An initial insight into Information Security Risk Assessment practices

被引:2
|
作者
Wangen, Gaute [1 ,2 ]
机构
[1] NTNU Gjovik, NISLab, Teknol 22, N-2802 Gjovik, Norway
[2] NTNU Gjovik, CCIS, Teknol 22, N-2802 Gjovik, Norway
关键词
D O I
10.15439/2016F158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, where the question of how practitioners view predominant issues is an essential element often left unexplored. Thus, this article represents an initial insight into how the InfoSec risk professionals see the InfoSec risk assessment (ISRA) field. We present the results of a 46-participant study where have gathered data regarding known issues in ISRA. The survey design was such that we collected both qualitative and quantitative data for analysis. One of the key contributions from the study is knowledge regarding how to handle risks at different organizational tiers, together with an insight into key roles and knowledge needed to conduct risk assessments. Also, we document several issues concerning the application of qualitative and quantitative methods, together with drawbacks and advantages. The findings of the analysis provides incentives to strengthen the research and scientific work for future research in InfoSec management.
引用
收藏
页码:999 / 1008
页数:10
相关论文
共 50 条
  • [1] THE STATE OF RISK ASSESSMENT PRACTICES IN INFORMATION SECURITY: AN EXPLORATORY INVESTIGATION
    Rees, Jackie
    Allen, Jonathan
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2008, 18 (04) : 255 - 277
  • [2] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [3] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [4] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [5] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [6] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    [J]. HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [7] An approach to support information security risk assessment
    Genchev, Petko
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [8] Information Security Risk Assessment of Commercial Organizations
    Kupriyanov, A. O.
    Babenko, A. A.
    Bakhracheva, Y. S.
    [J]. PHYSICS, TECHNOLOGIES AND INNOVATION (PTI-2019), 2019, 2174
  • [9] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61
  • [10] Risk assessment model of information security SVRAMIS
    [J]. Wu, D. (jump_wude@163.com), 2013, Science Press (40):