<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cybersecurity of hierarchical structured systems in emergency response⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Liubomyr Sikora</string-name>
          <email>lssikora@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lysa</string-name>
          <email>lysa.nataly@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Fedevych</string-name>
          <email>olha.y.fedevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nazarii Khyliak</string-name>
          <email>n.khyliak@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AdvAIT-2024: 1st International Workshop on Advanced Applied Information Technologies</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>28a Bandery Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>2</fpage>
      <lpage>12</lpage>
      <abstract>
        <p>The article considers decision-making schemes and models for threat elimination during emergencies in hierarchical systems based on information and system technologies. An analysis of publications, both classical and modern, was carried out. The relevance of a purposeful automated control systems study was shown, and the features of design using cognitive decision-making methods that would secure the possibility of avoiding structural errors were indicated. A method for assessing risks due to the cognitive component, i.e., operator errors, taking into account his intellectual characteristics, was developed, and intellectual activity cognitive coefficients tables were constructed. The application of the theory of systems and information technologies to the study of large-scale systems with a hierarchical structure of their organization, which is considered as a goal-oriented structure of interconnected subsystems for the implementation of target tasks, taking into account active attacks and threats and the cognitive component of the operator - manager, was considered.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Information</kwd>
        <kwd>system</kwd>
        <kwd>structure</kwd>
        <kwd>risk</kwd>
        <kwd>potentially dangerous objects 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        neural system of the operational personnel and the skills of using them under adverse working
conditions [
        <xref ref-type="bibr" rid="ref2">2, 6, 7</xref>
        ]. To solve this problem, it is necessary to develop a concept of knowledge
structuring and determine the risk interval and methods of personnel selection for the
implementation of a sustainable goal-oriented strategic level of management of man-made
infrastructure with П-hierarchical levels.
      </p>
      <p>The study aims to develop methods for ensuring effective management of production infrastructure
with a hierarchical organization in the face of a complex of active threats and internal and external
conflicts, which can lead to management failure, accidents, and the collapse of the structure of a
complex system.</p>
    </sec>
    <sec id="sec-2">
      <title>2. References analysis</title>
      <p>In accordance with this purpose, let’s consider the works of researchers published in monographs
and articles from 2011-2023.</p>
      <p>
        Monograph [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] considers the problems of intelligent control using logic digital automata as the
basis for creating control processes.
      </p>
      <p>The monograph [3] substantiates the methods of systematics of decision-making in complex
systems with robust properties to counteract strong disturbances to the system control processes.</p>
      <p>
        Books [
        <xref ref-type="bibr" rid="ref2">2,4,7,8</xref>
        ] consider logical and cognitive models of management decision-making in the face
of threats and information attacks on control systems.
      </p>
      <p>Based on system analysis, the monograph [6] developed the concept of formation of information
and intellectual operations for implementing security management strategies in the ACS.</p>
      <p>Books [10-13] analyze models of psychological factors influencing the process of managing
complex systems and evaluate multiplicative criteria.</p>
      <p>Monographs [4, 5] consider the strategic security problems of complex systems and methods of
designing an information security system under the influence of active attacks on data flows and the
management process.</p>
      <p>The monograph [9] considers the complex problem of creating automated information systems
to ensure effective and sustainable management of complex hierarchical man-made complexes.</p>
      <p>Works [14-17] consider neuro-fuzzy logic methods for building networks for processing data
flows in the control process under interference conditions.</p>
      <p>Works [18-22] consider methods of forming and making targeted decisions in the face of
information attacks and logical and cognitive failures using fuzzy logic to develop algorithms for
assessing the situation in complex systems.</p>
      <p>Monograph [23] discusses methods for creating algorithms and operating automata based on the
terminal logic of forming control actions.</p>
      <p>Work [24] substantiates the use of artificial intelligence methods for data and multimedia
processing, their use in decision-making procedures for control in complex systems.
