Abstract—Expert judgments are often used to estimate likelihood values in a security risk analysis. These judgments are subjective and their correctness rely on the competence, training, and experience of the experts. Thus, there is a need to validate the correctness of the estimates obtained from expert judgments. In this paper we report on experiences from a security risk analysis where indicators were used to validate likelihood estimates obtained from expert judgments. The experiences build on data collected during the analysis and on semi-structured interviews with the client experts who participated in the analysis. Keywords-security risk analysis; expert judgment; indicator I
Abstract—Due to the lack of quantitative information and for cost-efficiency, most risk assessment m...
This study examines source credibility of violence risk assessments made using two methods: actuaria...
Over the past decades a significant number of methods to identify and mitigate security risks have b...
Expert judgments are often used to estimate likelihood values in a security risk analysis. These jud...
In the information security business, 30 years of practical and theoretical research has resulted in...
A major challenge of risk and reliability analysis for human errors or hardware failures is the need...
Expert judgement is a valuable source of information in risk management. Especially, risk-based deci...
The increased use of risk assesment in governmental and corporate decision-making has increased the ...
This project will develop an elicitation process to assess important counterterrorism values such as...
The information security (IS) risk assessment process is an essential part to organisation's their p...
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert...
PresentationTo be acceptably safe one must identify the risks one is exposed to. It is uncertain whe...
Security professionals play a decisive role in security risk decision making, with important implica...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Abstract—Due to the lack of quantitative information and for cost-efficiency, most risk assessment m...
This study examines source credibility of violence risk assessments made using two methods: actuaria...
Over the past decades a significant number of methods to identify and mitigate security risks have b...
Expert judgments are often used to estimate likelihood values in a security risk analysis. These jud...
In the information security business, 30 years of practical and theoretical research has resulted in...
A major challenge of risk and reliability analysis for human errors or hardware failures is the need...
Expert judgement is a valuable source of information in risk management. Especially, risk-based deci...
The increased use of risk assesment in governmental and corporate decision-making has increased the ...
This project will develop an elicitation process to assess important counterterrorism values such as...
The information security (IS) risk assessment process is an essential part to organisation's their p...
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert...
PresentationTo be acceptably safe one must identify the risks one is exposed to. It is uncertain whe...
Security professionals play a decisive role in security risk decision making, with important implica...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Abstract—Due to the lack of quantitative information and for cost-efficiency, most risk assessment m...
This study examines source credibility of violence risk assessments made using two methods: actuaria...
Over the past decades a significant number of methods to identify and mitigate security risks have b...