Security Risk Management
2,724 Followers
Recent papers in Security Risk Management
Sovereign debt is financial (dis)advantage with several implications for economy and defense, in general. It affects directly military capabilities transformation and supports defense policy development taking into account defense costs... more
The workplace poster has been designed by the security team at a retail company to raise awareness and increased attention after some electronic equipment being noticed missing from the company stores. The poster will be used as staff... more
Risk management is becoming a well established discipline, with its own body of knowledge and domain practitioners. States worldwide now have their own risk management standards and in many, it is the company director’s responsibility to... more
This study determines various threat vectors of cyber-attacks on smart grid of the United States. The smart grid relatively a new initiative by the Department of Energy. It started in 2007 (DOE 2007). In December 2007, Congress passed,... more
Security is a function of Risk Management that requires intentional planning, strategy and design. This is in contrast to fairly common thinking that security is about a collection of things — anti-malware, data encryption, security... more
The global security guard industry has experienced tremendous growth in the past five decades and there is every indication it will continue. Many government and private sector bodies have created mandatory and recommended training... more
The purpose of this essay will be to discuss the role of a security and crime risk manager in an organization and to analyze how useful the knowledge of crime patterns could be to assist his/her role.
[co-editor] The articles contained in this publication are dispatches from a new frontline in humanitarian action: the digital frontier. The publication brings together 17 authors who analyse in 11 articles how communications technology... more
Succinct description of migration from DIACAP to RMF
In today's global and complex business environment, security is a major issue for any organization. All organizations should have the capability to plan and respond to incidents and business disruptions. Business continuity management is... more
This essay will discuss workplace crime of ‘Staff Dishonesty’, as one of the important workplace offences. It will outline the extent of the problem and the causes which possibly lead to staff dishonesty. An attempt would be made to... more
[co-author] Security risk management strategies aim to ensure safer access to communities in need of humanitarian aid. In Iraq, the link between humanitarian access and security risk management is even stronger. This article explores... more
The security industry operates within a diverse and multi-disciplined knowledge base, with risk management as a fundamental knowledge domain within security to mitigate its risks. Nevertheless, there has been limited research in... more
Terrorism threat increased globally in the recent years and Bangladesh is no difference to that. Many research and publications shows significant increase in terrorism in the last 18-24 months. Many of the lone wolf attackers are... more
According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions,... more
Service Oriented Architecture is an architectural paradigm and discipline that may be used to build infrastructures enabling those with needs (consumers) and those with capabilities (providers) to interact via services across disparate... more
The research project seeks to explore how corporate social responsibility can be used as a strategic tool to mitigate risk within increasingly dynamic and turbulent business environments. As such, this research hopes to create a... more
Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological, social, and economical... more
When risk assessments are conducted by project managers, information technology professionals, or engineers, often efforts are put into calculating a definite conclusion about the likelihood of disruptions that prevent completion of a... more
Does current data protection legislation achieve a satisfactory balance between the interests of the security manager and the individual? 3978 Word Security and individual privacy provide an important perspective for analyzing the Data... more
Organisations that allow employees to Bring Your Own Device (BYOD) in the workplace trade off the convenience of allowing employees to use their own device against higher risks to the confidentiality, integrity, and availability of... more
Our paper aims to question the limits of scientific knowledge and its use in the protection of employees exposed to chemical risks. In doing so, it will also question safety management in the light of real work situations studied during a... more
Modeling real-world social situations has proven to be one of the most daunting challenges in computational social science. With the exception of simplistic, single-domain scenarios, most computational models are quickly overwhelmed with... more
An Professional Security Consultant puts the realities of physically securing educational facilities from the "Active Shooter". A must read for school administrators, staff, parents and others having interest in the subject.
This study explores the impact of openness on contemporary Danish intelligence agencies. While ‘the openness of intelligence agencies’ may strike many readers as an apparent oxymoron, this study argues that openness has become a defining... more
This paper proposes a study corroborated by preliminary experiments on the inference of social relations based on the analysis of interpersonal distances, measured with on obtrusive computer vision techniques. The experiments have been... more
... This relatively simplistic, but nonetheless central equation in the criminological vocabulary conceals a ... management methodologies, which seen in a societal context of disaster equate risk ... overarching state-centric governmental... more
The Asia Pacific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental... more
This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care... more
This chapter explores the trend of bunkerized international aid interventions in conflict-torn spaces. In response to insecurity, aid agencies and other organizations that operate in conflict-torn spaces increasingly attempt to protect... more
Public and private sector have the need to be as much as possible entrepreneurial and innovative-minded, even more than many commercial enterprises. The thing management needs to pay special attention to is the security of the existing... more