<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards a Business Process-Based Economic Evaluation and Selection of IT Security Measures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stephan Kühnel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Sackmann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Trang</string-name>
          <email>simon.trang@wiwi.uni-goettin-</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilja Nastjuk</string-name>
          <email>ilja.nastjuk@wiwi.uni-goettin-</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tizian Matschak</string-name>
          <email>tizian.matschak@wiwi.uni-goettin-</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Laura Niedzela</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Leonard Nake</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Martin Luther University Halle-Wittenberg</institution>
          ,
          <addr-line>06108 Halle (Saale)</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universität Goettingen</institution>
          ,
          <addr-line>37073 Goettingen, Germany gen.de</addr-line>
        </aff>
      </contrib-group>
      <fpage>7</fpage>
      <lpage>21</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Technological innovations, such as cloud computing, intelligent process automation,
and big data analytics offer substantial opportunities for maintaining and strengthening
a company's competitive position. However, the introduction of such technologies
entails new compliance and security risks. One of the most challenging risks that
companies face is to protect technologies and other organizational assets from incidents or
attacks that aim to access sensitive information (confidentiality attacks), change the
code or data in information systems (integrity attacks), as well as disrupt the normal
operation of information systems (availability attacks) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        To mitigate such risks, both legislators and companies define far-reaching and
overarching requirements for information, data, and information technology (IT) security.
Examples can be found in a company's information security governance requirements
(e.g., general policies on authentication or guidelines on data classification and
handling), in sector-specific guidelines (e.g., the second Payment Services Directive of the
European Union (EU) for banks), or in cross-sectoral regulations (e.g., the EU General
Data Protection Regulation (GDPR) or the German IT Security Act). It is essential for
companies to comply with such requirements, i.e., to implement the requirements
through adequate IT security measures.
IT security measures are mechanisms that support organizations to identify and alert
about security incidents, to protect critical infrastructure services with the aim to
preserve the confidentiality, integrity, and availability of information, to respond to
security incidents (e.g., reduce the number of successful attacks), and to recover system
integrity after a security incident [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. IT security measures include both technical
measures, such as firewalls, intrusion detection systems, or authentication mechanisms,
as well as human-centric measures, such as information classification policies,
cleandesk regulations, and password policies [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In most cases, the implementation of
extensive IT security requirements cannot be realized through isolated IT security
measures but requires a complex bundle of interdependent measures. On the one hand,
such measures entail high investment costs and, on the other hand, can significantly
influence companies' business processes. For example, Article 32 (1) of the GDPR
requires that appropriate technical and organizational measures should be implemented
to ensure compliance with the protection goals of confidentiality, integrity, availability,
and resilience when processing personal data. To implement this requirement, both
technical precautions (e.g., encryption and pseudonymization of personal data) and
procedural configurations (e.g., activities and controls to ensure compliance in business
processes) are necessary. Such technical precautions and procedural configurations can
lead to high expenses [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. It is therefore not surprising that compliance with IT
security requirements is already described in existing literature as a cost-intensive task [
        <xref ref-type="bibr" rid="ref6 ref7">6,
7</xref>
        ] and even as a "heavy cost driver" [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Consequently, “the focus of IT security management is shifting from what is technically
possible to what is economically efficient” ([
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], p. 66). To ensure that a company's
profitability is not affected by implementing bundles of IT security measures, it becomes
necessary to identify suitable alternative courses of action to meet IT security
requirements and select the best alternatives based on economic criteria [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Accordingly, the
evaluation and selection of IT security measures have become critical skills for
information security managers. Traditional investment-based approaches and theories, such
as the return on investment (ROI), the real options theory (ROT), or the utility
maximization theory (UMT), form the backbone of most contemporary methods to
economically evaluate IT security investment decisions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In the context of IT security,
widely accepted methods to evaluate the return on investment include the return on
security investment (ROSI) and the return on information security investment (ROISI)
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Such methods consider directly attributable monetary costs and benefits, which
become important determinants of investment decisions. Decision makers benefit from
utilizing investment-based evaluation methods because they enforce to think about
explicit assumptions and decision rationales. In addition, they help to understand whether
security investments are consistent with the organizational risk strategies [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
However, investment-based approaches offer only limited guidance for the decision to
implement IT security measures because of the lack of available data to generate
accurate results, the high dependency of these approaches on subjective assumptions, and
the negligence to account for the interdependency between multiple IT security
measures [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In addition, investment-based methods usually do not account for
nonmonetary and indirect effects, such as the impact of IT security measures on business
process performance or outcome. This is an important topic of interest for two reasons.
First, IT investments in general impact the efficiency of business processes [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and
second, business processes have a substantial impact on the competitive position and
financial performance of any organization [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Since business processes are at the center of a company’s success, they offer a solid
foundation for cost-benefit analysis [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. However, to the best of our knowledge, there
is a lack of approaches in the literature supporting a comprehensive economic
evaluation of IT security measures (and bundles of measures) with particular regard to their
interaction with business processes. Based on existing knowledge about contemporary
business process management and compliance, we propose several requirements for the
development of business process-driven approaches to the evaluation and selection of
IT security measures for guiding future research. In particular, the paper discusses the
requirements needed on the journey towards a process-based approach for the economic
evaluation and selection of IT security measures. Such an approach enables effective
selection and implementation of IT security measures, stimulates business process
improvement, and further offers the opportunity to overcome the limitations of existing
investment-based methods.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Important Investment-based Approaches for the Economic</title>
    </sec>
    <sec id="sec-3">
      <title>Evaluation of IT Security Measures</title>
      <p>
        As mentioned above, investment theories form the backbone of most existing methods
for the economic evaluation of IT security measures [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In this context, direct costs
for the introduction and operation of (mostly isolated) IT security measures (e.g., costs
for software, hardware, or personnel) are interpreted as an investment from which an
expected direct return on capital (monetary benefit) results [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The existing literature
on the evaluation of IT security measures is dominated by the following three
approaches [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]:
1.
