Theoretical and methodological bases of threats. The method of security management support
Journal Title: Operations Research and Decisions - Year 2014, Vol 24, Issue 3
Abstract
A new approach to threat analysis and management of security understood has been presented. Threats have been analyzed in a wide theoretical-methodological range with particular emphasis on the need for the system-wide analysis of threats in terms of social (sociological), psychological (psychology of the crowd) and religious aspects. A method supporting security management has been proposed, using two-person zero-sum games to model situations of conflict. The matrix, infinite, logical and topological forms of such games are considered.
Authors and Affiliations
Tadeusz Galanc, Wiktor Kołwzan, Jerzy Pieronek
Estimating the reliability of the elements of cloud services
Cloud technologies are a very considerable area that influence IT infrastructure, network services and applications. Research has highlighted difficulties in the functioning of cloud infrastructure. For instance, if a se...
A method of assigning a global preference index
The issue of decision-making has been examined based on the preferences of the entire population, when the preferences of a few subpopulations varying significantly in size are known. The purpose of assigning global pref...
The optimal portfolio under VaR and ES
An analysis of the dependence structure among certain European indices (FTSE100, CAC40, DAX30, ATX20, PX, BUX and BIST) has been conducted. The main features of the financial data were studied: asymmetry, fat-tailedness...
Tendencies in research on innovation in low–technology sectors
The aim of the article is to identify and analyse the main tendencies in and subject matter of research on innovation in low-technology sectors. The data analysed come from the Scopus database covering 1977–2015. The aut...
Choosing what to protect when attacker resources and asset valuations are uncertain
The situation has been modelled where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker target...