TY - CHAP
T1 - Risk Management
AU - Rass, Stefan
AU - Schauer, Stefan
AU - König, Sandra
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - This chapter embeds game theoretic techniques and models inside the ISO31000 risk management process, as a generic template for the general duty of risk control. We observe similarities between risk management processes and extensive form games, accompanied by the possibility of using game-theoretic algorithms and methods in various steps of a risk management process. Examples include decision making for risk prioritization, choice of best risk mitigation actions or optimal resource allocation for security. To this end, we discuss a variety of systematic methods for adversarial risk analysis (ARA), resilience management (in relation to risk management), level-k thinking, and the assessment of action spaces and utilities for games.
AB - This chapter embeds game theoretic techniques and models inside the ISO31000 risk management process, as a generic template for the general duty of risk control. We observe similarities between risk management processes and extensive form games, accompanied by the possibility of using game-theoretic algorithms and methods in various steps of a risk management process. Examples include decision making for risk prioritization, choice of best risk mitigation actions or optimal resource allocation for security. To this end, we discuss a variety of systematic methods for adversarial risk analysis (ARA), resilience management (in relation to risk management), level-k thinking, and the assessment of action spaces and utilities for games.
UR - http://www.scopus.com/inward/record.url?scp=85087551558&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85087551558&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-46908-5_6
DO - 10.1007/978-3-030-46908-5_6
M3 - Chapter
AN - SCOPUS:85087551558
T3 - Advanced Sciences and Technologies for Security Applications
SP - 117
EP - 135
BT - Advanced Sciences and Technologies for Security Applications
PB - Springer
ER -