<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Towards a Business Process-Based Economic Evaluation and Selection of IT Security Measures</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Stephan</forename><surname>Kühnel</surname></persName>
							<email>stephan.kuehnel@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefan</forename><surname>Sackmann</surname></persName>
							<email>stefan.sackmann@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Simon</forename><surname>Trang</surname></persName>
							<email>simon.trang@wiwi.uni-goettin-gen.de</email>
							<affiliation key="aff1">
								<orgName type="institution">Universität Goettingen</orgName>
								<address>
									<postCode>37073</postCode>
									<settlement>Goettingen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ilja</forename><surname>Nastjuk</surname></persName>
							<email>ilja.nastjuk@wiwi.uni-goettin-gen.de</email>
							<affiliation key="aff1">
								<orgName type="institution">Universität Goettingen</orgName>
								<address>
									<postCode>37073</postCode>
									<settlement>Goettingen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tizian</forename><surname>Matschak</surname></persName>
							<email>tizian.matschak@wiwi.uni-goettin-gen.de</email>
							<affiliation key="aff1">
								<orgName type="institution">Universität Goettingen</orgName>
								<address>
									<postCode>37073</postCode>
									<settlement>Goettingen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Laura</forename><surname>Niedzela</surname></persName>
							<email>laura-maria.niedzela@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Leonard</forename><surname>Nake</surname></persName>
							<email>leonard.nake@wiwi.uni-halle.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Martin Luther University Halle-Wittenberg</orgName>
								<address>
									<postCode>06108</postCode>
									<settlement>Halle (Saale)</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Towards a Business Process-Based Economic Evaluation and Selection of IT Security Measures</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DB2FE3726C910B38B56D16DD7D2CF7B0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Technological innovations, such as cloud computing, intelligent process automation, and big data analytics offer substantial opportunities for maintaining and strengthening a company's competitive position. However, the introduction of such technologies entails new compliance and security risks. One of the most challenging risks that companies face is to protect technologies and other organizational assets from incidents or attacks that aim to access sensitive information (confidentiality attacks), change the code or data in information systems (integrity attacks), as well as disrupt the normal operation of information systems (availability attacks) <ref type="bibr" target="#b0">[1]</ref>.</p><p>To mitigate such risks, both legislators and companies define far-reaching and overarching requirements for information, data, and information technology (IT) security.</p><p>Examples can be found in a company's information security governance requirements (e.g., general policies on authentication or guidelines on data classification and handling), in sector-specific guidelines (e.g., the second Payment Services Directive of the European Union (EU) for banks), or in cross-sectoral regulations (e.g., the EU General Data Protection Regulation (GDPR) or the German IT Security Act). It is essential for companies to comply with such requirements, i.e., to implement the requirements through adequate IT security measures.</p><p>IT security measures are mechanisms that support organizations to identify and alert about security incidents, to protect critical infrastructure services with the aim to preserve the confidentiality, integrity, and availability of information, to respond to security incidents (e.g., reduce the number of successful attacks), and to recover system integrity after a security incident <ref type="bibr" target="#b1">[2]</ref>. IT security measures include both technical measures, such as firewalls, intrusion detection systems, or authentication mechanisms, as well as human-centric measures, such as information classification policies, cleandesk regulations, and password policies <ref type="bibr" target="#b2">[3]</ref>. In most cases, the implementation of extensive IT security requirements cannot be realized through isolated IT security measures but requires a complex bundle of interdependent measures. On the one hand, such measures entail high investment costs and, on the other hand, can significantly influence companies' business processes. For example, Article 32 (1) of the GDPR requires that appropriate technical and organizational measures should be implemented to ensure compliance with the protection goals of confidentiality, integrity, availability, and resilience when processing personal data. To implement this requirement, both technical precautions (e.g., encryption and pseudonymization of personal data) and procedural configurations (e.g., activities and controls to ensure compliance in business processes) are necessary. Such technical precautions and procedural configurations can lead to high expenses <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. It is therefore not surprising that compliance with IT security requirements is already described in existing literature as a cost-intensive task <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref> and even as a "heavy cost driver" <ref type="bibr" target="#b7">[8]</ref>. Consequently, "the focus of IT security management is shifting from what is technically possible to what is economically efficient" ([9], p. 66). To ensure that a company's profitability is not affected by implementing bundles of IT security measures, it becomes necessary to identify suitable alternative courses of action to meet IT security requirements and select the best alternatives based on economic criteria <ref type="bibr" target="#b9">[10]</ref>. Accordingly, the evaluation and selection of IT security measures have become critical skills for information security managers. Traditional investment-based approaches and theories, such as the return on investment (ROI), the real options theory (ROT), or the utility maximization theory (UMT), form the backbone of most contemporary methods to economically evaluate IT security investment decisions <ref type="bibr" target="#b10">[11]</ref>. In the context of IT security, widely accepted methods to evaluate the return on investment include the return on security investment (ROSI) and the return on information security investment (ROISI) <ref type="bibr" target="#b11">[12]</ref>. Such methods consider directly attributable monetary costs and benefits, which become important determinants of investment decisions. Decision makers benefit from utilizing investment-based evaluation methods because they enforce to think about explicit assumptions and decision rationales. In addition, they help to understand whether security investments are consistent with the organizational risk strategies <ref type="bibr" target="#b12">[13]</ref>. However, investment-based approaches offer only limited guidance for the decision to implement IT security measures because of the lack of available data to generate accurate results, the high dependency of these approaches on subjective assumptions, and the negligence to account for the interdependency between multiple