About: Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified.
  • The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified. (en)
Title
  • Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
  • Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment (en)
skos:prefLabel
  • Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
  • Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment (en)
skos:notation
  • RIV/68407700:21260/14:00225705!RIV15-MV0-21260___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • I, P(VG20132015130)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 31209
http://linked.open...ai/riv/idVysledku
  • RIV/68407700:21260/14:00225705
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • Asset; Human resources; Risk management; Stakeholder management; Supporter; Opponent; Process; Threat (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [C5AF94394A25]
http://linked.open...v/mistoKonaniAkce
  • Orlando
http://linked.open...i/riv/mistoVydani
  • Orlando, Florida
http://linked.open...i/riv/nazevZdroje
  • The 18th World Multi-Conference on Systemics, Cybernetics and Informatics
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Němec, Vladimír
  • Soušek, Radovan
  • Pitas, J.
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
number of pages
http://purl.org/ne...btex#hasPublisher
  • International Institute of Informatics and Systemics
https://schema.org/isbn
  • 978-1-941763-05-6
http://localhost/t...ganizacniJednotka
  • 21260
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 47 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software