Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 33) Visa alla publikasjoner
Hacks, S. & Slupczynski, A. (2025). Advancing Enterprise Architecture Debt: Insights from Work System Theory. In: Rébecca Deneckère; Marite Kirikova; Janis Grabis (Ed.), Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings. Paper presented at Perspectives in Business Informatics Research, 24th International Conference, BIR 2025, 17-19 September 2025, Riga, Latvia. (pp. 107-123). Springer
Åpne denne publikasjonen i ny fane eller vindu >>Advancing Enterprise Architecture Debt: Insights from Work System Theory
2025 (engelsk)Inngår i: Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings / [ed] Rébecca Deneckère; Marite Kirikova; Janis Grabis, Springer , 2025, s. 107-123Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Enterprise Architecture (EA) debt emerges when short-term decisions lead to structural inefficiencies that hinder organizational agility and strategic alignment. This paper applies Work System Theory (WST) to categorize and analyze EA debt, offering a structured approach to identifying and managing it. We highlight key challenges, research gaps, and future directions by mapping EA debt to WST components. The findings emphasize the need for adaptive frameworks, improved stakeholder engagement, and systematic debt management strategies.

sted, utgiver, år, opplag, sider
Springer, 2025
Serie
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356 ; 562
Emneord
Anthropology of Work, Architectural History and Theory, Enterprise Architecture, Organization Theory, Organizational Theory, Theory of Arts
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-247401 (URN)10.1007/978-3-032-04375-7_7 (DOI)2-s2.0-105016533918 (Scopus ID)978-3-032-04374-0 (ISBN)
Konferanse
Perspectives in Business Informatics Research, 24th International Conference, BIR 2025, 17-19 September 2025, Riga, Latvia.
Tilgjengelig fra: 2025-09-24 Laget: 2025-09-24 Sist oppdatert: 2025-10-07bibliografisk kontrollert
Henriksén, N., Lexert, I., Dahn, J. & Hacks, S. (2025). Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO Membership. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the9 11th International Conference on Information Systems Security and Privacy-(Volume 1: . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 209-216). SciTePress
Åpne denne publikasjonen i ny fane eller vindu >>Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO Membership
2025 (engelsk)Inngår i: Proceedings of the9 11th International Conference on Information Systems Security and Privacy-(Volume 1 / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, s. 209-216Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Sweden’s recent NATO membership marks a significant shift in the country’s national security strategy, particularly concerning cybersecurity. This study has assessed the current cybersecurity landscape in Sweden by conducting interviews with experts within the public sector and through document analysis. The interviewees included academics, researchers, and government officials from the municipal level to parliament. The study concludes how the threat environment has evolved following Sweden’s NATO membership. The study has identified key cyber threats facing Sweden, primarily from state-sponsored actors such as Advanced Persistent Threat (APT) groups and cybercriminal organizations targeting critical infrastructure. The study has also found disparities in cybersecurity preparedness between Sweden’s military and civilian sectors. The study emphasizes the need to strengthen civilian cybersecurity to reach a similar preparedness as the military to adapt to NATO’s requirements and stand ards.

sted, utgiver, år, opplag, sider
SciTePress, 2025
Serie
ICISSP, E-ISSN 2184-4356
Emneord
Cybersecurity, Sweden, NATO Membership, Cyber Defense, Cyber Threats
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-240582 (URN)10.5220/0013117800003899 (DOI)2-s2.0-105001873004 (Scopus ID)978-989-758-735-1 (ISBN)
Konferanse
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Tilgjengelig fra: 2025-03-10 Laget: 2025-03-10 Sist oppdatert: 2025-05-06bibliografisk kontrollert
Naval, M., Perjons, E. & Hacks, S. (2025). Cybersecurity Challenges in Critical Infrastructure: A Perspective on Regulations and Competence in Luxembourg. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume 1): . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 15-26). SciTePress
Åpne denne publikasjonen i ny fane eller vindu >>Cybersecurity Challenges in Critical Infrastructure: A Perspective on Regulations and Competence in Luxembourg
2025 (engelsk)Inngår i: Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume 1) / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, s. 15-26Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Critical infrastructure (CI) faces a growing threat of cyber-attacks as digitalization expands across industries, necessitating robust cyber-security measures. This study focuses on the challenges of securing CI in Luxembourg, exploring both regulatory and organizational aspects. Semi-structured interviews with chief information security officers (CISOs) within Luxembourg’s CI sectors were conducted to gather insights. Thematic analysis revealed six key challenge themes: Regulatory Compliance, Industry Landscape and Adaptation, Resource Management, External Collaboration and Support, IT Infrastructure Management, and Operational Governance. The findings underscore the need for a comprehensive, multi-faceted approach involving international regulation alignment, streamlined reporting, enhanced national cyber-security support, government initiatives, and ongoing harmonization efforts across nations to address cyber-security challenges in critical infrastructure effectively.

