Conceptualizing Business Process Dependencies That Propagate Cyber Risk

Gal Engelberg, Moshe Hadad, Pnina Soffer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper explores the propagation of cyber risks within business processes, addressing the lack of process-awareness in existing research, especially regarding dependencies between process model elements. We propose a conceptualization that incorporates process model elements, dependencies, cyber risk events, and inference rules for capturing cascading effects. The conceptualization covers control flow, data flow, and resource-to-activity dependencies. A proof of concept, analyzing risk propagation in a credit evaluation process, demonstrates how confidentiality, integrity, and availability risks cascade across components. Our findings show how this approach uncovers cascading risks, providing insights for cyber risk assessment in interconnected environments.

Original languageAmerican English
Title of host publicationIntelligent Information Systems - CAiSE 2025 Forum and Doctoral Consortium, Proceedings
EditorsLuise Pufahl, Kristina Rosenthal, Sergio España, Selmin Nurcan
PublisherSpringer Science and Business Media Deutschland GmbH
Pages86-94
Number of pages9
ISBN (Print)9783031945892
DOIs
StatePublished - 2025
EventForum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025 - Vienna, Austria
Duration: 16 Jun 202520 Jun 2025

Publication series

NameLecture Notes in Business Information Processing
Volume557 LNBIP

Conference

ConferenceForum and the Doctoral Consortium of the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025
Country/TerritoryAustria
CityVienna
Period16/06/2520/06/25

Keywords

  • Risk Assessment
  • Risk Propagation
  • Secure Business Process

All Science Journal Classification (ASJC) codes

  • Management Information Systems
  • Control and Systems Engineering
  • Business and International Management
  • Information Systems
  • Modelling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Conceptualizing Business Process Dependencies That Propagate Cyber Risk'. Together they form a unique fingerprint.

Cite this