{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:08:15Z","timestamp":1758931695246,"version":"3.44.0"},"reference-count":115,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":268,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"publisher","award":["EP\/R006865\/1"],"award-info":[{"award-number":["EP\/R006865\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The nature of information security has been, and probably will continue to be, marked by the asymmetric competition of attackers and defenders over the control of an uncertain environment. The reduction of this degree of uncertainty via an increase in understanding of that environment is a primary objective for both sides. Models are useful tools in this context because they provide a way to understand and experiment with their targets without the usual operational constraints. However, given the technological and social advancements of today, the object of modelling has increased in complexity. Such objects are no longer singular entities but heterogeneous socio-technical systems interlinked to form large-scale ecosystems. Furthermore, the underlying components of a system might be based on very different epistemic assumptions and methodologies for construction and use. Naturally, consistent, rigorous reasoning about such systems is hard but necessary for achieving both security and resilience. The goal of this paper is to present a modelling approach tailored for heterogeneous systems based on three elements: an inferentialist interpretation of what a model is, a distributed systems metaphor to structure that interpretation and a co-design cycle to describe the practical design and construction of the model. The underlying idea is that an open-world interpretation, supported by a formal, yet generic abstraction facilitating knowledge translation and providing properties for structured reasoning and, used in practice according to the co-design cycle could lead to models that are more likely to achieve their pre-stated goals. We explore the suitability of this method in the context of two different security-oriented models: an organizational recovery under ransomware model and a surge capacity trauma unit model.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf025","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T12:28:01Z","timestamp":1758889681000},"source":"Crossref","is-referenced-by-count":0,"title":["Co-designing heterogeneous models: a distributed systems approach"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5424-5375","authenticated-orcid":false,"given":"Marius-Constantin","family":"Ilau","sequence":"first","affiliation":[{"name":"University College London , Department of Computer Science, London, WC1E 6BT ,","place":["UK"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7039-6472","authenticated-orcid":false,"given":"Tristan","family":"Caulfield","sequence":"additional","affiliation":[{"name":"University College London , Department of Computer Science, London, WC1E 6BT ,","place":["UK"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6504-5838","authenticated-orcid":false,"given":"David","family":"Pym","sequence":"additional","affiliation":[{"name":"University College London , Department of Computer Science, London, WC1E 6BT ,","place":["UK"]},{"name":"Institute of Philosophy, University of London , London, WC1E 7HU ,","place":["UK"]}]}],"member":"286","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"key":"2025092608275851000_bib1","first-page":"vii","article-title":"Introduction: the pluralist stance","volume-title":"Scientific Pluralism","author":"Kellert","year":"2006"},{"key":"2025092608275851000_bib2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/S0305-0483(97)00018-2","article-title":"Multimethodology: towards a framework for mixing methodologies","volume":"25","author":"Mingers","year":"1997","journal-title":"Omega"},{"key":"2025092608275851000_bib3","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1002\/sres.1120","article-title":"Towards a framework for multiparadigm multimethodologies","volume":"28","author":"Bowers","year":"2011","journal-title":"Syst Res Behav Sci"},{"key":"2025092608275851000_bib4","first-page":"275","article-title":"Integrating epistemologies through scenarios","volume-title":"Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment","author":"Bennett","year":"2006"},{"key":"2025092608275851000_bib5","article-title":"Knowledge co-creation: interaction between science and society","volume-title":"A Transdisciplinary Approach to Complex Societal Issues Den Haag: Advisory Council for Research on Spatial Planning, Nature and the Environment\/Consultative Committee of Sector Councils in the Netherlands [RMNO\/COS]","author":"Regeer","year":"2009"},{"key":"2025092608275851000_bib6","first-page":"163","article-title":"The methodology of participatory design","volume":"52","author":"Spinuzzi","year":"2005","journal-title":"Tech