IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation That Engenders a Security Culture

被引:1
|
作者
Metin, Bilgin [1 ]
Duran, Sefa [2 ]
Telli, Eda
Mutluturk, Meltem [1 ]
Wynn, Martin [2 ]
机构
[1] Bogazici Univ, Dept Management Informat Syst, Hisar Campus, TR-34342 Istanbul, Turkiye
[2] Univ Gloucestershire, Sch Business Comp & Social Sci, Cheltenham GL50 2RH, England
关键词
risk assessment; asset value; information security; risk management; objective risk assessment; segregation of duties; security culture framework; COBIT; 2019; international standards; cybersecurity; supply chain security;
D O I
10.3390/info15010055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment-based on information relating to business requirements, human elements, and the security culture within an organisation-can provide a sound basis for informed decision making, effective risk prioritisation, and the implementation of suitable security measures. This paper focuses on asset valuation, supply chain risk, and enhanced objectivity-via a "segregation of duties" approach-to extend and apply the capabilities of an established security culture framework. The resultant system design aims at mitigating subjectivity in IT risk assessments, thereby diminishing personal biases and presumptions to provide a more transparent and accurate understanding of the real risks involved. Survey responses from 16 practitioners working in the private and public sectors confirmed the validity of the approach but suggest it may be more workable in larger organisations where resources allow dedicated risk professionals to operate. This research contributes to the literature on IT and cyber risk management and provides new perspectives on the need to improve objectivity in asset valuation and risk assessment.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Asset valuation technique for network management and security
    Beaudoin, Luc
    Ing, P.
    ICDM 2006: Sixth IEEE International Conference on Data Mining, Workshops, 2006, : 718 - 721
  • [2] System Reliability and Risk Management: Effects on System Planning, Operation, Asset Management, and Security
    Lauby, Mark G.
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [3] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [4] Measuring Security: A Step Towards Enhancing Security of System
    Jaiswal, Shruti
    Gupta, Daya
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS IN THE SERVICE SECTOR, 2018, 10 (01) : 28 - 53
  • [5] TOWARDS MATHEMATICAL MODELLING IN SECURITY RISK MANAGEMENT IN SYSTEM ENGINEERING
    Hird, John
    Koelle, Rainer
    Kolev, Denis
    2013 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2013,
  • [6] Towards an asset management system for railway embankments and cuttings
    Sloan, A
    Garland, RJ
    Lloyd, JA
    RAILWAY INFRASTRUCTURE, 2001, 2001 (03): : 201 - 211
  • [7] Asset management, risk, and distribution system planning
    Brown, RE
    Spare, JH
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 1681 - 1686
  • [8] Information Security Culture: Towards an Instrument for Assessing Security Management Practices
    Lim, Loo S.
    Maynard, Sean B.
    Ahmad, Atif
    Chang, Shanton
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (02) : 31 - 52
  • [9] Towards enhancing security of IoT-Enabled healthcare system
    Irshad, Reyazur Rashid
    Sohail, Shahab Saquib
    Hussain, Shahid
    Madsen, Dag Oivind
    Zamani, Abu Sarwar
    Ahmed, Abdallah Ahmed Alzupair
    Alattab, Ahmed Abdu
    Badr, Mohamed Mahdi
    Alwayle, Ibrahim M.
    HELIYON, 2023, 9 (11)
  • [10] Enhancing industrial security management system for multimedia environment
    Chi-Seok Lee
    Wonhyung Park
    Multimedia Tools and Applications, 2016, 75 : 14597 - 14615