2.
      </p>
      <p>
        Approaches based on the ROI (see, e.g., [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]), which value the return on
investment generated by an isolated IT security measure relative to the capital
invested.
      </p>
      <p>
        Approaches based on the ROT (see, e.g., [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]), which are based on option
pricing models for the valuation of IT security investments taking into account
time-dependent variability.
      </p>
      <p>
        Approaches based on the UMT (see, e.g., [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]), which aim to maximize the
benefit of an IT security investment for a given subject.
      </p>
      <p>
        All three approaches share the assumption that the capital reflow is represented by the
expected proportion of monetary damage from a potential IT security incident that can
be prevented by the use of an IT security measure, such as prevented operational
downtime or avoided recovery costs of an attack [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Based on these approaches, different
methods have been discussed in the literature to economically evaluate IT security
measures (for a detailed survey, see [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]). In the following, we would like to present an
important selection of these.
2.1
      </p>
      <sec id="sec-3-1">
        <title>The Annual Loss Exposure</title>
        <p>
          In 1979, the National Bureau of Standards of the U.S. Department of Commerce
introduced the Annual Loss Exposure (ALE) as a first method to assess IT security risks.
ALE can be used to estimate the monetary annual loss exposure of a company based on
the damage that results from security incidents (impact) and the likelihood of such an
incident occurring (frequency of occurring) [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. For single security incidents, the ALE
is simply computed by multiplying the estimated impact (e.g., expressed as a monetary
value) by the expected occurrence frequency. If there are several security incidents, the
ALE totals the product of the two variables for each security incident (summation) [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
As a single metric, ALE is not sufficient to accurately perform an economic evaluation
of IT security measures, but usually represents an input variable for more complex
evaluation procedures (see, e.g., [
          <xref ref-type="bibr" rid="ref23 ref24 ref25 ref5">5, 23–25</xref>
          ]).
2.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Return on Security Investment</title>
        <p>
          The ROSI is based on the traditional ROI calculation and compares the benefits of IT
security measures with their costs [
          <xref ref-type="bibr" rid="ref21 ref26 ref27">21, 26, 27</xref>
          ]. It considers the probability of occurrence
of an IT security incident, loss prevention due to an IT security measure, the cost of
security incidents, and the costs of IT security measures. While the costs of an IT
security measure correspond to the investment costs, benefits are determined by reducing
the probability of occurrence of security incidents and reducing the amount of loss due
to the implementation of the IT security measure. Sonnenreich et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] suggest that the
ALE can be used to calculate ROSI. Thereby the ALE is multiplied by an effectiveness
parameter, which provides information on the effectiveness of IT security measures
(expressed as a percentage). The result represents the portion of the monetary annual
expected loss value that can be saved by implementing IT security measures. Then, the
total costs resulting from the implementation of IT security measures are subtracted to
determine the net financial “return.” Finally, the net financial return is divided by the
total costs to produce a relative ROSI value. Per classical ROI interpretation, an
investment in IT security measures is economically advantageous if it holds that ROSI &gt; 0.
If the ROSI &lt; 0, IT security investments are financially not viable and, thus, should be
avoided for economic reasons. For ROSI=0, the monetary advantages and
disadvantages are balanced. Further alternatives to calculate the ROSI are based on a direct
comparison of costs incurred due to a security incident and total costs for implementing
and operating IT security measures (see, e.g., [
          <xref ref-type="bibr" rid="ref28 ref29 ref30">28–30</xref>
          ]).
2.3
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Return on Information Security Investment</title>
        <p>
          Another model for evaluating IT security measures is Mizzi’s Return on Information
Security Investment (ROISI) [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ]. In alignment with ROSI, ROISI considers the
security expenditures based on one-time costs to implement a defense mechanism,
maintenance costs, and costs to fix system vulnerabilities. The potential total loss resulting
from security incidents is conceptualized based on missed revenue and information lost
due to system downtimes and the financial costs of rebuilding the system (e.g., labor
costs for system recovery). The main difference to the ROSI method is that Mizzi’s
approach includes a cost-benefit consideration of the malicious entity. To determine
ROISI, Mizzi defines the cost of an attack as the cost of penetrating the security
mechanism and exploiting vulnerabilities. A rational attacker only carries out an attack (in
the sense of ROSI this means influencing the probability of occurrence) if the benefit
accruing to the attacker is greater than his costs. The rationale behind this assumption
is that a rational attacker is usually unwilling to pay more for an attack than the
immediate loss suffered by the attacked entity (e.g., the value of the stolen information).
Mizzi suggests that IT security measures should be designed to maximize attackers'
costs and minimize the information potentially accessible.
