2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications 2011
DOI: 10.1109/waina.2011.93
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Security Efficiency through Effective Risk Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…According to Ghernaouti-Helie, Simms, and Tashi [24] and Ponnam et al, [25], the main purpose of performing an effective risk assessment is to prioritize security efforts for valuable information assets, such as electronic and physical copies of student and financial information, which are vital to the continued operation of the institution. Because, for most organizations, the cost, in terms of personnel and financial resources, of mitigating all IS risks is impossible [6,13], it is important to have a method to prioritize risk mitigation efforts.…”
Section: Importance Of Is Risk Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Ghernaouti-Helie, Simms, and Tashi [24] and Ponnam et al, [25], the main purpose of performing an effective risk assessment is to prioritize security efforts for valuable information assets, such as electronic and physical copies of student and financial information, which are vital to the continued operation of the institution. Because, for most organizations, the cost, in terms of personnel and financial resources, of mitigating all IS risks is impossible [6,13], it is important to have a method to prioritize risk mitigation efforts.…”
Section: Importance Of Is Risk Assessmentmentioning
confidence: 99%
“…Researchers and practitioners have provided various descriptions of the IS risk assessment process. Generally, these investigators include three overall phases in the risk assessment process: risk identification, risk analysis, and risk evaluation [28,29,30]. Other well-respected researchers of risk assessment methods include a fourth phase, that of risk mitigation planning [31,32,33,34,35,36].…”
Section: Key Elements Of An Is Risk Assessmentmentioning
confidence: 99%