{"id":"https://openalex.org/W4399673087","doi":"https://doi.org/10.3390/info15060353","title":"Strategic Approaches in Network Communication and Information Security Risk Assessment","display_name":"Strategic Approaches in Network Communication and Information Security Risk Assessment","publication_year":2024,"publication_date":"2024-06-14","ids":{"openalex":"https://openalex.org/W4399673087","doi":"https://doi.org/10.3390/info15060353"},"language":"en","primary_location":{"id":"doi:10.3390/info15060353","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060353","pdf_url":"https://www.mdpi.com/2078-2489/15/6/353/pdf?version=1718356360","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/6/353/pdf?version=1718356360","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022313706","display_name":"Nadher Alsafwani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210103503","display_name":"Centre for Humanitarian Dialogue","ror":"https://ror.org/01eg7wt17","country_code":"CH","type":"nonprofit","lineage":["https://openalex.org/I4210103503"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Nadher Alsafwani","raw_affiliation_strings":["Center for Humanitarian Dialogue, 1202 Geneva, Switzerland"],"affiliations":[{"raw_affiliation_string":"Center for Humanitarian Dialogue, 1202 Geneva, Switzerland","institution_ids":["https://openalex.org/I4210103503"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000643475","display_name":"Yousef Fazea","orcid":"https://orcid.org/0000-0003-3544-2434"},"institutions":[{"id":"https://openalex.org/I4210118524","display_name":"Universit\u00e9 Bourgogne Franche-Comt\u00e9","ror":"https://ror.org/02dn7x778","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210118524"]},{"id":"https://openalex.org/I88694374","display_name":"Marshall University","ror":"https://ror.org/02erqft81","country_code":"US","type":"education","lineage":["https://openalex.org/I88694374"]}],"countries":["FR","US"],"is_corresponding":true,"raw_author_name":"Yousef Fazea","raw_affiliation_strings":["Department of Computer Sciences and Electrical Engineering, Marshall University, One John Marshall Drive, Huntington, WV 25755, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences and Electrical Engineering, Marshall University, One John Marshall Drive, Huntington, WV 25755, USA","institution_ids":["https://openalex.org/I4210118524","https://openalex.org/I88694374"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5099129317","display_name":"Fuad Alnajjar","orcid":"https://orcid.org/0000-0002-4082-4632"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fuad Alnajjar","raw_affiliation_strings":["Department of Business Engineering and Wireless, Mediacom Communications, Mediacom Park, NY 10918, USA"],"affiliations":[{"raw_affiliation_string":"Department of Business Engineering and Wireless, Mediacom Communications, Mediacom Park, NY 10918, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000643475"],"corresponding_institution_ids":["https://openalex.org/I4210118524","https://openalex.org/I88694374"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":9.7421,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97950359,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"15","issue":"6","first_page":"353","last_page":"353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.6661903858184814},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6549125909805298},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6487023830413818},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.6299473643302917},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.5880810022354126},{"id":"https://openalex.org/keywords/prioritization","display_name":"Prioritization","score":0.5795251727104187},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.5779443979263306},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5152412056922913},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5070834159851074},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4929499626159668},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.4624491035938263},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45038723945617676},{"id":"https://openalex.org/keywords/it-risk-management","display_name":"IT risk management","score":0.4454028010368347},{"id":"https://openalex.org/keywords/factor-analysis-of-information-risk","display_name":"Factor analysis of information risk","score":0.41510191559791565},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.40305253863334656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39883166551589966},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.34160351753234863},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.32886362075805664},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3149097263813019},{"id":"https://openalex.org/keywords/risk-management-information-systems","display_name":"Risk management information systems","score":0.27110975980758667},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.1656319499015808},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1595962941646576},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12122780084609985},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10844454169273376}],"concepts":[{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6661903858184814},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6549125909805298},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6487023830413818},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.6299473643302917},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.5880810022354126},{"id":"https://openalex.org/C2777615720","wikidata":"https://www.wikidata.org/wiki/Q11888847","display_name":"Prioritization","level":2,"score":0.5795251727104187},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.5779443979263306},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5152412056922913},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5070834159851074},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4929499626159668},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.4624491035938263},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45038723945617676},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.4454028010368347},{"id":"https://openalex.org/C168785665","wikidata":"https://www.wikidata.org/wiki/Q5428720","display_name":"Factor analysis of information