Advanced

Improving the current risk analysis techniques by study of their process and using the human body's immune system

Sarkheyli, Azadeh LU (2010) International Symposium on Telecommunications In 2010 5th International Symposium on Telecommunications p.651-656
Abstract
Risks include the factors that might adversely affect project outcomes. Risk analysis includes the processes concerned with identifying, analyzing and developing security strategy and plans for the factors. Although currently there are known methodologies such as (CCTA Risk Analysis and Management Method (CRAMM) or Consultative, Objective and Bi-functional Risk Analysis
(COBRA) and so on) for Risk Management, they have common failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component or poor executive support, high cost of implementation, untimely response, insufficient accountability, inability to qualitatively measure control environment ,infrequent in assessment, inaccurate data. On one hand... (More)
Risks include the factors that might adversely affect project outcomes. Risk analysis includes the processes concerned with identifying, analyzing and developing security strategy and plans for the factors. Although currently there are known methodologies such as (CCTA Risk Analysis and Management Method (CRAMM) or Consultative, Objective and Bi-functional Risk Analysis
(COBRA) and so on) for Risk Management, they have common failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component or poor executive support, high cost of implementation, untimely response, insufficient accountability, inability to qualitatively measure control environment ,infrequent in assessment, inaccurate data. On one hand these problems and on the other hand importance of IS/IT Risk Management cause the research to develop the current methodologies by making them intelligent as like as the natural management systems, it means that Immune System for example which is a complete system and could be the best model for simulating it with Risk Management in the organizations. However the findings of this study are important to help organizations toward improving IS/IT Risk Analysis process which are designed and proposed by investigation about their current procedure and problems of Risk Management. So the information as findings of this paper could be published and more extensive studies could be planned for the future. (Less)
Please use this url to cite or link to this publication:
author
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
DP management, information systemsrisk analysis, security of data, human body immune system, information system risk management, information technology risk management, risk analysis techniques, security management, Immune system, Information security, Organizations, Risk management, Standards organizations, Recover/avoid risks/attacks;Risk Analysis Methodology;Risk Analysis/Management;Security Management, Risk Analysis Methodology;Risk Analysis/Management, Security Management
in
2010 5th International Symposium on Telecommunications
editor
Binti Ithnin, Norafida and
pages
6 pages
publisher
IEEE--Institute of Electrical and Electronics Engineers Inc.
conference name
International Symposium on Telecommunications
external identifiers
  • scopus:79953879737
ISBN
978-1-4244-8183-5
978-1-4244-8185-9
DOI
10.1109/ISTEL.2010.5734104
language
English
LU publication?
no
id
f288b9c0-f541-42a7-aba0-06377a978994
date added to LUP
2016-06-30 18:43:57
date last changed
2018-05-29 11:42:01
@inproceedings{f288b9c0-f541-42a7-aba0-06377a978994,
  abstract     = {Risks include the factors that might adversely affect project outcomes. Risk analysis includes the processes concerned with identifying, analyzing and developing security strategy and plans for the factors. Although currently there are known methodologies such as (CCTA Risk Analysis and Management Method (CRAMM) or Consultative, Objective and Bi-functional Risk Analysis<br/>(COBRA) and so on) for Risk Management, they have common failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component or poor executive support, high cost of implementation, untimely response, insufficient accountability, inability to qualitatively measure control environment ,infrequent in assessment, inaccurate data. On one hand these problems and on the other hand importance of IS/IT Risk Management cause the research to develop the current methodologies by making them intelligent as like as the natural management systems, it means that Immune System for example which is a complete system and could be the best model for simulating it with Risk Management in the organizations. However the findings of this study are important to help organizations toward improving IS/IT Risk Analysis process which are designed and proposed by investigation about their current procedure and problems of Risk Management. So the information as findings of this paper could be published and more extensive studies could be planned for the future. },
  author       = {Sarkheyli, Azadeh},
  booktitle    = {2010 5th International Symposium on Telecommunications},
  editor       = {Binti Ithnin, Norafida},
  isbn         = {978-1-4244-8183-5},
  keyword      = {DP management,information systemsrisk analysis,security of data,human body immune system,information system risk management,information technology risk management,risk analysis techniques,security management,Immune system,Information security,Organizations,Risk management,Standards organizations,Recover/avoid risks/attacks;Risk Analysis Methodology;Risk Analysis/Management;Security Management,Risk Analysis Methodology;Risk Analysis/Management,Security Management},
  language     = {eng},
  pages        = {651--656},
  publisher    = {IEEE--Institute of Electrical and Electronics Engineers Inc.},
  title        = {Improving the current risk analysis techniques by study of their process and using the human body's immune system},
  url          = {http://dx.doi.org/10.1109/ISTEL.2010.5734104},
  year         = {2010},
}