IT security measures <ref type="bibr" target="#b10">[11]</ref>. In addition, investment-based methods usually do not account for nonmonetary and indirect effects, such as the impact of IT security measures on business process performance or outcome. This is an important topic of interest for two reasons. First, IT investments in general impact the efficiency of business processes <ref type="bibr" target="#b13">[14]</ref>, and second, business processes have a substantial impact on the competitive position and financial performance of any organization <ref type="bibr" target="#b14">[15]</ref>. Since business processes are at the center of a company's success, they offer a solid foundation for cost-benefit analysis <ref type="bibr" target="#b15">[16]</ref>. However, to the best of our knowledge, there is a lack of approaches in the literature supporting a comprehensive economic evaluation of IT security measures (and bundles of measures) with particular regard to their interaction with business processes. Based on existing knowledge about contemporary business process management and compliance, we propose several requirements for the development of business process-driven approaches to the evaluation and selection of IT security measures for guiding future research. In particular, the paper discusses the requirements needed on the journey towards a process-based approach for the economic evaluation and selection of IT security measures. Such an approach enables effective selection and implementation of IT security measures, stimulates business process improvement, and further offers the opportunity to overcome the limitations of existing investment-based methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Important Investment-based Approaches for the Economic Evaluation of IT Security Measures</head><p>As mentioned above, investment theories form the backbone of most existing methods for the economic evaluation of IT security measures <ref type="bibr" target="#b10">[11]</ref>. In this context, direct costs for the introduction and operation of (mostly isolated) IT security measures (e.g., costs for software, hardware, or personnel) are interpreted as an investment from which an expected direct return on capital (monetary benefit) results <ref type="bibr" target="#b16">[17]</ref>. The existing literature on the evaluation of IT security measures is dominated by the following three approaches <ref type="bibr" target="#b10">[11]</ref>:</p><p>1. Approaches based on the ROI (see, e.g., <ref type="bibr" target="#b17">[18]</ref>), which value the return on investment generated by an isolated IT security measure relative to the capital invested. 2. Approaches based on the ROT (see, e.g., <ref type="bibr" target="#b18">[19]</ref>), which are based on option pricing models for the valuation of IT security investments taking into account time-dependent variability. 3. Approaches based on the UMT (see, e.g., <ref type="bibr" target="#b19">[20]</ref>), which aim to maximize the benefit of an IT security investment for a given subject.</p><p>All three approaches share the assumption that the capital reflow is represented by the expected proportion of monetary damage from a potential IT security incident that can be prevented by the use of an IT security measure, such as prevented operational downtime or avoided recovery costs of an attack <ref type="bibr" target="#b20">[21]</ref>. Based on these approaches, different methods have been discussed in the literature to economically evaluate IT security measures (for a detailed survey, see <ref type="bibr" target="#b10">[11]</ref>). In the following, we would like to present an important selection of these.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Annual Loss Exposure</head><p>In 1979, the National Bureau of Standards of the U.S. Department of Commerce introduced the Annual Loss Exposure (ALE) as a first method to assess IT security risks. ALE can be used to estimate the monetary annual loss exposure of a company based on the damage that results from security incidents (impact) and the likelihood of such an incident occurring (frequency of occurring) <ref type="bibr" target="#b21">[22]</ref>. For single security incidents, the ALE is simply computed by multiplying the estimated impact (e.g., expressed as a monetary value) by the expected occurrence frequency. If there are several security incidents, the ALE totals the product of the two variables for each security incident (summation) <ref type="bibr" target="#b22">[23]</ref>.</p><p>As a single metric, ALE is not sufficient to accurately perform an economic evaluation of IT security measures, but usually represents an input variable for more complex evaluation procedures (see, e.g., <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Return on Security Investment</head><p>The ROSI is based on the traditional ROI calculation and compares the benefits of IT security measures with their costs <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27]</ref>. It considers the probability of occurrence of an IT security incident, loss prevention due to an IT security measure, the cost of security incidents, and the costs of IT security measures. While the costs of an IT security measure correspond to the investment costs, benefits are determined by reducing the probability of occurrence of security incidents and reducing the amount of loss due to the implementation of the IT security measure. Sonnenreich et al. <ref type="bibr" target="#b4">[5]</ref> suggest that the ALE can be used to calculate ROSI. Thereby the ALE is multiplied by an effectiveness parameter, which provides information on the effectiveness of IT security measures (expressed as a percentage). The result represents the portion of the monetary annual expected loss value that can be saved by implementing IT security measures. Then, the total costs resulting from the implementation of IT security measures are subtracted to determine the net financial "return." Finally, the net financial return is divided by the total costs to produce a relative ROSI value. Per classical ROI interpretation, an investment in IT security measures is economically advantageous if it holds that ROSI &gt; 0.</p><p>If the ROSI &lt; 0, IT security investments are financially not viable and, thus, should be avoided for economic reasons. For ROSI=0, the monetary advantages and disadvantages are balanced. Further alternatives to calculate the ROSI are based on a direct comparison of costs incurred due to a security incident and total costs for implementing and operating IT security measures (see, e.g., <ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref><ref type="bibr" target="#b29">[30]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Return on Information Security Investment</head><p>Another model for evaluating IT security measures is Mizzi's Return on Information Security Investment (ROISI) <ref type="bibr" target="#b30">[31]</ref>. In alignment with ROSI, ROISI considers the security expenditures based on one-time costs to implement a defense mechanism, maintenance costs, and costs to fix system vulnerabilities. The potential total loss resulting from security incidents is conceptualized based on missed revenue and information lost due to system downtimes and the financial costs of rebuilding the system (e.g., labor costs for system recovery). The main difference to the ROSI method is that Mizzi's approach includes a cost-benefit consideration of the malicious entity. To determine ROISI, Mizzi defines the cost of an attack as the cost of penetrating the security mechanism and exploiting vulnerabilities. A rational attacker only carries out an attack (in the sense of ROSI this means influencing the probability of occurrence) if the benefit accruing to the attacker is greater than his costs. The rationale behind this assumption is that a rational attacker is usually unwilling to pay more for an attack than the immediate loss suffered by the attacked entity (e.g., the value of the stolen information).