Information risk management and compliance — expect the unexpected M. Drew OriginalPaper Pages: 19 - 29
A compliance office for heavily regulated enterprises — a best practice approach to meeting US FDA requirements J. K. Himmelreich OriginalPaper Pages: 41 - 49
How benchmarking can mitigate risk in business transformation B. Ashford OriginalPaper Pages: 50 - 57
Commercial implications of operational risk for service-based contracts P. R. H. Burrington OriginalPaper Pages: 58 - 67
The role of systems and applications monitoring in operational risk management A. H. Edmiston OriginalPaper Pages: 68 - 78
Creating an effective security risk model for outsourcing decisions C. ColwillA. Gray OriginalPaper Pages: 79 - 87
Model-based security analysis in seven steps — a guided tour to the CORAS method F. den BraberI. HogganvikF. Vraalsen OriginalPaper Pages: 101 - 117
Security risk mitigation for information systems V. PageM. DixonI. Choudhury OriginalPaper Pages: 118 - 127
Using assurance models to aid the risk and governance life cycle A. BaldwinY. BeresS. Shiu OriginalPaper Pages: 128 - 140
A risk-driven security analysis method and modelling language P. KearneyL. Brügger OriginalPaper Pages: 141 - 153
Operational risk management with real-time business intelligence B. AzvineZ. CuiM. Spott OriginalPaper Pages: 154 - 167
Operational risk analysis in business processes A. K. JallowB. MajeedR. Roy OriginalPaper Pages: 168 - 177
Managing the risks from information — through semantic information management P. W. WarrenN. J. Davies OriginalPaper Pages: 178 - 191
Automated extraction of behavioural profiles from document usage S. D. Wolthusen OriginalPaper Pages: 192 - 200
Horizon scanning and the business environment — the implications for risk management D. Brown OriginalPaper Pages: 208 - 214