sted, utgiver, år, opplag, sider
SciTePress, 2025
Serie
ICISSP, E-ISSN 2184-4356
Emneord
Critical Infrastructure, Cyber-Security Challenges, Luxembourg, Thematic Analysis
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-240586 (URN)10.5220/0013091500003899 (DOI)2-s2.0-105001800531 (Scopus ID)978-989-758-735-1 (ISBN)
Konferanse
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Tilgjengelig fra: 2025-03-10 Laget: 2025-03-10 Sist oppdatert: 2025-05-06bibliografisk kontrollert
Eduardo Araújo Cardoso Cidrão, C., Hermansson, O. & Hacks, S. (2025). Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume !=: . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 234-241). SciTePress
Åpne denne publikasjonen i ny fane eller vindu >>Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?
2025 (engelsk)Inngår i: Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume != / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, s. 234-241Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Phishing attacks, a cybercrime where attackers deceive victims into revealing personal and financial information, present significant threats to cloud-based systems. Securing these environments has become paramount with the growing adoption of cloud services. This study addresses the research question: ”What is the overall perception of strategies in scientific publications to counter phishing attacks targeting cloud services?” Using a systematic literature review approach, the research synthesized findings from 13 selected scientific articles, focusing on technical and social defense strategies against phishing. The study highlights the human factor as a critical vulnerability despite existing technical solutions like advanced authentication, IDS (Intrusion Detection System), and machine learning. Effective defense requires combining technical measures with user education and adapting to evolving phishing strategies. It calls for greater integration of social aspects into technical solutions and targeted research on cloud-specific defenses and AI’s role in phishing mitigation.

sted, utgiver, år, opplag, sider
SciTePress, 2025
Serie
ICISSP, E-ISSN 2184-4356
Emneord
Phishing, Cloud, Cyber Defense, Systematic Literature Review
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-240587 (URN)10.5220/0013140000003899 (DOI)2-s2.0-105001803387 (Scopus ID)978-989-758-735-1 (ISBN)
Konferanse
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Tilgjengelig fra: 2025-03-10 Laget: 2025-03-10 Sist oppdatert: 2025-05-06bibliografisk kontrollert
Hacks, S., Malakhova, D. & Pahl, J. (2025). MaritIme juSt in time optimiSatION (MISSION). In: Claudenir M. Fonseca; Mattia Fumagalli (Ed.), Proceedings of the Research Projects Exhibition Papers Presented at the 37th International Conference on Advanced Information Systems Engineering (CAiSE 2025): . Paper presented at CAiSE-RPE 2025, Research Projects Exhibition at CAiSE 2025, Vienna, Austria, June 16-20, 2025..
Åpne denne publikasjonen i ny fane eller vindu >>MaritIme juSt in time optimiSatION (MISSION)
2025 (engelsk)Inngår i: Proceedings of the Research Projects Exhibition Papers Presented at the 37th International Conference on Advanced Information Systems Engineering (CAiSE 2025) / [ed] Claudenir M. Fonseca; Mattia Fumagalli, 2025Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The MISSION project aims to improve efficiency and reduce greenhouse gas emissions (GHG) in maritime transport by enabling just-in-time (JIT) port calls through digital coordination. Many ports still operate on a f irst-come-first-served (FCFS) basis, leading to unnecessary waiting times, fuel waste, and emissions. MISSION addresses these challenges by developing an interoperable, real-time optimization tool that supports better communication and collaboration between ships, ports, and hinterland logistics. This article presents the current state of the project.