Commun"},{"key":"2025092608275851000_bib7","doi-asserted-by":"crossref","DOI":"10.31235\/osf.io\/v9bmr","article-title":"Making it count. An inferentialist account of computer simulation","author":"Kuorikoski","year":"2019"},{"key":"2025092608275851000_bib8","doi-asserted-by":"crossref","DOI":"10.1017\/9781009003575","volume-title":"Scientific Representation","author":"Nguyen","year":"2022"},{"key":"2025092608275851000_bib9","first-page":"255","article-title":"Speaker\u2019s reference and semantic reference, Ludlow P. (red.)","volume":"2","author":"Kripke","year":"1977","journal-title":"Wiley"},{"key":"2025092608275851000_bib10","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-1-4020-4104-4_13","article-title":"A puzzle about belief","volume-title":"Meaning and Use: Papers Presented at the Second Jerusalem Philosophical Encounter April 1976","author":"Kripke","year":"1979"},{"key":"2025092608275851000_bib11","article-title":"Afterthoughts","author":"Kaplan","year":"1989"},{"key":"2025092608275851000_bib12","first-page":"481","article-title":"An essay on the semantics, logic, metaphysics, and epistemology of demonstratives and other indexicals","volume-title":"Themes from Kaplan","author":"Kaplan","year":"1989"},{"key":"2025092608275851000_bib13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1093\/aristoteliansupp\/64.1.93","article-title":"Words","volume":"64","author":"Kaplan","year":"1990","journal-title":"Proc Aristot Soc Suppl Vol"},{"key":"2025092608275851000_bib14","first-page":"131","article-title":"The meaning of \u201cmeaning\u201d","volume":"7","author":"Putnam","year":"1975","journal-title":"Minn Stud Philos Sci"},{"key":"2025092608275851000_bib15","first-page":"25","article-title":"\u00dcber sinn und bedeutung","volume":"100","author":"Frege","year":"1892","journal-title":"Z Philos Philos Krit"},{"key":"2025092608275851000_bib16","first-page":"\u00a047","article-title":"Der gedanke. eine logische untersuchung","volume":"4","author":"Frege","year":"1997","journal-title":"Wittgenstein Studien"},{"key":"2025092608275851000_bib17","first-page":"252","article-title":"Models of data","volume-title":"Studies in Logic and the Foundations of Mathematics","author":"Suppes","year":"1966"},{"key":"2025092608275851000_bib18","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00204967","article-title":"Philosophical problems in the empirical science of science: a formal approach","volume":"10","author":"Sneed","year":"1976","journal-title":"Erkenntnis"},{"key":"2025092608275851000_bib19","volume-title":"The scientific image","author":"Van\u00a0Fraassen","year":"1980"},{"key":"2025092608275851000_bib20","volume-title":"Science and Partial Truth: A Unitary Approach to Models and Scientific Reasoning","author":"Da\u00a0Costa","year":"2003"},{"key":"2025092608275851000_bib21","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctv18zhdxp","volume-title":"The Structure and Confirmation of Evolutionary Theory","author":"Lloyd","year":"2021"},{"key":"2025092608275851000_bib22","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11098-008-9313-2","article-title":"Models and fictions in science","volume":"143","author":"Godfrey-Smith","year":"2009","journal-title":"Philos Stud"},{"key":"2025092608275851000_bib23","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11229-009-9505-0","article-title":"Models and fiction","volume":"172","author":"Frigg","year":"2010","journal-title":"Synthese"},{"key":"2025092608275851000_bib24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-30526-4_3","article-title":"Models and representation","volume-title":"Springer Handbook of Model-based Science","author":"Frigg","year":"2017"},{"key":"2025092608275851000_bib25","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11098-014-0333-9","article-title":"Modeling without models","volume":"172","author":"Levy","year":"2015","journal-title":"Philos Stud"},{"key":"2025092608275851000_bib26","volume-title":"Simulation and Similarity: Using Models to Understand the World","author":"Weisberg","year":"2012"},{"key":"2025092608275851000_bib27","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1086\/421415","article-title":"An inferential conception of scientific representation","volume":"71","author":"Su\u00e1rez","year":"2004","journal-title":"Philos sci"},{"key":"2025092608275851000_bib28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1086\/519478","article-title":"Scientific representation, interpretation, and surrogative reasoning","volume":"74","author":"Contessa","year":"2007","journal-title":"Philos Sci"},{"key":"2025092608275851000_bib29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1747-9991.2009.00261.x","article-title":"Scientific representation","volume":"5","author":"Su\u00e1rez","year":"2010","journal-title":"Philos Compass"},{"key":"2025092608275851000_bib30","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10670-008-9139-5","article-title":"Credibility, idealisation, and model building: an inferential