The Security–Business Nexus
Edited by Gabriele G.S. Suder
Chapter 14: Conclusions
14. Conclusions Gabriele G.S. Suder A 22-page document entitled ‘General Security Risk Assessment Guidelines 2003’, which includes seven suggestions for corporate risk assessment, has been developed by ASIS with the aim of ‘helping the private sector protect business and critical infrastructure from terrorist attacks’.1 The US federal government as well as the European political organizations have been discussing ways to stimulate corporate security. The need to do ‘something’ to assess, evaluate and methodologize post-09/11 terrorism is recognized in the regulatory as well as in the corporate sector. Assessment process are particularly complex. What is terrorism? Why and how does it aﬀect business?2 Can it be classiﬁed as political risk? Do risk managers need to expand the notion of political risk and include geopolitical scenario planning? If so, what assets are prioritized and how are they categorized? What is the direct and what is the indirect impact of international terrorism to the primary, micro and macro level of the international business environment? For quantitative and qualitative risk assessment and research, it will be useful to deﬁne and narrow the criteria on which the risk ratio of emerging threat can be calculated for corporate purposes, as a basis for the extension of lossmodelling to operational resilience planning. Corporate assets and risk identiﬁcation is critical.3 The ability to measure risk and the possible consequences is a vital part of risk assessment and risk analysis. The notion of risk is historical, quantiﬁable, probabilistic and modelizable, while uncertainty is...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.