Attributes | Values |
---|
rdf:type
| |
Description
| - The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified.
- The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified. (en)
|
Title
| - Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
- Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment (en)
|
skos:prefLabel
| - Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
- Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment (en)
|
skos:notation
| - RIV/68407700:21260/14:00225705!RIV15-MV0-21260___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21260/14:00225705
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Asset; Human resources; Risk management; Stakeholder management; Supporter; Opponent; Process; Threat (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - The 18th World Multi-Conference on Systemics, Cybernetics and Informatics
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Němec, Vladimír
- Soušek, Radovan
- Pitas, J.
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - International Institute of Informatics and Systemics
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |