Improvement of security costs evaluation process by using data automatically captured from BPMN and EPC models

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Amount of security breaches and organizations’ losses, related to them, is increasing every year. One of the key reasons is a high dependency of organization’s key business processes on information and information technology. To decrease the risk of possible breaches, organizations have to ensure “due diligence” and “due care” principles. This means, organizations need to apply requirements or controls defined by existing security standards. One of the main issues in such approach is identification of critical areas and evaluation of cost for security requirements implementation. In this paper we consider how our previously proposed method for information security requirements implementation cost evaluation could be linked with organizations’ business processes. Our proposal could help us identify organization critical areas, which need to be protected and could let us to calculate security costs, related to the protected areas.

Cite

CITATION STYLE

APA

Olifer, D., Goranin, N., Janulevicius, J., Kaceniauskas, A., & Cenys, A. (2018). Improvement of security costs evaluation process by using data automatically captured from BPMN and EPC models. In Lecture Notes in Business Information Processing (Vol. 308, pp. 698–709). Springer Verlag. https://doi.org/10.1007/978-3-319-74030-0_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free