Skip to main content

Risk-Aware Business Process Management—Establishing the Link Between Business and Security

  • Chapter
Complex Intelligent Systems and Their Applications

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 41))

Summary

Companies face the challenge to effectively and efficiently perform their business processes and to guarantee their continuous operation. To meet the economic requirements, companies predominantly apply business process management concepts. The substantial consideration of robustness and continuity of operations is performed in other domains such as risk or business continuity management. Applying these domains separately, analysis results may significantly differ as valuations from an economic and risk point of view may lead to deviating improvement recommendations. Observing developments in the past years, one can see that regulative bodies, the industry, and the research community laid a special focus on the tighter integration of business process and risk management. Consequently, the integrated consideration of economic, risk, and security aspects when analyzing and designing business processes delivers enormous value to achieve these requirements.

In this chapter, we present an survey about selected scientific approaches tackling the challenge of integrating economic and risk aspects. Furthermore, we present a methodology enabling the risk-aware modeling and simulation of business processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • F. Braber, I. Hogganvik, M.S. Lund, K. Stølen, and F. Vraalsen. Model-based security analysis in seven steps—a guided tour to the CORAS method. BT Technology Journal, 25:101–117, 2007.

    Article  Google Scholar 

  • British Standard Institute (BSI). British standard bs25999-1:2006: Business continuity management—part 1: Code of practice, 2006.

    Google Scholar 

  • British Standard Institute (BSI). British standard bs25999-2:2007: Business continuity management—part 2: Specification, 2007.

    Google Scholar 

  • BSI (German Federal Office for Information Security). IT-Grundschutz Manual (English version), 2004.

    Google Scholar 

  • Business Continuity Institute. Good Practice Guidelines, 2008.

    Google Scholar 

  • A. Ekelhart, S. Fenz, and T. Neubauer. Aurum: A framework for supporting information security risk management. In Proceedings of the 42nd Hawaii International Conference on System Sciences (HICCS 2009), pages 1–10, 2009a.

    Google Scholar 

  • A. Ekelhart, S. Fenz, and T. Neubauer. Ontology-based decision support for information security risk management. In International Conference on Systems (ICONS 2009), pages 80–85, 2009b.

    Google Scholar 

  • European Commission. Auditing directives. URL: http://ec.europa.eu/internal_market/auditing/directives/index_en.htm, Accessed May 2010.

  • European Network and Information Security Agency (ENISA). Business and it continuity overview and implementation principles, 2008.

    Google Scholar 

  • S. Fenz, A. Ekelhart, and T. Neubauer. Business process-based resource importance determination. In Proceedings of the 7th International Conference on Business Process Management (BPM2009), pages 113–127, 2009.

    Google Scholar 

  • Gartner Inc. Gartner EXP worldwide survey of more than 1500 CIOS shows IT Spending to be flat in 2009, 2009.

    Google Scholar 

  • G. Goluch, A. Ekelhart, S. Fenz, S. Jakoubi, S. Tjoa, and T. Mück. Integration of an ontological information security concept in risk aware business process management. In 41st Hawaii International Conference on Systems Science (HICSS-41 2008), page 377, 2008.

    Google Scholar 

  • Gartner Inc. Misconceptions on process optimization and simulation. Gartner Blog, 2009.

    Google Scholar 

  • International Organization for Standardization. Iso/iec 13335-1:2004, information technology—security techniques—management of information and communications technology security, Part 1: Concepts and models for information and communications technology security management, 2004.

    Google Scholar 

  • International Organization for Standardization. Iso/iec 24762:2008 information technology—security techniques—guidelines for information and communications technology disaster recovery services, 2008.

    Google Scholar 

  • S. Jakoubi and S. Tjoa. A reference model for risk-aware business process management. In International Conference on Risks and Security of Internet and Systems. IEEE, New York, 2009.

    Google Scholar 

  • S. Jakoubi, S. Tjoa, and G. Quirchmayr. Rope: A methodology for enabling the risk-aware modelling and simulation of business processes. In Fifteenth European Conference on Information Systems, pages 1596–1607, 2007.

