Computational Analysis of the Effectiveness of the Intelligence Cycle for Organizational Cyber Risk Management

Euan Jeffery, Uwais Malsagov, Niels Tijssen, Andreas Zeisig, Charlotte C.A. Hoffmans, Jan Treur*, Peter H.M.P. Roelofsma

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

This paper presents a computational analysis of the effectiveness of the intelligence cycle to enhance the cybersecurity defences of a large company such as ASML which is targeted by sophisticated cyber threats. Each intelligence cycle’s phase’s efficiency is crucial for timely and accurate threat detection, processing, and response. A What-If analysis and risk assessment highlight the significant impact of data collection effectiveness, data processing speed, and intelligence analysis accuracy on the overall performance of the intelligence cycle.

Original languageEnglish
Title of host publicationArtificial Intelligence and System Engineering - Proceedings of 8th Computational Methods in Systems and Software 2024
EditorsRadek Silhavy, Petr Silhavy
PublisherSpringer Nature
Pages180-201
Number of pages22
ISBN (Electronic)9783031967597
ISBN (Print)9783031967580
DOIs
Publication statusPublished - 2025
Event8th International Conference on Computational Methods in Systems and Software, CoMeSySo 2024 -
Duration: 12 Oct 202414 Oct 2024

Publication series

NameLecture Notes in Networks and Systems
PublisherSpringer
Volume1490 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389
NameCoMeSySo: Proceedings of the Computational Methods in Systems and Software
PublisherSpringer
Volume2024

Conference

Conference8th International Conference on Computational Methods in Systems and Software, CoMeSySo 2024
Period12/10/2414/10/24

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Fingerprint

Dive into the research topics of 'Computational Analysis of the Effectiveness of the Intelligence Cycle for Organizational Cyber Risk Management'. Together they form a unique fingerprint.

Cite this