Change search
Link to record
Permanent link

Direct link
Publications (10 of 33) Show all publications
Hacks, S. & Slupczynski, A. (2025). Advancing Enterprise Architecture Debt: Insights from Work System Theory. In: Rébecca Deneckère; Marite Kirikova; Janis Grabis (Ed.), Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings. Paper presented at Perspectives in Business Informatics Research, 24th International Conference, BIR 2025, 17-19 September 2025, Riga, Latvia. (pp. 107-123). Springer
Open this publication in new window or tab >>Advancing Enterprise Architecture Debt: Insights from Work System Theory
2025 (English)In: Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings / [ed] Rébecca Deneckère; Marite Kirikova; Janis Grabis, Springer , 2025, p. 107-123Conference paper, Published paper (Refereed)
Abstract [en]

Enterprise Architecture (EA) debt emerges when short-term decisions lead to structural inefficiencies that hinder organizational agility and strategic alignment. This paper applies Work System Theory (WST) to categorize and analyze EA debt, offering a structured approach to identifying and managing it. We highlight key challenges, research gaps, and future directions by mapping EA debt to WST components. The findings emphasize the need for adaptive frameworks, improved stakeholder engagement, and systematic debt management strategies.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356 ; 562
Keywords
Anthropology of Work, Architectural History and Theory, Enterprise Architecture, Organization Theory, Organizational Theory, Theory of Arts
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-247401 (URN)10.1007/978-3-032-04375-7_7 (DOI)2-s2.0-105016533918 (Scopus ID)978-3-032-04374-0 (ISBN)
Conference
Perspectives in Business Informatics Research, 24th International Conference, BIR 2025, 17-19 September 2025, Riga, Latvia.
Available from: 2025-09-24 Created: 2025-09-24 Last updated: 2025-10-07Bibliographically approved
Henriksén, N., Lexert, I., Dahn, J. & Hacks, S. (2025). Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO Membership. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the9 11th International Conference on Information Systems Security and Privacy-(Volume 1: . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 209-216). SciTePress
Open this publication in new window or tab >>Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO Membership
2025 (English)In: Proceedings of the9 11th International Conference on Information Systems Security and Privacy-(Volume 1 / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, p. 209-216Conference paper, Published paper (Refereed)
Abstract [en]

Sweden’s recent NATO membership marks a significant shift in the country’s national security strategy, particularly concerning cybersecurity. This study has assessed the current cybersecurity landscape in Sweden by conducting interviews with experts within the public sector and through document analysis. The interviewees included academics, researchers, and government officials from the municipal level to parliament. The study concludes how the threat environment has evolved following Sweden’s NATO membership. The study has identified key cyber threats facing Sweden, primarily from state-sponsored actors such as Advanced Persistent Threat (APT) groups and cybercriminal organizations targeting critical infrastructure. The study has also found disparities in cybersecurity preparedness between Sweden’s military and civilian sectors. The study emphasizes the need to strengthen civilian cybersecurity to reach a similar preparedness as the military to adapt to NATO’s requirements and stand ards.

Place, publisher, year, edition, pages
SciTePress, 2025
Series
ICISSP, E-ISSN 2184-4356
Keywords
Cybersecurity, Sweden, NATO Membership, Cyber Defense, Cyber Threats
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240582 (URN)10.5220/0013117800003899 (DOI)2-s2.0-105001873004 (Scopus ID)978-989-758-735-1 (ISBN)
Conference
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-05-06Bibliographically approved
Naval, M., Perjons, E. & Hacks, S. (2025). Cybersecurity Challenges in Critical Infrastructure: A Perspective on Regulations and Competence in Luxembourg. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume 1): . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 15-26). SciTePress
Open this publication in new window or tab >>Cybersecurity Challenges in Critical Infrastructure: A Perspective on Regulations and Competence in Luxembourg
2025 (English)In: Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume 1) / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, p. 15-26Conference paper, Published paper (Refereed)
Abstract [en]

Critical infrastructure (CI) faces a growing threat of cyber-attacks as digitalization expands across industries, necessitating robust cyber-security measures. This study focuses on the challenges of securing CI in Luxembourg, exploring both regulatory and organizational aspects. Semi-structured interviews with chief information security officers (CISOs) within Luxembourg’s CI sectors were conducted to gather insights. Thematic analysis revealed six key challenge themes: Regulatory Compliance, Industry Landscape and Adaptation, Resource Management, External Collaboration and Support, IT Infrastructure Management, and Operational Governance. The findings underscore the need for a comprehensive, multi-faceted approach involving international regulation alignment, streamlined reporting, enhanced national cyber-security support, government initiatives, and ongoing harmonization efforts across nations to address cyber-security challenges in critical infrastructure effectively.