Serie
CEUR Workshop Proceedings, E-ISSN 1613-0073 ; 4050
Emneord
Port Call Optimization, Green House Gas Reduction, Integration Architecture
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-248242 (URN)2-s2.0-105018669744 (Scopus ID)
Konferanse
CAiSE-RPE 2025, Research Projects Exhibition at CAiSE 2025, Vienna, Austria, June 16-20, 2025.
Tilgjengelig fra: 2025-10-20 Laget: 2025-10-20 Sist oppdatert: 2025-10-24bibliografisk kontrollert
Rehnstam, E., Winquist, W. & Hacks, S. (2025). NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. In: Leonardo Horn Iwaya; Liina Kamm; Leonardo Martucci; Tobias Pulls (Ed.), Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings. Paper presented at 29th Nordic Conference, NordSec 2024, 6-7 November 2024, Karlstad, Sweden. (pp. 176-195). Springer
Åpne denne publikasjonen i ny fane eller vindu >>NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure
2025 (engelsk)Inngår i: Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings / [ed] Leonardo Horn Iwaya; Liina Kamm; Leonardo Martucci; Tobias Pulls, Springer , 2025, s. 176-195Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This study evaluates the preparedness of Swedish critical infrastructure for the NIS2 directive, which sets enhanced EU standards for information- and cybersecurity. The research reveals a generally low competence level, highlighting a lack of readiness for the directive’s requirements. Variations in competence are influenced by organizational size, resource availability, and existing strategic processes. Larger organizations with roles like CISOs tend to have higher competence levels, yet significant gaps remain in meeting the directive’s demands. The study emphasizes the need for comprehensive business and gap analyses to identify critical areas for improvement. Organizations should adopt strategic, systematic approaches to cybersecurity that integrate with existing processes. Enhancing competencies requires increased investment in education and training, supported by leadership committed to fostering a robust security culture. The NIS2 directive should be seen not as a regulatory burden but as an opportunity to enhance resilience against cyber threats. Methodologically, the study uses a consistent semi-structured interview approach with experts and authorities to ensure validity and reliability. Although the qualitative nature of the research limits generalizability, it offers critical insights into Sweden’s cybersecurity readiness and the need for strategic improvements.

sted, utgiver, år, opplag, sider
Springer, 2025
Serie
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15396
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-239292 (URN)10.1007/978-3-031-79007-2_10 (DOI)2-s2.0-85218498592 (Scopus ID)978-3-031-79007-2 (ISBN)978-3-031-79006-5 (ISBN)
Konferanse
29th Nordic Conference, NordSec 2024, 6-7 November 2024, Karlstad, Sweden.
Tilgjengelig fra: 2025-02-10 Laget: 2025-02-10 Sist oppdatert: 2025-04-09bibliografisk kontrollert
Pathe, T. R. & Hacks, S. (2025). Towards Threat Modeling with Large Language Models - Automating Domain-Specific Language Creation in Meta Attack Language (MAL). In: Dominik Bork; Roman Lukyanenko; Shazia Sadiq; Ladjel Bellatreche; Oscar Pasto (Ed.), Conceptual Modeling: 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025, Proceedings. Paper presented at 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025. (pp. 146-164). Springer
Åpne denne publikasjonen i ny fane eller vindu >>Towards Threat Modeling with Large Language Models - Automating Domain-Specific Language Creation in Meta Attack Language (MAL)
2025 (engelsk)Inngår i: Conceptual Modeling: 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025, Proceedings / [ed] Dominik Bork; Roman Lukyanenko; Shazia Sadiq; Ladjel Bellatreche; Oscar Pasto, Springer , 2025, s. 146-164Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Developing domain-specific Meta Attack Languages (MAL) is essential yet labor-intensive in cybersecurity threat modeling, demanding technical expertise to convert unstructured knowledge into formal models. This study presents MAL-LLM, a system that leverages Large Language Models (LLMs) to automate the generation of MAL languages from sources like technical documentation and incident reports. Using a Design Science Research approach, MAL-LLM produces syntactically correct and semantically rich MAL-Languages more efficiently than manual methods. It outperforms a baseline LLM and human-created models in speed and structural accuracy, with minimal errors. Qualitative evaluation via the ExPerT framework shows high recall and domain relevance, though precision varies with source complexity. The system also generates executable MAL-related files for integration into existing toolchains. This work shows that LLMs can reduce development time and improve model quality, though challenges like hallucination control and stylistic consistency remain.

