메뉴 건너뛰기




Volumn , Issue , 2009, Pages 23-27

A roadmap to risk-aware business process management

Author keywords

Business process management; Risk management

Indexed keywords

BUSINESS CONTINUITY MANAGEMENT; BUSINESS PROCESS; BUSINESS PROCESS MANAGEMENT; INFORMATION BASIS; ROADMAP;

EID: 77949592990     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSCC.2009.5394145     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 1
    • 77949583250 scopus 로고    scopus 로고
    • D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
    • D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
  • 2
    • 5144224094 scopus 로고    scopus 로고
    • Aris architecture and reference models for business process management
    • W. Scheer and M. Nüttgens, "Aris architecture and reference models for business process management," in proceedings of BPM, 2000.
    • (2000) proceedings of BPM
    • Scheer, W.1    Nüttgens, M.2
  • 3
    • 0011326587 scopus 로고    scopus 로고
    • Information technology - Security techniques - Information security risk management, ISO/IEC Std., 2008
    • ISO/IEC 27005
    • ISO/IEC 27005:2008 Information technology - Security techniques - Information security risk management, ISO/IEC Std., 2008.
    • (2008)
  • 4
    • 77949577424 scopus 로고    scopus 로고
    • NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST) Std., 2002.
    • NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST) Std., 2002.
  • 5
    • 77949610172 scopus 로고    scopus 로고
    • British Standard BS25999-1:2006: Business Continuity Management - Part 1: Code of practice, British Standard Institute (BSI) Std., 2006.
    • British Standard BS25999-1:2006: Business Continuity Management - Part 1: Code of practice, British Standard Institute (BSI) Std., 2006.
  • 6
    • 77949633373 scopus 로고    scopus 로고
    • British Standard BS25999-2:2007: Business Continuity Management - Part 2: Specification, British Standard Institute (BSI) Std., 2007.
    • British Standard BS25999-2:2007: Business Continuity Management - Part 2: Specification, British Standard Institute (BSI) Std., 2007.
  • 7
    • 77949582836 scopus 로고    scopus 로고
    • Business Continuity Institute, Online, Available
    • Business Continuity Institute, "Good Practice Guidelines," 2008. [Online]. Available: http://www.thebci.org/gpgdownloadpage.htm
    • (2008) Good Practice Guidelines
  • 8
    • 0011326587 scopus 로고    scopus 로고
    • Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services, ISO/IEC Std., 2008
    • ISO/IEC 24762
    • ISO/IEC 24762:2008 Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services, ISO/IEC Std., 2008.
    • (2008)
  • 10
    • 77949650624 scopus 로고    scopus 로고
    • NIST SP800-61: Computer security incident handling guide, National Institute of Standards and Technology Std., 2004.
    • NIST SP800-61: Computer security incident handling guide, National Institute of Standards and Technology Std., 2004.
  • 11
    • 84870648762 scopus 로고    scopus 로고
    • A Reference Model for Process-oriented IT Risk Management
    • Golden, W. et al, Eds, Galway, Ireland
    • S. Sackmann, A Reference Model for Process-oriented IT Risk Management, in: Golden, W. et al. (Eds.): 16th European Conference on Information Systems (ECIS'08), Galway, Ireland, 2008
    • (2008) 16th European Conference on Information Systems (ECIS'08)
    • Sackmann, S.1
  • 13
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - a guided tour to the CORAS method
    • F. Braber, I. Hogganvik, M.S. Lund, K. Stolen, F. Vraalsen, Model-based security analysis in seven steps - a guided tour to the CORAS method, BT Technology Journal, Vol. 25 No 1, 2007
    • (2007) BT Technology Journal , vol.25 , Issue.1
    • Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stolen, K.4    Vraalsen, F.5
  • 15
    • 63349110076 scopus 로고    scopus 로고
    • Ekelhart, A., Fenz, S. and Neubauer, T. AURUM: A Framework for Supporting Information Security Risk Management, 'Proceedings of the 42nd Hawaii International Conference on System Sciences, HICSS2009', IEEE Computer Society, Los Alamitos, CA, USA, 978-0-7695-3450-3, 2009, pp. 1-10.
    • Ekelhart, A., Fenz, S. and Neubauer, T. "AURUM: A Framework for Supporting Information Security Risk Management", 'Proceedings of the 42nd Hawaii International Conference on System Sciences, HICSS2009', IEEE Computer Society, Los Alamitos, CA, USA, 978-0-7695-3450-3, 2009, pp. 1-10.
  • 17
    • 70349102097 scopus 로고    scopus 로고
    • Ontology-based Decision Support for Information Security Risk Management
    • IEEE Computer Society
    • Ekelhart, A., Fenz, S. and Neubauer, T. "Ontology-based Decision Support for Information Security Risk Management", 'International Conference on Systems, 2009. ICONS 2009. IEEE Computer Society, 2009, pp. 80-85.
    • (2009) International Conference on Systems, 2009. ICONS , pp. 80-85
    • Ekelhart, A.1    Fenz, S.2    Neubauer, T.3
  • 18
    • 73649102822 scopus 로고    scopus 로고
    • S. Jakoubi, S. Tjoa, G. Goluch, G. Quirchmayr, A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management, Proceedings of the International Workshop on Business Processes Security (BPS'09) at the 20th edition of DEXA, IEEE, 2009
    • S. Jakoubi, S. Tjoa, G. Goluch, G. Quirchmayr, A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management, Proceedings of the International Workshop on Business Processes Security (BPS'09) at the 20th edition of DEXA, IEEE, 2009
  • 19
    • 49049093296 scopus 로고    scopus 로고
    • Rope: A methodology for enabling the risk-aware modelling and simulation of business processes
    • S. Jakoubi, S. Tjoa, and G. Quirchmayr, "Rope: A methodology for enabling the risk-aware modelling and simulation of business processes," in Fifteenth European Conference on Information Systems, 2007, pp. 1596-1607
    • (2007) Fifteenth European Conference on Information Systems , pp. 1596-1607
    • Jakoubi, S.1    Tjoa, S.2    Quirchmayr, G.3
  • 21
    • 77949576639 scopus 로고    scopus 로고
    • Gartner Inc, Misconceptions on Process Optimization and Simulation
    • Gartner Inc.: Misconceptions on Process Optimization and Simulation. http://blogs.gartner.com/jim-sinur/2009/01/27/misconceptions-onprocess- optimization-and-simulation/ (2009)
    • (2009) d-simulation
  • 22
    • 77949582414 scopus 로고    scopus 로고
    • One Hundred Seventh Congress of the United States of America. 2002. Sarbanes-Oxley Act., http://www.law.uc.edu/CCL/SOact/soact.pdf
    • One Hundred Seventh Congress of the United States of America. 2002. Sarbanes-Oxley Act., http://www.law.uc.edu/CCL/SOact/soact.pdf
  • 23
    • 16844361812 scopus 로고    scopus 로고
    • Committee of Sponsoring Organizations of the Treadway Commission, Executive Summary
    • Committee of Sponsoring Organizations of the Treadway Commission. 2004. Enterprise Risk Management: Executive Summary. http://www.coso.org/Publications/ ERM/COSO-ERM-ExecutiveSummary.pdf
    • (2004) Enterprise Risk Management


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.