Superleague Formula 2008: A Case Study in Managing Safety and Security Risks in Soccer-Themed Motor Racing

2010 ◽  
Vol 12 (3) ◽  
pp. 357-372 ◽  
Author(s):  
Steve Frosdick
Keyword(s):  
2007 ◽  
pp. 286-312
Author(s):  
Stephen C. Shih ◽  
Michael Camarata ◽  
H. Joseph Wen

Web technology has enabled many organizations to form an e-enterprise for effective communicating, collaborating, and information sharing. To gain competitive advantages, it is necessary for e-enterprises to integrate the entire lines of business operations and critical business data with external supply chain participants over the Web, which may introduce significant security risks to the organizations’ critical assets and infrastructures. This chapter reports a case study of e-service security design and implementation at a leading U.S. company. First, the chapter reviews security concerns and challenges in front-end e-business and back-end supply chain operations. This is followed by the analysis of the company’s e-service and its security problems. The case then presents an integrated e-enterprise security methodology to guide the company for meeting its security needs. The results of this case study provides security professionals with practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise supply chain environment.


2020 ◽  
pp. 133-153
Author(s):  
Eric Grandry ◽  
Christophe Feltus ◽  
Eric Dubois

Enterprise architecture management provides the mechanism for governing enterprise transformations required by changes in the environment. In this article, the authors focus on changes that result from the analysis of information system risks and of their impacts on the services delivered by the enterprise. The authors present how the concepts of an information system risks management domain can be integrated into the ArchiMate enterprise architecture modelling language. This article approaches the conceptual integration in two design cycles: first, this article will consider information security risks, and then the authors generalize to information system risks. Additionally, the authors illustrate the application of the proposed approach and demonstrate the benefits of the integrated model through the handling of a case study, first in the domain of information security, and then in the domain of information privacy. The generalized risk-oriented EA model leads to a risk integration framework for the service-oriented enterprise.


2017 ◽  
Vol 34 (7) ◽  
pp. 940-954 ◽  
Author(s):  
Abhijeet Ghadge ◽  
Xie Fang ◽  
Samir Dani ◽  
Jiju Antony

Purpose The purpose of this paper is to proactively analyse and mitigate the root causes of the product and security risks. The case study approach examines the effectiveness of the fuzzy logic approach for assessing the product and process-related failure modes within global supply chain context. Design/methodology/approach The case study of a Printed Circuit Board Company in China is used as a platform for conducting the research. Using data triangulation, the data are collected and analyzed through interviews, questionnaires, expert opinions and quantitative modelling for some interesting insights. Findings Fuzzy logic approach for failure mode and effect analysis (FMEA) provides a structured approach for understanding complex behaviour of failure modes and their associated risks for products and processes. Today’s managers should conduct robust risk assessment during the design stage to avoid product safety and security risks such as recalls. Research limitations/implications The research is based on the single case study and multiple cases from different industry sectors may provide some additional insights. Originality/value The study attempts to mitigate the root causes of product and processes using fuzzy approach to FMEA in supply chain network.


2020 ◽  
Author(s):  
Muhammad Firdaus

Supply chain security is a vital component of American national security. United State officials have continued to warn that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage. There has been an intense investigation on Huawei, ranging from their software development processes to allegations of back doors. While it may be debated if Huawei is a pawn in a trade war or national security risks, it reinforces the importance of knowing one’s ecosystem. This article summarizes a panel discussion at the RSA2020 cybersecurity conference in San Francisco, titled "How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei" was moderated by Craig Spiezle, founder of Agelight Advisory and Research Group, with panelists Katie Arrington, cyber information security officer of acquisitions for the U.S. Department of Defense; Donald Andy Purdy, chief security officer of Huawei Technologies USA; Bruce Schneier, security researcher and lecturer at the Harvard Kennedy School; and Kathryn Waldron, a fellow at R Street Institute. This session uses Huawei as a case study for best practices to assess risk and provide transparency to all stakeholders.


2010 ◽  
Vol 23 (2) ◽  
pp. 33-52 ◽  
Author(s):  
Sanjay Goel ◽  
Eitel J.M. Lauría

In this paper, the authors present a quantitative model for estimating security risk exposure for a firm. The model includes a formulation for the optimization of controls as well as determining sensitivity of the exposure of assets to different threats. The model uses a series of matrices to organize the data as groups of assets, vulnerabilities, threats, and controls. The matrices are then linked such that data is aggregated in each matrix and cascaded across the other matrices. The computations are reversible and transparent allowing analysts to answer what-if questions on the data. The exposure formulation is based on the Annualized Loss Expectancy (ALE) model, and uncertainties in the data are captured via Monte Carlo simulation. A mock case study based on a government agency is used to illustrate this methodology.


Author(s):  
John C. Pendergrass ◽  
Karen Heart ◽  
C. Ranganathan ◽  
V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.


1994 ◽  
Vol 29 (1) ◽  
pp. 53-87
Author(s):  
Sergei Medvedev
Keyword(s):  

2020 ◽  
Vol 37 (1) ◽  
pp. 101419 ◽  
Author(s):  
Omar Ali ◽  
Anup Shrestha ◽  
Akemi Chatfield ◽  
Peter Murray

Sign in / Sign up

Export Citation Format

Share Document