2020
DOI: 10.1007/s10207-020-00495-7
|View full text |Cite
|
Sign up to set email alerts
|

Risk model development for information security in organization environment based on business perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Avoiding perceptions of unfair decision-making may be ideal, but it is not feasible for all companies, such as those with highly complex internal operations or that justifiably worry about information leakages (Ibnugraha et al, 2021). When these extraordinary circumstances arise, employees should be aware of the risks associated with letting their self-damaging ruminations 29 escalate into complacency about reporting problem situations (Morrison, 2011), and managers should help them realize and avoid that situation.…”
Section: Practical Implicationsmentioning
confidence: 99%
“…Avoiding perceptions of unfair decision-making may be ideal, but it is not feasible for all companies, such as those with highly complex internal operations or that justifiably worry about information leakages (Ibnugraha et al, 2021). When these extraordinary circumstances arise, employees should be aware of the risks associated with letting their self-damaging ruminations 29 escalate into complacency about reporting problem situations (Morrison, 2011), and managers should help them realize and avoid that situation.…”
Section: Practical Implicationsmentioning
confidence: 99%
“…The previous studies commonly use specific perspectives to perform those steps. From a business perspective, the risk of the threat level is estimated by several metrics such as financial view, reputation, organization size, organization type, and critical level of information [13].…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Appropriate and frequently integrated actions provide security models. Currently, special applications are being developed around the round-the-clock monitoring status of the network and the warning of information security systems [35]. Managers should conduct training exercises to avoid accidental data collection by employees.…”
Section: Literature Reviewmentioning
confidence: 99%