THE STATE OF RISK ASSESSMENT PRACTICES IN INFORMATION SECURITY: AN EXPLORATORY INVESTIGATION

被引:11
|
作者
Rees, Jackie [1 ]
Allen, Jonathan [2 ]
机构
[1] Purdue Univ, Krannert Grad Sch Management, W Lafayette, IN 47907 USA
[2] Univ San Francisco, Sch Business & Management, San Francisco, CA 94117 USA
关键词
information systems risk management; information systems security; information technology management practices; risk assessment;
D O I
10.1080/10919390802421242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk in Information Systems Security can be defined as a function of a given threat source's exercising a particular vulnerability and the resulting impact of that adverse event on the organization. Risk management is the process of identifying and assessing risk and taking steps to reduce it to an acceptable level given the costs involved in doing so. The major activity within risk management is the risk assessment process. The objective of this research is to assess the current state of practice in conducting risk assessments for information security policy management. Results from an exploratory survey of U.S. headquartered firms indicate that increased frequency of conducting risk assessments, the use of quantitative measures of likelihood of loss, and more complete asset inventories correspond with higher levels of user satisfaction and perceived usefulness, although many companies choose not to engage in this level of practice or to only go part way. Additionally, respondents reported substantial difficulty in identifying threats and estimating loss, indicating that much can be done to improve the current state of practice.
引用
收藏
页码:255 / 277
页数:23
相关论文
共 50 条
  • [1] An initial insight into Information Security Risk Assessment practices
    Wangen, Gaute
    [J]. PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 999 - 1008
  • [2] An Exploratory Investigation of Threat Assessment Practices in Colorado Schools
    Crepeau-Hobson, Franci
    Leech, Nancy
    [J]. CONTEMPORARY SCHOOL PSYCHOLOGY, 2022, 26 (04) : 458 - 468
  • [3] An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations
    Alshaikh, Moneer
    Maynard, Sean B.
    Ahmad, Atif
    Chang, Shanton
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 5085 - 5094
  • [4] The relationship between internal audit and information security: An exploratory investigation
    Steinbart, Paul John
    Raschke, Robyn L.
    Gal, Graham
    Dilla, William N.
    [J]. INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2012, 13 (03) : 228 - 243
  • [5] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [6] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [7] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [8] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [9] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    [J]. HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [10] Discussion of "The relationship between internal audit and information security: An exploratory investigation"
    Grabski, Severin
    [J]. INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2012, 13 (03) : 244 - 247