• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Handelshøyskolen BI
  • Publikasjoner fra CRIStin - BI
  • View Item
  •   Home
  • Handelshøyskolen BI
  • Publikasjoner fra CRIStin - BI
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

On the Application of the Safety-II Concept in a Security Context

Steen, Riana
Journal article, Peer reviewed
Accepted version
Thumbnail
View/Open
Available from 2020-04-24 (1.103Mb)
URI
http://hdl.handle.net/11250/2607738
Date
2019
Metadata
Show full item record
Collections
  • Publikasjoner fra CRIStin - BI [636]
  • Scientific articles [1722]
Original version
European Journal for Security Research. 2019   10.1007/s41125-019-00041-0
Abstract
This paper presents an alternative and broader security risk perspective, incorporat-ing uncertainty, as a two-dimensional combination of (1) threat (Th) on value (Vl), (2) vulnerability (Vu) given coping capabilities (Cc), and associated uncertainties U (will the threat scenario occur? and to what degree are we vulnerable?). Moreo-ver, this work attempts to provide an integrated approach to the safety and secu-rity fields. We look closely into the issues related to Safety-I, Safety-II and security. Whereas conventional safety management approaches (Safety-I) are based on hind-sight knowledge and risk assessments calculating historical data-based probabilities, the concept of Safety-II looks for ways to enhance the ability of organisations to be resilient in the sense that they recognise, adapt to and absorb disturbances. Three determinants that shape the Safety-II concept in the security perspective are the capacity of organisations to operate in changing circumstances; formulating strat-egies that promote a willingness to devote resources to security purposes, driven mainly by the organisation’s leader; and an organisational culture that encourage people to speak up (respond), think creatively (anticipate), and act as mindful par-ticipants (monitor and learn). Based on clarifying some of the fundamental build-ing blocks of security risk assessment, this work develops an extended security risk assessment, including an analysis of both vulnerability and resilience. The analysis explores how the system works following any type of threat scenario and determines whether key functions and operations can be sustained.
Publisher
Springer
Journal
European Journal for Security Research
Copyright
"Authors may self-archive the author’s accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/ she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit…”

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit