A Methodology for Managing Information-Based Risk

A Methodology for Managing Information-Based Risk

Holmes E. Miller (Muhlenberg College, USA) and Kurt J. Engemann (Iona College, USA)
Copyright: © 1996 |Pages: 8
DOI: 10.4018/irmj.1996040102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Organizations often think of information security as a technological issue best left to technical specialists. While many security strategies undoubtedly rely on hardware and software solutions, the management processes surrounding security and the ongoing commitment of business and operations managers to security issues are no less important. In this paper we discuss a three-phase methodology for managing information-based risks, and present results of how a large money center bank implemented the methodology at numerous locations around the world. Our discussion focuses on the methodology, the implementation process, the results, and how similar efforts can be used in designing management processes to improve the security of information assets.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 30: 4 Issues (2017)
Volume 29: 4 Issues (2016)
Volume 28: 4 Issues (2015)
Volume 27: 4 Issues (2014)
Volume 26: 4 Issues (2013)
Volume 25: 4 Issues (2012)
Volume 24: 4 Issues (2011)
Volume 23: 4 Issues (2010)
Volume 22: 4 Issues (2009)
Volume 21: 4 Issues (2008)
Volume 20: 4 Issues (2007)
Volume 19: 4 Issues (2006)
Volume 18: 4 Issues (2005)
Volume 17: 4 Issues (2004)
Volume 16: 4 Issues (2003)
Volume 15: 4 Issues (2002)
Volume 14: 4 Issues (2001)
Volume 13: 4 Issues (2000)
Volume 12: 4 Issues (1999)
Volume 11: 4 Issues (1998)
Volume 10: 4 Issues (1997)
Volume 9: 4 Issues (1996)
Volume 8: 4 Issues (1995)
Volume 7: 4 Issues (1994)
Volume 6: 4 Issues (1993)
Volume 5: 4 Issues (1992)
Volume 4: 4 Issues (1991)
Volume 3: 4 Issues (1990)
Volume 2: 4 Issues (1989)
Volume 1: 1 Issue (1988)
View Complete Journal Contents Listing