Posted by:
admin
15 years, 10 months ago
I would think that this kind of research would be applicable to Information Security:
A new method for putting a price tag on the cost of "managerial neglect" has been developed by two industrial engineers in the University at Buffalo School of Engineering Applied Sciences. The method, and how it would be applied to a two-stage supply chain, is described in the current issue of "The Engineering Economist."
"Our method can be used for any process that has variability, like a multi-stage supply chain, manufacturing process or a quality-improvement project," explains Alfred Guiffrida, Ph.D., UB adjunct instructor of industrial and systems engineering, who developed the method with Rakesh Nagi, Ph.D., UB professor of industrial and systems engineering.
"Management theory says to improve a process you have to first improve its variability. Well, we've developed a way to put a price tag on the expected costs of failing to improve variability, for failing to improve a process," Guiffrida says.
Adds Nagi, "In this context, managerial neglect is something that a manager should be doing, but is not doing, and it's costing the company something. It's seldom that managerial neglect is quantified in financial terms."
I might have to run out and pick up a copy of "The Engineering Economist."
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)