Preview

Information Security Risk Management

Powerful Essays
Open Document
Open Document
2806 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Risk Management
Discussion
As observed at the 4th International Conference on Global e-Security in London in June 2008, Information Security Risk Management (ISRM) is a major concern of organizations worldwide. Although the number of existing ISRM methodologies is enormous, in practice a lot of resources are invested by organizations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organizations, but in most cases it is addressed in an ad hoc manner. The existence of a systematic approach for the development of new or improved ISRM methodologies would enhance the effectiveness of the process (Papadaki et al, 2008). In this review, we examine existing ISRM methodologies, analyse trends in the development of new or improved methods and highlight gaps in research on the subject. The overarching research questions that form the foundations for this study were consequently formulated as follows:

RQ1: What information security risk management methodologies are currently being used in the industry?
RQ2: What evidence has been presented in ISRM research regarding the benefits and limitations of these methodologies?
RQ3: How much effort has been devoted to making these methodologies more SME-friendly?
RQ4: What are the prospects of the concept of Evidence-Based Risk Management in ISRM?

In responding to these research questions, our review beams the searchlight of critical analysis on the ISRM methodologies covered in existing literature with a view to providing a compendium for practitioners, researchers and other stakeholders in the ISRM arena.

The following ISRM methodologies were covered in the primary studies selected for this review:
……………..
……………..
……………..

With respect to RQ1, we limited our scope to ISRM methodologies on which primary studies had been undertaken from January 1995 to October 2012 on the premise that prior to the adoption of

You May Also Find These Documents Helpful

  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    RISK MANAGEMENT

    • 1958 Words
    • 15 Pages

    The purpose of this project is to open a new coffee shop in the local area of Covington, Ga. Charming Café will be owned by two partners, Allison Hatchell and Marshall Brumfield. This area has a high number of passing shoppers which is supported by a large and growing local population. There are a very few coffee shops in the area. Allison has experience in the restaurant business and Marshall in the commercial development industry there is an opportunity for great success. The coffee shop will serve breakfast, lunch, pastries, and variety of coffee from open to close. Operation schedule will be Monday through Saturday 5am-10pm and Sunday 9am-6pm. For continued success three positions are filled for COO, CFO, and CEO. The COO is responsible for planning and implementing the operations of the business. CFO is responsible for the financials within the company. While the CEO is in charge of all administration tasks for the company.…

    • 1958 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Quantitative research is generally defined as four types: true experimental, quasi-experimental, correlational, and ex post facto. This paper gives a brief overview of the differences between experimental and…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A method known as isothermal calorimetric analysis can be used to perform a quantitative test of the heat released by certain reactions. These experiments are performed by isolating a system typically in ice and…

    • 1186 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    | 3.1. use appropriate research evaluation techniques3.2. interpret and analyze the results in terms of the original research specification3.3make recommendations and justify areas for furtherconsideration…

    • 1482 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    References: NIST (2011), Managing Information Security Risk -- Organization, Mission and Information System View, National Institute of Standards and Technology Special Publication 800-39.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Asfd

    • 2616 Words
    • 11 Pages

    Mangram, A. J., Horan, T. C., Pearson, M. L., Silver, L. C., Jarvis, W. R. (1999). Guidelines for…

    • 2616 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management

    • 1604 Words
    • 7 Pages

    According to the Risk Management section of Wells Fargo’s 2011 Annual Report, to be successful they manage and control three major business risks: credit, asset/liability, and market risk. As for this paper, I’m only going to discuss about their credit and interest rate risk, which is managed under their asset/liability section. Wells Fargo has continued to invest in its risk infrastructure especially since it is a larger and more complex company than before it merged with Wachovia. Wells Fargo’s Senior Executive Vice President and Chief Risk Officer, Michael Loughlin states that they have three lines of defense for managing the risks:…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Evidence Based Practice

    • 11068 Words
    • 45 Pages

    of these mostly quantitative study designs is given in Table 6-1. For in-depth understanding of particular methods and their suitability for studying particular phenomena,…

    • 11068 Words
    • 45 Pages
    Powerful Essays
  • Better Essays

    Risk Management

    • 1271 Words
    • 6 Pages

    As risk manger it is brought to your attention that a Nurse Green in the OR is upset with her rotation schedule and what she feels is slander against her professional abilities. The OR supervisor when asked indicated Ms. Green, had complained to her that a physician, Dr. Ray, had made several passes at her, made suggestive remarks to her and asked her to go out with him repeatedly. Nurse Green indicated she had told him no but he still persisted. She is upset because the new rotation schedule is out for the OR and she was removed from the type of surgery she specializes in which includes all of Dr. Ray’s cases. When she asked why she was told the physician requested she not be in his rotation until she gained more experience. The nurse is upset and indicated she never had a problem with any of the surgeons prior to this and requests a meeting with the supervisor and risk manager/Human resource director.…

    • 1271 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Risk Management

    • 426 Words
    • 2 Pages

    New technology can be good and bad at the same time. Often time’s new technology can open up new doors for hackers because new software will have to be installed with the new technology. Another threat can be new regulations and laws. The reason being, often times we may not know the new regulations and end up with a fine. Some common techniques to recover from an attack are risk mitigation and risk avoidance. Risk mitigation is when the use of various controls may reduce identified risks. The other is risk avoidance. This is making the choice not to take a risk from the beginning. Like, a company deciding to not do business depending on the organization.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Grow, L., Carr, J., Kodak, T., Jostad, C., & Kisamore, A. (2011.). A Comparison of Methods for…

    • 2066 Words
    • 9 Pages
    Better Essays
  • Good Essays

    The information security systems are now highly preferred in the United Kingdom by nearly 75 percent of the top managers and as a result of this preference, such systems are now being greatly established in business. On average, about 4 to 5 percent of the IT budget of any company in UK is now spent on the information security system. All the companies are motivated towards putting into practice and using the best system for information security all around the world as there is a rise in the number…

    • 9583 Words
    • 39 Pages
    Good Essays
  • Best Essays

    E Views 6 User Guide I

    • 66484 Words
    • 266 Pages

    The authors and Quantitative Micro Software assume no responsibility for any errors that may appear in this manual or the EViews program. The user assumes all responsibility for the selection of the program to achieve intended results, and for the installation, use, and results obtained from the program.…

    • 66484 Words
    • 266 Pages
    Best Essays