12,129 Hits in 1e+01 sec

Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation

Stefan Jakoubi, Gernot Goluch, Simon Tjoa, Gerald Quirchmayr
2008 European Conference on Information Systems  
With the risk-aware process modeling and simulation methodology named ROPE we fill this gap and combine the strengths of the aforementioned domains.  ...  The robustness and continuity of operations is separately considered in other domains such as business continuity management and risk management.  ...  ROPE -A METHODOLOGY ENABLING RISK-AWARE BUSINESS PROCESS MODELING AND SIMULATION In this section, we briefly introduce our ROPE (Risk-Oriented Process Evaluation) methodology to establish the basis for  ... 
dblp:conf/ecis/JakoubiGTQ08 fatcat:3bd4ulfg3ne4fdpsbmkbxublha

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management

Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, and Thomas Muck
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
Therefore, we proposed a unified method, integrating both points of views to enable risk-aware business process management and optimization.  ...  In this paper, we briefly describe the ROPE (Risk-Oriented Process Evaluation) methodology and the Security Ontology concept, which provides a solid knowledge base for an applicable and holistic company  ...  ROPE Within this section, we briefly describe the ROPE methodology introduced in [14] , which enables the risk-aware management and simulation of business processes.  ... 
doi:10.1109/hicss.2008.211 dblp:conf/hicss/GoluchEFJTM08 fatcat:7rz6m76ogbdgnh47eqwthvypbe

Enabling Risk-Aware Enterprise Modeling using Semantic Annotations and Visual Rules

Benedikt Pittl, Hans-Georg Fill, Gerald Honegger
2017 European Conference on Information Systems  
The usage of the approach is illustrated through an example from the domain of risk-aware business process management.  ...  Thereby, the use of enterprise models provides the foundation for a systematic and holistic analysis of processes, organizational structures and IT systems.  ...  The ROPE methodology introduced in (Tjoa, Jakoubi, and Quirchmayr 2008 ) also encompasses a process model connected with a risk model as well as a simulation environment to assess the incidence of a failure  ... 
dblp:conf/ecis/PittlFH17 fatcat:pe72bkndwrguhhliph2lviyxle

Secure business process management: a roadmap

T. Neubauer, M. Klemen, S. Biffl
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
This approach provides top management in process oriented enterprises with a stepwise methodology for the parallel and continuous development and improvement of business processes along with security issues  ...  The security of corporate business processes is crucial for the business success of companies.  ...  Based on existing shortcomings we proposed SBPM as a methodology for supporting process-oriented companies in implementing Secure Business Process Management.  ... 
doi:10.1109/ares.2006.121 dblp:conf/IEEEares/NeubauerKB06 fatcat:tokwbbo5pzgj5f6pdrl6sygkwi

ARES: Automated Risk Estimation in Smart Sensor Environments

Athanasios Dimitriadis, Jose Luis Flores, Boonserm Kulvatunyou, Nenad Ivezic, Ioannis Mavridis
2020 Sensors  
life cycle management and the context of business processes.  ...  Security is addressed by conducting risk management as a first step. Nevertheless, security risks are very much influenced by the assets that the business processes are supported.  ...  Conflicts of Interest: The authors declare no conflict of interest. Disclaimer: Any mention of commercial products is for information only; it does not imply recommendation or endorsement by NIST.  ... 
doi:10.3390/s20164617 pmid:32824471 fatcat:glyzscx3xfdtxaqtdimndkr37m

Conversational Agents in Organisations

Siddharth Patel, Yi-Te Chiu, Mohammad Saud Khan, Jean-Grégoire Bernard, Talitakuum A. T. Ekandjo
2021 Journal of Global Information Management  
and cognitive technologies in general by developing a typology of CA strategic applications and their implementation considerations.  ...  Drawing on the lens of routine capability, this study investigates strategic applications of CAs, and their associated implementation enablers and challenges.  ...  ACKNOwLedGMeNT This research was supported by Wellington School of Business and Government, Victoria University of Wellington (Funding number: 219977)  ... 
doi:10.4018/jgim.20211101.oa53 fatcat:fpaf5zhirfgb7i336pr42s2lwu

Business-driven IT management

Claudio Bartolini, Cesare Stefanelli
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
The resulting models also depend on the situation and goals of the model"s intended usagesuch as in the case of autonomic computing or in a decision support tool for IT managers to use. 17 2 State of the  ...  concepts of business impact and risk to the fore, as we will see in later chapters.  ...  The main reason for my using "we" is that the work behind this dissertation owes an immense amount to the help and dedication of several colleagues, many of which appears as co-authors of the publications  ... 
doi:10.1109/inm.2011.5990530 dblp:conf/im/BartoliniS11 fatcat:eiwspuykqzf6nhdfvwozrxecby

