Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes

Author(s):  
Tom W. Townley

The author of this chapter worked for 42 years in the construction industry. Employed by a company with great leadership, vision and values. The author was able to evolve from the pencil and paper applications to the latest in data acquisition, analysis and modeling. Simulation modeling and business science were successfully applied to many business functions with significant results in predicting risk and uncertainty ranges before bids, projects and investment decisions were complete. Included in this chapter are samples of Strategic Bidding, Cost (Range) Estimating, Scheduling, Project Management/Control, and Corporate Resource Management. Business processes can be measured for Stability, Capability and Predictability. Consistently balancing decisions within the upper and lower control limits, using valid reasoning for taking advantage of risk or opportunity will usually guarantee long term success. Reality can be a friend if it is measured and applied with the right expectations. Modeling creates the environment for tapping into substance and understanding.


2016 ◽  
Vol 6 (1) ◽  
pp. 206
Author(s):  
Weizhong Jiang ◽  
Xi Xie

<p>Security investment problems are mostly highly-nonlinear and have huge operations, hence quantitative investment is applied to make decisions frequently. Considering the example of Medicine plate in Chinese stocks, fundamental indicators and technical indicators are combined, and then investment decisions are made and optimized stepwise based on rough set model, where generical gorithm is applied to solve the model, aiming at searching for a portfolio with high value and growth inside the whole medicine plate. In addition, such strategy elements as trend and goodness are considered in the prediction, evaluation and correction of the model, resulting in lower uncertainty of index selection. In the empirical example, with the use of the improved model, stock rankings inside the plate achieve an accuracy of 60.7%, which proves the model makes sense to some extent in the security investment.</p>


Author(s):  
Vladimir A. Shekhovtsov ◽  
Roland Kaschek ◽  
Christian Kop ◽  
Heinrich C. Mayr

The paper argues that using non-first-normal-form (NF2) tables for requirements modeling is a suitable approach for communicating application system issues to stakeholders who have a business background. In particular, such tables are used in an intermediate predesign step residing between requirements elicitation and conceptual design for modeling functional and quality requirements of services and business processes. This approach extends to quality requirements of business processes used for service orchestration.


2011 ◽  
pp. 194-219
Author(s):  
Victor Portougal

The company is always aware of what it wants to produce because it is definedby the market pressures or by demand. However, what the company wants tomake must be rationalised against what it can make. The issue of balancebetween requirements and capacity relates to a type of trade off. On one hand,the company wants to satisfy demand, but on the other hand, it may not havethe capital resources to do so. At the senior management strategic planninglevel, long-range investment decisions are made that can increase the company’scapacity resources. Commonly however, the additional capacity lags behindthe pressure to produce more product more quickly. In these cases, manage-ment must make choices. A company must select carefully how to manage itslimited asset of resources to achieve the greatest benefit to the company.


2018 ◽  
Vol 14 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Daniel Schatz ◽  
Rabih Bashroush

This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.


Sign in / Sign up

Export Citation Format

Share Document