{"id":"https://openalex.org/W2033176976","doi":"https://doi.org/10.1109/stast.2011.6059255","title":"Information security management systems and socio-technical walkthroughs","display_name":"Information security management systems and socio-technical walkthroughs","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2033176976","doi":"https://doi.org/10.1109/stast.2011.6059255","mag":"2033176976"},"language":"en","primary_location":{"id":"doi:10.1109/stast.2011.6059255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/stast.2011.6059255","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083023312","display_name":"Kai\u2010Uwe Loser","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kai-Uwe Loser","raw_affiliation_strings":["Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","Information and Technology Management, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Information and Technology Management, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067373153","display_name":"Alexander Nolte","orcid":"https://orcid.org/0000-0003-1255-824X"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Nolte","raw_affiliation_strings":["Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","Information and Technology Management, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Information and Technology Management, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083843849","display_name":"Thomas Herrmann","orcid":"https://orcid.org/0000-0002-9270-4501"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Herrmann","raw_affiliation_strings":["Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","Information and Technology Management, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Information and Technology Management, Ruhr University of Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Information and Technology Management, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081370650","display_name":"Haiko te Neues","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Haiko te Neues","raw_affiliation_strings":["University Administration, Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"University Administration, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083023312"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.14352951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"45","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11024","display_name":"Information Systems Theories and Implementation","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6551249027252197},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.5934134721755981},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5575058460235596},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.5445960760116577},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5330613255500793},{"id":"https://openalex.org/keywords/software-walkthrough","display_name":"Software walkthrough","score":0.5039448142051697},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4613094627857208},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.44101861119270325},{"id":"https://openalex.org/keywords/technical-communication","display_name":"Technical communication","score":0.4384099543094635},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4141577482223511},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4001339077949524},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3438945412635803},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3402721583843231},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.26290854811668396},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.17754530906677246},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.12120068073272705}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6551249027252197},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.5934134721755981},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5575058460235596},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.5445960760116577},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5330613255500793},{"id":"https://openalex.org/C46110900","wikidata":"https://www.wikidata.org/wiki/Q11702993","display_name":"Software walkthrough","level":5,"score":0.5039448142051697},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4613094627857208},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.44101861119270325},{"id":"https://openalex.org/C64364511","wikidata":"https://www.wikidata.org/wiki/Q1132530","display_name":"Technical communication","level":2,"score":0.4384099543094635},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4141577482223511},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4001339077949524},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3438945412635803},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3402721583843231},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26290854811668396},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.17754530906677246},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12120068073272705},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/stast.2011.6059255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/stast.2011.6059255","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W23856054","https://openalex.org/W1484252823","https://openalex.org/W1604070650","https://openalex.org/W1973182598","https://openalex.org/W1974123882","https://openalex.org/W1977534227","https://openalex.org/W1995841147","https://openalex.org/W2011493069","https://openalex.org/W2019721567","https://openalex.org/W2023641092","https://openalex.org/W2028521236","https://openalex.org/W2032047314","https://openalex.org/W2048584594","https://openalex.org/W2050109227","https://openalex.org/W2065367771","https://openalex.org/W2075986741","https://openalex.org/W2083209334","https://openalex.org/W2123735821","https://openalex.org/W2124621485","https://openalex.org/W2174769915"],"related_works":["https://openalex.org/W2384517284","https://openalex.org/W2356461702","https://openalex.org/W2014872351","https://openalex.org/W2364504590","https://openalex.org/W2384717657","https://openalex.org/W2136424227","https://openalex.org/W2006831188","https://openalex.org/W2351445356","https://openalex.org/W2394152225","https://openalex.org/W2364753390"],"abstract_inverted_index":{"Information":[0],"Security":[1],"Management":[2],"is":[3,102],"related":[4],"to":[5,106],"the":[6,25,29,62],"design":[7],"of":[8,16,19,28,36,89,97],"socio-technical":[9,30],"work":[10],"processes.":[11],"The":[12],"development":[13],"and":[14,65,100],"reflection":[15],"this":[17,53],"kind":[18],"processes":[20],"can":[21,68,77],"be":[22,69,78],"supported":[23],"with":[24,48],"field-tested":[26],"method":[27],"walkthrough":[31],"(STWT).":[32],"Within":[33],"a":[34,41,72,111],"project":[35,54],"raising":[37],"security":[38],"standards":[39],"for":[40,58],"university":[42],"administration":[43],"infrastructure,":[44],"STWT":[45,104],"was":[46],"combined":[47],"common":[49],"ISMS":[50],"methodology.":[51],"During":[52],"we":[55],"found":[56],"indicators":[57],"improvement":[59],"by":[60],"employing":[61],"STWT:":[63],"technical":[64],"organizational":[66],"measures":[67],"specified":[70],"in":[71],"single":[73],"effort;":[74],"contingent":[75],"relationships":[76],"taken":[79],"into":[80],"account":[81],"as":[82,84,114,116],"well":[83,115],"vulnerability":[85],"resulting":[86],"from":[87],"characteristics":[88],"social":[90],"structures.":[91],"Furthermore":[92],"switching":[93],"between":[94],"different":[95],"levels":[96],"abstraction,":[98],"details":[99],"formalization":[101],"possible.":[103],"helps":[105],"develop":[107],"artifacts":[108],"which":[109],"support":[110],"focused":[112],"discussion":[113],"an":[117],"appropriate":[118],"documentation.":[119]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