approach","volume":"70","author":"de\u00a0Donato\u00a0Rodriguez","year":"2009","journal-title":"Erkenntnis"},{"key":"2025092608275851000_bib31","doi-asserted-by":"publisher","first-page":"378","DOI":"10.5840\/monist201497324","article-title":"Computer simulations: an inferential conception","volume":"97","author":"Bueno","year":"2014","journal-title":"The Monist"},{"key":"2025092608275851000_bib32","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s13194-012-0049-7","article-title":"How can computer simulations produce new knowledge?","volume":"2","author":"Beisbart","year":"2012","journal-title":"Eur J Philos Sci"},{"key":"2025092608275851000_bib33","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/02698595.2012.748497","article-title":"Why Monte Carlo simulations are inferences and not experiments","volume":"26","author":"Beisbart","year":"2012","journal-title":"Int Stud Philos Sci"},{"key":"2025092608275851000_bib34","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s11023-020-09520-z","article-title":"What is a simulation model?","volume":"30","author":"Dur\u00e1n","year":"2020","journal-title":"Minds Mach"},{"key":"2025092608275851000_bib35","first-page":"3102","article-title":"Towards a theory of conceptual modelling","volume":"16","author":"Thalheim","year":"2010","journal-title":"J Univers Comput Sci"},{"key":"2025092608275851000_bib36","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1093\/monist\/onw002","article-title":"The fiction view of models reloaded","volume":"99","author":"Frigg","year":"2016","journal-title":"The Monist"},{"key":"2025092608275851000_bib37","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-662-58824-6_11","article-title":"The co-design methodology","volume":"1","author":"Schewe","year":"2019","journal-title":"Design Dev Web Inf Syst"},{"key":"2025092608275851000_bib38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-58824-6_1","article-title":"The co-design framework","volume":"1","author":"Schewe","year":"2019","journal-title":"Design Dev Web Inf Syst"},{"key":"2025092608275851000_bib39","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/17440080580000078","article-title":"The co-design approach to Web information systems development","volume":"1","author":"Schewe","year":"2005","journal-title":"Int J Web Inf Syst"},{"key":"2025092608275851000_bib40","first-page":"108","article-title":"Found in translation: co-design for security modelling","volume-title":"International Workshop on Socio-Technical Aspects in Security","author":"Demjaha","year":"2021"},{"key":"2025092608275851000_bib41","volume-title":"Co-design and modelling of security policy for cultural and behavioural aspects of security in organisations","author":"Demjaha","year":"2023"},{"key":"2025092608275851000_bib42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3171533.3171540","article-title":"Practicing a science of security: a philosophy of science perspective","volume-title":"Proceedings of the 2017 New Security Paradigms Workshop","author":"Spring","year":"2017"},{"key":"2025092608275851000_bib43","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctv2x8v8nc","volume-title":"Handbook of Metaphysics and Ontology","author":"Burkhardt","year":"1991"},{"key":"2025092608275851000_bib44","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.shpsa.2014.11.001","article-title":"Deflationary representation, inference, and practice","volume":"49","author":"Su\u00e1rez","year":"2015","journal-title":"Studi Hist Philos Sci Part A"},{"key":"2025092608275851000_bib45","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804397","volume-title":"Contingency, Irony, and Solidarity","author":"Rorty","year":"1989"},{"key":"2025092608275851000_bib46","first-page":"242","article-title":"The fixation of belief","volume-title":"Writings of Charles S Peirce: A Chronological Edition","author":"Peirce","year":"1986"},{"key":"2025092608275851000_bib47","first-page":"193","article-title":"How to make our ideas clear","author":"Peirce","year":"2001","journal-title":"The Nature of Truth: Classic and Contemporary Perspectives"},{"key":"2025092608275851000_bib48","volume-title":"Empiricism and the Philosophy of Mind","author":"Sellars","year":"1956"},{"key":"2025092608275851000_bib49","first-page":"1","article-title":"Philosophy and the scientific image of man","volume":"1","author":"Sellars","year":"1962","journal-title":"Front Sci Philos"},{"key":"2025092608275851000_bib50","doi-asserted-by":"crossref","DOI":"10.56021\/9780801860393","volume-title":"Global Communications Since 1844: Geopolitics and Technology","author":"Hugill","year":"1999"},{"key":"2025092608275851000_bib51","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226458144.001.0001","volume-title":"The Structure of Scientific Revolutions","author":"Kuhn","year":"2012"},{"key":"2025092608275851000_bib52","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1057\/palgrave.jors.2600946","article-title":"Industrial dynamics","volume":"48","author":"Forrester","year":"1997","journal-title":"J Oper