-
1
-
-
77949583250
-
-
D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
-
D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
-
-
-
-
2
-
-
5144224094
-
Aris architecture and reference models for business process management
-
W. Scheer and M. Nüttgens, "Aris architecture and reference models for business process management," in proceedings of BPM, 2000.
-
(2000)
proceedings of BPM
-
-
Scheer, W.1
Nüttgens, M.2
-
3
-
-
0011326587
-
Information technology - Security techniques - Information security risk management, ISO/IEC Std., 2008
-
ISO/IEC 27005
-
ISO/IEC 27005:2008 Information technology - Security techniques - Information security risk management, ISO/IEC Std., 2008.
-
(2008)
-
-
-
4
-
-
77949577424
-
-
NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST) Std., 2002.
-
NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST) Std., 2002.
-
-
-
-
5
-
-
77949610172
-
-
British Standard BS25999-1:2006: Business Continuity Management - Part 1: Code of practice, British Standard Institute (BSI) Std., 2006.
-
British Standard BS25999-1:2006: Business Continuity Management - Part 1: Code of practice, British Standard Institute (BSI) Std., 2006.
-
-
-
-
6
-
-
77949633373
-
-
British Standard BS25999-2:2007: Business Continuity Management - Part 2: Specification, British Standard Institute (BSI) Std., 2007.
-
British Standard BS25999-2:2007: Business Continuity Management - Part 2: Specification, British Standard Institute (BSI) Std., 2007.
-
-
-
-
7
-
-
77949582836
-
-
Business Continuity Institute, Online, Available
-
Business Continuity Institute, "Good Practice Guidelines," 2008. [Online]. Available: http://www.thebci.org/gpgdownloadpage.htm
-
(2008)
Good Practice Guidelines
-
-
-
8
-
-
0011326587
-
Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services, ISO/IEC Std., 2008
-
ISO/IEC 24762
-
ISO/IEC 24762:2008 Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services, ISO/IEC Std., 2008.
-
(2008)
-
-
-
10
-
-
77949650624
-
-
NIST SP800-61: Computer security incident handling guide, National Institute of Standards and Technology Std., 2004.
-
NIST SP800-61: Computer security incident handling guide, National Institute of Standards and Technology Std., 2004.
-
-
-
-
11
-
-
84870648762
-
A Reference Model for Process-oriented IT Risk Management
-
Golden, W. et al, Eds, Galway, Ireland
-
S. Sackmann, A Reference Model for Process-oriented IT Risk Management, in: Golden, W. et al. (Eds.): 16th European Conference on Information Systems (ECIS'08), Galway, Ireland, 2008
-
(2008)
16th European Conference on Information Systems (ECIS'08)
-
-
Sackmann, S.1
-
12
-
-
81455156487
-
Selecting Services in Business Process Execution - A Risk-based Approach
-
H.R. Hansen et al, Eds, Vienna
-
S. Sackmann, L. Lowis, K. Kittel, Selecting Services in Business Process Execution - A Risk-based Approach, in: H.R. Hansen et al. (Eds.), Business Services: Konzepte, Technologien, Anwendungen, Tagung Wirtschaftsinformatik (WI'09), Vienna, 2009
-
(2009)
Business Services: Konzepte, Technologien, Anwendungen, Tagung Wirtschaftsinformatik (WI'09)
-
-
Sackmann, S.1
Lowis, L.2
Kittel, K.3
-
13
-
-
33947368645
-
Model-based security analysis in seven steps - a guided tour to the CORAS method
-
F. Braber, I. Hogganvik, M.S. Lund, K. Stolen, F. Vraalsen, Model-based security analysis in seven steps - a guided tour to the CORAS method, BT Technology Journal, Vol. 25 No 1, 2007
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stolen, K.4
Vraalsen, F.5
-
15
-
-
63349110076
-
-
Ekelhart, A., Fenz, S. and Neubauer, T. AURUM: A Framework for Supporting Information Security Risk Management, 'Proceedings of the 42nd Hawaii International Conference on System Sciences, HICSS2009', IEEE Computer Society, Los Alamitos, CA, USA, 978-0-7695-3450-3, 2009, pp. 1-10.
