Strategic Information Security Risk Management
Risk management entails more than traditional risk analysis or risk assessment. These traditional tools are limited in fundamental ways, such as the lack of reliable frequency data about past risk events and the relative rarity of many kinds of risk that must still be managed. Risk management involv...
| Main Author: | Baskerville, Richard |
|---|---|
| Other Authors: | D W Straub |
| Format: | Book Chapter |
| Published: |
M E Sharpe Inc
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/9138 |
Similar Items
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Managing culture creep: Toward a strategic model of user IT culture
by: Walsh, I., et al.
Published: (2010)
by: Walsh, I., et al.
Published: (2010)
Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations
by: Alshareef, Naser Mansour N
Published: (2022)
by: Alshareef, Naser Mansour N
Published: (2022)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Strategically Integrating Risk Management into Intellectual Capital Management
by: Noor Azlinna, Azizan, et al.
Published: (2015)
by: Noor Azlinna, Azizan, et al.
Published: (2015)
Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir
by: Khidzir, Nik Zulkarnaen
Published: (2013)
by: Khidzir, Nik Zulkarnaen
Published: (2013)
Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir
by: Khidzir, Nik Zulkarnaen
Published: (2013)
by: Khidzir, Nik Zulkarnaen
Published: (2013)
A risk management framework for design science research
by: Baskerville, Richard, et al.
Published: (2011)
by: Baskerville, Richard, et al.
Published: (2011)
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012)
by: Baskerville, Richard, et al.
Published: (2012)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Design ethnography in information systems
by: Baskerville, Richard, et al.
Published: (2015)
by: Baskerville, Richard, et al.
Published: (2015)
Malaysia's strategic food security approach
by: Tey, Yeong Sheng
Published: (2010)
by: Tey, Yeong Sheng
Published: (2010)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Commentary on Gill and Bhattacherjee: Is there an informing crisis?
by: Myers, M., et al.
Published: (2009)
by: Myers, M., et al.
Published: (2009)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)
by: Baskerville, Richard, et al.
Published: (2009)
RMF4DSR: A Risk Management Framework for Design Science Research
by: Pries-Heje, J., et al.
Published: (2014)
by: Pries-Heje, J., et al.
Published: (2014)
An overview of the role of information technology in strategic management: Part 2
by: Galbreath, Jeremy
Published: (2006)
by: Galbreath, Jeremy
Published: (2006)
An Integrated Approach in Risk Management Process for Identifying Information Security Threats using Medical Research Design
by: Ahmad, Rabiah
Published: (2012)
by: Ahmad, Rabiah
Published: (2012)
Setting our research agendas: Institutional ecology, informing sciences, or management fashion theory?
by: Myers, M., et al.
Published: (2011)
by: Myers, M., et al.
Published: (2011)
Conceptual framework on information security risk management in information technology outsourcing / Nik Zulkarnaen Khidzir, Noor Habibah Arshad and Azlinah Mohamed
by: Khidzir, Nik Zulkarnaen, et al.
Published: (2010)
by: Khidzir, Nik Zulkarnaen, et al.
Published: (2010)
Essays in strategic information transmission
by: Burdea, Valeria
Published: (2018)
by: Burdea, Valeria
Published: (2018)
Information systems as a reference discipline: Current debate and future directions
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Similar Items
-
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014) -
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019) -
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013) -
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)