2.4
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Adapted Loss Database</title>
        <p>
          Sackmann and Syring [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] base the evaluation of IT security measures or security
adaptations of technical infrastructures on the protection goals of business processes. In
this context, changes are modeled in a binary way from the perspective of an IT risk
reference model and based on a cause-and-effect concept that maps the chain from
threats to attacks and vulnerabilities to business processes. For the evaluation of both
isolated security measures and bundles of measures, the original data (e.g., historical
damages) are adapted to a more realistic cause-and-effect model and, thus, recalculated.
In principle, the adaptation of the data basis could be used with any method (e.g., ROSI)
for an evaluation of the measures under consideration.
2.5
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>Cyber Investment Analysis Methodology</title>
        <p>
          The Cyber Investment Analysis Methodology (CIAM) is a four-step data-driven
approach to evaluate and select IT security measures [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. First of all, it is necessary to
collect and/or select data on the assets to be protected, including data on security
incidents, appropriate IT security measures, the impact of exploited vulnerabilities on the
business, and costs to implement IT security measures. The second step involves
estimating weightings by domain experts to understand how each IT security measure
contributes to the goals of prevention, detection, and recovery. The third step includes
performing an effectiveness scoring in which each IT security measure is matched against
each attack step. Finally, an algorithm uses the data to compute a relative priority
ranking for each IT security measure.
2.6
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>Security Attribute Evaluation Method</title>
        <p>
          Butler [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] proposes the Security Attribute Evaluation Method (SEAM) as an economic
approach for assessing security investments. SAEM also proposes four steps to perform
the cost-benefit analysis of security measures. First, it starts with an assessment of the
benefits of an IT security measure. The second step includes evaluating the
effectiveness of the IT security measure in mitigating security risks. Third, a threat coverage
assessment is performed. The final step involves an assessment of the costs of the IT
security measure. Butler suggests that the data needed for the evaluation is sourced
from structured interviews with IT and security experts. To successfully conduct a
SEAM analysis, the company must have effective IT security policies and procedures
in place, have security mechanisms properly integrated into the existing IT
infrastructure, and be able to accurately predict attacks and their associated consequences.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Limitations of Existing Evaluation Methods for IT Security</title>
    </sec>
    <sec id="sec-5">
      <title>Measures</title>
      <p>
        While the methods presented in the previous chapter are valuable to evaluate and select
appropriate IT security measures economically, they offer several limitations.
One limitation is related to the lack of multidimensionality. Besides having an impact
on monetary returns, IT security measures have non-monetary effects. For example,
they can impact employee behavior, the organization’s reputation, as well as process
complexity or flexibility [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. Investment theory-based evaluation methods usually do
not account for such effects [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Accordingly, the scope and coverage of existing
approaches need to be extended to also include the impact of IT security measures on
nonfinancial dimensions.
      </p>
      <p>
        Another limitation is related to the lack of valid data for calculation. It is one of the
biggest challenges for organizations to obtain accurate data on the true costs of a
security incident. Most methods are data-driven, although necessary input data or accurate
estimators are often unavailable [
        <xref ref-type="bibr" rid="ref11 ref17">11, 17</xref>
        ]. Decision makers frequently underestimate the
costs of security incidents by looking only at the short-term tangible costs (e.g., lost
revenue), but there are also long-term intangible costs (e.g., loss of trust) that are
difficult to measure and therefore often neglected [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Another reason for the lack of valid
data is that most companies do not proactively and accurately capture cost information,
as emphasized by Sonnenreich et al. ([
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], p.47): “Security breaches that have no
immediate impact on day-to-day business often go completely unnoticed. When a breach
does get noticed, the organization is usually too busy fixing the problem to worry about
how much the incident actually costs. After the disaster, internal embarrassment and/or
concerns about public image often result in the whole incident getting swept under the
rug. As a result of this “ostrich response” to security incidents, the volume of data
behind existing actuarial tables is woefully inadequate.”
Another limitation is related to the lack of comparability. It is often difficult to
compare IT security measures, which are characterized by different goals and scopes based
on a monetary assessment of costs and benefits alone. In this context, Butler [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
emphasizes that it is more difficult to compare benefits among different IT security
measures than comparing costs. Existing and proven financial analysis tools allow costs
to be estimated quite accurately, but benefits are more difficult to quantify since they
are usually characterized by greater uncertainty, time lag, and indirect effects. In
addition, decision-makers are often confronted with imperfect knowledge about the explicit
benefits of IT security measures. Therefore, estimating costs and benefits often depends
on the IT security experts’ intuition, practical expertise, knowledge, and experience.
Research has also criticized the lack of scalability of existing evaluation methods (see,
e.g., [
        <xref ref-type="bibr" rid="ref11 ref9">9, 11</xref>
        ]). Investment-based methods are sensitive to different business sizes.
Although large corporations as well as small and medium-sized enterprises (SMEs) are
equally affected by IT security requirements, SMEs often have fewer financial and
personnel resources. For instance, Sonnenreich et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] emphasize that the cost-benefit
ratio of security investments is increasingly skewed as the number of employees
decreases, which is the case for most SMEs compared to large corporations. They
exemplify how an initially financially viable investment in an anti-spam solution would not
have been viable if the same organization were smaller, i.e. had fewer employees.