Article [25] considers the problematic tasks of forming management decisions using information
and intelligent technologies..</p>
    </sec>
    <sec id="sec-3">
      <title>3. Main research results</title>
      <p>The intensive development of man-made social infrastructure (industry, energy, transport, aviation,
municipal systems of cities, villages, megacities, mining, oil and gas, construction) consumes large
amounts of energy and material resources. To operate, they require labor resources (workers,
technicians, engineers, scientists, high-level experts, advisors with strategic importance and
experience in solving crisis problems).</p>
      <p>Research methods that were used to solve the problem of effective targeted management of the
production hierarchical infrastructure in the face of threats, conflicts, information, and cognitive
attacks:</p>
      <p>Methods of system analysis of the structure and dynamics of production infrastructure
components with a given goal orientation;
their intellectual interpretation;
2. Information technologies for processing situational data on the state of active objects and
situations;
and-effect diagrams.
3. Logical and cognitive models for assessing the ability of personnel to make decisions in crisis</p>
      <p>Methods for assessing the risks of emergencies at the terminal control cycles using
causeInfrastructural man-made complexes are hybrid systems with a hierarchy of production and
management structures (from man-made to strategic and global).</p>
      <p>The development of information technologies for crisis management has its own basis.</p>
      <p>New approaches to personnel training are based on the concept of modern scientific methods
(systems analysis, crisis management, technical systems management, databases and knowledge,
expert systems and computer engineering, communication and telecommunications networks
(space, satellite navigation systems).</p>
      <p>However, the foundation of the energy, metallurgy, construction, social sector, and other
industries requires high-level engineering and fundamental knowledge of mathematics, physics, and
thermodynamics of energy-active processes, as well as electronics and nuclear physics and automatic
control systems.</p>
      <p>Accordingly, man-made infrastructure requires comprehensive knowledge, not just digital and
information technologies, to ensure its functioning and project implementation.</p>
      <p>
        An important task of applying the theory of systems and information technology is to study
largescale systems with a hierarchical structure of their organization, which can be considered as a family
of appropriately connected subsystems for the implementation of target tasks. From this perspective,
systems theory studies the structure as an integrity that ensures the achievement of the goal [
        <xref ref-type="bibr" rid="ref1">1, 4,
6</xref>
        ]. Accordingly, all subsystems are connected through connection operators, which ensures the
integrity of the functional system and determines the role of each substructure in the system
structure and its purposeful behavior. This requires a revision of the classical (ACS) theory
automatic control systems and transition to a new concept - intelligent integrated control systems
for man-made infrastructure (IICSMMI).
      </p>
      <p>The use of system analysis, algebra of categories to represent organizational and functional
components of man-made infrastructure, data processing methods of information technology to
assess the state of energy-active objects, intellectual interpretation of the dynamic situation content
in the state space and the target space provides an opportunity to control the functioning of
technological units and assess the level of maximum loads, the risks of entering an emergency state.</p>
      <p>The use of statistics, situational logic-cognitive analysis and cause-effect diagrams is the basis for
building scenarios for the development of events in the terminal control cycles and assessing the risk
of an emergency. Preventing an emergency is the main task for operational personnel with the
appropriate level of knowledge, professional training, and cognitive intelligence to make targeted
Let's consider the elements of system structuring in accordance with the goal of the basic task.
Definition 1. Example text of a theorem. A generalized system   ⊂   ×   with objects
  , ,  ∈      =⊗</p>
      <p>, ,  ∈   
 ,
on
component
sets = (  1 ⋯    )
and   =
decisions.
