<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrating Shared Cyber Security Information into Information Security Risk Management</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science University of Innsbruck Innsbruck</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the last couples of years, the complexity and interconnectedness of Information Systems (IS), and security related incidents increased signi cantly. In order to guarantee con dentiality, integrity, and availability of these IS an appropriate information security risk management (ISRM) must be in place. Reliable ISRM represents a challenge for organizations, since they take security related decisions based on outdated data, overlook vulnerabilities, threats or common incidents. To overcome these issues the acquisition of shared cyber security information at the right time supports ISRM to reduce risks, identify attacks, and enhance resilience of an IS. However, the exchange and acquisition of shared cyber security information represents a major challenge in ISRM. In the proposed PhD thesis we focus on this challenge by developing a framework that automatically combines and integrates shared cyber security information into ISRM processes. In doing so, we develop quality criteria, measures, and metrics to evaluate and lter shared cyber security information.</p>
      </abstract>
      <kwd-group>
        <kwd>Information Security Risk Management</kwd>
        <kwd>Shared Cyber Security Information</kwd>
        <kwd>Information Integration</kwd>
        <kwd>Information Quality</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The increasing complexity and heterogeneity of Information Systems (IS)
combined with more sophisticated cyber-attacks manifest serious threats harming an
IS's security. Recent prominent information security incidents have shown that
attacks can lead to business-critical loss of intellectual property, productivity,
money, and reputation [1{3]. In order to counteract these threats, and to
guarantee con dentiality, integrity, and availability, an organisation needs to put an
information security risk management (ISRM) in place [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. ISRM includes
processes to identify, assess, treat, accept, communicate and monitor information
security related risks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It employs information derived from a multitude of
internal information sources, like monitoring tools, enterprise architecture
artifacts, and stakeholder's knowledge.
      </p>
      <p>
        Reliable ISRM represents a major challenge for organizations, since they fail to
predict risks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], due to decisions based on outdated data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], or de ciencies in
the timely reaction to occurring threats [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. To tackle these issues and improve
ISRM the acquisition of shared cyber security information and knowledge has
been frequently stated as desirable [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In the last couples of years a multitude
of shared cyber security information sources were created, ranging from
public available information sources (e.g. National Vulnerability Database1, Exploit
Database2, Vendor-speci c Advisories,. . . ) to threat intelligence sharing
communities that exchange threat intelligence among each other [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
In recent years, research and practice introduced several technologies, data
formats, messaging protocols, and frameworks that enable the exchange of cyber
security information [10{13]. However, cyber security information sharing in the
eld of ISRM is hardly present, and depicts one of the core challenges [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Thereby, the right selection of information for ISRM plays an important role
since inaccurate data could a ect the ISRM and can result in undesired
effects [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], or uncertainty [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>In the PhD thesis we want to answer the following overarching research question:
How can shared cyber security information be integrated into information
security risk management?
The main objective of the PhD thesis is the development of a framework to
combine and integrate shared cyber security information into ISRM, thereby we
want to focus primarily on security information shared between organisations. In
this context, the development of criteria (e.g. timeliness, completeness, reliability,
provenance of information) and methods to evaluate data quality, and lter
relevant information for ISRM plays an important role.</p>
      <p>Our contribution is threefold: At rst we characterize the landscape of relevant
and valuable shared cyber security information for ISRM. Secondly, we develop
a taxonomy to evaluate the quality of shared cyber security information and
provide rules to lter it. Finally, we implement a framework which bases upon
the developed taxonomy, provides methods to automatically evaluate the data
quality and lter relevant shared cyber security information, and combines and
integrates the collected information into ISRM.
2</p>
    </sec>
    <sec id="sec-2">
      <title>State of the Art</title>
      <p>
        Cyber Security information sharing is a contemporary topic in information
security communities. In recent years several standardization e orts have
addressed the challenge of representing cyber security information in a
standardized manner [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. As a result a number of protocols, data formats and
frame
      </p>
      <sec id="sec-2-1">
        <title>1 https://nvd.nist.gov/ Accessed: March, 2016</title>
      </sec>
      <sec id="sec-2-2">
        <title>2 https://www.exploit-db.com/ Accessed: March, 2016</title>
        <p>
          works have been introduced, e.g. Common Vulnerability Exposure (CVE),
Structured Threat Information Expression (STIXX), Trusted Automated eXchange
of Indicator Information (TAXII), Common Con guration Enumeration (CCE),
Common Attack Pattern Enumeration and Classi cation (CAPEC), and the
Open Vulnerability and Assessment Language (OVAL), among others [
          <xref ref-type="bibr" rid="ref10 ref11 ref13">11, 10,
13</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], a taxonomy is introduced to classify cyber security information
sharing technologies, identify gaps, and explain the di erences between them
from a scienti c perspective.
