= RIMA - Risk Management = == Short description == The course presents both probabilistic and non-probabilistic approaches to risk management. Further discusses the basics of various types of risk analyzes in depth. The emphasis is however on how the authorities seeking to minimize risks in their domains. Thus addressed specifically to accident risks and financial risks. == Aim == After the course the student should be able to: * Assess the quality of different kinds of risk analysis * Carry out simple probability calculations == Syllabus == The course is divided into two parts In the first part a student should read texts on how to handle physical hazards, problems related to information security, or on the management of financial risks. In the second part a few influential texts on the concept of probability are studied. References (i) On the Management of Physical Hazards Apostolakis, G.: How useful is Quantitative risk assessment?. 2004. Risk Analysis, Vol 24, No 3, 2004. (Available as a pdf file.) Aven, Terje (2012). 'The risk concept: historical and recent development trends'. Reliability Engineering and System Safety. 99:33-44. (Available as a pdf file.) Aven, Terje (2013). 'On the meaning of a black swan in a risk context'. Safety Science. 57:44-51. (Available as a pdf file.) Clarke, Lee (2008). 'Possibilistic Thinking: A New Conceptual Tool for Thinking about Extreme Events'. Social Research. Vol 75, No 3. (Available as a pdf file.) Haugen, Stein & Vinnem, Jan Erik (2015) 'Perspectives on risk and the unforseen'. Reliability Engineering and System Safety. 137:1-5. (Available as a pdf file.) ISO 31000 Risk Management – Principles and Guidelines. International Organization for Standardization, 2009. Kaplan, S. & Garrick, B. J.: On the quantitative definition of risk. 1981. Risk Analysis, Vol 1, No 1, 1981. (Available as a pdf file.) Lindbom, Hanna; Tehler, Henrik; Eriksson, Kerstin et al. (2015). 'The capability concept - On how to define and describe capability in relation to risk, vulnerability and resilience'. Reliability Engineering and System Safety. 135:45-54. (Available as a pdf file.) Paté-Cornell: Uncertainties in risk analysis – six levels of treatment. 1996. In Reliability Engineering and System Safety 54 1996. sid 95-111. (Available as a pdf file.) Renn, O.: The role of riskperception for risk management. 1998. Reliability Engineering & System Safety, Vol. 59, No. 1, 1998, pp. 49-68. (Available as a pdf file.) Renn, Ortwin (1998). 'Three decades of risk research: accomplishments and new challenges'. Journal of Risk Research. Vol 1, Issue 1, p49-71. (Available as a pdf file.) Scholz, Roland W.; Blumer, Yann B. & Brand, Fridolin S. (2010) 'Risk, vulnerability, robustness, and recilience from a decision-theoretic perspective'. Journal of Risk Research. 15:313-330. (Available as a pdf file.) (ii) On the Management of Financial Risks Hull, John C. Risk Management and Financial Institutions 3rd ed. kap. 6, 8, 12, 13 och 20. Regulation (EU) 575/2013 Directive (EU) 2013/36 (iii) On the Management of Problems Related to Information Security Al-Ahmad, W. and B. Mohammad (213). Addressing Information Security Risks by Adopting Standards, Journal of Information Security Science Vol. 2, No. 2. (Available as a pdf file) Ciborra, C. (2006). Imbrication of Representations: Risk and Digital Technologies, Journal of Management Studies 43:6. (Available as a pdf file) Dhillon, G. and G. Turkzadeh (2006). Value-focused assessment of information system security in organizations, Info Systems J 16, 293 - 314. (Available as a pdf file) Fenz, S. et al. (2014). Current challenges in information security risk management, Information Management & Computer Security Vol. 22 No. 5, pp. 410 - 430. (Available as a pdf file) Fernandes, D. et al. (2014). Security issues in cloud environments: a survey, Int. J. Secur. 13:113-170. (Available as a pdf file) ISO/IEC 27005: 2011, IDT. (Available as a pdf file) Kalyvas, J. et al. (2013a). Cloud Computing: A Practical Framewok for Managing Cloud Computing Risk-Part I, Intellectual Property & Technology Law Journal Vol. 25 No. 3. (Available as a pdf file) Kalyvas, J. et al. (2013a). Cloud Computing: A Practical Framewok for Managing Cloud Computing Risk-Part II, Intellectual Property & Technology Law Journal Vol. 25 No. 4. (Available as a pdf file) Neumann, P. (2014). Risks and Myths of Cloud Computing and Cloud Storage, Communications of the ACM Vol. 57 No. 10. (Available as a pdf file) Paquette, S. et al. (2010). Identifying the security risks associated with governmental use of cloud computing, Governmental Information Quarterly 27, 245-253. (Available as a pdf file) Spears, J. and H. Barki (2010). User Participation in Information Systems Security Risk Management, MIS Quarterly Vol. 34 No. 3, pp. 503-522. (Available as a pdf file) Susser, B. (2012). How to Effectively Manage IT Project Risks, Journal of Management and Business Research Vol 2. No. 2. (Available as a pdf file) Vitale, M. (1986). The Growing Risks of Information Systems Success, MIS Quarterly/December. (Available as a pdf file) (iv) On the Concept of Probability Cramér, H. Mathematical Methods of Statistics, Chapter 13. Kolmogorov, A.N. Foundations of the Theory of Probability, Second English Edition, § 1 - 3 of Chapter 1. Kolmogorov, A.N. The Theory of Probability. Chapter XI of Alexandrov et al. ed. Mathematics Its Contents Methods and Meaning. (Available as a pdf file) Malmnäs, P.E. Notes on Probability. (Available as a pdf file.) Ramsey, F.P. Truth and Probability, i Ramsey, F.P. Foundations of Mathematics and Other Logical Essays. (Available as a pdf file.) Savage, L.J. The Foundations of Statistics 2nd ed., Chapter 1 - 5. == Outline == The course is given in english. The course is given as a distance course.