On the role of the Facilitator in information security risk assessment

被引:0
|
作者
Coles-Kemp, Lizzie [1 ]
Overill, Richard E. [1 ]
机构
[1] Kings Coll London, Dept Comp Sci, London WC2R 2LS, England
关键词
D O I
10.1007/s11416-007-0040-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In organisations where information security has historically been a part of management and for which the risk assessment methodologies have been designed there are established methods for communicating risk. This is the case for example in the banking and military sectors. However in organisations where information security is not embedded into management thinking and where the relationship between information security and the business is less clearcut, communicating the risks to the business is less straightforward. In such circumstances it has been observed during field research that information security risk assessments frequently output findings to which the business cannot relate and the process is consequently often viewed as a "tick box" exercise, as opposed to one that provides real value to the business. In such a situation the information security risk assessment is divorced from the business process and not embedded into the organisation's processes or thinking. The research for this paper was undertaken in order to identify what needs to be done in order to ensure that businesses of this type find the risk assessment process valuable in practice.
引用
收藏
页码:143 / 148
页数:6
相关论文
共 50 条
  • [1] On the role of the Facilitator in information security risk assessment
    Lizzie Coles-Kemp
    Richard E. Overill
    [J]. Journal in Computer Virology, 2007, 3 (2): : 143 - 148
  • [2] Information Security Risk Assessment in SCM
    Roy, Arup
    Gupta, A. D.
    Deshmukh, S. G.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 1002 - 1006
  • [3] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [4] Role of information security risk assessment in establishing electronic archives safeguard systems
    Wang, Yinghai
    Xiang, Wenxin
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1320 - +
  • [5] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [6] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [7] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    [J]. HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [8] An approach to support information security risk assessment
    Genchev, Petko
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [9] Information Security Risk Assessment of Commercial Organizations
    Kupriyanov, A. O.
    Babenko, A. A.
    Bakhracheva, Y. S.
    [J]. PHYSICS, TECHNOLOGIES AND INNOVATION (PTI-2019), 2019, 2174
  • [10] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    [J]. COMPUTER, 2017, 50 (04) : 52 - 61