integrate the CTC-HSI in the enterprise’s (simply
the Entity) EA’s roadmap, where the CTC-HSI must
deliver the path for integrating security components
in the ADM4CTC. The RDP4CTC is based on:
Literature Review Process for CTC (LRP4CTC), a
Qualitative Analysis for CTC (QLA4CTC)
methodology, and the experiment or the Proof of
Concept (PoC), that is used to solve the Research
Question (RQ), in which the management of
processes has a crucial and his decisions are aided
by using the Decision-Making System (DMS for
CTC (DMS4CTC), [4]. Many CSFs influence CTC-
HSI’s integration, like 1) CP/ICS’ interface
mechanisms; 2) Managing Project security and other
types of risks; 3) Entity resources mapping to CTC-
HSI requirements and mechanisms; 4) CTC-HSI
related skills; 5) PCP security, infrastructure and
requirements support; 6) PCP security tests
capacities; and 7) PCP security monitoring and
control. The author’s research project’s keywords
were introduced in the scholar engine (in Google’s
search) and the results clearly show the uniqueness
and the absolute lead of the author’s methodology,
research, and works. Due to this fact, the author
considers his works in the mentioned fields as
successful and useful. The CTC-HIS-based PCP is
optimal because it synchronizes Entity’s processes,
tasks, actions, and resources; and that is the
chapter’s main focus. CP based EA methods, like
TOGAF and its adapted ADM4CTC, support the
needed for an CTC-HSI. Actual PCP security
technics focus on the Entity’s isolated security tools,
services, processes, and CSs. Minimal modelling
technics are needed for the CTC-HSI which used
standard ICS security frameworks to align with
other CPs, ADM4CTC, and secured atomic
Building Blocks (saBB). This chapter also illustrates
how Projects can benefit from using the CTC-HSI
and proposes an adequate RDP4CTC. The
TDP4CTC RQ is: “Which PCP characteristics and
support is needed for in the implementation of an
Entity CTC-HSI?”. Where the kernel of this
research is based on the Heuristics Decision Tree
(HDT), AI/ML and CSFs (and areas). A Critical
Success Area (CSA) is a category (or set) of CSFs
where in turn a CSF is a set of Key Performance
Indicators (KPI), where a KPI maps (or
corresponds) to a single CTC-HSI requirement. For
a given CTC-HSI requirement or problem, the
Project identifies sets of CSAs, CSFs and KPIs, to
be used by the DMS4CTC and to be mapped to
PCP’s artefacts. Hence the CSFs are important for
the mapping between CTC-HSI requirements,
resources, and DMS4CTC, [41]. Therefore, CSFs
reflect CSAs that must meet the Project’s goals and
constraints. Measurements technics, which are
provided by the Transformation, Research,
Architecture, and development framework
(TRADf), are used to evaluate performance in each
CSA, where CSFs can be internal or external. Once
the initial sets of CSFs and CSAs have been
identified, then the Project can use the DMS4CTC
to deliver solutions for CTC-HSI problems. The
CSF-based RDP4CTC uses the AI/ML/HDT based
DMS4CTC, where in RDP4CTC’s phase 1
(represented in automated tables), which form the
empirical part of the RDP4CTC, checks eight CSAs
and tables The tables’ decision concept was
influenced by the Object Management Group’s
(OMG) Decision Model and Notation (DMN),
where DMN can be used for specification of
business decisions and business rules. DMN is
optimal for different engineer’s profiles involved in
decision management, [5]. The CTC-HSI delivers
recommendations on how to align Project’s CP
resources by using TRADf.
2.1 The Framework-TRADf and the Empirical
Engineering Research Model
This and other authors’ research works are based on
a polymathic model, which is a very complex
approach. And it is recommended to refer to the
Using Applied Mathematical Models for Business
Transformation, [57]; to understand his approach.
The CTC-HSI alignment strategies manage the
Entity’s PCP security, resources and Microartefacts’
which used various types of technologies. The CTC-
HSI is complex and is a risky approach because 1)
The complexity of PCP’s security and risks
management; 2) Various security types and levels;
3) CTC-HSI synchronization for all processes and
resources; 4) Mapping mechanisms; and 5)
Implementation of security in existing PCP and ICS
components. A system’s approach, like TRADf’s, is
recommended for CTC-HSI-based Projects [6]. The
CTC-HSI is generic and can be applied to any
standard, public, or PCP. This chapter is a part of
many years' research cluster that has produced a
large set of articles and TRADf, and parts of
previous works are reused for a better understanding
of this complex iterative research. If all facts are
only referenced, it would have been tedious to
understand this RDP4CTC which is based on an
Empirical Engineering Research Model (EERM),
[2], [3], [7]. The EERM is optimal for engineering
projects and it uses an authentic mixed method that
is a natural complement to Quantitative Analysis for
CTC (QNA4CTC) and QLA4CTC research
methods, to deliver empirical concepts as a possible
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2022.21.41