2014
DOI: 10.3127/ajis.v18i3.1096
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risk Management: An Intelligence-Driven Approach

Abstract: Three deficiencies exist in the organisational practice of information security risk management: risk assessments are commonly perfunctory, security risks are estimated without investigation; risk is assessed on an occasional (as opposed to continuous) basis. These tendencies indicate that important data is being missed and that the situation awareness of decision-makers in many organisations is currently inadequate. This research-in-progress paper uses Endsley's situation awareness theory, and examines how th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…If the information classification is not considered a critical activity, it can lead to problems with the risk assessment. If there are shortcomings with the classification, it will reduce the possibility of adequately protecting the organizational assets as less knowledge is available, leading to less informed decisions (Shedden et al , 2016; Webb et al , 2014). Further, it also means that assets that should have been identified will remain unidentified.…”
Section: Asset Management and Information Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…If the information classification is not considered a critical activity, it can lead to problems with the risk assessment. If there are shortcomings with the classification, it will reduce the possibility of adequately protecting the organizational assets as less knowledge is available, leading to less informed decisions (Shedden et al , 2016; Webb et al , 2014). Further, it also means that assets that should have been identified will remain unidentified.…”
Section: Asset Management and Information Classificationmentioning
confidence: 99%
“…ISO 27002:2017 (ISO Central Secretary, 2017) describes its objective as an activity that is necessary to ensure that information receives an appropriate level of protection in accordance with its importance to the organization . Once the classification of assets is set, the result act as input into the risk assessment where classified information is required to analyze, prioritize and manage risks and apply protection (Bergström and Åhlfeldt, 2014; Everett, 2011; Webb et al , 2014). Thus, it is an essential piece of risk analysis and management within organizations (Bergquist et al , 2021; Everett, 2011; Gerber and Von Solms, 2005).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Current studies on ISM focus on the conceptual understanding of ISM, the performance evaluation of ISM and the factors that affect the success of ISM. A few papers have provided conceptual view of ISM at the organizational level from different perspectives: as an integrated component in corporate governance (Johnston and Hale, 2009;Posthumus and von Solms, 2004;Tsohou et al, 2015;von Solms and von Solms, 2006), as a form of risk management (Chang et al, 2011;Dhillon and Backhouse, 2001;Webb et al, 2014) and as a life cycle of dynamic multiple-phase decision-making (Ma et al, 2009;Nazareth and Choi, 2015;Nyanchama, 2005;Pipkin, 2000). A group of researchers has called for investigating the quality of information security programs (Choobineh et al, 2007).…”
Section: Research Backgroundmentioning
confidence: 99%
“…Information become vital part of organization. Almost everything in daily works involves the use of information [1]. Non-profit organization, such as Archdiocese of Jakarta is no exception.…”
Section: Introductionmentioning
confidence: 99%