        </p>
        <p>
          While there are a number of ad-hoc solutions for cyber security information
sharing, like email exchange, phone calls, shared databases or data feeds, there is a
tendency to establish systems for automated data exchange, and form
communities for cyber security information sharing [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. For example, in the Netherlands
the government together with companies has introduced the National Detection
Network(NDN) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. In this context, there is a need for an e ective cyber security
information sharing platform, the challenges, requirements and expectations are
discussed by [
          <xref ref-type="bibr" rid="ref16 ref17">17, 16</xref>
          ].
        </p>
        <p>
          To bene t from information, a persistent theme in research is the assessment
of information quality. Therefore, several data quality metrics, measures and
frameworks focusing on information quality exist [18{21]. In ISRM only a few
researches dealt with the aspect of information quality, e.g. investigations
regarding quality de ciencies in the documentation of business security
requirements [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], or how to improve quality assessment in ISRM processes through
stakeholder knowledge [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>To the best of our knowledge no prior research has been conducted that
examines how shared cyber security information with respect to quality criteria can be
integrated into ISRM. In doing so, research and practice lacks metrics, measures
and methods for quality assessment of shared cyber security information.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Research Questions &amp; Expected Contributions</title>
      <p>In Section 1 we introduced our overarching research questions which we divide
in the following three research questions: (a) What are potential shared cyber
security information sources for ISRM?, (b) What are quality requirements for
shared cyber security information for ISRM?, and (c) How can ISRM processes
be supplied with shared cyber security information? In the following we explain
these research questions and outline the expected contributions.
3.1</p>
      <p>RQ1: What are potential shared cyber security information
sources for ISRM?
As described in Section 2, several standards for describing and exchanging of
shared cyber security information exist. At rst we provide a comprehensive
overview of the state of the art of standards in the eld. Based on these
investigations we conduct a study with the goal of identifying potential shared cyber
security information sources applied in practice. In this context, our primary
focus is on security information which is shared between organisation. In
addition to them, we analyse information which is available from public security
databases. Finally, the contribution of this research step includes a classi cation
of the landscape of valuable shared cyber security information sources,
underlying standards, and their relevance for practice.
3.2</p>
      <p>
        RQ2: What are quality requirements for shared cyber security
information for ISRM?
Based on the identi ed landscape of shared cyber security information for ISRM
we develop criteria, metrics and measures to evaluate the data quality. For
example, they take in account criteria, like timeliness, provenance, reliability, or
completeness of shared information. For this purpose, we analyze the adoption
possibilities of existing quality models from information science [18{20, 24, 25],
and other elds of ISRM, e.g. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. In doing so, we want to analyse if it is
possible to adopt or extend existing approaches to evaluate the quality of shared
cyber security information. Our main goal is the development of criteria to assure
quality of shared cyber security information and provide criteria to lter
information in order to reduce the information overhead and facilitate the integration of
information into ISRM. Finally, our contribution includes a comprehensive
taxonomy containing quality criteria, metrics, and measures to evaluate the quality
of shared cyber security information.
3.3
      </p>
      <p>RQ3: How can ISRM processes be supplied with shared cyber
security information?
As depicted in Figure 1, based on the identi ed landscape of shared cyber
security information and the taxonomy for quality assurance we develop a
framework that automatically collects, combines, and integrates shared cyber security
information to ISRM processes. Thereby, we are following three goals: (a) To
integrate a multitude of shared cyber security information into ISRM processes,
(b) assure the quality of integrated information, and (c) reduce the implicated
overhead of useless information. The developed framework should be capable of
being integrated into information security management systems implementing
ISRM processes.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Research Plan</title>
      <p>
        As depicted in Figure 2 our research plan can be divided into the following three
steps considering the design science principles [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]: (a) Identifying the landscape
of shared cyber security information, (b) development of the taxonomy for
information quality assurance, (c) development and evaluation of the framework. In
our research we collaborate with a number of organizations, like the OWASP3
      </p>
      <sec id="sec-4-1">
        <title>3 https://www.owasp.org (Accessed: March, 2016)</title>
        <p>At rst, we conduct empirical studies with the goal of identifying the landscape
of shared cyber security information. Therefore, we carry out qualitative expert
interviews with experts in the eld. The interviewees include security experts
from our industry and academic partners. Based on the results of the interviews
we carry out a quantitative survey addressing the same issue. In doing so, our
main goal is the validation of the results of the expert interviews, and
subsequently provide of a comprehensive picture of relevant shared cyber security
information for ISRM in practice.