Finally, the presented methods are usually aimed at the evaluation of isolated IT
security measures, but they do not account for the effects that IT security measures have
on other measures when implemented as a bundle. Understanding synergies between
IT security measures is important to achieve desired business outcomes [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. In this
context, Axelsson ([
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], p. 189) emphasizes: “The best effect is often achieved when
several security measures are brought to bear together. How should intrusion detection
collaborate with other security mechanisms to achieve this synergy effect? How do we
ensure that the combination of security measures provides at least the same level of
security as each applied singly would provide, or that the combination does not in fact
lower the overall security of the protected system?” No single IT security measure can
ensure security by itself, and therefore, they need to be implemented in bundles and
configured to achieve optimal outcomes [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]. In this regard, Cavusoglu et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
criticize investment-based approaches as they do not consider the potential positive and
negative interactions of different IT security measures. More concretely, they criticize
the assumption that implementing one security measure will reduce the number of
attacks by a certain percentage and will result in a certain benefit value, as this neglects
substitution and complementary effects with other existing IT security measures.
The next chapter discusses how business process management concepts can contribute
to overcoming some of the limitations outlined.
4
      </p>
    </sec>
    <sec id="sec-6">
      <title>A Journey Towards a Process-Based Approach to Selecting and Evaluating IT Security Measures</title>
      <p>
        Using contemporary business process management concepts offers a promising
approach to address some of the key limitations outlined in the previous chapter. At the
core of business process management are business processes, which are defined as a
structured sequence of activities designed to achieve a specific output [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ].
4.1
      </p>
      <sec id="sec-6-1">
        <title>Two Interesting Approaches as Examples of How Business Process</title>
      </sec>
      <sec id="sec-6-2">
        <title>Management Can Already Be Used to Evaluate</title>
        <p>
          Magnani and Montesi [
          <xref ref-type="bibr" rid="ref38 ref39">38, 39</xref>
          ] proposed an approach for the cost evaluation of business
processes. The authors suggest extending relevant process elements in a business
process model with cost annotations. Costs are represented as textual information at the
respective process elements. Such an approach reaches its limits if business processes
are nested, i.e., if they contain one or more subprocesses and the calculation of costs
depends on their sequence flows. This is the case, for example, if a subprocess contains
connectors of the XOR type. The authors propose two alternatives for this limitation.
The first involves annotating cost intervals instead of individual cost values to all flow
objects (including subprocesses). Processes with fully annotated cost intervals are
suitable for the application of graph-based algorithms to determine the minimum and
maximum costs. For example, Dijkstra's algorithm [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] can be applied to identify a
minimum cost path between start and end events in a business process. However, it is
challenging to use cost intervals when loops are included in subprocesses since the upper
interval tends towards infinity in this case. The second alternative addresses this
problem by calculating and annotating average costs, provided that data from a sufficiently
large sample of process instances are available. However, the accuracy of the
calculation of average costs depends on the availability and correctness of data. The authors
demonstrate the applicability of both alternatives using the example of hotel
reservations.
        </p>
        <p>
          Sampathkumaran and Wirsing [
          <xref ref-type="bibr" rid="ref41 ref42">41, 42</xref>
          ] present a similar approach focused on
determining the expected costs of successfully executing a process, which they refer to as
"business costs." In contrast to Magnani and Montesi [
          <xref ref-type="bibr" rid="ref38 ref39">38, 39</xref>
          ], this approach does not only
focus on the determination of costs but also the degree of achievement of a defined
business objective. To include this degree in the calculation, the authors extended the
approach of Magnani and Montesi with the concept of “reliability” in calculating
process costs. Reliability represents the probability of successful execution of a task that
an organization performs to achieve a specific (business) objective. Consequently, the
business costs of a process depend not only on the costs of the process itself (e.g., the
amount of money needed to execute a process) but also on the process reliability (e.g.,
factors leading to successful process completion and the achievement of business
objectives). Sampathkumaran and Wirsing additionally suggest performing sensitivity
analyses to identify parameters that have the most critical impact on the business costs
and to optimize the process model.
4.2
        </p>
      </sec>
      <sec id="sec-6-3">
        <title>Requirements for a Process-Based Approach to the Economic Evaluation and Selection of IT Security Measures</title>
        <p>The aforementioned approaches can also be applied to IT security measures
implemented in business processes if specific conditions are met (e.g., modeling IT security
measures as modular and thus interchangeable subprocesses). Thus, they can provide
valuable information for determining the additional costs of IT security measures.
However, they do not accurately capture the interdependence between IT security and
business performance, i.e., how IT security measures impact the performance of
business processes. This is important to understand in order to improve the decision-making
process for IT security measures. We argue that a process-based approach for the
economic evaluation and selection of IT security measures offers tremendous opportunities
to complement existing approaches and overcome their limitations. Still, for the
successful implementation of a process-based evaluation approach in the context of IT
security, several requirements have to be taken into account.</p>
        <p>
          The development of a process-based approach requires, as a first step, the identification
of factors that characterize a business process and allow for its performance
determination. For example, complexity is a common characteristic of a business process that
significantly impacts associated quality and cost [
          <xref ref-type="bibr" rid="ref43 ref44">43, 44</xref>
          ]. The implementation of IT
security measures can lead to either a reduction or an increase in the complexity of a
business process and thus influence the cost-effectiveness of achieving business goals.
