Assessing the effects of IT changes on IT risk - A business process-oriented view
暂无分享,去创建一个
[1] R. Sanchez. Strategic flexibility in product competition , 1995 .
[2] Donn B. Parker,et al. Risks of risk-based security , 2007, Commun. ACM.
[3] W E Vesely,et al. Fault Tree Handbook , 1987 .
[4] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[5] Ulrich Faisst,et al. An optimization model for the management of security risks in banking companies , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[6] Michael Rosemann,et al. Integrating risks in business process models with value focused process engineering , 2006, ECIS.
[7] Varun Grover,et al. Types of Information Technology Capabilities and Their Role in Competitive Advantage: An Empirical Study , 2005, J. Manag. Inf. Syst..
[8] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[9] George M. Giaglis,et al. A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques , 2001 .
[10] Jonathan Liebenau,et al. International perspectives on information security practices: opinions, preferences and tools in the financial services industry , 2006 .
[11] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[12] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[13] Christine M. Anderson-Cook,et al. Book review: quantitative risk management: concepts, techniques and tools, revised edition, by A.F. McNeil, R. Frey and P. Embrechts. Princeton University Press, 2015, ISBN 978-0-691-16627-8, xix + 700 pp. , 2017, Extremes.
[14] Andrew S. Tanenbaum,et al. Structured Computer Organization , 1976 .
[15] C. Ellis. Workflow Technology , 1999 .
[16] Dimitris Karagiannis. A Business Process-Based Modelling Extension for Regulatory Compliance , 2008, Multikonferenz Wirtschaftsinformatik.
[17] M. Rosemann,et al. Integrating Risks in Business Process Models , 2005 .
[18] August-Wilhelm Scheer,et al. ARIS - Business Process Modeling , 1998 .
[19] Glyn A. Holton. Value at Risk: Theory and Practice , 2003 .
[20] Stefan Tai,et al. The next step in Web services , 2003, CACM.