Skip to main content

Methodologies of Support to the Execution of Risk Management

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2010 Workshops (OTM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6428))

  • 1341 Accesses

Introduction

There are several guidelines to the risk management. During the last quarter of 2009 was even published the ISO 31000, which proposes itself to be the real standard (unanimously recognized as such) to the risk management. However any of these guidelines supports the execution of itself. So, its full execution becomes frequently impossible with the actual organizational reality, many times characterized by significant architectural heterogeneities, cultural differences, and enormous disparities from a business process point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ISO 31000:2009 - Risk management – Principles and guidelines

    Google Scholar 

  2. Tribolet, J.: Organizations, People, Processes and Knowledge: from the reification of the human being as a component of knowledge to the knowledge of organizational self. Sistemas de Informação Organizacionais. Sílabo Editora (November 2005)

    Google Scholar 

  3. Jauk, G.: Intrusion Detection with Mondrian and Snort. VDM Verlag Dr. Müller Aktiengesellschaft & Co. KG (2009) ISBN 978-3-639-14052-1

    Google Scholar 

  4. Vasconcelos, A., Sousa, P., Tribolet, J.: Enterprise Architecture Analysis - An Information System Evaluation Approach. Enterprise Modelling and Information Systems Architectures 3(2) (December 2008) ISSN 1860-6059

    Google Scholar 

  5. Lankhorst, A.: Enterprise Architecture at Work: Modelling Communication and Analysis. Springer, Heidelberg (December 2005) ISBN-10 3-540-24371-2

    Google Scholar 

  6. Degraeve, Z., Nicholson, N.: Risk: How to make decisions in an uncertain world. Format Publishing (2004) ISBN-10 1903091365

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nascimento, L., Vasconcelos, A., Sousa, P., Alegria, J., Mendes, A. (2010). Methodologies of Support to the Execution of Risk Management. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2010 Workshops. OTM 2010. Lecture Notes in Computer Science, vol 6428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16961-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16961-8_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16960-1

  • Online ISBN: 978-3-642-16961-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics