Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/HICSS.2008.211guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management

Published: 07 January 2008 Publication History

Abstract

priately counteract occurring threats has increasingly become a crucial success factor. Traditional business process management provides concepts for the economical optimization of processes, while risk management focuses on the design of robust business processes. While aiming at the same goal, namely the improve- ment of business, the approaches how to reach this vary, due to a different understanding of improvement. Following this, op- timizing recommendations of business process management and risk management may be contradictory. Therefore, we proposed a unified method, integrating both points of views to enable risk-aware business process management and optimization. In this paper, we briefly describe the ROPE (Risk-Oriented Process Evaluation) methodology and the Security Ontology concept, which provides a solid knowledge base for an applicable and holistic company specific IT security approach. This heavy-weight ontology provides structured knowledge regarding the relations between threats, safeguards, and assets, which are crucial for modeling processes in ROPE. We show how the integration of the Security Ontology's knowledge base enhances the applicability of the ROPE methodology leading to improved risk-aware business process management.

Cited By

View all
  • (2016)Business process modelling challenges and solutionsJournal of Intelligent Manufacturing10.1007/s10845-014-0917-427:4(701-723)Online publication date: 1-Aug-2016
  • (2011)Basis for an integrated security ontology according to a systematic review of existing proposalsComputer Standards & Interfaces10.1016/j.csi.2010.12.00233:4(372-388)Online publication date: 1-Jun-2011
  • (2009)An information security ontology incorporating human-behavioural implicationsProceedings of the 2nd international conference on Security of information and networks10.1145/1626195.1626209(46-55)Online publication date: 6-Oct-2009
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
HICSS '08: Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
January 2008
ISBN:0769530758

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 January 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Business process modelling challenges and solutionsJournal of Intelligent Manufacturing10.1007/s10845-014-0917-427:4(701-723)Online publication date: 1-Aug-2016
  • (2011)Basis for an integrated security ontology according to a systematic review of existing proposalsComputer Standards & Interfaces10.1016/j.csi.2010.12.00233:4(372-388)Online publication date: 1-Jun-2011
  • (2009)An information security ontology incorporating human-behavioural implicationsProceedings of the 2nd international conference on Security of information and networks10.1145/1626195.1626209(46-55)Online publication date: 6-Oct-2009
  • (2009)OVMProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558646(1-4)Online publication date: 13-Apr-2009
  • (2009)Ontology-based security assessment for software productsProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558625(1-4)Online publication date: 13-Apr-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media