Place, publisher, year, edition, pages
SciTePress, 2025
Series
ICISSP, E-ISSN 2184-4356
Keywords
Critical Infrastructure, Cyber-Security Challenges, Luxembourg, Thematic Analysis
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240586 (URN)10.5220/0013091500003899 (DOI)2-s2.0-105001800531 (Scopus ID)978-989-758-735-1 (ISBN)
Conference
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-05-06Bibliographically approved
Eduardo Araújo Cardoso Cidrão, C., Hermansson, O. & Hacks, S. (2025). Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume !=: . Paper presented at International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal. (pp. 234-241). SciTePress
Open this publication in new window or tab >>Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?
2025 (English)In: Proceedings of the 11th International Conference on Information Systems Security and Privacy-(Volume != / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, SciTePress , 2025, p. 234-241Conference paper, Published paper (Refereed)
Abstract [en]

Phishing attacks, a cybercrime where attackers deceive victims into revealing personal and financial information, present significant threats to cloud-based systems. Securing these environments has become paramount with the growing adoption of cloud services. This study addresses the research question: ”What is the overall perception of strategies in scientific publications to counter phishing attacks targeting cloud services?” Using a systematic literature review approach, the research synthesized findings from 13 selected scientific articles, focusing on technical and social defense strategies against phishing. The study highlights the human factor as a critical vulnerability despite existing technical solutions like advanced authentication, IDS (Intrusion Detection System), and machine learning. Effective defense requires combining technical measures with user education and adapting to evolving phishing strategies. It calls for greater integration of social aspects into technical solutions and targeted research on cloud-specific defenses and AI’s role in phishing mitigation.

Place, publisher, year, edition, pages
SciTePress, 2025
Series
ICISSP, E-ISSN 2184-4356
Keywords
Phishing, Cloud, Cyber Defense, Systematic Literature Review
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240587 (URN)10.5220/0013140000003899 (DOI)2-s2.0-105001803387 (Scopus ID)978-989-758-735-1 (ISBN)
Conference
International Conference on Information Systems Security and Privacy, February 20-22, 2025, in Porto, Portugal.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-05-06Bibliographically approved
Hacks, S., Malakhova, D. & Pahl, J. (2025). MaritIme juSt in time optimiSatION (MISSION). In: Claudenir M. Fonseca; Mattia Fumagalli (Ed.), Proceedings of the Research Projects Exhibition Papers Presented at the 37th International Conference on Advanced Information Systems Engineering (CAiSE 2025): . Paper presented at CAiSE-RPE 2025, Research Projects Exhibition at CAiSE 2025, Vienna, Austria, June 16-20, 2025..
Open this publication in new window or tab >>MaritIme juSt in time optimiSatION (MISSION)
2025 (English)In: Proceedings of the Research Projects Exhibition Papers Presented at the 37th International Conference on Advanced Information Systems Engineering (CAiSE 2025) / [ed] Claudenir M. Fonseca; Mattia Fumagalli, 2025Conference paper, Published paper (Refereed)
Abstract [en]

The MISSION project aims to improve efficiency and reduce greenhouse gas emissions (GHG) in maritime transport by enabling just-in-time (JIT) port calls through digital coordination. Many ports still operate on a f irst-come-first-served (FCFS) basis, leading to unnecessary waiting times, fuel waste, and emissions. MISSION addresses these challenges by developing an interoperable, real-time optimization tool that supports better communication and collaboration between ships, ports, and hinterland logistics. This article presents the current state of the project.

