This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n10http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n18http://localhost/temp/predkladatel/
n11http://purl.org/net/nknouf/ns/bibtex#
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n8http://linked.opendata.cz/resource/domain/vavai/projekt/
n9http://linked.opendata.cz/ontology/domain/vavai/
n5https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n15http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F68407700%3A21260%2F14%3A00225705%21RIV15-MV0-21260___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n7http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F68407700%3A21260%2F14%3A00225705%21RIV15-MV0-21260___
rdf:type
skos:Concept n9:Vysledek
dcterms:description
The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified. The objective of the stakeholders’ management is to find out promoters who can significantly help us at problem solving in cyber security environment (including those who must be integrated into the risk management). On one side there is a necessity to find opponents who can become partakers of generated threat and who make an effort to prevent the set objectives to be achieved/or to inflict a significant damage by way of found vulnerabilities of critical assets (risk scenario). Knowledge of the stake holders according to their interests, objectives, influence on the objective set, and their knowledge in the field of cyber management belong to the key knowledge to be able define the attitude strategies towards stake holders in cyber security environment. During further monitoring the implementation of attitude strategy it is possible to assess the success of realized activities towards stake holders. Risk management of cyber security comes out from identification and analyses of human resources assets (stakeholders), that must be protected against the threat impacts of cyber security. It also comes out from identification of promoters who generate the threats of cyber security (stake holders – opponents). After a risk judgment the stake holders who are crucial from the point of controlling the risk (implementation of proposed activities to control and monitor risks) are identified.
dcterms:title
Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
skos:prefLabel
Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment
skos:notation
RIV/68407700:21260/14:00225705!RIV15-MV0-21260___
n3:aktivita
n20:P n20:I
n3:aktivity
I, P(VG20132015130)
n3:dodaniDat
n7:2015
n3:domaciTvurceVysledku
n13:5099358
n3:druhVysledku
n17:D
n3:duvernostUdaju
n6:S
n3:entitaPredkladatele
n15:predkladatel
n3:idSjednocenehoVysledku
31209
n3:idVysledku
RIV/68407700:21260/14:00225705
n3:jazykVysledku
n16:eng
n3:klicovaSlova
Asset; Human resources; Risk management; Stakeholder management; Supporter; Opponent; Process; Threat
n3:klicoveSlovo
n12:Threat n12:Opponent n12:Supporter n12:Stakeholder%20management n12:Risk%20management n12:Process n12:Asset n12:Human%20resources
n3:kontrolniKodProRIV
[C5AF94394A25]
n3:mistoKonaniAkce
Orlando
n3:mistoVydani
Orlando, Florida
n3:nazevZdroje
The 18th World Multi-Conference on Systemics, Cybernetics and Informatics
n3:obor
n19:BC
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
3
n3:projekt
n8:VG20132015130
n3:rokUplatneniVysledku
n7:2014
n3:tvurceVysledku
Pitas, J. Němec, Vladimír Soušek, Radovan
n3:typAkce
n10:WRD
n3:zahajeniAkce
2014-07-15+02:00
s:numberOfPages
4
n11:hasPublisher
International Institute of Informatics and Systemics
n5:isbn
978-1-941763-05-6
n18:organizacniJednotka
21260