Abstract
Modern society is replete with risk. Information systems risk, and software failure risk in particular, are but two of the many risks organizations face. To understand how to deal with such risk, we begin by reviewing techniques and tools to deal with all risks in the environment, especially those in the information systems environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Burgess, J., “Searching for a Better Computer Shield; Virus Incident Underscores Vulnerability of Companies as Role of Machines Widens, ” The Washington Post, November 13, 1988, p. H1.
Business Insurance, “Software Firms Discover E&0 Cover,” November 30, 1987, p. 54.
Charette, R. N., Software Engineering Risk Analysis and Management, New York: Multiscience, 1989.
Clemons, E. K., “Evaluation of Strategic Investments in Information Technology,” Comm. ACM 34(1) (January 1991), 22–36.
Coates, J. F, “Some Methods and Techniques for Comprehensive Impact Assessment,” Technological Forecasting and Social Change 6. (1974), 341–357.
Covello, V. T., and J. Mumpower, “Risk Analysis and Risk Management: An Historical Perspective,” Risk Analysis 5(2), (1985), 103–120.
Doherty, N. A., Corporate Risk Management: A Financial Exposition, New York: McGraw-Hill, 1985.
Haack, M. T., “Insuring the Data Processing Risk,” Best’s Review, January, 1984, pp. 44–50.
Henley, E. J., and H. Kumamoto, Reliability Engineering and Risk Assessment, Englewood Cliffs, NJ: Prentice-Hall, 1981.
Juris, R., “EDP Auditing Lessens Risk Exposure,” Computer Decisions, July 15, 1986, pp. 36–42.
Krauss, L., “EDP Contingency Planning: How to Survive a Disaster,” Management Rev., June, 1980, pp. 20–26.
Lauber, R., “Strategies for the Design and Validation of Safety-Related Computer-controlled Systems, ” in Real-Time Data Handling and Process Control, (G. Meyer, ed.), Amsterdam: North-Holland, 1980, pp. 305–310.
Mackenzie, J. J., “Rx for Nuclear Power,” Tech. Rev. 87, (February—March 1984), 33–39.
Murray, J., “Developing a Contingency Plan,” Data Management, January, 1980, pp. 10–48.
Pate-Cornell, M. E., “Fault Trees vs. Event Trees in Reliability Analysis,” Risk Anal. 4(3), (1984), 177–186.
Slovic, P., B. Fischoff, and S. Lichtenstein, “Facts versus Fears: Understanding Perceived Risk,” in Societal Risk Assessment: How Safe is Safe Enough? (Schwing, R., Albers, W. A., eds.) New York: Plenum, 1980.
Slovic, P, S. Lichtenstein, and S. Fischhoff, “Modeling the Societal Impact of Fatal Accidents,” Management Sci. 30(4), (April 1984), 464–474.
Starr, C., R. Rudman, and C. Whipple, “Philosophical Basis for Risk Analysis,” Annual Rev. Energy 1,(1976), 629–662.
Tversky, A. and A. Kahneman, “Judgment under Uncertainty: Heuristics and Biases,” Science 185, (September 1974), 1124–1131.
U.S. Nuclear Regulatory Commission, Reactor Safety Study: An Assessment of Accident Risks in U.S. Commercial Nuclear Power Plants, WASH-1400, October, 1975.
Vesely, W. E. and D. M. Rasmuson, “Uncertainties in Nuclear Probabilistic Risk Analyses,” Risk Anal. 4(4), (1984), 313–322.
von Mayrhauser, A., Software Engineering: Methods and Management, San Diego, CA: Academic Press, 1990.
Ward, G. M. and J. D. Harris, Managing Computer Risk: A Guide for the Policymaker, New York: Wiley, 1986.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer Science+Business Media New York
About this chapter
Cite this chapter
Sherer, S.A. (1992). Risk Analysis and Management. In: Software Failure Risk. Applications of Modern Technology in Business. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-3020-6_2
Download citation
DOI: https://doi.org/10.1007/978-1-4615-3020-6_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-6316-3
Online ISBN: 978-1-4615-3020-6
eBook Packages: Springer Book Archive