2020
DOI: 10.2139/ssrn.3625242
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management in Information Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…In [48], a formal representation of the metric is given: the metric is a function M on a set Q that determines the distance between two members of the set M Q Q : × ( )…”
Section: Methodsmentioning
confidence: 99%
“…In [48], a formal representation of the metric is given: the metric is a function M on a set Q that determines the distance between two members of the set M Q Q : × ( )…”
Section: Methodsmentioning
confidence: 99%
“…All of this can reach an extent where the software and hardware are damaged, and in cases where attacks such as viruses, PCB tampering, and IP piracy are combined and not treated and detected (managed) on time, can destroy the company hardware and software, making it impossible to access the information system [6,32,36,72]. Mohammad [73] further explains that the management of data requires regular update of software and continuous training and update in data security methods to keep data handling authentic, because the more that preventive methods are used, the more intruders find new ways to sabotage and penetrate systems. In recent years, advertising and the press have become common targets for cyber security incidents.…”
Section: Inability To Submit Tenders and Hardware And Software Destru...mentioning
confidence: 99%
“…To achieve a long-time use of digital devices, the address of ethical considerations that come with the variety of digital technologies need to be put in place [9]. This is possible through the use of data management and security with the ability to retrieve, store and transmit data through different applications to detect various data risks and avoid negative financial consequences and information losses [73].…”
Section: Compromised Project and Employee Datamentioning
confidence: 99%
“…This management system is backed with other management protocols that can be gauged with risk management strategies. The process of risk management strategies plays important role in organization [14,15]. Also during the risk management and conflict management development process, there should be complete guidance of disaster recovery planning in a system that can give easy bounce back for the organization [16].…”
Section: Future Prospectivementioning
confidence: 99%