</p><p>Mizzi suggests that IT security measures should be designed to maximize attackers' costs and minimize the information potentially accessible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Adapted Loss Database</head><p>Sackmann and Syring <ref type="bibr" target="#b31">[32]</ref> base the evaluation of IT security measures or security adaptations of technical infrastructures on the protection goals of business processes. In this context, changes are modeled in a binary way from the perspective of an IT risk reference model and based on a cause-and-effect concept that maps the chain from threats to attacks and vulnerabilities to business processes. For the evaluation of both isolated security measures and bundles of measures, the original data (e.g., historical damages) are adapted to a more realistic cause-and-effect model and, thus, recalculated.</p><p>In principle, the adaptation of the data basis could be used with any method (e.g., ROSI) for an evaluation of the measures under consideration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5">Cyber Investment Analysis Methodology</head><p>The Cyber Investment Analysis Methodology (CIAM) is a four-step data-driven approach to evaluate and select IT security measures <ref type="bibr" target="#b32">[33]</ref>. First of all, it is necessary to collect and/or select data on the assets to be protected, including data on security incidents, appropriate IT security measures, the impact of exploited vulnerabilities on the business, and costs to implement IT security measures. The second step involves estimating weightings by domain experts to understand how each IT security measure contributes to the goals of prevention, detection, and recovery. The third step includes performing an effectiveness scoring in which each IT security measure is matched against each attack step. Finally, an algorithm uses the data to compute a relative priority ranking for each IT security measure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.6">Security Attribute Evaluation Method</head><p>Butler <ref type="bibr" target="#b12">[13]</ref> proposes the Security Attribute Evaluation Method (SEAM) as an economic approach for assessing security investments. SAEM also proposes four steps to perform the cost-benefit analysis of security measures. First, it starts with an assessment of the benefits of an IT security measure. The second step includes evaluating the effectiveness of the IT security measure in mitigating security risks. Third, a threat coverage assessment is performed. The final step involves an assessment of the costs of the IT security measure. Butler suggests that the data needed for the evaluation is sourced from structured interviews with IT and security experts. To successfully conduct a SEAM analysis, the company must have effective IT security policies and procedures in place, have security mechanisms properly integrated into the existing IT infrastructure, and be able to accurately predict attacks and their associated consequences.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Limitations of Existing Evaluation Methods for IT Security Measures</head><p>While the methods presented in the previous chapter are valuable to evaluate and select appropriate IT security measures economically, they offer several limitations. One limitation is related to the lack of multidimensionality. Besides having an impact on monetary returns, IT security measures have non-monetary effects. For example, they can impact employee behavior, the organization's reputation, as well as process complexity or flexibility <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. Investment theory-based evaluation methods usually do not account for such effects <ref type="bibr" target="#b10">[11]</ref>. Accordingly, the scope and coverage of existing approaches need to be extended to also include the impact of IT security measures on nonfinancial dimensions.</p><p>Another limitation is related to the lack of valid data for calculation. It is one of the biggest challenges for organizations to obtain accurate data on the true costs of a security incident. Most methods are data-driven, although necessary input data or accurate estimators are often unavailable <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b16">17]</ref>. Decision makers frequently underestimate the costs of security incidents by looking only at the short-term tangible costs (e.g., lost revenue), but there are also long-term intangible costs (e.g., loss of trust) that are difficult to measure and therefore often neglected <ref type="bibr" target="#b8">[9]</ref>. Another reason for the lack of valid data is that most companies do not proactively and accurately capture cost information, as emphasized by Sonnenreich et al. ( <ref type="bibr" target="#b4">[5]</ref>, p.47): "Security breaches that have no immediate impact on day-to-day business often go completely unnoticed. When a breach does get noticed, the organization is usually too busy fixing the problem to worry about how much the incident actually costs. After the disaster, internal embarrassment and/or concerns about public image often result in the whole incident getting swept under the rug. As a result of this "ostrich response" to security incidents, the volume of data behind existing actuarial tables is woefully inadequate." Another limitation is related to the lack of comparability. It is often difficult to compare IT security measures, which are characterized by different goals and scopes based on a monetary assessment of costs and benefits alone. In this context, Butler <ref type="bibr" target="#b12">[13]</ref> emphasizes that it is more difficult to compare benefits among different IT security measures than comparing costs. Existing and proven financial analysis tools allow costs to be estimated quite accurately, but benefits are more difficult to quantify since they are usually characterized by greater uncertainty, time lag, and indirect effects. In addition, decision-makers are often confronted with imperfect knowledge about the explicit benefits of IT security measures. Therefore, estimating costs and benefits often depends on the IT security experts' intuition, practical expertise, knowledge, and experience.