Abstract
This paper presents and discusses an approach for evaluating and selecting methods for risk and vulnerability assessments, covering both accidental events and security issues. The approach provides guidance on the selection of one specific, suitable method for various types of decision situations, reflecting different levels of potential consequences and associated uncertainties. The evaluation addresses the various stages of the risk assessment process, covering planning, execution, and use of the risk and vulnerability analyses. An example from information and communication technology (ICT) is used to illustrate the method.
Get full access to this article
View all access options for this article.
