2006
DOI: 10.1080/10429247.2006.11431680
|View full text |Cite
|
Sign up to set email alerts
|

Challenges to Sustainable Risk Management: Case Example in Information Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The SoSE management matrix developed by Gorod et al (2008) includes risk management as one of the conceptual areas, and the way risk management deals with emergence is to verify and validate the achievement of new behaviours. The realisation that current problem scenarios in which EMs and SEs work cannot be aptly described by traditional systems notions has been presented by Keating et al (2003Keating et al ( , 2008 and Pinto et al (2006). They have explicitly and implicitly described the complexity and emergent behaviour of modern types of systems, e.g., SoS, enterprise systems, and federation of systems.…”
Section: First Foundation Of Risk: Undesirable Consequencesmentioning
confidence: 97%
“…The SoSE management matrix developed by Gorod et al (2008) includes risk management as one of the conceptual areas, and the way risk management deals with emergence is to verify and validate the achievement of new behaviours. The realisation that current problem scenarios in which EMs and SEs work cannot be aptly described by traditional systems notions has been presented by Keating et al (2003Keating et al ( , 2008 and Pinto et al (2006). They have explicitly and implicitly described the complexity and emergent behaviour of modern types of systems, e.g., SoS, enterprise systems, and federation of systems.…”
Section: First Foundation Of Risk: Undesirable Consequencesmentioning
confidence: 97%
“…However, it is only a national network. Therefore, it is desirable for Korean NGOs to follow their counterparts in the USA and form an international network (Pinto et al, 2006;Shekhar et al, 2020). Similarly, the popularity of outsourcing in the field of emergency management has recently increased, particularly by procuring related services and products from other markets in the international community.…”
Section: Ngosmentioning
confidence: 99%
“…The optimum level of informationsecurity investments is treated on the basis of the expected cost/ benefit investment trade-offs. Pinto, Arora, Hall, and Schmitz (2006) introduce a calculation of risk-based return on investment (RROI). RROI pertains to the ratio between the net benefit in implementing an IT solution and the cost of this implementation.…”
Section: Related Researchmentioning
confidence: 99%