</p><p>Research has also criticized the lack of scalability of existing evaluation methods (see, e.g., <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b10">11]</ref>). Investment-based methods are sensitive to different business sizes. Although large corporations as well as small and medium-sized enterprises (SMEs) are equally affected by IT security requirements, SMEs often have fewer financial and personnel resources. For instance, Sonnenreich et al. <ref type="bibr" target="#b4">[5]</ref> emphasize that the cost-benefit ratio of security investments is increasingly skewed as the number of employees decreases, which is the case for most SMEs compared to large corporations. They exemplify how an initially financially viable investment in an anti-spam solution would not have been viable if the same organization were smaller, i.e. had fewer employees. Finally, the presented methods are usually aimed at the evaluation of isolated IT security measures, but they do not account for the effects that IT security measures have on other measures when implemented as a bundle. Understanding synergies between IT security measures is important to achieve desired business outcomes <ref type="bibr" target="#b33">[34]</ref>. In this context, <ref type="bibr">Axelsson ([35]</ref>, p. 189) emphasizes: "The best effect is often achieved when several security measures are brought to bear together. How should intrusion detection collaborate with other security mechanisms to achieve this synergy effect? How do we ensure that the combination of security measures provides at least the same level of security as each applied singly would provide, or that the combination does not in fact lower the overall security of the protected system?" No single IT security measure can ensure security by itself, and therefore, they need to be implemented in bundles and configured to achieve optimal outcomes <ref type="bibr" target="#b35">[36]</ref>. In this regard, Cavusoglu et al. <ref type="bibr" target="#b8">[9]</ref> criticize investment-based approaches as they do not consider the potential positive and negative interactions of different IT security measures. More concretely, they criticize</p><p>the assumption that implementing one security measure will reduce the number of attacks by a certain percentage and will result in a certain benefit value, as this neglects substitution and complementary effects with other existing IT security measures. The next chapter discusses how business process management concepts can contribute to overcoming some of the limitations outlined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">A Journey Towards a Process-Based Approach to Selecting and Evaluating IT Security Measures</head><p>Using contemporary business process management concepts offers a promising approach to address some of the key limitations outlined in the previous chapter. At the core of business process management are business processes, which are defined as a structured sequence of activities designed to achieve a specific output <ref type="bibr" target="#b36">[37]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Two Interesting Approaches as Examples of How Business Process</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Management Can Already Be Used to Evaluate</head><p>Magnani and Montesi <ref type="bibr" target="#b37">[38,</ref><ref type="bibr" target="#b38">39]</ref> proposed an approach for the cost evaluation of business processes. The authors suggest extending relevant process elements in a business process model with cost annotations. Costs are represented as textual information at the respective process elements. Such an approach reaches its limits if business processes are nested, i.e., if they contain one or more subprocesses and the calculation of costs depends on their sequence flows. This is the case, for example, if a subprocess contains connectors of the XOR type. The authors propose two alternatives for this limitation.</p><p>The first involves annotating cost intervals instead of individual cost values to all flow objects (including subprocesses). Processes with fully annotated cost intervals are suitable for the application of graph-based algorithms to determine the minimum and maximum costs. For example, Dijkstra's algorithm <ref type="bibr" target="#b39">[40]</ref> can be applied to identify a minimum cost path between start and end events in a business process. However, it is challenging to use cost intervals when loops are included in subprocesses since the upper interval tends towards infinity in this case. The second alternative addresses this problem by calculating and annotating average costs, provided that data from a sufficiently large sample of process instances are available. However, the accuracy of the calculation of average costs depends on the availability and correctness of data. The authors demonstrate the applicability of both alternatives using the example of hotel reservations.</p><p>Sampathkumaran and Wirsing <ref type="bibr" target="#b40">[41,</ref><ref type="bibr" target="#b41">42]</ref> present a similar approach focused on determining the expected costs of successfully executing a process, which they refer to as "business costs." In contrast to Magnani and Montesi <ref type="bibr" target="#b37">[38,</ref><ref type="bibr" target="#b38">39]</ref>, this approach does not only focus on the determination of costs but also the degree of achievement of a defined business objective. To include this degree in the calculation, the authors extended the approach of Magnani and Montesi with the concept of "reliability" in calculating process costs. Reliability represents the probability of successful execution of a task that an organization performs to achieve a specific (business) objective. Consequently, the business costs of a process depend not only on the costs of the process itself (e.g., the amount of money needed to execute a process) but also on the process reliability (e.g., factors leading to successful process completion and the achievement of business objectives). Sampathkumaran and Wirsing additionally suggest performing sensitivity analyses to identify parameters that have the most critical impact on the business costs and to optimize the process model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Requirements for a Process-Based Approach to the Economic Evaluation and Selection of IT Security Measures</head><p>The aforementioned approaches can also be applied to IT security measures implemented in business processes if specific conditions are met (e.g., modeling IT security measures as modular and thus interchangeable subprocesses). Thus, they can provide valuable information for determining the additional costs of IT security measures. However, they do not accurately capture the interdependence between IT security and business performance, i.e., how IT security measures impact the performance of business processes. This is important to understand in order to improve the decision-making process for IT security measures. We argue that a process-based approach for the economic evaluation and selection of IT security measures offers tremendous opportunities to complement existing approaches and overcome their limitations. Still, for the successful implementation of a process-based evaluation approach in the context of IT security, several requirements have to be taken into account.