2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00230
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The IT professionals with the overall safety of the applications and the existence of a disaster Moreover, shared data information risk tenancy issues are deemed to be a significant drawback for the accounting . This outcome shows that there are differences in emerging information risk when it comes to the selection of the cloud supplier, an aspect that can influence the overall security [27] of the solution, in the scenario in which the accounting department should mitigate any possible ore quickly and efficiently compared with the other emerging technologies presented, a point that can be explained through the general preference of Benefits such as continuous access, better connectivity, and qualifies mobile technologies as a critical differentiator in the current local economic context. However, some of the most addressed drawbacks and challenges of this technology are limited resources, small screens, and connectivity issues.…”
Section: Resultsmentioning
confidence: 93%
See 1 more Smart Citation
“…The IT professionals with the overall safety of the applications and the existence of a disaster Moreover, shared data information risk tenancy issues are deemed to be a significant drawback for the accounting . This outcome shows that there are differences in emerging information risk when it comes to the selection of the cloud supplier, an aspect that can influence the overall security [27] of the solution, in the scenario in which the accounting department should mitigate any possible ore quickly and efficiently compared with the other emerging technologies presented, a point that can be explained through the general preference of Benefits such as continuous access, better connectivity, and qualifies mobile technologies as a critical differentiator in the current local economic context. However, some of the most addressed drawbacks and challenges of this technology are limited resources, small screens, and connectivity issues.…”
Section: Resultsmentioning
confidence: 93%
“…We have got people within the organization that we work with; whom we can call on [14]. What's most important is a broader understanding of what is driving and therefore what can influence the business beyond security and malicious threat [27]concerns that we have every day.…”
Section: Setsmentioning
confidence: 99%
“…An organization knows the importance of implementing risk management and making it the main step in minimizing the risks that will occur. The successful implementation of risk management in government agencies is influenced by several factors, namely risk management, policy development, and policy compliance [22].…”
Section: A Risk Managementmentioning
confidence: 99%
“…In addition, information technology systems should be continually monitored and examined to ensure security and compliance with the usage requirements and secrecy of the corporation information [37]. The cybersecurity policies that should be applied by the business corporations include a risk management policy that focuses on two main objectives: identification and prediction of cyber incidents in order to be mitigated in the future, and presentation of a brief description for purpose, scope, and objectives of institutional risk management [39].…”
Section: • Policies and Procedures Of Cybersecurity [34]mentioning
confidence: 99%