Series
CEUR Workshop Proceedings, E-ISSN 1613-0073 ; 4050
Keywords
Port Call Optimization, Green House Gas Reduction, Integration Architecture
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-248242 (URN)2-s2.0-105018669744 (Scopus ID)
Conference
CAiSE-RPE 2025, Research Projects Exhibition at CAiSE 2025, Vienna, Austria, June 16-20, 2025.
Available from: 2025-10-20 Created: 2025-10-20 Last updated: 2025-10-24Bibliographically approved
Rehnstam, E., Winquist, W. & Hacks, S. (2025). NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. In: Leonardo Horn Iwaya; Liina Kamm; Leonardo Martucci; Tobias Pulls (Ed.), Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings. Paper presented at 29th Nordic Conference, NordSec 2024, 6-7 November 2024, Karlstad, Sweden. (pp. 176-195). Springer
Open this publication in new window or tab >>NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure
2025 (English)In: Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings / [ed] Leonardo Horn Iwaya; Liina Kamm; Leonardo Martucci; Tobias Pulls, Springer , 2025, p. 176-195Conference paper, Published paper (Refereed)
Abstract [en]

This study evaluates the preparedness of Swedish critical infrastructure for the NIS2 directive, which sets enhanced EU standards for information- and cybersecurity. The research reveals a generally low competence level, highlighting a lack of readiness for the directive’s requirements. Variations in competence are influenced by organizational size, resource availability, and existing strategic processes. Larger organizations with roles like CISOs tend to have higher competence levels, yet significant gaps remain in meeting the directive’s demands. The study emphasizes the need for comprehensive business and gap analyses to identify critical areas for improvement. Organizations should adopt strategic, systematic approaches to cybersecurity that integrate with existing processes. Enhancing competencies requires increased investment in education and training, supported by leadership committed to fostering a robust security culture. The NIS2 directive should be seen not as a regulatory burden but as an opportunity to enhance resilience against cyber threats. Methodologically, the study uses a consistent semi-structured interview approach with experts and authorities to ensure validity and reliability. Although the qualitative nature of the research limits generalizability, it offers critical insights into Sweden’s cybersecurity readiness and the need for strategic improvements.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15396
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-239292 (URN)10.1007/978-3-031-79007-2_10 (DOI)2-s2.0-85218498592 (Scopus ID)978-3-031-79007-2 (ISBN)978-3-031-79006-5 (ISBN)
Conference
29th Nordic Conference, NordSec 2024, 6-7 November 2024, Karlstad, Sweden.
Available from: 2025-02-10 Created: 2025-02-10 Last updated: 2025-04-09Bibliographically approved
Pathe, T. R. & Hacks, S. (2025). Towards Threat Modeling with Large Language Models - Automating Domain-Specific Language Creation in Meta Attack Language (MAL). In: Dominik Bork; Roman Lukyanenko; Shazia Sadiq; Ladjel Bellatreche; Oscar Pasto (Ed.), Conceptual Modeling: 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025, Proceedings. Paper presented at 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025. (pp. 146-164). Springer
Open this publication in new window or tab >>Towards Threat Modeling with Large Language Models - Automating Domain-Specific Language Creation in Meta Attack Language (MAL)
2025 (English)In: Conceptual Modeling: 44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025, Proceedings / [ed] Dominik Bork; Roman Lukyanenko; Shazia Sadiq; Ladjel Bellatreche; Oscar Pasto, Springer , 2025, p. 146-164Conference paper, Published paper (Refereed)
Abstract [en]

Developing domain-specific Meta Attack Languages (MAL) is essential yet labor-intensive in cybersecurity threat modeling, demanding technical expertise to convert unstructured knowledge into formal models. This study presents MAL-LLM, a system that leverages Large Language Models (LLMs) to automate the generation of MAL languages from sources like technical documentation and incident reports. Using a Design Science Research approach, MAL-LLM produces syntactically correct and semantically rich MAL-Languages more efficiently than manual methods. It outperforms a baseline LLM and human-created models in speed and structural accuracy, with minimal errors. Qualitative evaluation via the ExPerT framework shows high recall and domain relevance, though precision varies with source complexity. The system also generates executable MAL-related files for integration into existing toolchains. This work shows that LLMs can reduce development time and improve model quality, though challenges like hallucination control and stylistic consistency remain.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 16189
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-248738 (URN)10.1007/978-3-032-08623-5_8 (DOI)978-3-032-08623-5 (ISBN)978-3-032-08622-8 (ISBN)
Conference
44th International Conference, ER 2025, Poitiers, France, October 20–23, 2025.
Available from: 2025-10-30 Created: 2025-10-30 Last updated: 2025-11-05Bibliographically approved
Kinderen, S. d., Kaczmarek-Heß, M. & Hacks, S. (2024). A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design: On the Example of the Electricity Sector. Business & Information Systems Engineering
Open this publication in new window or tab >>A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design: On the Example of the Electricity Sector
2024 (English)In: Business & Information Systems Engineering, ISSN 2363-7005, E-ISSN 1867-0202Article in journal (Refereed) Epub ahead of print
Abstract [en]