Res Soc"},{"key":"2025092608275851000_bib53","first-page":"291","article-title":"Criteria for evaluation of econometric models","volume-title":"Annals of Economic and Social Measurement","author":"Dhrymes","year":"1972"},{"key":"2025092608275851000_bib54","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1080\/00213624.1988.11504801","article-title":"Institutional dynamics: an extension of the institutionalist approach to socioeconomic analysis","volume":"22","author":"Radzicki","year":"1988","journal-title":"J Econ Issues"},{"key":"2025092608275851000_bib55","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1111\/j.1467-954X.1984.tb00113.x","article-title":"Some elements of a sociology of translation: domestication of the scallops and the fishermen of St Brieuc Bay","volume":"32","author":"Callon","year":"1984","journal-title":"Sociol Rev"},{"key":"2025092608275851000_bib56","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1017\/S1068280500010078","article-title":"Controlling the biological invasion of a commercial fishery by a space competitor: a bioeconomic model with reference to the bay of St-Brieuc scallop fishery","volume":"35","author":"Fr\u00e9sard","year":"2006","journal-title":"Agr Resour Econ Rev"},{"key":"2025092608275851000_bib57","first-page":"259","article-title":"Meta-modelling for Ecosystems Security","volume-title":"International Conference on Simulation Tools and Techniques","author":"Caulfield","year":"2021"},{"key":"2025092608275851000_bib58","first-page":"71","article-title":"Bayes\u2019s theorem and weighing evidence by juries","volume-title":"Proceedings-British Academy. Vol. 113","author":"Dawid","year":"2002"},{"key":"2025092608275851000_bib59","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.destud.2008.03.003","article-title":"Barriers and enablers for creating shared understanding in co-design projects","volume":"29","author":"Kleinsmann","year":"2008","journal-title":"Des Stud"},{"key":"2025092608275851000_bib60","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0142-694X(88)90045-2","article-title":"An ethnographic perspective on engineering design","volume":"9","author":"Bucciarelli","year":"1988","journal-title":"Des Stud"},{"key":"2025092608275851000_bib61","volume-title":"Designing Engineers","author":"Bucciarelli","year":"1994"},{"key":"2025092608275851000_bib62","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0142-694X(94)00007-Z","article-title":"Observations of teamwork and social processes in design","volume":"16","author":"Cross","year":"1995","journal-title":"Des Stud"},{"key":"2025092608275851000_bib63","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/S0142-694X(99)00017-4","article-title":"Analysis of design projects","volume":"20","author":"Badke-Schaub","year":"1999","journal-title":"Des Stud"},{"key":"2025092608275851000_bib64","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0142-694X(01)00035-7","article-title":"Between thought and object in engineering design","volume":"23","author":"Bucciarelli","year":"2002","journal-title":"Des Stud"},{"key":"2025092608275851000_bib65","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/15710880601170768","article-title":"Mental models in design teams: a valid approach to performance in design collaboration?","volume":"3","author":"Badke-Schaub","year":"2007","journal-title":"CoDesign"},{"key":"2025092608275851000_bib66","first-page":"5","article-title":"Co-creation and the new landscapes of design","volume":"4","author":"Sanders","year":"2008","journal-title":"Co-design"},{"key":"2025092608275851000_bib67","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.envsoft.2015.11.016","article-title":"Modelling with stakeholders\u2013next generation","volume":"77","author":"Voinov","year":"2016","journal-title":"Environ Modell Softw"},{"key":"2025092608275851000_bib68","first-page":"445","article-title":"User-centered design","volume-title":"Encyclopedia of Human-Computer Interaction","author":"Abras","year":"2004"},{"key":"2025092608275851000_bib69","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.envsoft.2017.01.014","article-title":"Collaborative modelling or participatory modelling? A framework for water resources management","volume":"91","author":"Basco-Carrera","year":"2017","journal-title":"Environ Modell Softw"},{"key":"2025092608275851000_bib70","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.envsoft.2018.08.028","article-title":"Tools and methods in participatory modeling: selecting the right tool for the job","volume":"109","author":"Voinov","year":"2018","journal-title":"Environ Modell Softw"},{"key":"2025092608275851000_bib71","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1177\/0092070302303006","article-title":"An exploratory investigation of user involvement in new service development","volume":"30","author":"Alam","year":"2002","journal-title":"J Acad Market Sci"},{"key":"2025092608275851000_bib72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01449290301782","article-title":"User