For example, Stoewer and Kraft [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ] show that new security solutions can lead to
improved process efficiency if the IT security measure to be implemented triggers a
redesign of the underlying process. Therefore, we argue that a prerequisite for a
processbased approach to assessing IT security measures is to capture relevant factors that
characterize business processes and impact their performance. However, it is important
to consider that business processes have different and possibly competing priorities in
terms of factors such as time, cost, flexibility, or quality [
          <xref ref-type="bibr" rid="ref46">46</xref>
          ]. In this regard, vom
Brocke and Sonnenberg [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ] emphasize the importance of considering trade-offs
between factors when determining the economic value of business processes: “[…] a
process that produces quality products might have long cycle times and relatively high
costs, whereas a process with low cycle times might have moderate costs and a low
quality level” (p. 114). A goal-oriented approach is desirable to appropriately manage
competing priorities in business processes. Goal orientation accounts for the strategic
objectives of an organization and how these objectives are achieved through business
process design [
          <xref ref-type="bibr" rid="ref48">48</xref>
          ]. Consequently, a process-driven approach requires a definition and
evaluation of the specific business process goals.
        </p>
        <p>
          Once relevant influencing factors are identified, the next step is to investigate which
business processes are affected by IT security measures. Standards such as the Business
Process Modeling and Notation (BPMN) allow for the graphical modeling and
specification of business process models [
          <xref ref-type="bibr" rid="ref49">49</xref>
          ]. Business process models provide specific
insights into how organizations work and we argue that they offer the opportunity to
integrate IT security measures into their process landscape, as shown by Seyffarth et al.
[
          <xref ref-type="bibr" rid="ref50">50</xref>
          ]. One example is the implementation of so-called access controls to monitor and
control access to organizational systems for ensuring the integrity and confidentiality
of data [
          <xref ref-type="bibr" rid="ref51">51</xref>
          ]. Access controls can be mapped in business process models by specific
modeling objects such as tasks, events, gateways, and annotations. In a
purchase-topay scenario, Sadiq et al. [
          <xref ref-type="bibr" rid="ref52">52</xref>
          ] demonstrate that compliance controls can be integrated
into an organizational process model through specific process annotations (so-called
control tags).
        </p>
        <p>
          The next step involves quantitatively evaluating the extent to which a process model is
influenced by the integration of IT security measures. Kuehnel et al. [
          <xref ref-type="bibr" rid="ref53">53</xref>
          ] use so-called
process log files as the data basis for their calculations in the context of compliance
measures. They propose various design requirements and principles for an IT tool that
is supposed to enable an economic evaluation of business process compliance. For
example, the IT tool should be able to automatically reconstruct the paths of a business
process from a given log file and support a modular process view to visualize
compliance activities. We argue that log files can be used to capture the performance of a
business process and any changes caused by the implementation of IT security
measures. It should be noted that the economic analysis of IT security measures based
on business processes is a "complex task" that can overwhelm the person in charge
(e.g., the process owner or IT security expert), especially if log files are analyzed
manually [
          <xref ref-type="bibr" rid="ref53">53</xref>
          ]. Considering that the main goal of human decision-makers is to optimize
decision quality with the least possible cognitive effort, the use of software artifacts is
recommended (e.g., [
          <xref ref-type="bibr" rid="ref53 ref54 ref55">53–55</xref>
          ]).
        </p>
        <p>
          The development and evaluation of a process-based approach for the economic
evaluation of IT security measures should also be performed in close cooperation with
businesses of different sizes and types. This is important since large corporations differ
from small and medium-sized corporations, for example, in terms of available
resources, processes, security requirements, and security expertise [
          <xref ref-type="bibr" rid="ref56 ref57">56, 57</xref>
          ]. In addition,
IT security requirements and associated business processes vary across industries. For
example, information systems from electricity suppliers that rely on smart meters to
exchange information with other devices in a smart grid have specific infrastructure
requirements and different system vulnerabilities than information systems from the
healthcare sector [
          <xref ref-type="bibr" rid="ref58 ref59">58, 59</xref>
          ]. Understanding and accounting for such differences when
developing a process-based approach to the economic evaluation of IT security
measures contributes to the early identification of gaps and missing requirements and
supports broad applicability.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>Selecting the best set of IT security measures is an important strategic decision for any
organization, considering the costs associated with security incidents and the significant
impacts on the organization’s business processes. Therefore, the ability to accurately
evaluate the costs and benefits associated with IT security investments has become a
critical skill for decision-makers. Traditional (investment-based) approaches provide
only limited guidance in determining the true costs and benefits of IT security measures.
We, therefore, discuss the journey towards a process-based approach to economically
evaluating and selecting IT security measures. We argue that it is important to account
for the interdependencies between IT security measures and business processes, as
business processes form the backbone of an organization’s business model and are key cost
and performance drivers. Although a process-based approach cannot address all
shortcomings of traditional methods, it has the potential to improve the quality of strategic
IT security investment decisions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Gunduz</surname>
            ,
            <given-names>M.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Cyber-security on smart grid: Threats and potential solutions</article-title>
          .