-
Ekelhart, A., Fenz, S. and Neubauer, T. "AURUM: A Framework for Supporting Information Security Risk Management", 'Proceedings of the 42nd Hawaii International Conference on System Sciences, HICSS2009', IEEE Computer Society, Los Alamitos, CA, USA, 978-0-7695-3450-3, 2009, pp. 1-10.
-
-
-
-
16
-
-
70349325827
-
Business Process-based Resource Importance Determination
-
Springer, accepted for publication
-
Fenz, S., Ekelhart, A. and Neubauer, T. "Business Process-based Resource Importance Determination", 'Proceedings of the 7th International Conference on Business Process Management (BPM'2009)', Springer, accepted for publication, 2009, pp. 113-127.
-
(2009)
Proceedings of the 7th International Conference on Business Process Management (BPM
, pp. 113-127
-
-
Fenz, S.1
Ekelhart, A.2
Neubauer, T.3
-
17
-
-
70349102097
-
Ontology-based Decision Support for Information Security Risk Management
-
IEEE Computer Society
-
Ekelhart, A., Fenz, S. and Neubauer, T. "Ontology-based Decision Support for Information Security Risk Management", 'International Conference on Systems, 2009. ICONS 2009. IEEE Computer Society, 2009, pp. 80-85.
-
(2009)
International Conference on Systems, 2009. ICONS
, pp. 80-85
-
-
Ekelhart, A.1
Fenz, S.2
Neubauer, T.3
-
18
-
-
73649102822
-
-
S. Jakoubi, S. Tjoa, G. Goluch, G. Quirchmayr, A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management, Proceedings of the International Workshop on Business Processes Security (BPS'09) at the 20th edition of DEXA, IEEE, 2009
-
S. Jakoubi, S. Tjoa, G. Goluch, G. Quirchmayr, A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management, Proceedings of the International Workshop on Business Processes Security (BPS'09) at the 20th edition of DEXA, IEEE, 2009
-
-
-
-
19
-
-
49049093296
-
Rope: A methodology for enabling the risk-aware modelling and simulation of business processes
-
S. Jakoubi, S. Tjoa, and G. Quirchmayr, "Rope: A methodology for enabling the risk-aware modelling and simulation of business processes," in Fifteenth European Conference on Information Systems, 2007, pp. 1596-1607
-
(2007)
Fifteenth European Conference on Information Systems
, pp. 1596-1607
-
-
Jakoubi, S.1
Tjoa, S.2
Quirchmayr, G.3
-
20
-
-
84870639484
-
Deriving resource requirements applying risk-aware business process modeling and simulation
-
S. Jakoubi, G. Goluch, S. Tjoa, and G. Quirchmayr, "Deriving resource requirements applying risk-aware business process modeling and simulation," in 16th European Conference on Information Systems, 2008, pp. 1542-1554.
-
(2008)
16th European Conference on Information Systems
, pp. 1542-1554
-
-
Jakoubi, S.1
Goluch, G.2
Tjoa, S.3
Quirchmayr, G.4
-
21
-
-
77949576639
-
-
Gartner Inc, Misconceptions on Process Optimization and Simulation
-
Gartner Inc.: Misconceptions on Process Optimization and Simulation. http://blogs.gartner.com/jim-sinur/2009/01/27/misconceptions-onprocess- optimization-and-simulation/ (2009)
-
(2009)
d-simulation
-
-
-
22
-
-
77949582414
-
-
One Hundred Seventh Congress of the United States of America. 2002. Sarbanes-Oxley Act., http://www.law.uc.edu/CCL/SOact/soact.pdf
-
One Hundred Seventh Congress of the United States of America. 2002. Sarbanes-Oxley Act., http://www.law.uc.edu/CCL/SOact/soact.pdf
-
-
-
-
23
-
-
16844361812
-
-
Committee of Sponsoring Organizations of the Treadway Commission, Executive Summary
-
Committee of Sponsoring Organizations of the Treadway Commission. 2004. Enterprise Risk Management: Executive Summary. http://www.coso.org/Publications/ ERM/COSO-ERM-ExecutiveSummary.pdf
-
(2004)
Enterprise Risk Management
-
-
|