TY - CHAP
T1 - A repeatable collaboration process for incident response planning
AU - Davis, Alanah
AU - de Vreede, Gert Jan
AU - Pietron, Leah R.
PY - 2009
Y1 - 2009
N2 - This chapter presents a repeatable collaboration process as an approach for developing a comprehensive Incident Response Plan for an organization or team. Despite the process of incident response planning being an essential ingredient in security planning procedures in organizations, extensive literature reviews have not yielded any collaborative processes for such a crucial activity. As such, this chapter will discuss the background of incident response planning as well as Collaboration Engineering, which is an approach to design repeatable collaborative work practices. We then present a collaboration process for incident response planning that was designed using Collaboration Engineering principles, followed by a discussion of the application process in three cases. The presented process is applicable across organizations in various sectors and domains, and consist of codified "best facilitation practices" that can be easily transferred to and adopted by security managers. The chapter describes the process in detail and highlights research results obtained during initial applications of the process.
AB - This chapter presents a repeatable collaboration process as an approach for developing a comprehensive Incident Response Plan for an organization or team. Despite the process of incident response planning being an essential ingredient in security planning procedures in organizations, extensive literature reviews have not yielded any collaborative processes for such a crucial activity. As such, this chapter will discuss the background of incident response planning as well as Collaboration Engineering, which is an approach to design repeatable collaborative work practices. We then present a collaboration process for incident response planning that was designed using Collaboration Engineering principles, followed by a discussion of the application process in three cases. The presented process is applicable across organizations in various sectors and domains, and consist of codified "best facilitation practices" that can be easily transferred to and adopted by security managers. The chapter describes the process in detail and highlights research results obtained during initial applications of the process.
UR - http://www.scopus.com/inward/record.url?scp=84900604743&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84900604743&partnerID=8YFLogxK
U2 - 10.4018/978-1-60566-326-5.ch012
DO - 10.4018/978-1-60566-326-5.ch012
M3 - Chapter
AN - SCOPUS:84900604743
SN - 9781605663265
SP - 250
EP - 264
BT - Cyber Security and Global Information Assurance
ER -