2013
DOI: 10.1108/imcs-09-2012-0054
|View full text |Cite
|
Sign up to set email alerts
|

Resolving vulnerability identification errors using security requirements on business process models

Abstract: Purpose -In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors -wrongly identified or unidentified vulnerabilities -can occur as uncertain data are used. Furthermore, businesses' security needs are not considered sufficiently. Hence, security functions may not protect business assets sufficiently and cost-effectively.Design/methodology/approach -This paper aims to resolve vulnerability errors by anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 29 publications
(55 reference statements)
0
8
0
1
Order By: Relevance
“…Dantu and Kolan [83] Other DE, AB BN Yes Depoy et al [105] Other DE, AB WP, WCP Yes Hasle et al [106] Enterprise (A) AW WLC No Villarrubia et al [107] Enterprise (A) RE WLC No Bhilare et al [74] Enterprise (M/L) RE None Yes Grunske and Joyce [108] Other DE, AB WP, WM Yes Sahinoglu [84] Other RE WLC, BN Yes Dantu et al [85] Other DE, AB BN Yes Chen and Wang [87] Other AW WP No Chan [88] Enterprise (M/L) RE WLC, WP No Shin et al [78] Other AW, KN WLC No Bojanc et al [109] Enterprise (A) RE WLC, WM Yes Lo and Chen [50] Enterprise (M/L) AW, RE WLC No Rantos et al [110] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Shameli-Sendi et al [80] Enterprise (A) KN, AB WC No Bojanc and Jerman-Blažič [111] Enterprise (A) AW, RE WLC Yes Marconato et al [79] Other AW, DE None No Taubenberger et al [112] Enterprise (M/L) AW, RE None No Alencar Rigon et al [102] Enterprise (M/L) RE WLC No Boggs et al [113] Other AW WLC Yes Chen et al [114] Enterprise (M/L) RE WLC No Cheng et al [115] Other AW WLC, WP, WM Yes Feng et al [86] Enterprise (M/L) AW, RE BN Yes Manifavas et al [77] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Silva et al [81] Other RE WLC, WP No Suhartana et al [116] Enterprise (A) AB, RE WLC Yes Yadav and Dong [117] Other AW, KN, AB, RE None Yes Dehghanimohammadabadi and Bamakan [118] Enterprise (M/L) RE WLC, WP Yes Juliadotter and Choo [119] Other AW, DE, KN, AB, RE WLC Yes Otero [120] Enterprise (M/L) AW, AB, RE None Yes Solic et al [121] Enterprise (A) AW, KN, AB WLC No Sugiura et al [122] Enterprise (A) AW, RE None No Wei et al [123] Other AW, AB WLC No You et al [7...…”
Section: Research Application Area Adkar Elements Aggregation Strategies Real-life Threatmentioning
confidence: 99%
“…Dantu and Kolan [83] Other DE, AB BN Yes Depoy et al [105] Other DE, AB WP, WCP Yes Hasle et al [106] Enterprise (A) AW WLC No Villarrubia et al [107] Enterprise (A) RE WLC No Bhilare et al [74] Enterprise (M/L) RE None Yes Grunske and Joyce [108] Other DE, AB WP, WM Yes Sahinoglu [84] Other RE WLC, BN Yes Dantu et al [85] Other DE, AB BN Yes Chen and Wang [87] Other AW WP No Chan [88] Enterprise (M/L) RE WLC, WP No Shin et al [78] Other AW, KN WLC No Bojanc et al [109] Enterprise (A) RE WLC, WM Yes Lo and Chen [50] Enterprise (M/L) AW, RE WLC No Rantos et al [110] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Shameli-Sendi et al [80] Enterprise (A) KN, AB WC No Bojanc and Jerman-Blažič [111] Enterprise (A) AW, RE WLC Yes Marconato et al [79] Other AW, DE None No Taubenberger et al [112] Enterprise (M/L) AW, RE None No Alencar Rigon et al [102] Enterprise (M/L) RE WLC No Boggs et al [113] Other AW WLC Yes Chen et al [114] Enterprise (M/L) RE WLC No Cheng et al [115] Other AW WLC, WP, WM Yes Feng et al [86] Enterprise (M/L) AW, RE BN Yes Manifavas et al [77] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Silva et al [81] Other RE WLC, WP No Suhartana et al [116] Enterprise (A) AB, RE WLC Yes Yadav and Dong [117] Other AW, KN, AB, RE None Yes Dehghanimohammadabadi and Bamakan [118] Enterprise (M/L) RE WLC, WP Yes Juliadotter and Choo [119] Other AW, DE, KN, AB, RE WLC Yes Otero [120] Enterprise (M/L) AW, AB, RE None Yes Solic et al [121] Enterprise (A) AW, KN, AB WLC No Sugiura et al [122] Enterprise (A) AW, RE None No Wei et al [123] Other AW, AB WLC No You et al [7...…”
Section: Research Application Area Adkar Elements Aggregation Strategies Real-life Threatmentioning
confidence: 99%
“…The role of business processes in the security of organizations has been investigated in a number of studies, including the work of Wangen and Snekkenes (2014) and the work of Taubenberger et al (2013). These studies have shown that enterprises' business processes play a major role in the security of the organizations.…”
Section: Process-based Security Assessmentmentioning
confidence: 99%
“…Taubenberger et al have also evaluated their approach in resolving errors related to the identification of vulnerabilities in comparison to an existing approach. Their findings indicate that explicitly evaluating security requirements during the course of business can help in resolving vulnerability identification errors (Taubenberger et al 2013). Karpati et al have recently reported empirical evaluation of misuse case maps in identifying security threats through two controlled experiments (Karpati, Opdahl, and Sindre 2015).…”
Section: Security Requirements Elicitation and Evaluationmentioning
confidence: 99%