{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:40:18Z","timestamp":1727502018827},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/syscon61195.2024.10553517","type":"proceedings-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T17:55:15Z","timestamp":1718646915000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Enterprise Transformation and Cybersecurity: A Literature Review on Cyberattacks"],"prefix":"10.1109","author":[{"given":"Enoc","family":"Ferniza","sequence":"first","affiliation":[{"name":"The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA"}]},{"given":"Sergio","family":"Luna","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Industrial, Manufacturing, and Systems Engineering,El Paso,TX,USA"}]},{"given":"Aditya","family":"Akundi","sequence":"additional","affiliation":[{"name":"University of Wisconsin &#x2013;Milwaukee,Industrial and Manufacturing Engineering,Milwaukee,WI,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2023-3772"},{"volume-title":"Brick by brick : how LEGO rewrote the rules of innovation and conquered the global toy industry","year":"2013","author":"Robertson","key":"ref2"},{"year":"2022","key":"ref3","article-title":"Leading the Way in Digital Technologies"},{"article-title":"The Evolution of Systems Engineering in the US Department of Defense","volume-title":"MIT SDM - System Design and Management","year":"2018","key":"ref4"},{"year":"2021","key":"ref5","article-title":"Systems Engineering Vision 2035 Copyright \u00a9 2021 by INCOSE"},{"article-title":"enterprise","volume-title":"@CambridgeWords","year":"2022","key":"ref6"},{"year":"2019","key":"ref7","article-title":"Definition of ENTERPRISE"},{"key":"ref8","article-title":"What Is an Enterprise? Definition and Guide","volume-title":"Shopify","author":"Hitchcock","year":"2023"},{"article-title":"What Is An Enterprise?","volume-title":"oboloo","year":"2023","key":"ref9"},{"year":"2015","key":"ref10","article-title":"Enterprise - Glossary | CSRC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1139922.1139951"},{"volume-title":"Understanding patterns of enterprise transformation","year":"2018","author":"Williams","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.01.119"},{"key":"ref14","article-title":"What are the Methods and Motives for Hacking?","volume-title":"VMware Security Blog","author":"Morpus","year":"2022"},{"key":"ref15","article-title":"The State of Ransomware 2022","volume-title":"Sophos News","author":"Adam","year":"2022"},{"article-title":"Cost of a data breach 2023","volume-title":"IBM","year":"2023","key":"ref16"},{"article-title":"Casino giant MGM expects $100 million hit from hack that led to data breach | CNN Business","volume-title":"CNN","year":"2023","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7744-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781119433729"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-030-84655-8_4","article-title":"From Business Engineering to Digital Engineering: The Role of Metamodeling in Digital Transformation","volume-title":"Engineering the Transformation of the Enterprise: A Design Science Research Perspective","author":"Leist","year":"2021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392199"},{"article-title":"Strengthen your cybersecurity","volume-title":"Strengthen your cybersecurity","year":"2023","key":"ref22"},{"article-title":"Glossary \u2018Malware,\u2019","volume-title":"NIST","year":"2019","key":"ref23"},{"article-title":"Cyberplanner","volume-title":"Federal Communications Commission","year":"2018","key":"ref24"},{"article-title":"Get Online Safety Resources From the National Cyber Security Alliance","volume-title":"Stay Safe Online","year":"2016","key":"ref25"},{"article-title":"Cyber Attack - What Are Common Cyberthreats?","volume-title":"Cisco","year":"2019","key":"ref26"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-1-4302-6083-7_16","article-title":"Common Cyberattacks","volume-title":"Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats","author":"Donaldson","year":"2015"},{"key":"ref28","article-title":"Cyber-Physical Attacks: 5 Steps for Prevention | Dataminr"},{"author":"Editor","key":"ref29","article-title":"social engineering - Glossary | CSRC"},{"author":"Editor","key":"ref30","article-title":"Cyber - Glossary | CSRC"},{"author":"Editor","key":"ref31","article-title":"security - Glossary | CSRC"},{"author":"Editor","key":"ref32","article-title":"cybersecurity - Glossary | CSRC"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2740571"},{"key":"ref34","first-page":"1","article-title":"Digital Twins and Cyber Security \u2013 solution or challenge?","volume-title":"2021 6th SouthEast Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDACECNSM)","author":"Holmes"}],"event":{"name":"2024 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2024,4,15]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2024,4,18]]}},"container-title":["2024 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10553374\/10553399\/10553517.pdf?arnumber=10553517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:12:05Z","timestamp":1727500325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/syscon61195.2024.10553517","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]}}}