Implementing a risk management approach for optimizing information security systems

被引:0
|
作者
Petrescu, Marius [1 ]
Stegaroiu, Ion [1 ]
Braboveanu, Mioara [1 ]
Petrescu, Anca-Gabriela [1 ]
Sirbu, Nicoleta [1 ]
机构
[1] Valahia Univ Targoviste, Targoviste, Romania
关键词
Risk; risk assessment; risk management; information security; decision-making;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The globalization imposed a re-assessment of the security concepts, reconsideration and extension of the responsibilities in the field of information security. Organizations are continuously confronted with complex threats to information they handle and to the information systems they administer. The information security risk management emerged as an efficient and comprehensive procedure that complements the overall management of almost all aspects of our lives. Managers in very diverse types of organizations, with different missions, all incorporate risk assessment in their decision-making processes. At present, more and more managers in industry and government organizations are allocating a large part of their resources to the task of improving their understanding and approach to risk-based decision-making. The study revolves around the premises that information systems going through a systematic risk assessment and management process and associated decision-making steps would attain significantly better the information security objectives than systems that do not. The paper provides an overview of the theoretical approaches to information security risk management, as an essential step in developing effective information security systems. The article aims at advancing the current theories in order to develop adapted methods for different types of organizations.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [21] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [23] Risks Management relating to Information Systems Security. Assessment Methods for the Risk Level in Information Security
    Baicu, Floarea
    Baicu, Andrei Mihai
    QUALITY-ACCESS TO SUCCESS, 2012, 13 (129): : 112 - 115
  • [24] Organizational factors to the effectiveness of implementing information security management
    Chang, Shuchih Ernest
    Ho, Chienta Bruce
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2006, 106 (3-4) : 345 - 361
  • [25] Implementing integrated management systems using a risk analysis based approach
    Labodová, A
    JOURNAL OF CLEANER PRODUCTION, 2004, 12 (06) : 571 - 580
  • [26] Designing and implementing an undergraduate program in information systems security
    Ralevich, Victor
    Martinovic, Dragana
    EDUCATION AND INFORMATION TECHNOLOGIES, 2010, 15 (04) : 293 - 315
  • [27] A process model for implementing information systems security governance
    Nicho, Mathew
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 10 - 38
  • [28] Implementing timed petri net in security information systems
    Chin, Hubert H.
    Huang, Chu-Feng
    Jafari, Ayat A.
    PROCEEDINGS OF THE THIRTY-NINTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2007, : 214 - +
  • [29] An approach to risk management for information systems of health units
    Santos, Antonio Carvalho
    Santos, Henrique M. D.
    Monteiro, Rui Vasco
    ACTAS DA 1A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE INFORMACAO, VOL I, 2006, : 589 - 601
  • [30] Towards a systematic approach for improving information security risk management methods
    Papadaki, Katerina
    Polemi, Nineta
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 3733 - +