</p><p>The development of a process-based approach requires, as a first step, the identification of factors that characterize a business process and allow for its performance determination. For example, complexity is a common characteristic of a business process that significantly impacts associated quality and cost <ref type="bibr" target="#b42">[43,</ref><ref type="bibr" target="#b43">44]</ref>. The implementation of IT security measures can lead to either a reduction or an increase in the complexity of a business process and thus influence the cost-effectiveness of achieving business goals. For example, Stoewer and Kraft <ref type="bibr" target="#b44">[45]</ref> show that new security solutions can lead to improved process efficiency if the IT security measure to be implemented triggers a redesign of the underlying process. Therefore, we argue that a prerequisite for a processbased approach to assessing IT security measures is to capture relevant factors that characterize business processes and impact their performance. However, it is important to consider that business processes have different and possibly competing priorities in terms of factors such as time, cost, flexibility, or quality <ref type="bibr" target="#b45">[46]</ref>. In this regard, vom Brocke and Sonnenberg <ref type="bibr" target="#b46">[47]</ref> emphasize the importance of considering trade-offs be-tween factors when determining the economic value of business processes: "[…] a process that produces quality products might have long cycle times and relatively high costs, whereas a process with low cycle times might have moderate costs and a low quality level" (p. 114). A goal-oriented approach is desirable to appropriately manage competing priorities in business processes. Goal orientation accounts for the strategic objectives of an organization and how these objectives are achieved through business process design <ref type="bibr" target="#b47">[48]</ref>. Consequently, a process-driven approach requires a definition and evaluation of the specific business process goals.</p><p>Once relevant influencing factors are identified, the next step is to investigate which business processes are affected by IT security measures. Standards such as the Business Process Modeling and Notation (BPMN) allow for the graphical modeling and specification of business process models <ref type="bibr" target="#b48">[49]</ref>. Business process models provide specific insights into how organizations work and we argue that they offer the opportunity to integrate IT security measures into their process landscape, as shown by Seyffarth et al. <ref type="bibr" target="#b49">[50]</ref>. One example is the implementation of so-called access controls to monitor and control access to organizational systems for ensuring the integrity and confidentiality of data <ref type="bibr" target="#b50">[51]</ref>. Access controls can be mapped in business process models by specific modeling objects such as tasks, events, gateways, and annotations. In a purchase-topay scenario, Sadiq et al. <ref type="bibr" target="#b51">[52]</ref> demonstrate that compliance controls can be integrated into an organizational process model through specific process annotations (so-called control tags). The next step involves quantitatively evaluating the extent to which a process model is influenced by the integration of IT security measures. Kuehnel et al. <ref type="bibr" target="#b52">[53]</ref> use so-called process log files as the data basis for their calculations in the context of compliance measures. They propose various design requirements and principles for an IT tool that is supposed to enable an economic evaluation of business process compliance. For example, the IT tool should be able to automatically reconstruct the paths of a business process from a given log file and support a modular process view to visualize compliance activities. We argue that log files can be used to capture the performance of a business process and any changes caused by the implementation of IT security measures. It should be noted that the economic analysis of IT security measures based on business processes is a "complex task" that can overwhelm the person in charge (e.g., the process owner or IT security expert), especially if log files are analyzed manually <ref type="bibr" target="#b52">[53]</ref>. Considering that the main goal of human decision-makers is to optimize decision quality with the least possible cognitive effort, the use of software artifacts is recommended (e.g., <ref type="bibr" target="#b52">[53]</ref><ref type="bibr" target="#b53">[54]</ref><ref type="bibr" target="#b54">[55]</ref>). The development and evaluation of a process-based approach for the economic evaluation of IT security measures should also be performed in close cooperation with businesses of different sizes and types. This is important since large corporations differ from small and medium-sized corporations, for example, in terms of available resources, processes, security requirements, and security expertise <ref type="bibr" target="#b55">[56,</ref><ref type="bibr" target="#b56">57]</ref>. In addition, IT security requirements and associated business processes vary across industries. For example, information systems from electricity suppliers that rely on smart meters to exchange information with other devices in a smart grid have specific infrastructure requirements and different system vulnerabilities than information systems from the healthcare sector <ref type="bibr" target="#b57">[58,</ref><ref type="bibr" target="#b58">59]</ref>. Understanding and accounting for such differences when developing a process-based approach to the economic evaluation of IT security measures contributes to the early identification of gaps and missing requirements and supports broad applicability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>Selecting the best set of IT security measures is an important strategic decision for any organization, considering the costs associated with security incidents and the significant impacts on the organization's business processes. Therefore, the ability to accurately evaluate the costs and benefits associated with IT security investments has become a critical skill for decision-makers. Traditional (investment-based) approaches provide only limited guidance in determining the costs and benefits of IT security measures. We, therefore, discuss the journey towards a process-based approach to economically evaluating and selecting IT security measures. We argue that it is important to account for the interdependencies between IT security measures and business processes, as business processes form the backbone of an organization's business model and are key cost and performance drivers. Although a process-based approach cannot address all shortcomings of traditional methods, it has the potential to improve the quality of strategic IT security investment decisions.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber-security on smart grid: Threats and potential solutions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Z</forename><surname>Gunduz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Das</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Networks</title>
		<imprint>
			<biblScope unit="volume">169</biblScope>
			<biblScope unit="page">107094</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Information Systems Audit and Control Association (ISACA): Implementing the NIST Cybersecurity Framework</title>
				<meeting><address><addrLine>Rolling Meadows, IL</addrLine></address></meeting>
		<imprint>
			<publisher>ISACA</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research</title>
		<author>
			<persName><forename type="first">S</forename><surname>Trang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Brendel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Frontiers</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="1265" to="1284" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Effizienzorientiertes Risikomanagement für Business Process Compliance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HMD</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="124" to="145" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Return On Security Investment (ROSI): A Practical Quantitative Model</title>
		<author>
