Abstract
This paper explores the propagation of cyber risks within business processes, addressing the lack of process-awareness in existing research, especially regarding dependencies between process model elements. We propose a conceptualization that incorporates process model elements, dependencies, cyber risk events, and inference rules for capturing cascading effects. The conceptualization covers control flow, data flow, and resource-to-activity dependencies. A proof of concept, analyzing risk propagation in a credit evaluation process, demonstrates how confidentiality, integrity, and availability risks cascade across components. Our findings show how this approach uncovers cascading risks, providing insights for cyber risk assessment in interconnected environments.
| Original language | English |
|---|---|
| Title of host publication | Intelligent Information Systems - CAiSE 2025 Forum and Doctoral Consortium, Proceedings |
| Editors | Luise Pufahl, Kristina Rosenthal, Sergio España, Selmin Nurcan |
| Publisher | Springer Science and Business Media Deutschland GmbH |
| Pages | 86-94 |
| Number of pages | 9 |
| ISBN (Print) | 9783031945892 |
| DOIs | |
| State | Published - 2025 |
| Event | Forum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025 - Vienna, Austria Duration: 16 Jun 2025 → 20 Jun 2025 |
Publication series
| Name | Lecture Notes in Business Information Processing |
|---|---|
| Volume | 557 LNBIP |
| ISSN (Print) | 1865-1348 |
| ISSN (Electronic) | 1865-1356 |
Conference
| Conference | Forum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025 |
|---|---|
| Country/Territory | Austria |
| City | Vienna |
| Period | 16/06/25 → 20/06/25 |
Bibliographical note
Publisher Copyright:© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
Keywords
- Risk Assessment
- Risk Propagation
- Secure Business Process
ASJC Scopus subject areas
- Management Information Systems
- Control and Systems Engineering
- Business and International Management
- Information Systems
- Modeling and Simulation
- Information Systems and Management
Fingerprint
Dive into the research topics of 'Conceptualizing Business Process Dependencies That Propagate Cyber Risk'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver