2011
DOI: 10.1108/09685221111115854
|View full text |Cite
|
Sign up to set email alerts
|

Risk analysis methodology used by several small and medium enterprises in the Czech Republic

Abstract: PurposeThe aim of this paper is to present risk analysis procedures which have been successfully applied by Czech small and medium enterprises (SMEs). The methodology, which is based on the modification and combination of two standard methods, aims to accelerate (and make more affordable) the risk analysis process, as compared to other risk analysis methods used for public organizations and major corporations in the Czech Republic.Design/methodology/approachThe paper presents in detail the individual steps the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0
3

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
2
0
3
Order By: Relevance
“…It would be valuable to identify and categorize the various other major use-cases of security management techniques and the extent to which they are served by published research. Small businesses seem to receive relatively good amounts of research, such as the papers by Debasis Bhattacharya [87] and Ladislav Beranek [88]. Small businesses are probably attractive to researchers in comparison to larger organizations because it is presumably easier to obtain access to managers and other decision makers within a small business.…”
Section: Opportunities For Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It would be valuable to identify and categorize the various other major use-cases of security management techniques and the extent to which they are served by published research. Small businesses seem to receive relatively good amounts of research, such as the papers by Debasis Bhattacharya [87] and Ladislav Beranek [88]. Small businesses are probably attractive to researchers in comparison to larger organizations because it is presumably easier to obtain access to managers and other decision makers within a small business.…”
Section: Opportunities For Future Workmentioning
confidence: 99%
“…This might be because the existing raft of information security consulting services tend to focus on auditing, incident response or the implementation of technical projects. (Beranek, 2011;IBM web site, 2013;Symantec web site, 2013;McAfee web site, 2013).…”
Section: Opportunities For Future Workmentioning
confidence: 99%
“…Beranek sugiere un modelo cualitativo basado en la integración de dos metodologías FRAPP y BITS, teniendo como metodología base a BITS. En esta integración, el autor utiliza la evaluación de los activos de FRAPP y para el resto del proceso de análisis se basa en BITS [14].…”
Section: Revisión Literariaunclassified
“…Behnia, Rashid, & Chaudhry (2012) define al análisis de riesgo como la base de la protección de la información, la gestión de riesgos y el riesgo en el proceso de protección de la información. Además, Beranek (2012) indica que el análisis de riesgos de seguridad es fundamental para la seguridad de cualquier organización, ya que esta es esencial para asegurar que los controles son totalmente proporcionales a los riesgos a los que la organización está expuesta y los procesos relevantes están en conformidad con las políticas de seguridad.…”
Section: Tabla 4 Tipos De Incidentes Reportadosunclassified
“…En esta integración, el autor utiliza la evaluación de los activos de FRAPP y para el resto del proceso de análisis se basa en BITS. (Beranek, 2012) Los enfoques cuantitativos utilizan modelos matemáticos y estadísticos para representar el riesgo a diferencia del modelo cualitativo (Feng, Harry, & Li, A security risk analysis model for information systems, 2013). La exposición al riesgo de seguridad se representa como una función de la probabilidad de las amenazas y la pérdida esperada debido a la vulnerabilidad a esas amenazas (Büyüközkan & Ruan, 2010).…”
Section: Tabla 4 Tipos De Incidentes Reportadosunclassified