Secondly, we identify and develop quality criteria with corresponding quality
metrics to assess the quality for shared cyber security information. Therefore,
we conduct a systematic literature study on existing data quality criteria and
metrics in di erent applications areas of information science. Based on
qualitative expert interviews we evaluate the applicability of the identi ed quality
criteria and metrics to shared cyber security information. Thereby, it might be
necessary to adopt or add one or another quality metric. The main result of</p>
      </sec>
      <sec id="sec-4-2">
        <title>4 https://www.tuv.at/ (Accessed: March, 2016)</title>
      </sec>
      <sec id="sec-4-3">
        <title>5 https://www.sig-switzerland.ch/de/ (Accessed: March, 2016)</title>
        <p>the the systematic literature study and the expert interviews is a comprehensive
taxonomy to evaluate the quality of shared cyber security information.</p>
        <p>
          Development and evaluation of the framework
Thirdly, we develop a framework to supply shared cyber security information for
ISRM processes. As mentioned in Section 3 the framework should be capable of
being integrated into information security management systems (ISMS)
implementing ISRM processes. In order to demonstrate the integration capabilities we
integrate it into the tool-supported ISMS framework ADAMANT [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] which is
part of one of our ongoing research projects. Finally, we evaluate our framework
through con rmatory case studies with our research and industry partners.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>The main goal of our research, and the proposed PhD thesis is the development
of a framework that integrates shared cyber security information into ISRM
processes. In doing so, the framework combines information originating from
di erent sources, ensures a certain degree of information quality, and lters
information in order to counteract useless information over ow. Thereby our
research contributions are threefold: (a) Identifying the landscape of shared cyber
security information, (b) providing a taxonomy to evaluate the quality of shared
cyber security information, and (c) developing the described framework. This
paper provides an overview of the addressed research questions, expected
contributions and applied research methodology. At the time of writing this paper we
were analysing the results of the survey and expert study for identifying valuable
shared cyber security information for ISRM, described in section 4.1.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>P.</given-names>
            <surname>Wood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Nahorney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chandrasekar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wallace</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Haley</surname>
          </string-name>
          .
          <source>Symantec internet security threat report 2015. Technical report, Symantec Corporation</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Louis</given-names>
            <surname>Marinos</surname>
          </string-name>
          and
          <string-name>
            <given-names>Andreas</given-names>
            <surname>Sfakianakis</surname>
          </string-name>
          .
          <article-title>Enisa threat landscape-responding to the evolving threat environment</article-title>
          .
          <source>ENISA (The European Network and Information Security Agency)</source>
          (
          <year>September 2012</year>
          ),
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Andrew</given-names>
            <surname>Miller</surname>
          </string-name>
          , Richard Horne, and
          <string-name>
            <given-names>Chris</given-names>
            <surname>Porter</surname>
          </string-name>
          .
          <article-title>2015 information security breaches survey</article-title>
          .
          <source>Technical report, PWC</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. ISO/IEC. ISO/IEC 27001:
          <year>2013</year>
          :
          <article-title>Information technology - security techniques - information security management systems - requirements</article-title>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. ISO/IEC. ISO/IEC 27005:
          <year>2011</year>
          :
          <article-title>Information technology - security techniques - information security risk management</article-title>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Stefan</given-names>
            <surname>Fenz</surname>
          </string-name>
          , Johannes Heurix, Thomas Neubauer, and
          <string-name>
            <given-names>Fabian</given-names>
            <surname>Pechstein</surname>
          </string-name>
          .
          <article-title>Current challenges in information security risk management</article-title>
          .