          <source>Computer Networks</source>
          <volume>169</volume>
          ,
          <issue>107094</issue>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Information</given-names>
            <surname>Systems</surname>
          </string-name>
          Audit and
          <article-title>Control Association (ISACA): Implementing the NIST Cybersecurity Framework</article-title>
          . ISACA,
          <string-name>
            <surname>Rolling</surname>
            <given-names>Meadows</given-names>
          </string-name>
          , IL (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brendel</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>21</volume>
          ,
          <fpage>1265</fpage>
          -
          <lpage>1284</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seyffarth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Effizienzorientiertes Risikomanagement für Business Process Compliance</article-title>
          .
          <source>HMD 54</source>
          ,
          <fpage>124</fpage>
          -
          <lpage>145</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Sonnenreich</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albanese</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stout</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Return On Security Investment (ROSI): A Practical Quantitative Model</article-title>
          .
          <source>Journal of Research and Practice in Information Technology</source>
          <volume>38</volume>
          ,
          <fpage>45</fpage>
          -
          <lpage>56</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
          </string-name>
          , G.:
          <article-title>Managing Regulatory Compliance in Business Processes</article-title>
          . In: Vom Brocke,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Rosemann</surname>
          </string-name>
          , M. (eds.)
          <article-title>Handbook on Business Process Management 2</article-title>
          .
          <string-name>
            <surname>Strategic</surname>
            <given-names>Alignment</given-names>
          </string-name>
          , Governance, People and Culture, pp.
          <fpage>265</fpage>
          -
          <lpage>288</lpage>
          . Springer Berlin Heidelberg, Berlin, Heidelberg, s.l. (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Strategic business process management</article-title>
          .
          <source>International Conference on Software and Systems Process (ICSSP)</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delfmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
          </string-name>
          , H.-A.,
          <string-name>
            <surname>Steinhorst</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eggert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Business process compliance checking - applying and evaluating a generic pattern matching approach for conceptual models in the financial sector</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>18</volume>
          ,
          <fpage>359</fpage>
          -
          <lpage>405</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cavusoglu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cavusoglu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raghunathan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Economics of IT Security Management: Four Improvements to Current Security Practices</article-title>
          .
          <source>CAIS</source>
          <volume>14</volume>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A Reference Model for Process-oriented IT Risk Management</article-title>
          .
          <source>ECIS 2008 Proceedings</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Schatz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bashroush</surname>
          </string-name>
          , R.:
          <article-title>Economic valuation for information security investment: a systematic literature review</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>19</volume>
          ,
          <fpage>1205</fpage>
          -
          <lpage>1228</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Tsiakis</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stephanides</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>The economic approach of information security</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>24</volume>
          ,
          <fpage>105</fpage>
          -
          <lpage>108</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Butler</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>Security attribute evaluation method: a cost-benefit approach</article-title>
          .
          <source>Proceedings of the 24th International Conference on Software Engineering (ICSE</source>
          <year>2002</year>
          ),
          <fpage>232</fpage>
          -
          <lpage>240</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Tallon</surname>
            ,
            <given-names>P.P.:</given-names>
          </string-name>
          <article-title>A Process-Oriented Perspective on the Alignment of Information Technology and Business Strategy</article-title>
          .
          <source>Journal of Management Information Systems</source>
          <volume>24</volume>
          ,
          <fpage>227</fpage>
          -
          <lpage>268</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ray</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barney</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muhanna</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          :
          <article-title>Capabilities, business processes, and competitive advantage: choosing the dependent variable in empirical tests of the resource-based view</article-title>
          .
          <source>Strat. Mgmt. J</source>
          .
          <volume>25</volume>
          ,
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Kuehnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zasada</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>An Approach Toward the Economic Assessment of Business Process Compliance</article-title>
          . In: Woo,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.W.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.L</surname>
          </string-name>
          . (eds.)
          <article-title>Advances in Conceptual Modeling</article-title>
          .
          <article-title>ER 2018 Workshops Emp-ER, MoBiD</article-title>
          , MREBA, QMMQ,
          <string-name>
            <surname>SCME</surname>
          </string-name>
          ,
          <source>Xi'an, China, October 22-25</source>
          ,
          <year>2018</year>
          , Proceedings, pp.
          <fpage>228</fpage>
          -
          <lpage>238</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Return on security investment - proving it's worth it</article-title>
          .
          <source>Network Security</source>
          <year>2005</year>
          ,
          <fpage>8</fpage>
          -
          <lpage>10</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Pulliam</surname>
            <given-names>Phillips</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Phillips</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.J.:</surname>
          </string-name>
          <article-title>ROI fundamentals. Why and when to measure ROI</article-title>
          . Pfeiffer, San Francisco (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>MILLER</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          , PARK, C.S.:
          <article-title>Decision Making Under Uncertainty-Real Options to the Rescue?</article-title>
          <source>The Engineering Economist</source>
          <volume>47</volume>
          ,
          <fpage>105</fpage>
          -
          <lpage>150</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Strotz</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          :
          <article-title>Myopia and Inconsistency in Dynamic Utility Maximization</article-title>
          .
          <source>The Review of Economic Studies</source>
          <volume>23</volume>
          ,
          <issue>165</issue>
          (
          <year>1955</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Soo</given-names>
            <surname>Hoo</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.J.</surname>
          </string-name>
          :
          <article-title>How Much is Enough? A Risk Management Approach to Computer Security</article-title>
          . Working Paper. Stanford University (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <article-title>National Bureau of Standards: Guideline for Automatic Data Processing Risk Analysis</article-title>
          .