    Google Scholar 

  • S. Jakoubi, G. Goluch, S. Tjoa, and G. Quirchmayr. Deriving resource requirements applying risk-aware business process modeling and simulation. In 16th European Conference on Information Systems, pages 1542–1554, 2008.

    Google Scholar 

  • S. Jakoubi, T. Neubauer, and S. Tjoa. A roadmap to risk-aware business process management. In Proceedings of the International Workshop on Secure Service Computing (SSC 2009), 2009.

    Google Scholar 

  • A.K. Jallow, B. Majeed, K. Vergidis, A. Tiwari, and R.Roy. Operational risk analysis in business processes. BT Technology Journal, 25:168–177, 2007.

    Article  Google Scholar 

  • D. Karagiannis, J. Mylopoulos, and M. Schwab. Business process-based regulation compliance: The case of the sarbanes-oxley act. In Proceedings of the 15th IEEE International Requirements Engineering Conference, pages 315–321, 2007.

    Google Scholar 

  • N. Milanovic, B. Milic, and M. Malek. Modeling business process availability. In IEEE International Conference on Services Computing (SCC 2008), pages 315–321, 2008.

    Google Scholar 

  • National Institute of Standards and Technology. NIST SP800-30, risk management guide fir information technology systems, 2002.

    Google Scholar 

  • National Institute of Standards and Technology. NIST SP800-61: Computer security incident handling guide, 2004.

    Google Scholar 

  • D. Neiger, L. Churilov, M. zur Muehlen, and M. Rosemann. Integrating risks in business process models with value focused process engineering. In European Conference on Information Systems (ECIS 2006), 2006.

    Google Scholar 

  • One Hundred Seventh Congress of the United States of America. Sarbanes–Oxley Act, 2002.

    Google Scholar 

  • A. Rodríguez, E. Fernández-Medina, and M. Piattini. Towards a UML 2.0 extension for the modeling of security requirements in business processes. In International Conference on Trust and Privacy in Digital Business (TrustBus 2006), pages 51–61, 2006.

    Google Scholar 

  • S. Sackmann. A reference model for process-oriented IT risk management. In 16th European Conference on Information Systems, 2008.

    Google Scholar 

  • S. Sackmann, L. Lowis, and K. Kittel. Selecting services in business process execution—a risk-based approach. In Business Services: Konzepte, Technologien, Anwendungen, Tagung Wirtschaftsinformatik (WI09), 2009.

    Google Scholar 

  • S. Sadiq, G. Governatori, and K. Namiri. Modelling control objectives for business process compliance. In 5th International Conference on Business Process Management (BPM2007), pages 149–164, 2007.

    Google Scholar 

  • The MathWorks. Simulink—simulation and model-based design, URL: http://www.mathworks.com/products/simulink/, Accessed May 2010.

  • S. Tjoa, S. Jakoubi, G. Goluch, and G. Quirchmayr. Extension of a methodology for risk-aware business process modeling and simulation enabling process-oriented incident handling support. In Advanced Information Networking and Applications, pages 48–55, 2008a.

    Google Scholar 

  • S. Tjoa, S. Jakoubi, and G. Quirchmayr. Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology. In International Conference on Availability, Reliability and Security, pages 179–186, 2008b.

    Google Scholar 

  • I. Weber, G. Governatori, and J. Hoffmann. Approximate compliance checking for annotated process models. In 1st International Workshop on Governance, Risk and Compliance—Applications in Information Systems (GRCIS’08), 2008.

    Google Scholar 

  • M. zur Muehlen and M. Rosemann. Integrating risks in business process models. In Australasian Conference on Information Systems (ACIS 2005), 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Jakoubi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Jakoubi, S., Tjoa, S., Goluch, S., Kitzler, G. (2010). Risk-Aware Business Process Management—Establishing the Link Between Business and Security. In: Xhafa, F., Barolli, L., Papajorgji, P. (eds) Complex Intelligent Systems and Their Applications. Springer Optimization and Its Applications, vol 41. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-1636-5_6

Download citation

Publish with us

Policies and ethics