1998
DOI: 10.2307/249551
|View full text |Cite
|
Sign up to set email alerts
|

Coping with Systems Risk: Security Planning Models for Management Decision Making

Abstract: The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

2
464
0
3

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 775 publications
(506 citation statements)
references
References 47 publications
2
464
0
3
Order By: Relevance
“…Yet a focus on the offender has the potential to open up original areas for future research. Traditionally, IS security countermeasures have been categorized into four types, which include deterrence, prevention, detection, and recovery (Forcht, 1994;Parker, 1998;Straub & Welke, 1998). Compliance research, therefore, involves attempts to improve 'prevention' methods.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Yet a focus on the offender has the potential to open up original areas for future research. Traditionally, IS security countermeasures have been categorized into four types, which include deterrence, prevention, detection, and recovery (Forcht, 1994;Parker, 1998;Straub & Welke, 1998). Compliance research, therefore, involves attempts to improve 'prevention' methods.…”
mentioning
confidence: 99%
“…Existing bodies of divergent theory enable an understanding of offender behavior, not only during perpetration, but also importantly, prior to the commission process. If these 'appropriate' theories can be drawn from, there exists the potential to fully develop an understanding of this second form of behavior and expand the range of safeguards beyond the traditional deterrence, prevention, detection and, recovery classification (Straub & Welke, 1998).…”
mentioning
confidence: 99%
“…Saleh & Alfantookh (Saleh and Alfantookh, 2011) concur in opinion. However, the main goal of all the ISRA is to reduce, mitigate, transfer or accept risks to an acceptable level by prioritizing and estimating the risk value (Saleh and Alfantookh, 2011;Straub and Welke, 1998). Hence, it can be concluded that any organization, regardless of their size, they have to ensure that the details for the activity listed below are gathered accurately: a.…”
Section: Conceptual Framework Of Info-structure Isramentioning
confidence: 99%
“…A number of researchers have focused specifically on the deterrent effect of safeguards (Campbell, 1988;Hoffer and Straub, 1989;Straub, 1990;Straub and Nance, 1990;Cardinali, 1995;Sherizen, 1995;Harrington, 1996;Straub and Welke, 1998). Of this group, several have applied General Deterrence Theory to the IS security domain (Hoffer and Straub, 1989;Straub, 1990;Straub et al, 1992;Harrington, 1996;Straub and Welke, 1998).…”
Section: Deterring Offendersmentioning
confidence: 99%
“…Of this group, several have applied General Deterrence Theory to the IS security domain (Hoffer and Straub, 1989;Straub, 1990;Straub et al, 1992;Harrington, 1996;Straub and Welke, 1998). This criminological theory posits that:…”
Section: Deterring Offendersmentioning
confidence: 99%