dc.contributor.author | Steen, Riana | |
dc.date.accessioned | 2019-08-09T09:28:44Z | |
dc.date.available | 2019-08-09T09:28:44Z | |
dc.date.created | 2019-04-17T11:45:40Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | European Journal for Security Research. 2019 | nb_NO |
dc.identifier.issn | 2365-0931 | |
dc.identifier.uri | http://hdl.handle.net/11250/2607738 | |
dc.description.abstract | This paper presents an alternative and broader security risk perspective, incorporat-ing uncertainty, as a two-dimensional combination of (1) threat (Th) on value (Vl), (2) vulnerability (Vu) given coping capabilities (Cc), and associated uncertainties U (will the threat scenario occur? and to what degree are we vulnerable?). Moreo-ver, this work attempts to provide an integrated approach to the safety and secu-rity fields. We look closely into the issues related to Safety-I, Safety-II and security. Whereas conventional safety management approaches (Safety-I) are based on hind-sight knowledge and risk assessments calculating historical data-based probabilities, the concept of Safety-II looks for ways to enhance the ability of organisations to be resilient in the sense that they recognise, adapt to and absorb disturbances. Three determinants that shape the Safety-II concept in the security perspective are the capacity of organisations to operate in changing circumstances; formulating strat-egies that promote a willingness to devote resources to security purposes, driven mainly by the organisation’s leader; and an organisational culture that encourage people to speak up (respond), think creatively (anticipate), and act as mindful par-ticipants (monitor and learn). Based on clarifying some of the fundamental build-ing blocks of security risk assessment, this work develops an extended security risk assessment, including an analysis of both vulnerability and resilience. The analysis explores how the system works following any type of threat scenario and determines whether key functions and operations can be sustained. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer | nb_NO |
dc.subject | Security | nb_NO |
dc.subject | Vulnerability | nb_NO |
dc.subject | Uncertainty | nb_NO |
dc.subject | Resilience | nb_NO |
dc.subject | Safety-II | nb_NO |
dc.title | On the Application of the Safety-II Concept in a Security Context | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.rights.holder | "Authors may self-archive the author’s accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/ she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit…” | nb_NO |
dc.source.journal | European Journal for Security Research | nb_NO |
dc.identifier.doi | 10.1007/s41125-019-00041-0 | |
dc.identifier.cristin | 1693067 | |
cristin.unitcode | 158,13,0,0 | |
cristin.unitname | Institutt for regnskap, revisjon og foretaksøkonomi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |