2022
DOI: 10.3390/su14031269
|View full text |Cite
|
Sign up to set email alerts
|

Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry

Abstract: Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to maintain trusted business relationships. Information security management systems (ISMSs) support companies to better deal with information security risks and cyber-attacks. Although there are many different approaches to successfully implementing an ISMS in a company, the most important and time-consuming part of establishing an IS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 57 publications
0
6
0
1
Order By: Relevance
“…The envisaged framework for risk analysis typically includes three main components: risk assessment, risk management, and risk communication (Kitsios et al, 2022). Risk assessment involves identifying and characterizing risks, while risk management focuses on controlling and mitigating risks.…”
Section: Clarity Of Framework Developmentmentioning
confidence: 99%
“…The envisaged framework for risk analysis typically includes three main components: risk assessment, risk management, and risk communication (Kitsios et al, 2022). Risk assessment involves identifying and characterizing risks, while risk management focuses on controlling and mitigating risks.…”
Section: Clarity Of Framework Developmentmentioning
confidence: 99%
“…Based on the analysis of studies [1][2][3][4][5][6][7][21][22][23][24], a categorical model of causal relationships between vulnerabilities and threats in the field of information security was systematized and built (Table 1, Fig. 1).…”
Section: Construction Of a Categorical Model Of Causal Relationships ...mentioning
confidence: 99%
“…Loss of confidentiality, availability or integrity does not affect the organization's monetary losses, legal, contractual obligations and/or reputation A scale and a risk level matrix were used to measure the recognized risk [24]. The final measure of risk is obtained by multiplying the rating given by the probability of the threat and the effect of the threat:…”
Section: Systematization Of the Risk Assessment Process And Developme...mentioning
confidence: 99%
“…Furthermore, a resilient cybersecurity framework contributes significantly to the overall risk management strategy of a business. By integrating cybersecurity into the broader risk management framework, organizations can align their security measures with strategic objectives [14]. This alignment ensures that cybersecurity investments are not only seen as a necessity for compliance but are also strategically embedded in the business strategy, enhancing the overall resilience of the organization [15].…”
Section: Literature Review a Cyber Resilience For Business Continuitymentioning
confidence: 99%