{"title":"A Methodology for Managing Information-Based Risk","authors":"K. Engemann, H. Miller","doi":"10.4018/IRMJ.1996040102","DOIUrl":null,"url":null,"abstract":"Organizations often think of information security as a technological issue best left to technical specialists. While many security strategies undoubtedly rely on hardware and software solutions, the management processes surrounding security and the ongoing commitment of business and operations managers to security issues are no less important. In this paper we discuss a three-phase methodology for managing information-based risks, and present results of how a large money center bank implemented the methodology at numerous locations around the world. Our discussion focuses on the methodology, the implementation process, the results, and how similar efforts can be used in designing management processes to improve the security of information assets.","PeriodicalId":44735,"journal":{"name":"Information Resources Management Journal","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"1996-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Resources Management Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IRMJ.1996040102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 17
Abstract
Organizations often think of information security as a technological issue best left to technical specialists. While many security strategies undoubtedly rely on hardware and software solutions, the management processes surrounding security and the ongoing commitment of business and operations managers to security issues are no less important. In this paper we discuss a three-phase methodology for managing information-based risks, and present results of how a large money center bank implemented the methodology at numerous locations around the world. Our discussion focuses on the methodology, the implementation process, the results, and how similar efforts can be used in designing management processes to improve the security of information assets.
期刊介绍:
Topics should be drawn from, but not limited to, the following areas, with major emphasis on the managerial and organizational aspects of information resource and technology management: •Application of IT to operation •Artificial intelligence and expert systems technologies and issues •Business process management and modeling •Data warehousing and mining •Database management technologies and issues •Decision support and group decision support systems •Distance learning technologies and issues •Distributed software development •E-collaboration •Electronic commerce technologies and issues •Electronic government •Emerging technologies management