- Arora, Ashish, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, and R. Telang, “Measuring the Risk-Based Value of IT Security Solutions,” IEEE IT Professional, 6:6 (2004), pp. 35–42.
- Bryson, Kweku-Muata, and William E. Sullivan, “Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems,” Proceedings of the 35th Hawaii International Conference on System Sciences (2002), pp. 2760–2769.
- Clements, Paul C., and Ray C. Williams, Final Report From the Workshop “Managing Software Risk at NASA,” CMU-Software Engineering Institute (November, 2003).
- Fudenberg, Drew, and Jean Tirole, Game Theory, The MIT Press (2002).
- Haimes, Yacov, Risk Modeling, Assessment, and Management, J. Wiley & Sons (1998).
- Heimann, C., and F. Larry, Acceptable Risks, Politics, Policy, and Risky Technologies, The University of Michigan Press (2000).
- Kaplan, Stan, and B. John Garrick, “On the Quantitative Definition of Risk,” Risk Analysis 1:1 (1981), pp. 11–27.
- Pinto, C. Ariel, Ashish Arora, Dennis Hall, and Edward Schmitz, “Challenges to Sustainable Risk Management,” Proceedings of the 25th National Conference of the American Society for Engineering Management (October 2004), pp. 703–711.
- Schmitz, Edward, C. Ariel Pinto, Ashish Arora, and Rahul Telang, “Iterative Incentive Scheme for Outsourced IA,” Proceedings of the 2004 IEEE Workshop on Information Assurance(June, 2004).
- Society for Risk Analysis (SRA), Risk Analysis Glossary http://www.sra.org/resources_glossary_p-r.php, (cited May 2004).
- Varian, Hal R., sMicroeconomic Analysis, 3rd ed., W.W. Norton & Company (1992).
Challenges to Sustainable Risk Management: Case Example in Information Network Security
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.