Publication | Open Access
The role of risk management in IT systems of organizations
92
Citations
4
References
2011
Year
Information Security ManagementTechnologyEngineeringSecurity ManagementInformation SecurityInformation Technology ManagementRisk ManagementManagementBusinessInformation AssuranceEffective Risk ManagementRisk Analysis (Business)Risk AnalysisStrategic ManagementSystem SecurityRisk MitigationEnterprise Risk ManagementCyber-risk Management
Information is a vital organizational asset, and IT advances improve efficiency and customer satisfaction, yet risk management is essential to protect information. The paper aims to explain the importance of risk management and propose a framework for developing effective risk management in IT systems. It describes the roles of chief executives in risk management, methods for selecting security controls, and key elements of a successful risk management program.
In this century, information, along with other factors of production, is a valuable and vital component of the organizations. With increasing technology advances, organizations have realized the undeniable benefits of Information Technology (IT) to increase the quality, accuracy and speed of affairs and most managers have become aware of the importance of its use in increasing efficiency and effectiveness of organizations and more satisfied customers and have established and used information systems. Meanwhile for organizations to use the information technology, risk management plays a crucial role in protecting their information. Effective risk management is one of the most important parts of a security program in IT organizations. This paper first explains the importance of risk management and a framework for development of effective risk management in order to identify, assess and reduce the existing risks in IT systems is provided. Also, the chief executives in risk management in organizations will be introduced and appropriate methods of selection for advantageous security controls will be described, and at the end, the keys to a successful risk management program in the IT system will be noted.
| Year | Citations | |
|---|---|---|
Page 1
Page 1