  =⊗</p>
      <p>,
{  1, ⋯  in } forms a structure with the set {  }, if it can form a connection.    ∈    , {  } =⊗
   :    ∈   - input. The output object of the system    =⊗    :    ∈  
There are many types
of connections for each system   ⊂   ×   :(  =   ×   ) →    ⊂    ×    × 

 ×     =1
which differ by the sets    ,</p>
      <p>Accordingly, the class of connected systems can be defined in the form of a cascade connection,
which reflects the class of the aggregated technological structure:</p>
      <p>1 ⊂ ( 1 ×   1) ×  1,
 3 ⊂ ( 1 ×  2 ×  ) × ( 1 ×  2),   1 =   2 =  ,</p>
      <p>2 ⊂ ( 2 ×   2) ×  2,
then the parallel structure represented through the composition of substructures with a given
class of functional purpose:
( 1,  1,  ), ( 1,  1) ∈  3 ⇔ ( 1,  ),  1 ∈  1&amp; ( 2,  ),  2 ∈  2</p>
      <p>
        In accordance with the concept of infrastructure targeting, a decomposition scheme of the
hierarchy of units has been developed (Fig. 1).
According to Fig. 1, let’s define the levels of structuring of the man-made system:
1. Hierarchical integrated system that implements targeted strategic infrastructure
management [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ];
2. Production complex with an automatic control system.
3. The structure of the intellectual type of strategic goals generation for infrastructure
functioning.
4. Technological production structure, which includes an aggregate line with production
technology, an automatic process control and management system, operational
management, and strategic coordination, which ensures the functioning of the
infrastructure under the influence of active threats to the structure, resources, and
production process.
      </p>
      <p>Accordingly, the structure in Fig. 1 is one of the ways to represent the organization of
production in the man-made infrastructure complex.
3.1. Assessment of the suitability of operational personnel for managing a
targeted energy-active system</p>
      <sec id="sec-3-1">
        <title>Engineering and system management</title>
      </sec>
      <sec id="sec-3-2">
        <title>Operational and technical administration</title>
      </sec>
      <sec id="sec-3-3">
        <title>Technical operational management</title>
      </sec>
      <sec id="sec-3-4">
        <title>Service</title>
      </sec>
      <sec id="sec-3-5">
        <title>Acceptable risk</title>
      </sec>
      <sec id="sec-3-6">
        <title>Test for stability</title>
      </sec>
      <sec id="sec-3-7">
        <title>Information attacks (ІА, АCS)</title>
      </sec>
      <sec id="sec-3-8">
        <title>System targeted attacks (ІА, ACS)</title>
      </sec>
      <sec id="sec-3-9">
        <title>Resource and structural attacks (АCS, STRK (TS))</title>
      </sec>
      <sec id="sec-3-10">
        <title>Complex cognitive and logical attacks on personnel</title>
      </sec>
      <sec id="sec-3-11">
        <title>Externally set accident risk</title>
        <p>levelаварій</p>
      </sec>
      <sec id="sec-3-12">
        <title>Intensity of attacks</title>
        <p>Х</p>
      </sec>
      <sec id="sec-3-13">
        <title>AVAR</title>
        <p>Ranking of technological infrastructure personnel by functional requirements:
 (   1) - personnel for the maintenance of units and blocks;
 (   2) - personnel for repair and installation works;
 (   3) - personnel of laboratories of automation and control and measurement systems;
 (   4) - personnel (engineers, technicians) for shift maintenance of complexes of units and
power units;
    5 - personnel for control and maintenance of automatic control systems (ACS-TP);
 (   6) - personnel of shift operational control of a closed-cycle technological system;
 (   7) - operational and administrative personnel and document management and
computer network services;
 (   8) - personnel for maintenance of information and automated systems;
 (   9) - personnel of the chief technologist service;
 (   10) - financial and administrative management and planning personnel;
    11 - Chief Engineer's Service (departments, information security service, fire and
technological safety service);
 (   12) - expert advisory service and DSS (decision support system) for senior management;
 (   13) - senior managers and members of the Management Board and directors,
shareholders' representatives;
 (   14) - the chairman of the board and the supervisory board of the industrial complex;
 (   20) - owners (individual, team);
     (  ) - external teams of strategic level advisors and national and international
experts (Certified by type of activity).</p>
        <p>The requirements for technical, administrative and managerial personnel are formed in
accordance with the rank.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results &amp; discussion</title>
      <p>In accordance with the rank, test requirements for a person's cognitive, knowledge, and
psychological characteristics are formed in tables and a scheme of risk situations.</p>
      <p>Accordingly, lets provide information, logic, system and cognitive aptitude of personnel
(Table 1).
