi.org/10.3233/978-1-58603-900-4-453","mag":"89911379"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-58603-900-4-453","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-58603-900-4-453","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047131980","display_name":"Katerina Papadaki","orcid":"https://orcid.org/0000-0002-0755-1281"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Papadaki Katerina","raw_affiliation_strings":["National Technical University of Athens & Bank of Greece"],"affiliations":[{"raw_affiliation_string":"National Technical University of Athens & Bank of Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055769796","display_name":"Nineta Polemi","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Polemi Nineta","raw_affiliation_strings":["University of Pireaus#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Pireaus#TAB#","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047131980"],"corresponding_institution_ids":["https://openalex.org/I174458059"],"apc_list":null,"apc_paid":null,"fwci":0.3608,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5897003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"453","last_page":"461"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12028","display_name":"Knowledge Management and Sharing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.5310547351837158},{"id":"https://openalex.org/keywords/knowledge-sharing","display_name":"Knowledge sharing","score":0.49490922689437866},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.419075071811676},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4147421419620514},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40606823563575745},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.32610103487968445},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.040980398654937744}],"concepts":[{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5310547351837158},{"id":"https://openalex.org/C2776604539","wikidata":"https://www.wikidata.org/wiki/Q6423395","display_name":"Knowledge sharing","level":2,"score":0.49490922689437866},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.419075071811676},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4147421419620514},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40606823563575745},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32610103487968445},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.040980398654937744}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-58603-900-4-453","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-58603-900-4-453","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"mag:89911379","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W657731981","https://openalex.org/W1489021242","https://openalex.org/W1495419098","https://openalex.org/W1518101824","https://openalex.org/W1549342539","https://openalex.org/W1966609706","https://openalex.org/W1970428482","https://openalex.org/W1971368595","https://openalex.org/W1974136521","https://openalex.org/W1989895788","https://openalex.org/W1995440326","https://openalex.org/W1997603734","https://openalex.org/W2009638102","https://openalex.org/W2035716223","https://openalex.org/W2038513512","https://openalex.org/W2049561176","https://openalex.org/W2078690141","https://openalex.org/W2116437857","https://openalex.org/W2132486490","https://openalex.org/W2156811504","https://openalex.org/W2163020995","https://openalex.org/W2319482779","https://openalex.org/W2418125792"],"related_works":["https://openalex.org/W3114154697","https://openalex.org/W1547577918","https://openalex.org/W91279511","https://openalex.org/W2099974807","https://openalex.org/W3008366965","https://openalex.org/W2737514969","https://openalex.org/W2581287716","https://openalex.org/W2152869043","https://openalex.org/W2292220430","https://openalex.org/W2013494527"],"abstract_inverted_index":{"Information":[0],"security":[1],"risk":[2],"management":[3],"(ISRM)":[4],"is":[5,19,50,62],"a":[6,23,51,72,96,112,118],"major":[7],"concern":[8],"of":[9,15,25,44,71,78,88],"organizations":[10,30],"worldwide.":[11],"Although":[12],"the":[13,42,76,86,89,109,132],"number":[14],"existing":[16],"ISRM":[17,34,82,104,128],"methodologies":[18,35,83,129],"enormous,":[20],"in":[21,31,36,58,64],"practice":[22],"lot":[24],"resources":[26],"are":[27],"invested":[28],"by":[29,130],"creating":[32],"new":[33,79],"order":[37],"to":[38],"capture":[39],"more":[40],"accurately":[41],"risks":[43],"their":[45],"complex":[46],"information":[47],"systems.":[48],"This":[49],"crucial":[52],"knowledge-intensive":[53],"process":[54],"for":[55,75,99,111],"organizations,":[56],"but":[57],"most":[59],"cases":[60],"it":[61],"addressed":[63],"an":[65],"ad":[66],"hoc":[67],"manner.":[68],"The":[69],"existence":[70],"systematic":[73,97],"approach":[74],"development":[77],"or":[80,102],"improved":[81,103],"would":[84],"enhance":[85],"effectiveness":[87],"process.":[90],"In":[91],"this":[92],"paper":[93],"we":[94],"propose":[95],"meta-process":[98],"developing":[100],"new,":[101],"methods.":[105],"We":[106],"also":[107],"present":[108],"specifications":[110],"collaboration":[113],"and":[114],"knowledge-sharing":[115],"platform":[116],"supporting":[117],"virtual":[119],"intra-organizational":[120],"cross-disciplinary":[121],"team,":[122],"which":[123],"aims":[124],"at":[125],"improving":[126],"its":[127],"adopting":[131],"proposed":[133],"meta-process.":[134]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2016-06-24T00:00:00"}
