2011
DOI: 10.1016/j.procs.2010.12.144
|View full text |Cite
|
Sign up to set email alerts
|

The role of risk management in IT systems of organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
5

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(31 citation statements)
references
References 4 publications
0
26
0
5
Order By: Relevance
“…Tohidi (Tohidi, 2011) presented a paper about the role of ISM processes and risk management in organizations' information systems. At the same time Jian Zhang, Wei Hua Yuan, Wenjing Qi (Zhang et al, 2011) and Mike Faessler with Mark Morgan (Faessler et al, 2011) defined possibilities to optimize information security risk management and ISM.…”
Section: Risk and Solutions In Organizational Levelmentioning
confidence: 99%
“…Tohidi (Tohidi, 2011) presented a paper about the role of ISM processes and risk management in organizations' information systems. At the same time Jian Zhang, Wei Hua Yuan, Wenjing Qi (Zhang et al, 2011) and Mike Faessler with Mark Morgan (Faessler et al, 2011) defined possibilities to optimize information security risk management and ISM.…”
Section: Risk and Solutions In Organizational Levelmentioning
confidence: 99%
“…As a result, standards for its application, procedures, tools, techniques and some computing programs that support the application of risk management for a better functioning of enterprises and projects have been developed [2]. In general, the main operational concerns of risk management are on the following topics: 1) the identification of risks; 2) risk analysis and evaluation; 3) the development of techniques, tools and software that help with the application of risk management; and 4) the evaluation of the RM maturity within organizations [18], [19].…”
Section: Risk Managementmentioning
confidence: 99%
“…Asset Impact of unwanted event (Tohidi, 2010), and information technology services (Microsoft TechNet, 2006). There are critical and non-critical information system assets depending on how important are the operations that each asset is supporting.…”
Section: Likelihood Of Unwanted Eventmentioning
confidence: 99%