			<persName><forename type="first">W</forename><surname>Sonnenreich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Albanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stout</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Research and Practice in Information Technology</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="45" to="56" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Managing Regulatory Compliance in Business Processes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook on Business Process Management 2. Strategic Alignment, Governance, People and Culture</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Vom Brocke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Rosemann</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg, s</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="265" to="288" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Strategic business process management</title>
		<author>
			<persName><forename type="first">La</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Software and Systems Process (ICSSP)</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Business process compliance checking -applying and evaluating a generic pattern matching approach for conceptual models in the financial sector</title>
		<author>
			<persName><forename type="first">J</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Delfmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-A</forename><surname>Dietrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Steinhorst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Eggert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Frontiers</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="359" to="405" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Economics of IT Security Management: Four Improvements to Current Security Practices</title>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Raghunathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CAIS</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A Reference Model for Process-oriented IT Risk Management</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ECIS 2008 Proceedings</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Economic valuation for information security investment: a systematic literature review</title>
		<author>
			<persName><forename type="first">D</forename><surname>Schatz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bashroush</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1205" to="1228" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The economic approach of information security</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tsiakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stephanides</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="105" to="108" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Security attribute evaluation method: a cost-benefit approach</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Butler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 24th International Conference on Software Engineering (ICSE 2002)</title>
				<meeting>the 24th International Conference on Software Engineering (ICSE 2002)</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="232" to="240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A Process-Oriented Perspective on the Alignment of Information Technology and Business Strategy</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">P</forename><surname>Tallon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Management Information Systems</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="227" to="268" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Capabilities, business processes, and competitive advantage: choosing the dependent variable in empirical tests of the resource-based view</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Barney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Muhanna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Strat. Mgmt. J</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="23" to="37" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">An Approach Toward the Economic Assessment of Business Process Compliance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kuehnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zasada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Conceptual Modeling. ER 2018 Workshops Emp-ER, MoBiD, MREBA</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Woo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Lu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><forename type="middle">W</forename><surname>Ling</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Lee</surname></persName>
		</editor>
		<meeting><address><addrLine>, QMMQ, SCME, Xi&apos;an, China; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">October 22-25, 2018. 2018</date>
			<biblScope unit="page" from="228" to="238" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Return on security investment -proving it&apos;s worth it</title>
		<author>
			<persName><forename type="first">A</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Network Security</title>
		<imprint>
			<biblScope unit="page" from="8" to="10" />
			<date type="published" when="2005">2005. 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Pulliam Phillips</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Phillips</surname></persName>
		</author>
		<title level="m">ROI fundamentals. Why and when to measure ROI</title>
				<meeting><address><addrLine>San Francisco</addrLine></address></meeting>
		<imprint>
			<publisher>Pfeiffer</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Decision Making Under Uncertainty-Real Options to the Rescue?</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Park</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Engineering Economist</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="105" to="150" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Myopia and Inconsistency in Dynamic Utility Maximization</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Strotz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Review of Economic Studies</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page">165</biblScope>
			<date type="published" when="1955">1955</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">How Much is Enough? A Risk Management Approach to Computer Security</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Soo Hoo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
		<respStmt>
			<orgName>Stanford University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Working Paper</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">National Bureau of Standards: Guideline for Automatic Data Processing Risk Analysis</title>
	</analytic>
	<monogr>
		<title level="m">Federal Information Processing Standards Publication</title>
				<imprint>
			<publisher>FIPS PUB</publisher>
			<biblScope unit="volume">65</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Return on Controls Invest</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hofmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HMD</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="31" to="40" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Effizienz Compliance-konformer Kontrollprozesse in internen Kontrollsystemen (IKS)</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HMD</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="252" to="266" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Verfahren zur Wirtschaftlichkeitsanalyse von IT-Sicherheitsinvestitionen</title>