involvement: a review of the benefits and challenges","volume":"22","author":"Kujala","year":"2003","journal-title":"Behav Inf Technol"},{"key":"2025092608275851000_bib73","first-page":"1125","article-title":"Participatory design: the third space in human\u2013computer interaction","volume-title":"Human Computer Interaction Handbook","author":"Muller","year":"2012"},{"key":"2025092608275851000_bib74","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-1-4471-7472-1_5","article-title":"Soft systems methodology","author":"Checkland","year":"2020","journal-title":"Systems Approaches to Making Change: A Practical Guide"},{"key":"2025092608275851000_bib75","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1049\/ip-cta:19982234","article-title":"Towards the formalisation of soft systems models using Petri net theory","volume":"145","author":"Sagoo","year":"1998","journal-title":"IEE Proc-Cont Theor Appl"},{"key":"2025092608275851000_bib76","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/SP.2017.38","article-title":"Sok: science, security and the elusive goal of security as a scientific pursuit","volume-title":"2017 IEEE Symposium on Security and Privacy (SP)","author":"Herley","year":"2017"},{"key":"2025092608275851000_bib77","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1162\/DESI_a_00207","article-title":"Co-design as a process of joint inquiry and imagination","volume":"29","author":"Steen","year":"2013","journal-title":"Des Issues"},{"key":"2025092608275851000_bib78","article-title":"Modelling and simulating organizational ransomware recovery: structure, methodology, and decisions","author":"Ilau"},{"key":"2025092608275851000_bib79","volume-title":"How Experiments End","author":"Galison","year":"1987"},{"key":"2025092608275851000_bib80","first-page":"137","volume-title":"Trading Zone: Coordinating Action and Belief (1998 Abridgment)","author":"Galison","year":"1999"},{"key":"2025092608275851000_bib81","volume-title":"Image and Logic: A Material Culture of Microphysics","author":"Galison","year":"1997"},{"key":"2025092608275851000_bib82","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.shpsa.2007.09.003","article-title":"Trading zones and interactional expertise","volume":"38","author":"Collins","year":"2007","journal-title":"Stud Hist Philos Sci Part A"},{"key":"2025092608275851000_bib83","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1177\/030631289019003001","article-title":"Institutional ecology,translations\u2019 and boundary objects: amateurs and professionals in Berkeley\u2019s Museum of Vertebrate Zoology, 1907-39","volume":"19","author":"Star","year":"1989","journal-title":"Soc Stud Sci"},{"key":"2025092608275851000_bib84","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1177\/0306312702032002003","article-title":"The third wave of science studies: studies of expertise and experience","volume":"32","author":"Collins","year":"2002","journal-title":"Soc Stud Sci"},{"key":"2025092608275851000_bib85","first-page":"236","article-title":"Engineering ecosystem models: semantics and pragmatics","volume-title":"International Conference on Simulation Tools and Techniques","author":"Caulfield","year":"2021"},{"key":"2025092608275851000_bib86","doi-asserted-by":"publisher","first-page":"215","DOI":"10.2307\/421090","article-title":"The logic of bunched implications","volume":"5","author":"O\u2019Hearn","year":"1999","journal-title":"Bull Symb Log"},{"key":"2025092608275851000_bib87","volume-title":"A Discipline of Mathematical Systems Modelling","author":"Collinson","year":"2012"},{"key":"2025092608275851000_bib88","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","article-title":"Calculi for synchrony and asynchrony","volume":"25","author":"Milner","year":"1983","journal-title":"Theor Comput Sci"},{"key":"2025092608275851000_bib89","first-page":"e3","article-title":"Modelling and simulating systems security policy","volume":"3","author":"Caulfield","year":"2016","journal-title":"EAI Endorsed Transactions on Security and Safety"},{"key":"2025092608275851000_bib90","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/(SICI)1099-1743(199905\/06)16:3&lt;203::AID-SRES210&gt;3.0.CO;2-1","article-title":"Systemics and cybernetics in a historical perspective","volume":"16","author":"Fran\u00e7ois","year":"1999","journal-title":"Syst Res Behav Sci"},{"key":"2025092608275851000_bib91","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1145\/365813.365819","article-title":"SIMULA: an ALGOL-based simulation language","volume":"9","author":"Dahl","year":"1966","journal-title":"Commun ACM"},{"key":"2025092608275851000_bib92","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-6685-8","volume-title":"Demos\u2014Discrete Event Modelling on Simula","author":"Birtwistle","year":"1979"},{"key":"2025092608275851000_bib93","article-title":"demos implementation guide and reference manual","author":"Birtwistle","year":"1981"},{"key":"2025092608275851000_bib94","article-title":"SysModels