2019
DOI: 10.5539/cis.v12n3p1
|View full text |Cite
|
Sign up to set email alerts
|

Information Systems Risk Management: Litterature Review

Abstract: The security of a company's information system (IS) is an important requirement for the pursuit of its business. Risk management contributes to the protection of the IS assets. It saves the organism from the losses caused by the emergence of unwanted events having an incidence on the IS objectives and consequently on its strategy. It has also an important role in the decision making about entering new opportunities. In addition, it promises an optimal allocation of information system resources. The ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 25 publications
0
4
0
2
Order By: Relevance
“…In a sense, negative campaigns on social media as a novel attack vector should already be a concern of the personnel in charge of information systems (IS) risk within public utility companies. A preliminary literature review (Amraoui, Elmaallam, Bensaid & Kriouile, 2019), however, shows that this is not yet the case. In fact, if information systems are, de facto, socio-technical systems, organizational overlapping should bring IS people to work more closely with marketing and social media managers.…”
Section: Discussionmentioning
confidence: 92%
“…In a sense, negative campaigns on social media as a novel attack vector should already be a concern of the personnel in charge of information systems (IS) risk within public utility companies. A preliminary literature review (Amraoui, Elmaallam, Bensaid & Kriouile, 2019), however, shows that this is not yet the case. In fact, if information systems are, de facto, socio-technical systems, organizational overlapping should bring IS people to work more closely with marketing and social media managers.…”
Section: Discussionmentioning
confidence: 92%
“…The methodology that is used in this research is OCTAVE Allegro with the help of OCTAVE Allegro Worksheets to help understand to create risk assessment. Risk assessment itself is an essential part of risk management that is used to identify, analyze and evaluate a curtain risk [9]. In information technology, information security is a new term that is increasing awareness of access, usage, disclosure, disruption, modification, inspection, recording and destruction of data from an organization that can be accessed [10].…”
Section: Methodsmentioning
confidence: 99%
“…Di dalamnya juga terdapat prinsip serta perspektif umum yang dapat menyatukan proses manajemen risiko dari berbagai standar, yang dikeluarkan oleh Organisasi Standardisasi Internasional (IOS) maupun lembaga lain (Barafort et al, 2019;Muzaimi et al, 2017). Penelitian dari Amraoui et al (2019) menyimpulkan bahwa ISO 31000:2018 adalah pendekatan paling komprehensif untuk manajemen risiko, yang mencakup perihal: komunikasi dan konsultasi, penentuan ruang lingkup, konteks dan kriteria, identifikasi risiko, analisis risiko, evaluasi risiko, manajemen risiko, pemantauan dan tinjauan, serta pencatatan dan pelaporan, seperti yang diilustrasikan pada Gambar 2 (International Organization for Standardization, 2018). Lebih lanjut tentang topik ini, pembaca dapat menggali lebih jauh dari penelitian sebelumnya (Amraoui et al, 2019;Barafort et al, 2017;Eskaluspita, 2020;Grusho et al, 2020;Schnitzler, 2018;Suyasa & Legowo, 2019;Wallin & Xu, 2008;Zhiwei & Zhongyuan, 2012), beserta referensi didalamnya, untuk mendapatkan gambaran tentang penerapan sistem manajemen keamanan informasi, dimana diawali dengan penetapan konteks dan pemahaman proses kritis, serta menilai sensitivitas aset, yang dilanjutkan dengan penilaian risiko yang meliputi identifikasi, analisis dan evaluasi risiko untuk membantu organisasi dalam mewaspadai kerentanan dan mengantisipasi kemungkinan ancaman (Zhiwei & Zhongyuan, 2012).…”
Section: Penelitian Terkaitunclassified