1 / 13

適用於 NFC 應用環境之風險管理架構暨評估模式

適用於 NFC 應用環境之風險管理架構暨評估模式. 計畫主持人:洪政煌老師、查士朝老師 研究助理:林淇玫、王家駿、卓錦德、蔡孟潔. Date of Meeting : 26 nov . 2010. 第一年計畫執行進度規劃. 預計產出. 工作進度表. 風險評估流程. 風險確認 Risk Identification 風險衡量 Risk Measurement 風險決策 Decision under Risk and Uncertainty 風險管理的施行 Risk Management Implementation

avidan
Download Presentation

適用於 NFC 應用環境之風險管理架構暨評估模式

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 適用於NFC應用環境之風險管理架構暨評估模式 計畫主持人:洪政煌老師、查士朝老師 研究助理:林淇玫、王家駿、卓錦德、蔡孟潔 Date of Meeting : 26 nov. 2010

  2. 第一年計畫執行進度規劃

  3. 預計產出

  4. 工作進度表

  5. 風險評估流程 風險確認 Risk Identification 風險衡量 Risk Measurement 風險決策 Decision under Risk and Uncertainty 風險管理的施行 Risk Management Implementation 成效考核與回饋 Evaluation and Feedback

  6. 已研究之工具、方法 Qualitative : 風險矩陣(Risk matrix) 德菲法(Delphi) 錯誤樹分析(Fault Tree Analysis) HazOp(Hazard Operable Process) CRAMM (CCTA Risk Analysis Management Method) Quantitative: 決策樹分析 馬爾可夫分析 (Markov Analysis)

  7. 未來研究之工具、方法 Qualitative : 敏感度分析 事件樹分析(ETA) 失效模式與效應分析(FMECA) Quantitative: 風險係數評估法 ALE Risk density curve PRA(概率風險評估) DPRA(動態風險概率評估) 仿真通用軟件VERT(風險評審技術)

  8. 1.錯誤樹分析 2.HazOp 1.風險矩陣 2.決策樹分析 1.馬爾可夫分析 1.CRAMM 2.德菲法

  9. 下個階段接續的進度 定義介面規格 發展自動檢測之方法 設計與實作雛形系統

  10. Reference Kevin J. SooHoo. “How Much Is Enough? A Risk-Management Approach to Computer Security”. Working Paper. Jun 2000. Shi-Cho Cha, Hung-Wen Tung, Han-Chao Lee. “Take Risks into Consideration while Job Dispatching”. Advanced e-Commerce Institute. 2005. Bilge Karabacak, Ibrahim Sogukpinar. “information security risk analysis method”. Computers & Security. 27 July 2004. Shi-Cho Cha, Li-Ting Liu, Bo-Chen Yu. “Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk”. National Taiwan University of Science and Technology. 2009. Marvin Rausand. “System Analysis Fault Tree Analysis”. Norwegian University of Science and Technology. October 7, 2005. J.H.P. Eloff, L. Labuschagne and K.P. Badenhorst. “A comparative framework for risk analysis methods”. R.A.U. 1993.

  11. Reference L Fussell, S Field, The Role of the Risk Management Database in the RiskManagement Process, Systems Engineering, 2005. ICSEng 2005. 18thInternational , 2005 JeevanPerera, PhD, JD, Jerry Holsomback, An Integrated Risk ManagementTool and Process, Aerospace, 2005 IEEE Conference 5-12 March 2005Page(s):129 – 136 陳景新, 設計與實作使用模糊風險分析和控制方法之服務導向風險管理系統, 碩士論文 王志斌, 結合層級分析法與德菲法發展資訊安全認知評量表之研究, 台北市, 世新大學管理學院資訊管理學系碩士論文, 2009/06 張作貞, 社會研究方法專題,南投縣, 暨南國際大學社會政策與社會工作學系博士班

  12. End Next Meeting: 16:30,Dec xx,2010

More Related