Julia Package","author":"Caulfield"},{"key":"2025092608275851000_bib95","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1017\/S0960129509990077","article-title":"Algebra and logic for resource-based systems modelling","volume":"19","author":"Collinson","year":"2009","journal-title":"Math Struct Comput Sci"},{"key":"2025092608275851000_bib96","doi-asserted-by":"crossref","DOI":"10.4108\/ICST.SIMUTOOLS2010.8631","article-title":"Semantics for structured systems modelling and simulation","volume-title":"Proc. Simutools 2010","author":"Collinson","year":"2010"},{"key":"2025092608275851000_bib97","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.tcs.2015.11.035","article-title":"A calculus and logic of bunched resources and processes","volume":"614","author":"Anderson","year":"2016","journal-title":"Theor Comput Sci"},{"key":"2025092608275851000_bib98","first-page":"141","volume-title":"Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security","author":"Beautement","year":"2009"},{"key":"2025092608275851000_bib99","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-07620-1_21","article-title":"Compositional security modelling: structure, economics, and behaviour","volume":"8533","author":"Caulfield","year":"2014","journal-title":"Lect Notes Comput Sci"},{"key":"2025092608275851000_bib100","first-page":"12","article-title":"Security analytics: bringing science to security management","volume":"4","author":"Pym","year":"2010","journal-title":"IISP Pulse"},{"key":"2025092608275851000_bib101","first-page":"284","article-title":"Modelling organizational recovery","volume-title":"International Conference on Simulation Tools and Techniques","author":"Baldwin","year":"2021"},{"key":"2025092608275851000_bib102","article-title":"Economic methods and decision making by security professionals","volume-title":"Economics of Information Security and Privacy III","author":"Baldwin","year":"2012"},{"key":"2025092608275851000_bib103","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/ACSAC.2008.42","article-title":"Analysing the performance of security solutions to reduce vulnerability exposure window","author":"Beres","year":"2008","journal-title":"2008 Annual Computer Security Applications Conference (ACSAC)"},{"key":"2025092608275851000_bib104","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/NOMSW.2010.5486590","article-title":"Decision support for systems security investment","author":"Beresnevichiene","year":"2010","journal-title":"2010 IEEE\/IFIP Network Operations and Management Symposium Workshops"},{"key":"2025092608275851000_bib105","article-title":"Security analytics","author":"Hewlett-Packard Laboratories","year":"2011"},{"key":"2025092608275851000_bib106","first-page":"67","article-title":"Ransomware in hospitals: what providers will inevitably face when attacked","volume":"32","author":"Kelpsas","year":"2016","journal-title":"J Med Pract Manage"},{"key":"2025092608275851000_bib107","first-page":"e224873","article-title":"Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016-2021","volume-title":"JAMA Health Forum","author":"Neprash","year":"2022"},{"key":"2025092608275851000_bib108","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.annemergmed.2023.04.025","article-title":"Hacking acute care: a qualitative study on the health care impacts of ransomware attacks against hospitals","volume":"83","author":"van\u00a0Boven","year":"2024","journal-title":"Ann Emerg Med"},{"key":"2025092608275851000_bib109","volume-title":"A Dictionary of Psychology","author":"Colman","year":"2015"},{"key":"2025092608275851000_bib110","doi-asserted-by":"crossref","DOI":"10.1093\/acref\/9780195369380.001.0001","volume-title":"Guide to Latin in International Law","author":"Fellmeth","year":"2009"},{"key":"2025092608275851000_bib111","volume-title":"Oxford Dictionary of English","author":"Stevenson","year":"2010"},{"key":"2025092608275851000_bib112","doi-asserted-by":"crossref","DOI":"10.1093\/acref\/9780191835759.001.0001","volume-title":"A Dictionary of Ethics","author":"Cuneo","year":"2020"},{"key":"2025092608275851000_bib113","doi-asserted-by":"crossref","DOI":"10.1093\/acref\/9780198794790.001.0001","volume-title":"A Dictionary of Critical Theory","author":"Buchanan","year":"2018"},{"key":"2025092608275851000_bib114","volume-title":"Fowler\u2019s Dictionary of Modern English Usage","author":"Fowler","year":"2015"},{"key":"2025092608275851000_bib115","volume-title":"The World Encyclopedia","author":"Press","year":"2001"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf025\/64414059\/tyaf025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf025\/64414059\/tyaf025.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T12:28:13Z","timestamp":1758889693000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf025\/8266174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":115,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf025","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf025"}}