The Management of Security: How Robust is the Justification Process?

被引:0
|
作者
Giovanni Manunta
机构
[1] Senior Lecturer,
[2] and academic leader of the MSc in Corporate Security Management,undefined
[3] in the Cranfield Security Centre,undefined
[4] RMCS Shrivenham,undefined
关键词
Decision-making process; justification; methodology; risk; security;
D O I
10.1057/palgrave.sj.8340152
中图分类号
学科分类号
摘要
Security management literature pays considerable attention to the process of justifying security-related decisions in the context of an organisation. This process, which is widely assumed as being subject to management considerations and obtained by means of managerial techniques, is frequently related to a financial comparison of a posteriori and a priori assessments of a given security initiative. The application of this paradigm might raise issues of knowledge, rationality and reliability, thus opening the door to weaknesses in matters of blame and liability. This paper identifies a number of these weaknesses, with a view to assisting security managers in strengthening their case and, hopefully, instigating more academic research.
引用
收藏
页码:33 / 43
页数:10
相关论文
共 50 条
  • [1] JUSTIFICATION OF BANK FINANCIAL SECURITY MANAGEMENT STRATEGY
    Vysotska, I
    Savina, S.
    Mazur, K.
    Nahirna, M.
    Dorosh, I
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2021, 4 (39): : 58 - 65
  • [2] Security management - The process
    Roberts, DW
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 366 - 376
  • [3] PRESENTING YOUR IDEAS TO MANAGEMENT - HOW TO DEVELOP A JUSTIFICATION
    CURRY, RA
    BERRY, TL
    WERNEBERG, D
    JOURNAL OF DIAGNOSTIC MEDICAL SONOGRAPHY, 1992, 8 (03) : 146 - 148
  • [4] Security in business process management
    Sicherheit in Geschäftsprozessmanagement
    Accorsi, Rafael (raccorsi@acm.org), 2013, De Gruyter Oldenbourg (55):
  • [5] Security in Business Process Management
    Accorsi, Rafael
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 215 - 216
  • [6] Theoretical Justification and Practice of Risk Management for Economic Security of the Dealer Networks of Carmakers
    Serebryakova, Tatyana Yu
    Kurtaeva, Olga Yu
    INDUSTRY COMPETITIVENESS: DIGITALIZATION, MANAGEMENT, AND INTEGRATION, VOL 1, 2020, 115 : 201 - 213
  • [7] Ethical hacking: The security justification
    Smith, B
    Yurcik, W
    Doss, D
    ETHICS AND ELECTRONIC INFORMATION: A FESTSCHRIFT FOR STEPHEN ALMAGNO, 2002, : 148 - 153
  • [8] The Automating Process of Information Security Management
    Sokolov, Sergey S.
    Alimov, Oleg M.
    Golubeva, Mariy G.
    Burlov, Vyacheslav G.
    Vikhrov, Nikolai M.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 124 - 127
  • [9] IT SYSTEMS SECURITY MANAGEMENT IN MIGRATION PROCESS
    Pieta, Sylwester
    FOUNDATIONS OF MANAGEMENT, 2010, 2 (02) : 63 - 80
  • [10] A PROCESS APPROACH TO INFORMATION SECURITY MANAGEMENT
    VONSOLMS, R
    VONSOLMS, SH
    CARROLL, JM
    COMPUTER SECURITY, 1993, 37 : 385 - 399