Published: 2023-12-20
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks
DOI: 10.35870/ijsecs.v3i3.1816
Loso Judijanto, Djarot Hindarto, Sentot Imam Wahjono, Djunarto
Article Metrics
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Enterprise Architecture plays a critical role in reducing business risks holistically and ensuring a company's resilience to cyber security threats. This abstract emphasizes the significance of Enterprise Architecture in contemporary organizational structures and its influence on these matters, particularly at a time when cybersecurity threats are becoming more prevalent in the global business arena. By integrating Human Resources, Governance Frameworks, Technology, and Processes, Enterprise Architecture offers a holistic perspective of the Information Technology environment within an organization. By means of a methodical governance framework, Enterprise Architecture conducts comprehensive examinations of interdependencies among components, detects susceptibilities, and establishes robust groundwork for enhanced threat prevention. Enterprise Architecture is not only a proactive risk management tool, but it also contributes significantly to the overall business strategy. The integration of cybersecurity and enterprise architecture entails not only fortifying the technological infrastructure but also integrating it into the overarching business strategy. This enables the correlation of cybersecurity endeavors with the objectives of the organization, thereby connecting technological aspirations with business strategy. This study emphasizes the potential of incorporating adaptive and agile responses to threats into corporate culture to foster innovation. By functioning as a strategic catalyst, it assists organizations in adjusting to cyber threats, safeguarding business interests, and optimizing operations within an ever-evolving digital environment. By integrating governance and enterprise architecture frameworks, organizations can proactively mitigate business risks and cybersecurity threats, thereby fostering resilience and sustainability in the dynamic digital environment.
Keywords
Corporate Culture; Cybersecurity; Enterprise Architecture; Global Business; Risk Management
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 3 No. 3 (2023)
-
Section: Articles
-
Published: 2023-12-20
-
License: CC BY 4.0
-
Copyright: © 2023 Authors
-
DOI: 10.35870/ijsecs.v3i3.1816
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem.
Djarot Hindarto, Nasional University
Informatics Study Program, Faculty of Communication and Informatics Technology, Universitas Nasional, City of South Jakarta, Special Capital Region of Jakarta, Indonesia
Sentot Imam Wahjono, Universitas Muhammadiyah Surabaya
Management Study Program, Faculty of Economics and Business, Universitas Muhammadiyah Surabaya, Surabaya City, East Java Province, Indonesia
-
Hindarto, D., Indrajit, R.E. and Dazki, E., 2021. Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron: jurnal dan penelitian teknik informatika, 6(1), pp.13-24. DOI: https://doi.org/10.33395/sinkron.v6i1.11115.
-
Amanda, D., Hindarto, D., Indrajit, E. and Dazki, E., 2023. Proposed use of TOGAF-Based Enterprise Architecture in Drinking Water Companies. Sinkron: jurnal dan penelitian teknik informatika, 8(3), pp.1265-1277. DOI: https://doi.org/10.33395/sinkron.v8i3.12477.
-
Iswahyudi, I., Hindarto, D. and Indrajit, R.E., 2023. Digital Transformation in University: Enterprise Architecture and Blockchain Technology. Sinkron: jurnal dan penelitian teknik informatika, 8(4), pp.2501-2512. DOI: https://doi.org/10.33395/sinkron.v8i4.12977.
-
Hindarto, D., 2023. Blockchain-Based Academic Identity and Transcript Management in University Enterprise Architecture. Sinkron: jurnal dan penelitian teknik informatika, 8(4), pp.2547-2559. DOI: https://doi.org/10.33395/sinkron.v8i4.12978.
-
Hindarto, D. and Santoso, H., 2021. Android APK Identification using Non Neural Network and Neural Network Classifier. Journal of Computer Science and Informatics Engineering (J-Cosine), 5(2), pp.149-157. DOI: https://doi.org/10.29303/jcosine.v5i2.420.
-
Hindarto, D. and Santoso, H., 2022. Performance Comparison of Supervised Learning Using Non-Neural Network and Neural Network. Jurnal Nasional Pendidikan Teknik Informatika: JANAPATI, 11(1), pp.49-62. DOI: https://doi.org/10.23887/janapati.v11i1.40768.
-
Sari, R.T.K. and Hindarto, D., 2023. Implementation of Cyber-Security Enterprise Architecture Food Industry in Society 5.0 Era. Sinkron: jurnal dan penelitian teknik informatika, 8(2), pp.1074-1084. DOI: https://doi.org/10.33395/sinkron.v8i2.12377.
-
Hasan, M.K., Habib, A.A., Shukur, Z., Ibrahim, F., Islam, S. and Razzaque, M.A., 2023. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of Network and Computer Applications, 209, p.103540. DOI: https://doi.org/10.1016/j.jnca.2022.103540.
-
Chadwick, D.W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A. and Wang, X.S., 2020. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future generation computer systems, 102, pp.710-722. DOI: https://doi.org/10.1016/j.future.2019.06.026.
-
Mantha, B., de Soto, B.G. and Karri, R., 2021. Cyber security threat modeling in the AEC industry: An example for the commissioning of the built environment. Sustainable Cities and Society, 66, p.102682. DOI: https://doi.org/10.1016/j.scs.2020.102682.
-
Varga, S., Brynielsson, J. and Franke, U., 2021. Cyber-threat perception and risk management in the Swedish financial sector. Computers & security, 105, p.102239. DOI: https://doi.org/10.1016/j.cose.2021.102239.
-
Ainslie, S., Thompson, D., Maynard, S. and Ahmad, A., 2023. Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice. Computers & Security, p.103352. DOI: https://doi.org/10.1016/j.cose.2023.103352.
-
Marksteiner, S., Vallant, H. and Nahrgang, K., 2019. Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling. Journal of Information Security and Applications, 49, p.102389. DOI: https://doi.org/10.1016/j.jisa.2019.102389.
-
Zahid, S., Mazhar, M.S., Abbas, S.G., Hanif, Z., Hina, S. and Shah, G.A., 2023. Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls. Internet of Things, 22, p.100766. DOI: https://doi.org/10.1016/j.iot.2023.100766.
-
Rudrakar, S. and Rughani, P., 2023. IoT based agriculture (Ag-IoT): A detailed study on architecture, security and forensics. Information Processing in Agriculture. DOI: https://doi.org/10.1016/j.inpa.2023.09.002.
-
Loft, P., He, Y., Yevseyeva, I. and Wagner, I., 2022. CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers & Security, 122, p.102877. DOI: https://doi.org/10.1016/j.cose.2022.102877.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.