          <source>Information Management &amp; Computer Security</source>
          ,
          <volume>22</volume>
          (
          <issue>5</issue>
          ):
          <volume>410</volume>
          {
          <fpage>430</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Matthias</given-names>
            <surname>Farwick</surname>
          </string-name>
          , Berthold Agreiter, Ruth Breu, Ste en Ryll, Karsten Voges, and
          <string-name>
            <given-names>Inge</given-names>
            <surname>Hanschke</surname>
          </string-name>
          .
          <article-title>Requirements for automated enterprise architecture model maintenance</article-title>
          .
          <source>In 13th International Conference on Enterprise Information Systems (ICEIS)</source>
          , Beijing,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Bachlechner</surname>
          </string-name>
          , Ronald Maier,
          <article-title>Frank Innerhofer-Oberper er, and Lukas Demetz. Understanding the management of information security controls in practice</article-title>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>F.</given-names>
            <surname>Fransen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smulders</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Kerkdijk</surname>
          </string-name>
          .
          <article-title>Cyber security information exchange to gain insight into the e ects of cyber threats and incidents</article-title>
          .
          <source>e &amp; i Elektrotechnik und Informationstechnik</source>
          ,
          <volume>132</volume>
          (
          <issue>2</issue>
          ):
          <volume>106</volume>
          {
          <fpage>112</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Jessica</surname>
            <given-names>Steinberger</given-names>
          </string-name>
          , Anna Sperotto, Mario Golling, and
          <string-name>
            <given-names>Harald</given-names>
            <surname>Baier</surname>
          </string-name>
          .
          <article-title>How to exchange security events? overview and evaluation of formats and protocols</article-title>
          .
          <source>In Integrated Network Management (IM)</source>
          ,
          <year>2015</year>
          IFIP/IEEE International Symposium on, pages
          <volume>261</volume>
          {
          <fpage>269</fpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Panos</given-names>
            <surname>Kampanakis</surname>
          </string-name>
          .
          <article-title>Security automation and threat information-sharing options</article-title>
          .
          <source>Security &amp; Privacy</source>
          , IEEE,
          <volume>12</volume>
          (
          <issue>5</issue>
          ):
          <volume>42</volume>
          {
          <fpage>51</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Eric W Burger</surname>
          </string-name>
          ,
          <string-name>
            <surname>Michael D Goodman</surname>
            ,
            <given-names>Panos</given-names>
          </string-name>
          <string-name>
            <surname>Kampanakis</surname>
          </string-name>
          , and Kevin A Zhu.
          <article-title>Taxonomy model for cyber threat intelligence information exchange technologies</article-title>
          .
          <source>In Proceedings of the 2014 ACM Workshop on Information Sharing &amp; Collaborative Security</source>
          , pages
          <volume>51</volume>
          {
          <fpage>60</fpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Robert</surname>
          </string-name>
          Martin et al.
          <article-title>Making security measurable and manageable</article-title>
          .
          <source>In Military Communications Conference</source>
          ,
          <year>2008</year>
          .
          <article-title>MILCOM 2008</article-title>
          .
          <article-title>IEEE, pages 1{9</article-title>
          . IEEE,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <article-title>Luc Dandurand and Oscar Serrano Serrano</article-title>
          .
          <article-title>Towards improved cyber security information sharing</article-title>
          .
          <source>In Cyber Con ict (CyCon)</source>
          ,
          <year>2013</year>
          5th International Conference on, pages
          <volume>1</volume>
          {
          <fpage>16</fpage>
          . IEEE,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mari</surname>
            <given-names>Kert</given-names>
          </string-name>
          , Javier Lopez, Markatos Evangelos, and
          <string-name>
            <given-names>Bart</given-names>
            <surname>Preneel</surname>
          </string-name>
          .
          <article-title>State-of-the-art of secure ict landscape</article-title>
          .
          <source>Technical report</source>
          , ENISA - NIS Platform - Working Group 3,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Oscar</surname>
            <given-names>Serrano</given-names>
          </string-name>
          , Luc Dandurand, and Sarah Brown.
          <article-title>On the design of a cyber security data sharing system</article-title>
          .
          <source>In Proceedings of the 2014 ACM Workshop on Information Sharing &amp; Collaborative Security</source>
          , pages
          <volume>61</volume>
          {
          <fpage>69</fpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Sarah</surname>
            <given-names>Brown</given-names>
          </string-name>
          , Joep Gommers, and
          <string-name>
            <given-names>Oscar</given-names>
            <surname>Serrano</surname>
          </string-name>
          .
