Conceptualizing Business Process Dependencies That Propagate Cyber Risk

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper explores the propagation of cyber risks within business processes, addressing the lack of process-awareness in existing research, especially regarding dependencies between process model elements. We propose a conceptualization that incorporates process model elements, dependencies, cyber risk events, and inference rules for capturing cascading effects. The conceptualization covers control flow, data flow, and resource-to-activity dependencies. A proof of concept, analyzing risk propagation in a credit evaluation process, demonstrates how confidentiality, integrity, and availability risks cascade across components. Our findings show how this approach uncovers cascading risks, providing insights for cyber risk assessment in interconnected environments.

Original languageEnglish
Title of host publicationIntelligent Information Systems - CAiSE 2025 Forum and Doctoral Consortium, Proceedings
EditorsLuise Pufahl, Kristina Rosenthal, Sergio España, Selmin Nurcan
PublisherSpringer Science and Business Media Deutschland GmbH
Pages86-94
Number of pages9
ISBN (Print)9783031945892
DOIs
StatePublished - 2025
EventForum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025 - Vienna, Austria
Duration: 16 Jun 202520 Jun 2025

Publication series

NameLecture Notes in Business Information Processing
Volume557 LNBIP
ISSN (Print)1865-1348
ISSN (Electronic)1865-1356

Conference

ConferenceForum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025
Country/TerritoryAustria
CityVienna
Period16/06/2520/06/25

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Keywords

  • Risk Assessment
  • Risk Propagation
  • Secure Business Process

ASJC Scopus subject areas

  • Management Information Systems
  • Control and Systems Engineering
  • Business and International Management
  • Information Systems
  • Modeling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Conceptualizing Business Process Dependencies That Propagate Cyber Risk'. Together they form a unique fingerprint.

Cite this