1996
DOI: 10.1108/09685229610114178
|View full text |Cite
|
Sign up to set email alerts
|

A business approach to effective information technology risk analysis and management

Abstract: Suggests that a number of difficulties are experienced by organizations using conventional risk analysis and management. "Conventional" refers to those methodologies which are based on the traditional asset/threat/vulnerability model. Identifies a need for an approach that is more suitable for smaller organizations, as well as organizations requiring a quicker, more simplified and less resourceintensive approach. In light of this requirement, proposes an alternative approach to effective information technology… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
2

Year Published

2001
2001
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(31 citation statements)
references
References 2 publications
0
29
0
2
Order By: Relevance
“…Table I show several key literatures on the information security risks related to the ICT outsourcing project implementation. [2], [23], [24], [25] Environmental Disaster [26], [27], [28] B. ICT Outsourcing Information Security Risk Factors Information security risks are the chances of threats action for vulnerabilities to cause impacts contributed to information security incidents [2]. Various examples of Information security risks are information leakage, theft of confidential information, extraction or damage and unauthorized exploitation of intellectual properties.…”
Section: A Ict Outsourcing Information Security Risksmentioning
confidence: 99%
“…Table I show several key literatures on the information security risks related to the ICT outsourcing project implementation. [2], [23], [24], [25] Environmental Disaster [26], [27], [28] B. ICT Outsourcing Information Security Risk Factors Information security risks are the chances of threats action for vulnerabilities to cause impacts contributed to information security incidents [2]. Various examples of Information security risks are information leakage, theft of confidential information, extraction or damage and unauthorized exploitation of intellectual properties.…”
Section: A Ict Outsourcing Information Security Risksmentioning
confidence: 99%
“…In addition, current risk assessment proceedings lead to simplification and are focused to strong on technical issues rather than on information or business issues [11]. For procedural reasons the assessor will usually simplify otherwise he will be lost in detail and forget the objectives [12]. Additionally, methods follow the waterfall model and therefore are not capable of considering changes during the lifetime of the assessment [31].…”
Section: Risk Determinationmentioning
confidence: 99%
“…Gollman, 1999;Norman, 1983;Parker, 1998). Several RM approaches have been presented (Wong, 1977;Cooper, 1989;Custance, 1996;Veatc et al, 1995;Moses, 1995;Bennett & Kailay, 1992;Halliday et al 1996;Lichtenstein, 1996;Freeman et al, 1997;Jung et al 1999;Spruit & Samwel, 1999). The terms risk analysis/management/assessment are used very differently by different authors, and without muddling through the terminological mess, we hereafter apply the term RM.…”
Section: Risk Management Techniquesmentioning
confidence: 99%