          <article-title>From cyber security information sharing to threat management</article-title>
          .
          <source>In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security</source>
          , pages
          <volume>43</volume>
          {
          <fpage>49</fpage>
          . ACM,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Carlo</surname>
            <given-names>Batini</given-names>
          </string-name>
          , Cinzia Cappiello, Chiara Francalanci, and
          <string-name>
            <given-names>Andrea</given-names>
            <surname>Maurino</surname>
          </string-name>
          .
          <article-title>Methodologies for data quality assessment and improvement</article-title>
          .
          <source>ACM computing surveys (CSUR)</source>
          ,
          <volume>41</volume>
          (
          <issue>3</issue>
          ):
          <fpage>16</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Laura</surname>
          </string-name>
          Sebastian-Coleman.
          <article-title>Measuring data quality for ongoing improvement: A data quality assessment framework</article-title>
          .
          <source>Newnes</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Laure</surname>
          </string-name>
          Berti-Equille, Isabelle Comyn-Wattiau, Mireille Cosquer, Zoubida Kedad, Sylvaine Nugier, Veronika Peralta, Samira
          <string-name>
            <surname>Si-Said Cher</surname>
          </string-name>
          , and
          <article-title>Virginie ThionGoasdoue. Assessment and analysis of information quality: a multidimensional model and case studies</article-title>
          .
          <source>International Journal of Information Quality</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ):
          <volume>300</volume>
          {
          <fpage>323</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Peter van Nederpelt</surname>
            and
            <given-names>Piet</given-names>
          </string-name>
          <string-name>
            <surname>Daas</surname>
          </string-name>
          .
          <article-title>49 factors that in uence the quality of secondary data sources</article-title>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>Christian</given-names>
            <surname>Sillaber</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ruth</given-names>
            <surname>Breu</surname>
          </string-name>
          .
          <article-title>Quality matters: Systematizing quality de - ciencies in the documentation of business security requirements</article-title>
          .
          <source>In Availability, Reliability and Security (ARES)</source>
          ,
          <year>2014</year>
          Ninth International Conference on, pages
          <volume>251</volume>
          {
          <fpage>258</fpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>Christian</given-names>
            <surname>Sillaber</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ruth</given-names>
            <surname>Breu</surname>
          </string-name>
          .
          <article-title>Using stakeholder knowledge for data quality assessment in is security risk management processes</article-title>
          .
          <source>In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research</source>
          , pages
          <volume>153</volume>
          {
          <fpage>159</fpage>
          . ACM,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Fatimah</surname>
            <given-names>Sidi</given-names>
          </string-name>
          ,
          <source>PH Shariat Panahy</source>
          ,
          <article-title>Lilly Suriani A endey, Marzanah A Jabar, Haidi Ibrahim, and Aouache Mustapha. Data quality: A survey of data quality dimensions</article-title>
          .
          <source>In Information Retrieval &amp; Knowledge Management (CAMP)</source>
          , 2012 International Conference on, pages
          <volume>300</volume>
          {
          <fpage>304</fpage>
          . IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Amrapali</surname>
            <given-names>Zaveri</given-names>
          </string-name>
          , Anisa Rula, Andrea Maurino, Ricardo Pietrobon, Jens Lehmann, Soren Auer, and
          <string-name>
            <given-names>Pascal</given-names>
            <surname>Hitzler</surname>
          </string-name>
          .
          <article-title>Quality assessment methodologies for linked open data</article-title>
          . Submitted to Semantic
          <source>Web Journal</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>R</given-names>
            <surname>Hevner von Alan</surname>
          </string-name>
          ,
          <source>Salvatore T March</source>
          , Jinsoo Park, and
          <string-name>
            <given-names>Sudha</given-names>
            <surname>Ram</surname>
          </string-name>
          .
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS quarterly</source>
          ,
          <volume>28</volume>
          (
          <issue>1</issue>
          ):
          <volume>75</volume>
          {
          <fpage>105</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>Michael</given-names>
            <surname>Brunner</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ruth</given-names>
            <surname>Breu</surname>
          </string-name>
          .
          <article-title>It compliance mit kontextuellen sicherheitsanforderungen</article-title>
          .
          <source>DA CH Security</source>
          , pages
          <volume>136</volume>
          {
          <fpage>147</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>