• Aucun résultat trouvé

Modeling enterprise risk management and security with the ArchiMate language

N/A
N/A
Protected

Academic year: 2021

Partager "Modeling enterprise risk management and security with the ArchiMate language"

Copied!
2
0
0

Texte intégral

(1)

RESEARCH OUTPUTS / RÉSULTATS DE RECHERCHE

Author(s) - Auteur(s) :

Publication date - Date de publication :

Permanent link - Permalien :

Rights / License - Licence de droit d’auteur :

Bibliothèque Universitaire Moretus Plantin

Institutional Repository - Research Portal

Dépôt Institutionnel - Portail de la Recherche

researchportal.unamur.be

University of Namur

Modeling enterprise risk management and security with the ArchiMate language

Band, Iver; Engelsman, Wilco; Feltus, Christophe; González Paredes, Sonia; Hietala, Jim;

Jonkers, Henk; Massart, Sébastien

Publication date:

2015

Document Version

Early version, also known as pre-print

Link to publication

Citation for pulished version (HARVARD):

Band, I, Engelsman, W, Feltus, C, González Paredes, S, Hietala, J, Jonkers, H & Massart, S 2015, Modeling

enterprise risk management and security with the ArchiMate language..

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal ?

Take down policy

If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

(2)

Modeling Enterprise Risk

Management and Security with the

ArchiMate

®

Language

Iver Band, Wilco Engelsman, Christophe Feltus, Sonia González Paredes, Jim Hietala,

Henk Jonkers, Sebastien Massart

Références

Documents relatifs

company is fa ced with, that’s make managers to voluntary or mandatory disclose information regarding risk management, usually as a part of the A nnual Report.Inthis part of our

The development of Yugen has tackled many enterprise domain challenges, such as data cold start problem, detecting domain-specific query intents, key entities and their

Two methods – Information System Security Risk Management (ISSRM) [5] [14] and Bayesian Network Based Attack Graph (BN- BAG) [10] [18] – are used to assess the information

The technologies consist of 91 technological, mostly software, components provided by 27 partners including 37 datasets of Earth Observation and sensor data as well as 13

First, and obviously, to create a socio-technical approach to cyber security risk analysis and management, based on security culture assessment, which can identify

Finally, we implement a framework which bases upon the developed taxonomy, provides methods to automatically evaluate the data quality and filter relevant shared cyber

In contrast, this research provides evidence that a common governance infrastructure can create a ‘common mechanism’ that would prioritise risks, support

The Protect and Enhance Enterprise Value Model (Figure 3) is introduced to present how the shareholders value can be built up through continuous alignment of the