The risk-aware enterprise architecture: Towards a transparent inventory of IT riskmanagement artifacts

Manfred Pauli, Michael Schermann, Helmut Krcmar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A risk inventory provides an integrated view on risk management artifacts, e.g., risks, risk controls, and performance indicators. In this paper, we show how adapting the enterprise architecture management processes (EAM) may provide a foundation for an integrated IT risk inventory. Based on a design research approach, we develop a systematic approach for integrating the disciplines of risk management and enterprise architecture management. We demonstrate the utility of our approach by evaluating an identity management solution in a large bank.

Original languageEnglish
Title of host publicationINFORMATIK 2010 - Service Science - Neue Perspektiven fur die Informatik, Beitrage der 40. Jahrestagung der Gesellschaft fur Informatik e.V. (GI)
Pages259-264
Number of pages6
StatePublished - 2010
Event40th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Service Science - Neue Perspektiven fur die Informatik 40th Annual Conf. of the German Informatics Society (GI): Service Science - New Perspectives in Computer Science INFORMATIK 2010 - Leipzig, Germany
Duration: 27 Sep 20101 Oct 2010

Publication series

NameINFORMATIK 2010 - Service Science - Neue Perspektiven fur die Informatik, Beitrage der 40. Jahrestagung der Gesellschaft fur Informatik e.V. (GI)
Volume2

Conference

Conference40th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Service Science - Neue Perspektiven fur die Informatik 40th Annual Conf. of the German Informatics Society (GI): Service Science - New Perspectives in Computer Science INFORMATIK 2010
Country/TerritoryGermany
CityLeipzig
Period27/09/101/10/10

Fingerprint

Dive into the research topics of 'The risk-aware enterprise architecture: Towards a transparent inventory of IT riskmanagement artifacts'. Together they form a unique fingerprint.

Cite this