2010
DOI: 10.1016/j.ijinfomgt.2010.08.007
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative risk method for information security management practices: A case context within Turkey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 8 publications
0
22
0
1
Order By: Relevance
“…This argument may still hold true, although there has been published empirical studies on information security issues since the Kotulic and Clark study (e.g. [39,86,115,43]), there is still a gap regarding ISRA practices. Sufficient to say, ISRM as a research field presents several interesting research problems.…”
Section: Research Problem and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…This argument may still hold true, although there has been published empirical studies on information security issues since the Kotulic and Clark study (e.g. [39,86,115,43]), there is still a gap regarding ISRA practices. Sufficient to say, ISRM as a research field presents several interesting research problems.…”
Section: Research Problem and Motivationmentioning
confidence: 99%
“…Which makes it a challenge to detect and treat risks within human performance, human errors, and organization wide factors [35]. While Ozkan and Karabacak [115] point to a similar misconception: such as IS being a purely technical task that can be successfully performed by the IT department only, IS is company-wide and the IT department in general does not have sufficient power to run such a program and seldom have a holistic view of the organization. The same authors also highlight the misconception that consultancy firms can and should achieve IS management for an organization.…”
Section: Level 1 Information Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Ozkan and Karabacak [22] suggests that process modeling can be used to ease the use of risk analysis methods and move the IS focus from hardware and software over to IT processes. The authors suggests using process modeling to model the activities of the information processing and to determine the scope of the risk analysis.…”
Section: Related Workmentioning
confidence: 99%
“…However, these external groups are per BPM definition not important stakeholders, ISO/IEC 27001:2013 address the stakeholder needs in section 4.2 Understanding the needs and expectations of interested parties, but we can not see this reflected in the control objectives. The ISMS-program risk failing if key stakeholders lose interest, several instances of failure due to not having sufficiently powerful allies is highlighted in [22]. Although not completely neglected by IS, there is a clear gap between how much emphasis BPM and ISRM put on stakeholder management.…”
Section: B Summary Of Comparison Bpm and Isrmmentioning
confidence: 99%