{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:17Z","timestamp":1759072097239},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770091"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77010-7_13","type":"book-chapter","created":{"date-parts":[[2007,11,22]],"date-time":"2007-11-22T04:39:56Z","timestamp":1195706396000},"page":"118-129","source":"Crossref","is-referenced-by-count":9,"title":["Conceptual Model of Risk: Towards a Risk Modelling Language"],"prefix":"10.1007","author":[{"given":"Amadou","family":"Sienou","sequence":"first","affiliation":[]},{"given":"Elyes","family":"Lamine","sequence":"additional","affiliation":[]},{"given":"Achim","family":"Karduck","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Pingaud","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Business Process Management: Profiting From Process","author":"R.T. Burlton","year":"2001","unstructured":"Burlton, R.T.: Business Process Management: Profiting From Process. Sams publishing, Indianapolis (2001)"},{"key":"13_CR2","volume-title":"Reengineering the Corporation: A Manifesto for Business Revolution","author":"M. Hammer","year":"1993","unstructured":"Hammer, M., Champy, J.: Reengineering the Corporation: A Manifesto for Business Revolution. Harper Business, New York (1993)"},{"key":"13_CR3","unstructured":"The Business Continuity Institute: Good Practice Guidelines - A Framework for Business Continuity Management. In: Smith, D.J. (ed.). The Business Continuity Institute (2005)"},{"key":"13_CR4","unstructured":"COSO: Enterprise Risk Management - Integrated Framework. Committee of Sponsoring Organizations of the Treadway Commission (2004)"},{"key":"13_CR5","unstructured":"Robillard, L.: Integrated Risk Management Framework. Treasury Board of Canada Secretariat (2001)"},{"key":"13_CR6","unstructured":"zur Muehlen, M.: Workflow-based Process Controlling. Foundation, Design, and Application of workflow-driven Process Information Systems. Logos Verlag, Berlin (2004)"},{"key":"13_CR7","unstructured":"AS\/NZS: AS\/NZS 4360:2004: Risk management. Australian \/ New Zealand Standard for Risk Management (2004)"},{"key":"13_CR8","unstructured":"Scheherazade, B.: Contribution \u00e1 une d\u00e9marche d\u2019int\u00e9gration des processus de gestion des risques et des projets: \u00e9tude de la fonction planification. \u00c9cole doctorale Syst\u00e9mes. Ecole des Mines d\u2019Albi-Carmaux, PhD thesis, Institut National Polytechnique de Toulouse (2003)"},{"key":"13_CR9","unstructured":"Gourc, D.: Vers un mod\u00e9le g\u00e9n\u00e9ral du risque pour le pilotage et la conduite des activit\u00e9s de biens et de services: Propositions pour une conduite des projets et une gestion des risques int\u00e9gr\u00e9es. Ecole des Mines d\u2019Albi-Carmaux, HDR. Institut National Polytechnique de Toulouse (2006)"},{"key":"13_CR10","unstructured":"Office of Government Commerce: Management of Risk: Guidance for Practitioners. The Stationery Office Books (2002)"},{"key":"13_CR11","unstructured":"Kervern, G.-Y.: \u00c9l\u00e9ments fondamentaux des cindyniques. Economica, Paris (1995)"},{"key":"13_CR12","unstructured":"RBDM: Risk-based Decision-making guidelines. U.S. Coast Guard, Homeland Security (1997)"},{"key":"13_CR13","unstructured":"Kontio, J.: Software Engineering Risk Management: A Method, Improvement Framework, and Empirical Evaluation. Department of Computer Science and Engineering, Laboratory of Information Processing Science, PhD Thesis, Helsinki University of Technology, Finland (2001)"},{"key":"13_CR14","unstructured":"Bernard, J.-G., Aubert, A.B., Bourdeau, S., Cl\u00e9ment, E., Debuissy, C., Dumoulin, M.-J., Laberge, M., de Marcellis, N., Peigner, I.: Le risque: un model conceptuel d\u2019integration. In: CIRANO: Centre interuniversitaire de recherche en analyse des organisations, Montr\u00e9al (2002)"},{"key":"13_CR15","unstructured":"Stamatelatos, M.: Probabilistic Risk Assessment Procedures Guide for NASA Managers and Practitioners, Version 1.1. Office of Safety and Mission Assurance, NASA, Washington, DC, 323 (2002)"},{"key":"13_CR16","unstructured":"Alberts, C.J.: Common Elements of Risk. Acquisition Support Program. Carnegie Mellon University, Software Engineering Institute, Pittsburgh, Pennsylvania (2006)"},{"key":"13_CR17","unstructured":"Basel Committee on Banking Supervision: Operational Risk - Consultative Document. Bank for International Settlements (2001)"},{"key":"13_CR18","unstructured":"\u00c1lvarez, G.: Operational Risk Quantification: Mathematical Solutions for Analyzing Loss Data. Basel Committee on Banking Supervision, Bank for International Settlements (2001)"},{"key":"13_CR19","unstructured":"Miccolis, J., Shah, S.: Enterprise Risk Management: An Analytic Approach. Tillinghast-Towers Perrin (2000)"},{"key":"13_CR20","unstructured":"Miccolis, J., Shah, S.: RiskValueInsights: Creating Value Through Enterprise Risk Management-A Practical Approach for the Insurance Industry. Tillinghast-Towers Perrin"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1287\/opre.34.6.871","volume":"34","author":"R.D. Shachter","year":"1996","unstructured":"Shachter, R.D.: Evaluating Influence Diagrams. Operations Research\u00a034, 871\u2013882 (1996)","journal-title":"Operations Research"},{"key":"13_CR22","unstructured":"zur Muehlen, M., Rosemann, M.: Integrating Risks in Business Process Models. In: ACIS 2005. Proceedings of the 2005 Australasian Conference on Information Systems, Manly, Sydney, Australia (2005)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Alberts, C.J., Dorofee, A.J.: Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex Environments. Carnegie Mellon University, Software Engineering Institute, Pittsburgh, Pennsylvania (2005)","DOI":"10.21236\/ADA441906"},{"key":"13_CR24","unstructured":"Lund, M.S., Hogganvik, I., Seehusen, F., St\u00f8len, K.: The CORAS framework, the CORAS UML profile for security assessment, and the CORAS library of reusable elements. Information Society Technologies, European Commission (2003)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2007 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77010-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:52:49Z","timestamp":1619520769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77010-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770091"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77010-7_13","relation":{},"subject":[]}}