Title
Applications for IT-Risk Management - Requirements and Practical Evaluation
Abstract
Nowadays the importance of a dedicated information security management (ISM) is undisputedly. One essential task in realizing a company's ISM is to implement a compulsory operational risk management (ORM) aiming also at ensuring the compliance with certain standards. The risks addressed by ORM prevalently result from information systems. A promising approach is to focus on business processes to combine the technical system focused perspective of security management with the more centralized perspective of operational risk management. Within this paper first we will deliver an introduction an integrated IT risk management and its corresponding decisions. Afterwards we will derive requirements for application systems in order to supporting decisions in IT-Risk Management. For this purpose a catalogue of requirements will be developed. Based on this catalogue software systems for IT security management and operational risk management were examined with regard to their adequacy for decision support in IT-Risk Management.
Year
DOI
Venue
2008
10.1109/ARES.2008.168
ARES
Keywords
Field
DocType
security management,catalogue software system,centralized perspective,operational risk management,compulsory operational risk management,integrated it risk management,dedicated information security management,it security management,practical evaluation,orm prevalently result,it-risk management,availability,information system,information security,software systems,application software,risk management,information management,it security,information security management,decision support,risk analysis,operational risk,management information systems,market analysis,business processes,content management,business process,it risk management
Risk management framework,Computer science,Computer security,Operational risk management,Knowledge management,Risk analysis (engineering),Risk management,Risk management information systems,IT risk management,Security information and event management,Systems management,Security management
Conference
Citations 
PageRank 
References 
1
0.51
4
Authors
3
Name
Order
Citations
PageRank
Heinz Lothar Grob1135.58
Gereon Strauch283.08
Christian Buddendick3186.68