risk","level":5,"score":0.41510191559791565},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.40305253863334656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39883166551589966},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34160351753234863},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.32886362075805664},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3149097263813019},{"id":"https://openalex.org/C81146079","wikidata":"https://www.wikidata.org/wiki/Q7336283","display_name":"Risk management information systems","level":4,"score":0.27110975980758667},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.1656319499015808},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1595962941646576},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12122780084609985},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10844454169273376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15060353","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060353","pdf_url":"https://www.mdpi.com/2078-2489/15/6/353/pdf?version=1718356360","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fdc7d9590b094e85a5952802fc82aef0","is_oa":true,"landing_page_url":"https://doaj.org/article/fdc7d9590b094e85a5952802fc82aef0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 6, p 353 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15060353","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15060353","pdf_url":"https://www.mdpi.com/2078-2489/15/6/353/pdf?version=1718356360","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399673087.pdf"},"referenced_works_count":72,"referenced_works":["https://openalex.org/W1192635585","https://openalex.org/W1528539325","https://openalex.org/W1536385191","https://openalex.org/W1966673329","https://openalex.org/W1967546682","https://openalex.org/W1977781738","https://openalex.org/W1994558055","https://openalex.org/W1996613146","https://openalex.org/W2003387266","https://openalex.org/W2012270501","https://openalex.org/W2041047503","https://openalex.org/W2070164421","https://openalex.org/W2075093277","https://openalex.org/W2075986741","https://openalex.org/W2086952563","https://openalex.org/W2087499972","https://openalex.org/W2093629677","https://openalex.org/W2112767344","https://openalex.org/W2144958981","https://openalex.org/W2146969793","https://openalex.org/W2155634086","https://openalex.org/W2158570766","https://openalex.org/W2164740041","https://openalex.org/W2171660940","https://openalex.org/W2208596391","https://openalex.org/W2339802317","https://openalex.org/W2424598242","https://openalex.org/W2482530406","https://openalex.org/W2522809986","https://openalex.org/W2529831505","https://openalex.org/W2587281303","https://openalex.org/W2608464414","https://openalex.org/W2620215059","https://openalex.org/W2745101140","https://openalex.org/W2803863022","https://openalex.org/W2806028629","https://openalex.org/W2927554065","https://openalex.org/W2945640515","https://openalex.org/W2947032870","https://openalex.org/W2982102463","https://openalex.org/W2999678315","https://openalex.org/W3017146019","https://openalex.org/W3017177411","https://openalex.org/W3027277410","https://openalex.org/W3045274067","https://openalex.org/W3085957768","https://openalex.org/W3097716730","https://openalex.org/W3107060092","https://openalex.org/W3138534012","https://openalex.org/W3159609967","https://openalex.org/W3167081472","https://openalex.org/W3173583930","https://openalex.org/W3173714054","https://openalex.org/W3178267535","https://openalex.org/W3193921668","https://openalex.org/W3195131276","https://openalex.org/W3203841480","https://openalex.org/W4200328111","https://openalex.org/W4205672638","https://openalex.org/W4214938748","https://openalex.org/W4226305852","https://openalex.org/W4240892312","https://openalex.org/W4281915919","https://openalex.org/W4283396616","https://openalex.org/W4285495264","https://openalex.org/W4289556003","https://openalex.org/W4293065385","https://openalex.org/W4315497982","https://openalex.org/W4391769816","https://openalex.org/W6648919898","https://openalex.org/W6673938223","https://openalex.org/W6989475779"],"related_works":["https://openalex.org/W2202160327","https://openalex.org/W2557049691","https://openalex.org/W2358390340","https://openalex.org/W201042542","https://openalex.org/W2098014028","https://openalex.org/W3186595770","https://openalex.org/W2132746796","https://openalex.org/W2363630253","https://openalex.org/W2496445682","https://openalex.org/W2377272910"],"abstract_inverted_index":{"Risk":[0,107],"assessment":[1,71,146],"is":[2,13,91],"a":[3,126],"critical":[4,155],"sub-process":[5],"in":[6],"information":[7,81,148],"security":[8,29,82,149],"risk":[9,70],"management":[10],"(ISRM)":[11],"that":[12,102,124],"used":[14],"to":[15,78,92,115],"identify":[16],"an":[17],"organization\u2019s":[18],"vulnerabilities":[19],"and":[20,27,34,51,58,63,76,120,128,141,158,164],"threats":[21],"as":[22,24],"well":[23],"evaluate":[25],"current":[26,69],"planned":[28],"controls.":[30],"Therefore,":[31],"adequate":[32],"resources":[33],"return":[35],"on":[36,54,162],"investments":[37],"should":[38],"be":[39],"considered":[40],"when":[41],"reviewing":[42],"assets.":[43],"However,":[44],"many":[45],"existing":[46],"frameworks":[47],"lack":[48],"granular":[49],"guidelines":[50],"mostly":[52],"operate":[53],"qualitative":[55],"human":[56],"input":[57],"feedback,":[59],"which":[60],"increases":[61],"subjective":[62],"unreliable":[64],"judgment":[65],"within":[66],"organizations.":[67],"Consequently,":[68],"methods":[72],"require":[73],"additional":[74],"time":[75,142],"cost":[77],"test":[79],"all":[80],"controls":[83,156],"thoroughly.":[84],"The":[85],"principal":[86],"aim":[87],"of":[88,147],"this":[89],"study":[90],"critically":[93],"review":[94],"the":[95,104,138,145],"Information":[96,105,130],"Security":[97,106,131],"Control":[98,132],"Prioritization":[99,133],"(ISCP)":[100],"models":[101],"improve":[103],"Assessment":[108],"(ISRA)":[109],"process,":[110],"by":[111],"using":[112],"literature":[113],"analysis":[114],"investigate":[116],"ISRA\u2019s":[117],"main":[118],"problems":[119],"challenges.":[121],"We":[122],"recommend":[123],"designing":[125],"streamlined":[127],"standardized":[129],"model":[134],"would":[135],"greatly":[136],"reduce":[137],"uncertainty,":[139],"cost,":[140],"associated":[143],"with":[144],"controls,":[150],"thereby":[151],"helping":[152],"organizations":[153],"prioritize":[154],"reliably":[157],"more":[159],"efficiently":[160],"based":[161],"clear":[163],"practical":[165],"guidelines.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