          <source>Federal Information Processing Standards Publication (FIPS PUB) Nr</source>
          .
          <fpage>65</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <source>Return on Controls Invest. HMD 50</source>
          ,
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Effizienz Compliance-konformer Kontrollprozesse in internen Kontrollsystemen (IKS)</article-title>
          .
          <source>HMD 51</source>
          ,
          <fpage>252</fpage>
          -
          <lpage>266</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Rumpel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glanze</surname>
          </string-name>
          , R.:
          <article-title>Verfahren zur Wirtschaftlichkeitsanalyse von IT-Sicherheitsinvestitionen</article-title>
          .
          <source>Practical Business Research</source>
          <volume>2</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Betriebswirtschaftliche Bewertung von Security Investments in der Praxis</article-title>
          .
          <source>Datenschutz und Datensicherheit (DuD) 35</source>
          ,
          <fpage>50</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frinke</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carter</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ritter</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Cost-Benefit Analysis for Network Intrusion Detection Systems</article-title>
          .
          <source>Proceedings of the CSI 28th Annual Computer Security Conference</source>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. Dirk Schadt:
          <article-title>Über die Ökonomie der IT-Sicherheit - Betrachtungen zum Thema "Return on Security Investment</article-title>
          .
          <source>HMD Prax. Wirtsch</source>
          .
          <volume>248</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Matousek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schlienger</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teufel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Metriken und Konzepte zur Messung der Informationssicherheit</article-title>
          .
          <source>HMD</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Pohlmann</surname>
          </string-name>
          , N.:
          <article-title>Wie wirtschaftlich sind IT-Sicherheitsmaßnahmen</article-title>
          .
          <source>HMD</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Mizzi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Return on information security investment-the viability of an antispam solution in a wireless environment</article-title>
          .
          <source>International Journal of Network Security</source>
          <volume>10</volume>
          ,
          <fpage>18</fpage>
          -
          <lpage>24</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syring</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Adapted Loss Database-A New Approach to Assess IT Risk in Automated Business Processes</article-title>
          .
          <source>AMCIS 2010 Proceedings</source>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Llanso</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>CIAM: A data-driven approach for selecting and prioritizing security controls</article-title>
          .
          <source>In: 2012 IEEE International Systems Conference SysCon</source>
          <year>2012</year>
          . IEEE (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Chatterjee</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elbanna</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A possible conceptualization of the information systems ( IS ) artifact: A general systems theory perspective 1</article-title>
          .
          <source>Inf Syst J</source>
          <volume>31</volume>
          ,
          <fpage>550</fpage>
          -
          <lpage>578</lpage>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Axelsson</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The base-rate fallacy and the difficulty of intrusion detection</article-title>
          .
          <source>ACM Trans. Inf. Syst. Secur</source>
          .
          <volume>3</volume>
          ,
          <fpage>186</fpage>
          -
          <lpage>205</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Cavusoglu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raghunathan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cavusoglu</surname>
          </string-name>
          , H.:
          <source>Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. Information Systems Research</source>
          <volume>20</volume>
          ,
          <fpage>198</fpage>
          -
          <lpage>217</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Davenport</surname>
            ,
            <given-names>T.H.: Process</given-names>
          </string-name>
          <string-name>
            <surname>Innovation</surname>
          </string-name>
          .
          <source>Reengineering Work Through Information Technology. Harvard Business</source>
          Press (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Magnani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montesi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Computing the Cost of BPMN Diagrams</article-title>
          .
          <source>Technical Report UBLCS-07-17</source>
          . Bologna (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Magnani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montesi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : BPMN.
          <article-title>How Much Does It Cost? An Incremental Approach</article-title>
          . In: Alonso,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Dadam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Rosemann</surname>
          </string-name>
          , M. (eds.)
          <article-title>Business process management</article-title>
          .
          <source>5th international conference, BPM</source>
          <year>2007</year>
          , Brisbane, Australia,
          <source>September 24 - 28</source>
          ,
          <year>2007</year>
          ; proceedings, 4714, pp.
          <fpage>80</fpage>
          -
          <lpage>87</lpage>
          . Springer, Berlin (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Dijkstra</surname>
            ,
            <given-names>E.W.:</given-names>
          </string-name>
          <article-title>A Note on Two Problems in Connexion with Graphs</article-title>
          .
          <source>Numerische Mathematik</source>
          <volume>1</volume>
          ,
          <fpage>169</fpage>
          -
          <lpage>271</lpage>
          (
          <year>1959</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Sampathkumaran</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wirsing</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Computing the Cost of Business Processes</article-title>
          . In: Aalst,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Ginige</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kutsche</surname>
          </string-name>
          , R.-D.,
          <string-name>
            <surname>Mayr</surname>
            ,
            <given-names>H.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadeh</surname>
            ,
            <given-names>N.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shaw</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szyperski</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          . (eds.) Information Systems: Modeling, Development, and
          <string-name>
            <surname>Integration</surname>
          </string-name>
          .
          <source>Third International United Information Systems Conference, UNISCON</source>
          <year>2009</year>
          , Sydney, Australia,
          <source>April 21-24</source>
          ,
          <year>2009</year>
          . Proceedings,
          <volume>20</volume>
          , pp.
