108
Views
11
CrossRef citations to date
0
Altmetric
Original Articles

Challenges to Sustainable Risk Management: Case Example in Information Network Security

, , &
Pages 17-23 | Published online: 18 Apr 2015

  • Arora, Ashish, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, and R. Telang, “Measuring the Risk-Based Value of IT Security Solutions,” IEEE IT Professional, 6:6 (2004), pp. 35–42.
  • Bryson, Kweku-Muata, and William E. Sullivan, “Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems,” Proceedings of the 35th Hawaii International Conference on System Sciences (2002), pp. 2760–2769.
  • Clements, Paul C., and Ray C. Williams, Final Report From the Workshop “Managing Software Risk at NASA,” CMU-Software Engineering Institute (November, 2003).
  • Fudenberg, Drew, and Jean Tirole, Game Theory, The MIT Press (2002).
  • Haimes, Yacov, Risk Modeling, Assessment, and Management, J. Wiley & Sons (1998).
  • Heimann, C., and F. Larry, Acceptable Risks, Politics, Policy, and Risky Technologies, The University of Michigan Press (2000).
  • Kaplan, Stan, and B. John Garrick, “On the Quantitative Definition of Risk,” Risk Analysis 1:1 (1981), pp. 11–27.
  • Pinto, C. Ariel, Ashish Arora, Dennis Hall, and Edward Schmitz, “Challenges to Sustainable Risk Management,” Proceedings of the 25th National Conference of the American Society for Engineering Management (October 2004), pp. 703–711.
  • Schmitz, Edward, C. Ariel Pinto, Ashish Arora, and Rahul Telang, “Iterative Incentive Scheme for Outsourced IA,” Proceedings of the 2004 IEEE Workshop on Information Assurance(June, 2004).
  • Society for Risk Analysis (SRA), Risk Analysis Glossary http://www.sra.org/resources_glossary_p-r.php, (cited May 2004).
  • Varian, Hal R., sMicroeconomic Analysis, 3rd ed., W.W. Norton & Company (1992).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.