		<author>
			<persName><forename type="first">R</forename><surname>Rumpel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Glanze</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Practical Business Research</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Betriebswirtschaftliche Bewertung von Security Investments in der Praxis</title>
		<author>
			<persName><forename type="first">D</forename><surname>Fox</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Datenschutz und Datensicherheit (DuD)</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="50" to="55" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Cost-Benefit Analysis for Network Intrusion Detection Systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Frinke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Carter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ritter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the CSI 28th Annual Computer Security Conference</title>
				<meeting>the CSI 28th Annual Computer Security Conference</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Über die Ökonomie der IT-Sicherheit -Betrachtungen zum Thema &quot;Return on Security Investment</title>
		<author>
			<persName><forename type="first">Dirk</forename><surname>Schadt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HMD Prax. Wirtsch</title>
		<imprint>
			<biblScope unit="volume">248</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Matousek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schlienger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Teufel</surname></persName>
		</author>
		<title level="m">Metriken und Konzepte zur Messung der Informationssicherheit</title>
				<imprint>
			<publisher>HMD</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Wie wirtschaftlich sind IT-Sicherheitsmaßnahmen</title>
		<author>
			<persName><forename type="first">N</forename><surname>Pohlmann</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>HMD</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Return on information security investment-the viability of an antispam solution in a wireless environment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mizzi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Network Security</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="18" to="24" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Adapted Loss Database-A New Approach to Assess IT Risk in Automated Business Processes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Syring</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AMCIS 2010 Proceedings</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">CIAM: A data-driven approach for selecting and prioritizing security controls</title>
		<author>
			<persName><forename type="first">T</forename><surname>Llanso</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Systems Conference SysCon 2012</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A possible conceptualization of the information systems ( IS ) artifact: A general systems theory perspective 1</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chatterjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sarker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Elbanna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf Syst J</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="550" to="578" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">The base-rate fallacy and the difficulty of intrusion detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Axelsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="186" to="205" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Raghunathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Research</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="198" to="217" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<title level="m" type="main">Process Innovation. Reengineering Work Through Information Technology</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Davenport</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>Harvard Business Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">Computing the Cost of BPMN Diagrams</title>
		<author>
			<persName><forename type="first">M</forename><surname>Magnani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Montesi</surname></persName>
		</author>
		<idno>UBLCS-07-17</idno>
		<imprint>
			<date type="published" when="2007">2007</date>
			<pubPlace>Bologna</pubPlace>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">BPMN. How Much Does It Cost? An Incremental Approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Magnani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Montesi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business process management. 5th international conference, BPM 2007</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Alonso</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Rosemann</surname></persName>
		</editor>
		<meeting><address><addrLine>Brisbane, Australia; Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">September 24 -28, 2007. 2007</date>
			<biblScope unit="volume">4714</biblScope>
			<biblScope unit="page" from="80" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">A Note on Two Problems in Connexion with Graphs</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">W</forename><surname>Dijkstra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Numerische Mathematik</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="169" to="271" />
			<date type="published" when="1959">1959</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Computing the Cost of Business Processes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Sampathkumaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wirsing</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Systems: Modeling, Development, and Integration. Third International United Information Systems Conference, UNISCON 2009</title>
				<editor>
			<persName><forename type="first">W</forename><surname>Aalst</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Ginige</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R.-D</forename><surname>Kutsche</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Sadeh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Shaw</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Szyperski</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Yang</surname></persName>
		</editor>
		<meeting><address><addrLine>Sydney, Australia; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">April 21-24, 2009. 2009</date>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="178" to="183" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Financial Evaluation and Optimization of Business Processes</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Sampathkumaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wirsing</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJISMD</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="91" to="120" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">The performance impact of business process standardization</title>
		<author>
			<persName><forename type="first">B</forename><surname>Münstermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Eckhardt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Weitzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Process Management Journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="29" to="56" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">The Impact of Process Standardization on Business Process Outsourcing Success</title>