sted, utgiver, år, opplag, sider
Springer, 2025
Serie
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 16189
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-248738 (URN)10.1007/978-3-032-08623-5_8 (DOI)978-3-032-08623-5 (ISBN)978-3-032-08622-8 (ISBN)
Konferanse
44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025.
Tilgjengelig fra: 2025-10-30 Laget: 2025-10-30 Sist oppdatert: 2025-11-05bibliografisk kontrollert
Kinderen, S. d., Kaczmarek-Heß, M. & Hacks, S. (2024). A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design: On the Example of the Electricity Sector. Business & Information Systems Engineering
Åpne denne publikasjonen i ny fane eller vindu >>A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design: On the Example of the Electricity Sector
2024 (engelsk)Inngår i: Business & Information Systems Engineering, ISSN 2363-7005, E-ISSN 1867-0202Artikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

The increased reliance of organizations on information technology inherently increases their vulnerability to cyber-security attacks. As a response, a host of cyber-security approaches exists. While useful, these approaches exhibit shortcomings such as an inclination to be fragmented, not accounting for up-to-date organizational data, focusing on singular vulnerabilities only, and being reactive, i.e., focusing on patching up vulnerabilities in current systems. The paper presents and evaluates a modeling method aiming to address those shortcomings and to support security by design with a focus on the electricity sector. The proposed modeling method encompasses a multi-level reference model reconstructing and integrating existing initiatives and supporting top-down and bottom-up analyses. Compared to earlier work, the paper contributes (1) a process model for cyber-security by design, which proactively considers security as a first-class citizen during the design process, (2) a complete coverage of the multi-level model, in terms of three views complementing the introduced process model, (3) an elaborated evaluation, in terms of reporting on an additional design science cycle.

Emneord
Cyber-security by design, Modeling method, Security reference framework, Security analysis, Multi-level modeling
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-235700 (URN)10.1007/s12599-024-00899-y (DOI)001345228200003 ()2-s2.0-85207771557 (Scopus ID)
Tilgjengelig fra: 2024-11-19 Laget: 2024-11-19 Sist oppdatert: 2024-11-20
Hacks, S., Roelens, B., Kirikova, M., Reinhartz-Berger, I., Bork, D. & Krogstie, J. (Eds.). (2024). Companion Proceedings of the 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024. Paper presented at 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024.. CEUR Workshop Proceedings
Åpne denne publikasjonen i ny fane eller vindu >>Companion Proceedings of the 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024
Vise andre…
2024 (engelsk)Konferanseproceedings (Annet vitenskapelig)
sted, utgiver, år, opplag, sider
CEUR Workshop Proceedings, 2024
Serie
CEUR Workshop Proceedings, E-ISSN 1613-0073 ; 3855
HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-237090 (URN)
Konferanse
17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024.
Tilgjengelig fra: 2024-12-10 Laget: 2024-12-10 Sist oppdatert: 2024-12-11bibliografisk kontrollert
Hacks, S. & Pahl, J. (2024). Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool. Journal of Physics, Conference Series, 2867(1), Article ID 012047.
Åpne denne publikasjonen i ny fane eller vindu >>Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool
2024 (engelsk)Inngår i: Journal of Physics, Conference Series, ISSN 1742-6588, E-ISSN 1742-6596, Vol. 2867, nr 1, artikkel-id 012047Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The MISSION project aims to revolutionize maritime transport by developing a digital tool for real-time optimization of port calls and voyages, thereby reducing fuel consumption, cutting greenhouse gas emissions, and decreasing waiting times through enhanced coordination and information sharing among stakeholders. However, the security of the involved IT systems is critical to ensure safe and reliable operations.

This paper introduces harborLang, a novel threat modeling language tailored for the maritime sector, built on the Meta Attack Language (MAL) framework. harborLang addresses the unique security challenges in maritime transport by enabling the modeling and mitigation of potential threats through detailed attack simulations. By integrating harborLang with the Yet Another Cybersecurity Risk Assessment Framework (YACRAF), the project enhances its risk analysis capabilities, allowing for precise threat scenarios that reflect the maritime environment's complexities. The combined use of harborLang and YACRAF facilitates comprehensive cybersecurity risk assessments, significantly improving decision-making, operational safety, and the overall cybersecurity posture of maritime and port operations.

HSV kategori
Forskningsprogram
data- och systemvetenskap
Identifikatorer
urn:nbn:se:su:diva-234867 (URN)10.1088/1742-6596/2867/1/012047 (DOI)2-s2.0-85208138558 (Scopus ID)
Tilgjengelig fra: 2024-10-25 Laget: 2024-10-25 Sist oppdatert: 2024-11-12bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0003-0478-9347