An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures

Eleni-Maria Kalogeraki, Spyridon Papastergiou, Themis Panayiotopoulos
2022 Electronics  
., Indicators of Compomise (IoCs), and any other incident-related information from various sources, e.g., log files, which are evidence of cyber-attacks on a system or network.  ...  This paper proposes an attack simulation and evidence chains generation model which computes all possible attack paths associated with specific, confirmed security events.  ...  The attack simulation and evidence chains generation model detects and assesses vulnerabilities by combining and analyzing incident data during the risk assessment process.  ... 
doi:10.3390/electronics11030404 fatcat:fs4o3ruzezg5npw5ijmy2uucci

A Study on User-Oriented and Intelligent Service Design in Sustainable Computing: A Case of Shipbuilding Industry Safety

Taehee Joe, Hangbae Chang
2017 Sustainability  
In light of this trend, this study was intended to design a user-oriented u-Business service for preventing and promptly responding to industrial disasters at shipbuilding sites using a systematic methodology  ...  Specifically, major danger elements of disasters in need of preferential preventive and responsive measures were derived as business opportunities unfulfilled by the current process, and then a u-Business  ...  Author Contributions: Taehee Joe coordinated, processed the data, and generated the results of the work. Taehee Joe then coordinated the writing of the manuscript, and contributed to the text.  ... 
doi:10.3390/su9040544 fatcat:rp3l6mcjgffj3d5yp43jhxmaum

Sensemaking in Critical Situations and in Relation to Resilience—A Review

Stine S. Kilskar, Brit-Eli Danielsen, Stig O. Johnsen
2019 ASCE-ASME J of Risk & Uncertainty in Engineering SystemsPart B: Mechanical Engineering  
Sensemaking and risks must be understood as a part of the organizational context of the incidents.  ...  as a process creating situational awareness; and it is explained by others mainly in terms of how it relates to resilience.  ...  Acknowledgment This article was invited to the journal as an extended and updated version of the paper Sensemaking and resilience in safety-critical situations: a literature review that was presented at  ... 
doi:10.1115/1.4044789 fatcat:osjdserpt5h57jf7rxwv6ou2gu

Security of Ports' Critical Information Infrastructures [chapter]

Nineta Polemi
2018 Port Cybersecurity  
The concept of the risk is related to a threat, an asset, and specific security needs. It comprises the vulnerability of the asset and the impact of the threat on the security needs.  ...  The concept of the risk (defined as annual loss expectancy [ALE]) is related to a threat and an asset, and it comprises the probability of the threat affecting the asset and the average loss of the resulting  ...  These methods consist of an estimation of the risk situation based on the business process models and the infrastructure within the organization.  ... 
doi:10.1016/b978-0-12-811818-4.00003-4 fatcat:heowxnf7bfg4ljt4nqqjcnkpti

Cyber security assessment of a power plant

Igor Nai Fovino, Luca Guidi, Marcelo Masera, Alberto Stefanini
2011 Electric power systems research  
issues: The copyright stays with the editors and authors respectively, however people are encouraged to distribute this CIIP Newsletter >Founders and Editors Eyal  ...  Hämmerli, HTA, Initiator and Main Editor Eric Luiijf, TNO, >Country specific Editors  ...  For this purpose, SimCIP has: • a model editor allowing users to build the simulation models, • a sophisticated simulation kernel allowing to process simulation models, • an attractive Graphical User Interface  ... 
doi:10.1016/j.epsr.2010.10.012 fatcat:lydqvovrp5hz3mjp3ekos5i72q

On the exploitation of process mining for security audits

Rafael Accorsi, Thomas Stocker
2012 Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC '12  
Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated.  ...  Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial sector applying this technology for the auditing of relevant security requirements.  ...  INTRODUCTION Despite the growing effort in tool design for the secure deployment of business process models, e.g. [1, 5] , security incidents and fraud soar [4] .  ... 
doi:10.1145/2245276.2232051 dblp:conf/sac/AccorsiS12 fatcat:vktz76jirjdq5jv7b3ganfqteq

Framework for Operational Resilience Management of Critical Infrastructures and Organizations

Daniel Lichte, Frank Sill Torres, Evelin Engler
2022 Infrastructures  
The proposed framework is extensively discussed, and required processes are presented in detail.  ...  This trend motivated recent discussions and developments in risk science, emphasizing the need to handle such uncertainties.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/infrastructures7050070 fatcat:igoxjkxfwbckben3ootzo4d7q4

An Adaptable Big Data Value Chain Framework for End-to-End Big Data Monetization

Abou Zakaria Faroukhi, Imane El Alaoui, Youssef Gahi, Aouatif Amine
2020 Big Data and Cognitive Computing  
For this, we present a comprehensive review of existing BDVC models relying on some definitions and theoretical foundations of data monetization.  ...  They rely on Data Value Chain (DVC) models to handle data processes and extract hidden values to obtain reliable insights.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/bdcc4040034 fatcat:l7azema46nh7rfwljtnhrlkj2a
« Previous Showing results 1 — 15 out of 12,129 results