1.
2.
3.</p>
      <p>Ability to take active
management actions
Targeted to the recognition</p>
      <p>situation
Reaction and active factors
Encouraging goal-oriented</p>
      <p>activities
Building sets of target</p>
      <p>alternatives</p>
      <p>Choosing strategies
Subconscious choice of goal</p>
      <p>orientation</p>
      <p>Targeted selection
Conscious risk assessment</p>
      <p>ZAd
CSitПS
Rek (AF)</p>
      <p>CDi</p>
      <p>C(Di)</p>
      <sec id="sec-4-1">
        <title>VStrarU</title>
        <p>ПSv(Ci)
V (Ci)
0.5-1
0.8-1
0.6-1
0.7-1
0.9-1
0.8-1
0.7-1
0.8-1</p>
      </sec>
      <sec id="sec-4-2">
        <title>Sens (Icon)</title>
      </sec>
      <sec id="sec-4-3">
        <title>Targeted operations in the face Di(Ci/Ui) of threats Confidence in their actions</title>
      </sec>
      <sec id="sec-4-4">
        <title>Complex confidence (knowledge, intelligence)</title>
      </sec>
      <sec id="sec-4-5">
        <title>Self-confidence in your knowledge Professional self-confidence</title>
      </sec>
      <sec id="sec-4-6">
        <title>Trust of external experts in the person Professional trust in the personality of a cognitive agent</title>
        <p>Self-confidence in the ability to
solve the problem</p>
      </sec>
      <sec id="sec-4-7">
        <title>Determination to act in the face of risk</title>
        <p>KV sp
Sg KV (Аі )
ZpKV (Аj )
SKV (Аі )
SZ КV (Аі )
Rd (Аі )
KZP (Аі )
Кcogn (Аі )
Кdu (А )
Кd (Drisk )
0.6-1
0.7-1
0.7-1
0.5-1
0.8-1.0
0.7-1.0
0.6-1.0
0,8-1,0
0,8-1,0
0,2-1,0
0,2-1,0
0,75-1,0
0,8-1,0
0,85-1,0
0,9-1,0</p>
      </sec>
      <sec id="sec-4-8">
        <title>Points</title>
        <p>Systemic background</p>
        <p>knowledge
Engineering and technical</p>
        <p>examples
Operational management</p>
        <p>Strategic level</p>
        <p>K</p>
        <p>0,0-100
0,2-100
50-100
Ranking table of the level of scientific and technical knowledge based on the results of specialized
industry tests, which are formed on the basis of the study
α
α
r &gt; 0.5
α</p>
        <p>On the basis of the developed risk assessments (   ) and the introduced cognitive coefficients
(  ) - trust and coefficients of knowledge requirements (  ), the methods of assessing professional
suitability are substantiated. On the basis of (Table 1), a diagram for assessing the target suitability of
personnel for managerial activities in the hierarchical structure of a man-made system has been
developed as a basis for maintaining the level of cybersecurity under the influence of information
attacks and threats, which can lead to disorientation in the situation and its incorrect assessment in the
formation and decision-making.</p>
        <p>The diagram (Fig. 3) of goal suitability assessment and preliminary studies and schemes (Figs.
1-3) are the basis for the construction of professionally oriented tests.
