Abstract | ||
---|---|---|
Nowadays the importance of a dedicated information security management (ISM) is undisputedly. One essential task in realizing a company's ISM is to implement a compulsory operational risk management (ORM) aiming also at ensuring the compliance with certain standards. The risks addressed by ORM prevalently result from information systems. A promising approach is to focus on business processes to combine the technical system focused perspective of security management with the more centralized perspective of operational risk management. Within this paper first we will deliver an introduction an integrated IT risk management and its corresponding decisions. Afterwards we will derive requirements for application systems in order to supporting decisions in IT-Risk Management. For this purpose a catalogue of requirements will be developed. Based on this catalogue software systems for IT security management and operational risk management were examined with regard to their adequacy for decision support in IT-Risk Management. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ARES.2008.168 | ARES |
Keywords | Field | DocType |
security management,catalogue software system,centralized perspective,operational risk management,compulsory operational risk management,integrated it risk management,dedicated information security management,it security management,practical evaluation,orm prevalently result,it-risk management,availability,information system,information security,software systems,application software,risk management,information management,it security,information security management,decision support,risk analysis,operational risk,management information systems,market analysis,business processes,content management,business process,it risk management | Risk management framework,Computer science,Computer security,Operational risk management,Knowledge management,Risk analysis (engineering),Risk management,Risk management information systems,IT risk management,Security information and event management,Systems management,Security management | Conference |
Citations | PageRank | References |
1 | 0.51 | 4 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Heinz Lothar Grob | 1 | 13 | 5.58 |
Gereon Strauch | 2 | 8 | 3.08 |
Christian Buddendick | 3 | 18 | 6.68 |