The Management of Security: How Robust is the Justification Process?

被引:0
|
作者
Giovanni Manunta
机构
[1] Senior Lecturer,
[2] and academic leader of the MSc in Corporate Security Management,undefined
[3] in the Cranfield Security Centre,undefined
[4] RMCS Shrivenham,undefined
关键词
Decision-making process; justification; methodology; risk; security;
D O I
10.1057/palgrave.sj.8340152
中图分类号
学科分类号
摘要
Security management literature pays considerable attention to the process of justifying security-related decisions in the context of an organisation. This process, which is widely assumed as being subject to management considerations and obtained by means of managerial techniques, is frequently related to a financial comparison of a posteriori and a priori assessments of a given security initiative. The application of this paradigm might raise issues of knowledge, rationality and reliability, thus opening the door to weaknesses in matters of blame and liability. This paper identifies a number of these weaknesses, with a view to assisting security managers in strengthening their case and, hopefully, instigating more academic research.
引用
收藏
页码:33 / 43
页数:10
相关论文
共 50 条
  • [31] Security management of process plants by a Bayesian network methodology
    Misuri A.
    Khakzad N.
    Reniers G.
    Cozzani V.
    Cozzani, Valerio (valerio.cozzani@unibo.it), 2018, Italian Association of Chemical Engineering - AIDIC (67): : 247 - 252
  • [32] Process security management: Assess the threats, control the risk
    Marszal, EM
    CHEMICAL ENGINEERING, 2003, 110 (01) : 42 - 46
  • [33] An Information Security Management Approach for an Electoral Process in Ecuador
    Toapanta Toapanta, Segundo Moises
    Valero Carrillo, Andrea Paola
    Naranjo Sanchez, Bertha Alice
    Mafia Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 921 - 932
  • [34] The Optimization of the Educational Process of Security Technologies, Systems and Management
    Svoboda, P.
    Svobodova, B.
    Sevcik, J.
    INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES, 2015, 9 : 69 - 72
  • [35] A meta-process for information security risk management
    Papadaki, Katerina
    Polemi, Nineta
    Damilos, Dimitrios Konnos
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 257 - +
  • [36] A meta-process for information security risk management
    Papadaki, Katerina
    Polemi, Despina
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2008, 1 (04) : 336 - 343
  • [37] Balancing flexibility and security in adaptive process management systems
    Weber, B
    Reichert, M
    Wild, W
    Rinderle, S
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS, DOA, AND ODBASE, PT 1, PROCEEDINGS, 2005, 3760 : 59 - 76
  • [38] JUSTIFICATION OF PROCESS CONTROL COMPUTERS
    SMITH, CL
    INSTRUMENTS & CONTROL SYSTEMS, 1970, 43 (05): : 34 - &
  • [39] Justification of the Rational Composition of the Information Security System
    Suprun, A. F.
    Zegzhda, D. P.
    Anisimov, V. G.
    Anisimov, E. D.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (08) : 1093 - 1099
  • [40] Food security and the justification of productivism in New Zealand
    Rosin, Christopher
    JOURNAL OF RURAL STUDIES, 2013, 29 : 50 - 58