2019
DOI: 10.1007/978-3-030-30278-8_35
|View full text |Cite
|
Sign up to set email alerts
|

A Business-Context-Based Approach for Message Standards Use - A Validation Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…The score considers the control effectiveness to determine the residual risk. Through the process the assessor answers specified questions/consideration and can define the arbitrary controls and their effectiveness in the scale of [1][2][3][4][5]. The tool does not focus on identifying technical aspects of the implementations to shed light on privacy risks that can be raised due to actual threat vectors targeting the deployment.…”
Section: The Current Landscape In Pia Framework and Toolsmentioning
confidence: 99%
See 3 more Smart Citations
“…The score considers the control effectiveness to determine the residual risk. Through the process the assessor answers specified questions/consideration and can define the arbitrary controls and their effectiveness in the scale of [1][2][3][4][5]. The tool does not focus on identifying technical aspects of the implementations to shed light on privacy risks that can be raised due to actual threat vectors targeting the deployment.…”
Section: The Current Landscape In Pia Framework and Toolsmentioning
confidence: 99%
“…It must be stated that the exact value of the weights is a parameter that can be adjusted accordingly, given the preferences and the domain knowledge of experts of the organisation. The weighted scale formula is given in Equation (1).…”
Section: Privacy Impact Scoring Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the adoption of Industry 4.0 presents many significant technical challenges [ 5 ], including integrability, interoperability, composability, and security [ 6 , 7 , 8 ]. Currently, integrability, interoperability and composability are addressed by next-generation approaches for enterprise systems integration such as model-based standards, ontology, Business Process Model Life Cycle Management (BPM LCM), context of business process, and a host of other transport protocol standards [ 9 , 10 , 11 , 12 ]. Security is addressed by conducting risk management as a first step.…”
Section: Introductionmentioning
confidence: 99%