{"title":"Reasonable Security by Effective Risk Management Practices: From Theory to Practice","authors":"S. Ghernaouti-Helie, David Simms, I. Tashi","doi":"10.1109/NBiS.2009.66","DOIUrl":null,"url":null,"abstract":"In this period of grave uncertainty, organizations have to manage more and more complicated situations in an environment that is subject to massive and rapid evolution. A solely intuitive approach to risk management is no longer sufficient when considering the need to optimize investments concerning security. It is necessary to find the difficult balance between the cost of risks versus their reduction so as to ensure that organizations can realize their objectives in a reasonable and durable manner. The aim of this paper is to point out the strong need for information system’s owners and manager to rely upon effective risk analysis methodology for decision making related to efficient security measure in order to develop business performances. We present a methodological approach. A case study and return of experiences “ based on real life” are given to illustrate the applicability of it.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2009.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this period of grave uncertainty, organizations have to manage more and more complicated situations in an environment that is subject to massive and rapid evolution. A solely intuitive approach to risk management is no longer sufficient when considering the need to optimize investments concerning security. It is necessary to find the difficult balance between the cost of risks versus their reduction so as to ensure that organizations can realize their objectives in a reasonable and durable manner. The aim of this paper is to point out the strong need for information system’s owners and manager to rely upon effective risk analysis methodology for decision making related to efficient security measure in order to develop business performances. We present a methodological approach. A case study and return of experiences “ based on real life” are given to illustrate the applicability of it.