4.1. Prospects for research on the problems of managerial stress resistance and
professional engineering and technical activity
The current stage of society development, industrial infrastructure, and social and communal
conglomerates is characterized by a set of regional and global problems. The problems that have
developed in the infrastructure of society, global ecosystems, energy, transport and the entire
economic and industrial complex are becoming increasingly complex and cannot be solved by simple,
deregulatory solutions.</p>
        <p>The growing process of informatization of technologies and society (start-up technologies, the
Internet, artificial intelligence, process automation, intelligent technologies, global data and
knowledge bases) cannot ensure the mass welfare of the population, as this requires a certain level
of education, not self-deception of opportunities. The low level of managerial culture at all levels of
the hierarchy and the educational base leads to strategic mistakes of global and local accidents of the
systemic type (e.g., Chornobyl, Yokohama, dam breaks, environmental disasters, Saano-Shushenska
TPP), which are characterized by resource, financial and large losses of population.</p>
        <p>The war leads to the collapse of infrastructure and large population losses, the ruin of social,
communal and strategic structures. These problems can be solved only through the constructive use
of material and energy resources, labor, and scientific and engineering potential to upgrade
infrastructure. This problem can be solved with effective management at different levels of the
hierarchy of state infrastructure organizations, raising the level of professionalism on the basis of
modernized educational programs of training and vocational education, selection of managerial
personnel on the basis of new concepts of testing and aptitude assessment, taking into account
cognitive, psychological and intellectual characteristics to assess the ability to each type of
professional activity.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Depending on the system structure and the situation, there are changes in the state of the
hierarchical system in the terminal space [Tm×TR] in relation to the dynamics of the pace of events,
which leads to the thickening of situations on the real-time axis and to the occurrence of an
emergency in case of untimely adoption of protection measures. Therefore, for the rapid elimination
of emergencies, it is necessary to develop: structural diagrams of technological processes; models,
schemes for data selection and processing; methods of classifying situations and making decisions;
schemes for the development of possible event scenarios; schemes of personnel behavior and
instructions for emergency response based on information and system technologies.</p>
      <p>On the basis of the proposed approach, using the logic of actions and the theory of situational
management, models of the structure of systems for active control of technological processes under
conditions of dynamic disturbances on objects both of the systemic, structural, and
cognitiveinformational types were developed. The concept of goal orientation and coordination of logical and
cognitive models of forming control decisions of a system with a hierarchical structure under the
influence of threats and information attacks as a basis for the synthesis of robust decision-making
strategies in crisis emergency situations were substantiated.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[3] D. Stirzaker, Stochastic processes and models. Cambridge University Press, 2016.
[4] D. O'Connor, I. McDermat, Systemic thinking and search for extraordinary creative solutions.</p>
      <p>Kyiv: Nash format, 2018. (In Ukrainian).
[5] M. Cook, J. Noyes, Decision making in complex environments; CRC Press, Boca Raton, Florida,</p>
      <p>USA, 2007; 458 p.
[6] V.O. Khoroshchko, B.J. Bobalo, V.B. Dudykevych Procurement of integrated information security
systems; NU "LP" PH, Lviv, Ukraine, 2020; 320 p.
[7] M. Groover, Automation, Production Systems, and Computer-Integrated Manufacturing. 4th ed.</p>
      <p>London, UK, Pearson, 2013.
[8] M. Acevedo Decision making real-time environmental monitoring: sensors and systems, CRC</p>
      <p>Press, Boca Raton, Florida, USA, 2023. 424 р.
[9] J. Girdhar, Management information systems. New Delhi Oxford University Press, 2013.
[10] Tattam, D.: A Short Guide to Operational Risk; 1st edn. Routledge, London, UK, 2011; 256p.
