Information Technology Risk Assessment: Octave-S Approach

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A DEA-based approach for information technology risk assessment through risk information technology framework

The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organization to accomplish its mission(s). However, IT projects have often been found to be complex and risky to implement in organizations. The organizational relevance and risk of IT projects make it important for organizat...

متن کامل

An Assessment of Information Technology Outsourcing Risk

This paper proposes a research model for defining and measuring information technology outsourcing risks. The model is based on transaction cost and agency theory as well as on IT outsourcing literature. Risk is defined here as a set of triplets composed of scenarios, their likelihood and consequences. It draws on the behavioral perspective, which associates risk with the magnitude of a negativ...

متن کامل

Information Asset Valuation Method for Information Technology Security Risk Assessment

The information security strategic plan is necessarily comprehensive, including business processes, people, and physical infrastructure, as well as the information system. The Security risk evaluation needs the calculating asset value to predict the impact and consequence of security incidents. The return on security investment (ROSI) is defining the value for all invested in terms of security ...

متن کامل

An Approach for Modeling Information Systems Security Risk Assessment

In this paper, we present a conceptual modeling approach, which is new in the domain of information systems security risk assessment. The approach is helpful for performing means-end analysis, thereby uncovering the structural origin of security risks in an information system, and how the rootcauses of such risks can be controlled from the early stages of the projects. The approach addresses th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: CommIT (Communication and Information Technology) Journal

سال: 2011

ISSN: 2460-7010,1979-2484

DOI: 10.21512/commit.v5i1.549