메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A reference model for process-oriented IT risk management

Author keywords

IT risk; IT risk management; IT risk reference model; Risk oriented business process management

Indexed keywords

BUSINESS PROCESS; BUSINESS PROCESS MANAGEMENT; PROCESS-ORIENTED; REFERENCE MODELS; RISK MANAGEMENT PROCESS; SYSTEMATIC MODELING;

EID: 84870648762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (39)
  • 1
    • 34848920878 scopus 로고    scopus 로고
    • Necessary measures: Metric-driven information security risk assessment and decision making
    • Baker, W.H., Rees, L.P., and Tippett, P.S. (2007). Necessary Measures: Metric-driven Information Security Risk Assessment and Decision Making. Communications of the ACM, 50 (10), 101-106.
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 101-106
    • Baker, W.H.1    Rees, L.P.2    Tippett, P.S.3
  • 2
    • 84870645800 scopus 로고    scopus 로고
    • Basel Committee on Banking Supervision Working Paper 8, September 2001. URL 03-28
    • Basel Committee on Banking Supervision (2001). Regulatory Treatment of Operational Risk. Working Paper 8, September 2001. URL: http://www.bis.org/publ/ bcbs-wp8.pdf (2008-03-28).
    • (2001) Regulatory Treatment of Operational Risk
  • 5
    • 0003427441 scopus 로고
    • IEEE Computer Society Press, Washington, D.C
    • Boehm, B.W. (1989). Software risk management. IEEE Computer Society Press, Washington, D.C.
    • (1989) Software Risk Management
    • Boehm, B.W.1
  • 6
    • 84870336809 scopus 로고    scopus 로고
    • URL 11-30
    • BSI - Federal Office for Information Security (2005). IT-Grundschutz Manual. URL: http://www.bsi.de/english/gshb/manual/download/pdfversion.zip (2007-11-30).
    • (2005) IT-Grundschutz Manual
  • 10
    • 0038080575 scopus 로고    scopus 로고
    • Workflow technology
    • (Beaudouin-Lafon, M. Ed.) John Wiley & Sons, Chichester
    • Ellis, C. A. (1999). Workflow Technology. In Computer Supported Co-operative Work (Beaudouin-Lafon, M. Ed.), pp. 29-54, John Wiley & Sons, Chichester.
    • (1999) Computer Supported Co-operative Work , pp. 29-54
    • Ellis, C.A.1
  • 12
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • Finne, T. (1998). A conceptual framework for information security management. Computers & Security, 17 (4), 303-307.
    • (1998) Computers & Security , vol.17 , Issue.4 , pp. 303-307
    • Finne, T.1
  • 13
    • 0035300743 scopus 로고    scopus 로고
    • A taxonomy of business process modelling and information systems modelling techniques
    • Giaglis, G.M. (2001). A taxonomy of business process modelling and information systems modelling techniques. International Journal of Flexible Manufacturing Systems, 13 (2), 209-228.
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 24
    • 84871107909 scopus 로고    scopus 로고
    • The future of business - Aligning business and IT to create an enduring impact on industry
    • URL 03-28
    • Mills, S. (2007). The future of business - Aligning business and IT to create an enduring impact on industry. IBM, Thought leadership paper. URL: ftp://ftp.software.ibm.com/software/soa/pdf/future-of-business.pdf (2008-03-28).
    • (2007) IBM, Thought Leadership Paper
    • Mills, S.1
  • 27
    • 84869455364 scopus 로고    scopus 로고
    • Analysing business processes
    • March 2003
    • Palm, J. (2003). Analysing Business Processes. Risk, March 2003, 23-25.
    • (2003) Risk , pp. 23-25
    • Palm, J.1
  • 28
    • 34147190861 scopus 로고    scopus 로고
    • Risks of risk-based security
    • Parker, D.B. (2007). Risks of risk-based security. Communications of the ACM, 50 (3), 120.
    • (2007) Communications of the ACM , vol.50 , Issue.3 , pp. 120
    • Parker, D.B.1
  • 31
    • 70349363570 scopus 로고    scopus 로고
    • Assessing the effects of IT changes on IT risk - A business process-oriented view
    • (Bichler, M. et al. (Eds.) GITO, Berlin
    • Sackmann, S. (2008). Assessing the effects of IT changes on IT risk - A business process-oriented view. In Multikonferenz Wirtschaftsinformatik MKWI'08 (Bichler, M. et al. (Eds.), pp. 1137-1148, GITO, Berlin.
    • (2008) Multikonferenz Wirtschaftsinformatik MKWI'08 , pp. 1137-1148
    • Sackmann, S.1
  • 32
    • 84989078094 scopus 로고
    • Strategic flexibility in product competition
    • Sanchez, R. (1995). Strategic Flexibility in Product Competition. Strategic Management Journal, 16, 135-159.
    • (1995) Strategic Management Journal , vol.16 , pp. 135-159
    • Sanchez, R.1
  • 34
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • December 1999
    • Schneier, B. (1999). Attack Trees. Dr. Dobb's Journal, December 1999, 24 (12), 21-29.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 39
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman, M. (2003). Enemy at the gate: Threats to information security. Communications of the ACM, 46 (8), 91-95.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.