{"title":"迂回风险评估","authors":"A.E. Forman","doi":"10.1109/ICADIWT.2008.4664406","DOIUrl":null,"url":null,"abstract":"With risk assessment such a crucial part of any IT operation, it is necessary to re-evaluate some of the methods used to procure genuine responses from those under assessment. Many current risk assessment methodologies are set up to fail from the beginning. When performing a risk assessment, the evaluator is dependent on the integrity of the IT team s/he is questioning as part of the assessment. A new methodology called the Round-About Risk Evaluation (R.A.R.E.), implements techniques to reduce the Social Desirability Bias (SDB) that can lead to an assessment that does not represent the depth of security vulnerabilities. Implementation of R.A.R.E. prior to the start of a new a risk assessment, can be used to help the risk assessment team discover vulnerabilities that might otherwise go unreported.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"R.A.R.E.: Round-About Risk Evaluation\",\"authors\":\"A.E. Forman\",\"doi\":\"10.1109/ICADIWT.2008.4664406\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With risk assessment such a crucial part of any IT operation, it is necessary to re-evaluate some of the methods used to procure genuine responses from those under assessment. Many current risk assessment methodologies are set up to fail from the beginning. When performing a risk assessment, the evaluator is dependent on the integrity of the IT team s/he is questioning as part of the assessment. A new methodology called the Round-About Risk Evaluation (R.A.R.E.), implements techniques to reduce the Social Desirability Bias (SDB) that can lead to an assessment that does not represent the depth of security vulnerabilities. Implementation of R.A.R.E. prior to the start of a new a risk assessment, can be used to help the risk assessment team discover vulnerabilities that might otherwise go unreported.\",\"PeriodicalId\":189871,\"journal\":{\"name\":\"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICADIWT.2008.4664406\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICADIWT.2008.4664406","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With risk assessment such a crucial part of any IT operation, it is necessary to re-evaluate some of the methods used to procure genuine responses from those under assessment. Many current risk assessment methodologies are set up to fail from the beginning. When performing a risk assessment, the evaluator is dependent on the integrity of the IT team s/he is questioning as part of the assessment. A new methodology called the Round-About Risk Evaluation (R.A.R.E.), implements techniques to reduce the Social Desirability Bias (SDB) that can lead to an assessment that does not represent the depth of security vulnerabilities. Implementation of R.A.R.E. prior to the start of a new a risk assessment, can be used to help the risk assessment team discover vulnerabilities that might otherwise go unreported.