The increased reliance of organizations on information technology inherently increases their vulnerability to cyber-security attacks. As a response, a host of cyber-security approaches exists. While useful, these approaches exhibit shortcomings such as an inclination to be fragmented, not accounting for up-to-date organizational data, focusing on singular vulnerabilities only, and being reactive, i.e., focusing on patching up vulnerabilities in current systems. The paper presents and evaluates a modeling method aiming to address those shortcomings and to support security by design with a focus on the electricity sector. The proposed modeling method encompasses a multi-level reference model reconstructing and integrating existing initiatives and supporting top-down and bottom-up analyses. Compared to earlier work, the paper contributes (1) a process model for cyber-security by design, which proactively considers security as a first-class citizen during the design process, (2) a complete coverage of the multi-level model, in terms of three views complementing the introduced process model, (3) an elaborated evaluation, in terms of reporting on an additional design science cycle.

Keywords
Cyber-security by design, Modeling method, Security reference framework, Security analysis, Multi-level modeling
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-235700 (URN)10.1007/s12599-024-00899-y (DOI)001345228200003 ()2-s2.0-85207771557 (Scopus ID)
Available from: 2024-11-19 Created: 2024-11-19 Last updated: 2024-11-20
Hacks, S., Roelens, B., Kirikova, M., Reinhartz-Berger, I., Bork, D. & Krogstie, J. (Eds.). (2024). Companion Proceedings of the 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024. Paper presented at 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024.. CEUR Workshop Proceedings
Open this publication in new window or tab >>Companion Proceedings of the 17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024
Show others...
2024 (English)Conference proceedings (editor) (Other academic)
Place, publisher, year, edition, pages
CEUR Workshop Proceedings, 2024
Series
CEUR Workshop Proceedings, E-ISSN 1613-0073 ; 3855
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-237090 (URN)
Conference
17th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling Forum, M4S, FACETE, AEM, Tools and Demos co-located with PoEM 2024, Stockholm, Sweden, December 3-5, 2024.
Available from: 2024-12-10 Created: 2024-12-10 Last updated: 2024-12-11Bibliographically approved
Hacks, S. & Pahl, J. (2024). Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool. Journal of Physics, Conference Series, 2867(1), Article ID 012047.
Open this publication in new window or tab >>Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool
2024 (English)In: Journal of Physics, Conference Series, ISSN 1742-6588, E-ISSN 1742-6596, Vol. 2867, no 1, article id 012047Article in journal (Refereed) Published
Abstract [en]

The MISSION project aims to revolutionize maritime transport by developing a digital tool for real-time optimization of port calls and voyages, thereby reducing fuel consumption, cutting greenhouse gas emissions, and decreasing waiting times through enhanced coordination and information sharing among stakeholders. However, the security of the involved IT systems is critical to ensure safe and reliable operations.

This paper introduces harborLang, a novel threat modeling language tailored for the maritime sector, built on the Meta Attack Language (MAL) framework. harborLang addresses the unique security challenges in maritime transport by enabling the modeling and mitigation of potential threats through detailed attack simulations. By integrating harborLang with the Yet Another Cybersecurity Risk Assessment Framework (YACRAF), the project enhances its risk analysis capabilities, allowing for precise threat scenarios that reflect the maritime environment's complexities. The combined use of harborLang and YACRAF facilitates comprehensive cybersecurity risk assessments, significantly improving decision-making, operational safety, and the overall cybersecurity posture of maritime and port operations.

National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-234867 (URN)10.1088/1742-6596/2867/1/012047 (DOI)2-s2.0-85208138558 (Scopus ID)
Available from: 2024-10-25 Created: 2024-10-25 Last updated: 2024-11-12Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0478-9347

Search in DiVA

Show all publications