          <fpage>178</fpage>
          -
          <lpage>183</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Sampathkumaran</surname>
            ,
            <given-names>P.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wirsing</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Financial Evaluation and Optimization of Business Processes</article-title>
          .
          <source>IJISMD 4</source>
          ,
          <fpage>91</fpage>
          -
          <lpage>120</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Münstermann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eckhardt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weitzel</surname>
            ,
            <given-names>T.:</given-names>
          </string-name>
          <article-title>The performance impact of business process standardization</article-title>
          .
          <source>Business Process Management Journal</source>
          <volume>16</volume>
          ,
          <fpage>29</fpage>
          -
          <lpage>56</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Wuellenweber</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koenig</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beimborn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weitzel</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The Impact of Process Standardization on Business Process Outsourcing Success</article-title>
          .
          <source>In: Information Systems Outsourcing</source>
          , pp.
          <fpage>527</fpage>
          -
          <lpage>548</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Stöwer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kraft</surname>
          </string-name>
          , R.: IT Security Investment and
          <article-title>Costing Emphasizing Benefits in Times of Limited Budgets</article-title>
          .
          <source>In: ISSE 2012 Securing Electronic Business Processes</source>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>47</lpage>
          . Springer Vieweg, Wiesbaden (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>REIJERS</surname>
          </string-name>
          , H., LIMANMANSAR, S.:
          <article-title>Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics</article-title>
          .
          <source>Omega</source>
          <volume>33</volume>
          ,
          <fpage>283</fpage>
          -
          <lpage>306</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <given-names>Vom</given-names>
            <surname>Brocke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Sonnenberg</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>Value-Orientation in Business Process Management</article-title>
          .
          <source>In: Handbook on Business Process Management 2</source>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>132</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Nurcan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Etien</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaabi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zoukar</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rolland</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A strategy driven business process modelling approach</article-title>
          .
          <source>Business Process Management Journal</source>
          <volume>11</volume>
          ,
          <fpage>628</fpage>
          -
          <lpage>649</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Chinosi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trombetta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>BPMN: An introduction to the standard</article-title>
          .
          <source>Computer Standards &amp; Interfaces</source>
          <volume>34</volume>
          ,
          <fpage>124</fpage>
          -
          <lpage>134</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Seyffarth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>ConFlex - An Ontology-Based Approach for the Flexible Integration of Controls into Business Processes</article-title>
          .
          <source>Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI´16)</source>
          ,
          <fpage>1341</fpage>
          -
          <lpage>1352</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Sampemane</surname>
          </string-name>
          , G.:
          <article-title>Internal access controls</article-title>
          .
          <source>Commun. ACM</source>
          <volume>58</volume>
          ,
          <fpage>62</fpage>
          -
          <lpage>65</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Namiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Modeling Control Objectives for Business Process Compliance</article-title>
          .
          <source>Proceedings of the 5th International Conference on Business Process Management (BPM'07)</source>
          ,
          <fpage>149</fpage>
          -
          <lpage>164</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lindner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Conceptualization, Design, and
          <article-title>Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance</article-title>
          . In: Laender,
          <string-name>
            <given-names>A.H.F.</given-names>
            ,
            <surname>Pernici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Lim</surname>
          </string-name>
          , E.-P. (eds.) Conceptual Modeling. 38th International Conference, ER 2019, Salvador, Brazil, November 4-
          <issue>7</issue>
          ,
          <year>2019</year>
          , Proceedings, pp.
          <fpage>378</fpage>
          -
          <lpage>386</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Bhamidipaty</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Narendra</surname>
            ,
            <given-names>N.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varshneya</surname>
            ,
            <given-names>V.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deshwal</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Indra: An integrated quantitative system for compliance management for IT service delivery</article-title>
          .
          <source>IBM Journal of Research</source>
          and
          <string-name>
            <surname>Development (IBM J. Res</surname>
          </string-name>
          . &amp;
          <string-name>
            <surname>Dev</surname>
          </string-name>
          .)
          <volume>53</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Doganata</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Curbera</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A method of calculating the cost of reducing the risk exposure of non-compliant process instances</article-title>
          . In: Jajodia,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Kudo</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the first ACM workshop on Information security governance</source>
          , p.
          <fpage>7</fpage>
          . ACM, New York, NY (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Abbas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahmood</surname>
            ,
            <given-names>H.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hussain</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Information security management for small and medium size enterprises</article-title>
          .
          <source>Sci. Int</source>
          . (Lahore)
          <volume>27</volume>
          ,
          <fpage>2393</fpage>
          -
          <lpage>2398</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>Alshboul</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Streff</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Analyzing Information Security Model for Small-Medium Sized Businesses</article-title>
          .
          <source>AMCIS 2015 Proceedings</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Díaz</surname>
            <given-names>Redondo</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.P.</given-names>
            ,
            <surname>Fernández-Vilas</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          , Fernández dos Reis, G.:
          <article-title>Security Aspects in Smart Meters: Analysis and Prevention</article-title>
          .
          <source>Sensors</source>
          <volume>20</volume>
          ,
          <issue>3977</issue>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lambright</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdelwahed</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <source>Towards Autonomic Security Management of Healthcare Information Systems</source>
          .
          <source>2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)</source>
          ,
          <fpage>113</fpage>
          -
          <lpage>118</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>