Modeling and Analysing Socio-Technical Systems

Zaruhi Aslanyan, Marieta G. Ivanova, Flemming Nielson, Christian W. Probst

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    21 Downloads (Pure)


    Modern organisations are complex, socio-technical systems consisting of a mixture of physical infrastructure, human actors, policies and processes. An increasing number of attacks on these organisations exploits vulnerabilities on all different levels, for example combining a malware attack with social engineering. Due to this combination of attack steps on technical and social levels, risk assessment in socio-technical systems is complex. Therefore, established risk assessment methods often abstract away the internal structure of an organisation and ignore human factors when modelling and assessing attacks. In our work we model all relevant levels of socio-technical systems, and propose evaluation techniques for analysing the security properties of the model. Our approach simplifies the identification of possible attacks and provides qualified assessment and ranking of attacks based on the expected impact.
    Original languageEnglish
    Title of host publication1st International Workshop on Socio-Technical Perspective in IS development (STPIS)
    Place of PublicationAachen, Germany
    Number of pages4
    Publication statusPublished - 9 Jun 2015
    Event1st International Workshop on Socio-Technical Perspective in IS development, STPIS 2015 - Stockholm, Sweden
    Duration: 9 Jun 20159 Jun 2015
    Conference number: 1

    Publication series

    NameCEUR Workshop Proceedings
    ISSN (Print)1613-0073


    Workshop1st International Workshop on Socio-Technical Perspective in IS development, STPIS 2015
    Abbreviated titleSTPIS


    • SCS-Cybersecurity
    • EC Grant Agreement nr.: FP7/318003
    • EC Grant Agreement nr.: FP7/2007-2013


    Dive into the research topics of 'Modeling and Analysing Socio-Technical Systems'. Together they form a unique fingerprint.

    Cite this