[11] R. Watt, Visual Processing: Computational, Psychophysical, and Cognitive Research:
Computational Psychophysical and Cognitive Research; 1st edn., Psychology Press, London, UK,
1988; 167p. doi:10.4324/9781315785080
[12] M.W. Wiggins, Introduction to Human Factors for Organizational Psychologists; Boca Raton,</p>
      <p>FL:CRC Press, Taylor &amp; Francis Group, USA, 2022. doi:10.1201/9781003229858
[13] P. Yu, Multiple-criteria decision making: concepts techniques and extensions; Plenum Press,
New</p>
      <p>York-London, USA-UK, 1985. doi:10.1007/978-1-4684-8395-6.
[14] H. Yousef, Power system load frequency control: Classical and adaptive fuzzy approaches. Boca</p>
      <p>Raton, FL: CRC Press, 2017. doi: 10.1201/9781315166292
[15] P. Melin and O. Castillo, Modelling, simulation and control of non-linear dynamical systems: An
intelligent approach using soft computing and fractal theory. Boca Raton,: CRC Press, 2019.
[16] I. Gupta, G. Nagpal, Artificial Intelligence and Expert Systems; Mercury Learning &amp; Information,</p>
      <p>USA, 2020; 300 p.
[17] L. Sikora, N. Lysa , O. Fedevych , R. and R. Tkachuk,. Laser and Information Technologies for
Controlling Dynamic Displacements Spatial Structures of Objects Under the Influence of Active
Man-Made and Natural Risk Factors for Accidents. Computer Systems and Information
Technologies, 2 (2022) 57–68. doi:10.31891/csit-2022-2-7
[18] V.D. Bhise, Decision-Making in Energy Systems. Boca Raton, FL: CRC Press, USA, 2022.
[19] L.S. Sikora, R.L. Tkachuk, N.K. Lysa, I.M. Dronyuk, O.Yu. Fedevych, Information and logic
cognitive technologies of decision-making in risk conditions, in: Proceedings of the 1st
International Workshop on Intelligent Information Technologies &amp; Systems of Information
Security, IntellTSIS 2020, Khmelnytskyi, June 10-12 2020, Vol. 2623 (2020), p. 340-356.
[20] H. Jantan, A. Hamdan and Z. Othman Intelligent Techniques for Decision Support System in
Human Resource Management: in International Journal of Innovative Computing, Information
and Control, 7(1), ICIC International, Hong Kong, 2011, pp. 13-24.
[21] T. Aven Foundations of Risk Analysis: A Knowledge and Decision-Oriented Perspective, Wiley,</p>
      <p>Hoboken, USA, 2012; 240p.
[22] A. S. Nejad, Fundamentals of System Analysis &amp; Design Publisher. LAP LAMBERT Academic</p>
      <p>Publishing, 2014. doi:10.13140/2.1.1469.7280
[23] S. Demri, V. Goranko, M.Lange, Temporal Logics in Computer Science, Cambridge, Cambridge</p>
      <p>University Press, 2016. doi:10.1017/CBO9781139236119
[24] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, Y.</p>
      <p>Bengio. Generative adversarial nets: in Advances in neural information processing systems, NIPS
Foundation, Montreal (2014) 2672–2680.
[25] L.S. Sikora, R.L. Tkachuk, N.K. Lysa, I.M. Dronyuk, О.Yu. Fedevych, M.L. Navutka Information
technologies of formation of intellectual decision-making strategies under conditions of cognitive
failures. In Proceedings of the 1st International Workshop on Computational &amp; Information
Technologies for Risk-Informed Systems (CITRisk – 2020). Kherson, Ukraine, October 15-16, 2020.
Vol. 2805, pp. 233-254.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>G. Boy,</surname>
          </string-name>
          <article-title>The handbook of human-machine interaction: A human-centered design approach</article-title>
          . 1st ed. Boca Raton, FL: CRC Press,
          <year>2011</year>
          . doi:
          <volume>10</volume>
          .1201/9781315557380
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Aven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Thekdi</surname>
          </string-name>
          ,
          <article-title>Enterprise risk management: advances on its foundation and practice 1st ed</article-title>
          . London, UK, Routledge,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .4324/9780429425028
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>