		<author>
			<persName><forename type="first">K</forename><surname>Wuellenweber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Koenig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Beimborn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Weitzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Systems Outsourcing</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="527" to="548" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Stöwer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kraft</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ISSE 2012 Securing Electronic Business Processes</title>
				<meeting><address><addrLine>Wiesbaden</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Vieweg</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="37" to="47" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics</title>
		<author>
			<persName><forename type="first">H</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Limanmansar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Omega</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="283" to="306" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Value-Orientation in Business Process Management</title>
		<author>
			<persName><forename type="first">J</forename><surname>Vom Brocke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sonnenberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook on Business Process Management 2</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="101" to="132" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">A strategy driven business process modelling approach</title>
		<author>
			<persName><forename type="first">S</forename><surname>Nurcan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Etien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Zoukar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rolland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Process Management Journal</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="628" to="649" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">BPMN: An introduction to the standard</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chinosi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Trombetta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Standards &amp; Interfaces</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="124" to="134" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">ConFlex -An Ontology-Based Approach for the Flexible Integration of Controls into Business Processes</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seyffarth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sackmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI´16)</title>
				<meeting>the Multikonferenz Wirtschaftsinformatik (MKWI´16)</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1341" to="1352" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Internal access controls</title>
		<author>
			<persName><forename type="first">G</forename><surname>Sampemane</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="page" from="62" to="65" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Modeling Control Objectives for Business Process Compliance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Namiri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference on Business Process Management (BPM&apos;07)</title>
				<meeting>the 5th International Conference on Business Process Management (BPM&apos;07)</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="149" to="164" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">Conceptualization, Design, and Implementation of EconBPC -A Software Artifact for the Economic Analysis of Business Process Compliance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kühnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Trang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lindner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conceptual Modeling. 38th International Conference, ER 2019</title>
				<editor>
			<persName><forename type="first">A</forename><forename type="middle">H F</forename><surname>Laender</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Pernici</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E.-P</forename><surname>Lim</surname></persName>
		</editor>
		<meeting><address><addrLine>Salvador, Brazil</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">vember 4-7, 2019. 2019</date>
			<biblScope unit="page" from="378" to="386" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Indra: An integrated quantitative system for compliance management for IT service delivery</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bhamidipaty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Narendra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nagar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">K</forename><surname>Varshneya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vasa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Deshwal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IBM Journal of Research and Development (IBM J. Res. &amp; Dev.)</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">A method of calculating the cost of reducing the risk exposure of non-compliant process instances</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">N</forename><surname>Doganata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Curbera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the first ACM workshop on Information security governance</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Jajodia</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Kudo</surname></persName>
		</editor>
		<meeting>the first ACM workshop on Information security governance<address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">Information security management for small and medium size enterprises</title>
		<author>
			<persName><forename type="first">J</forename><surname>Abbas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">K</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hussain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sci. Int. (Lahore)</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="2393" to="2398" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Analyzing Information Security Model for Small-Medium Sized Businesses</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Alshboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Streff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AMCIS 2015 Proceedings</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Security Aspects in Smart Meters: Analysis and Prevention</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">P</forename><surname>Díaz Redondo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Fernández-Vilas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fernández Dos Reis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page">3977</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Towards Autonomic Security Management of Healthcare Information Systems</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lambright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Abdelwahed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="113" to="118" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
