Reference Hub2
The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis

The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis

David Rehak, Monika Grasseova
ISBN13: 9781613503119|ISBN10: 1613503113|EISBN13: 9781613503126
DOI: 10.4018/978-1-61350-311-9.ch007
Cite Chapter Cite Chapter

MLA

Rehak, David, and Monika Grasseova. "The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis." Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment, edited by Mustafa Alshawi and Mohammed Arif, IGI Global, 2012, pp. 162-184. https://doi.org/10.4018/978-1-61350-311-9.ch007

APA

Rehak, D. & Grasseova, M. (2012). The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis. In M. Alshawi & M. Arif (Eds.), Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment (pp. 162-184). IGI Global. https://doi.org/10.4018/978-1-61350-311-9.ch007

Chicago

Rehak, David, and Monika Grasseova. "The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis." In Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment, edited by Mustafa Alshawi and Mohammed Arif, 162-184. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-311-9.ch007

Export Reference

Mendeley
Favorite

Abstract

The chapter is focused mainly on assessing the factors of the external environment in the area of security of information systems in the organization through SWOT analysis. At first the method is characterized from the viewpoint of its purpose and nature. The emphasis is laid on the principles of SWOT analysis, the possible use of methods and tools, and also the most common problems occurring during the implementation of the analysis. The recommended methodical procedure for the implementation of SWOT analysis is described in another part of the chapter with individual phases and particular activities, which are appropriate to be carried out within these phases. The main part of the chapter is focused on the ways of semi-quantitative assessment of threats to the area of information systems of the organization, while evaluating their risks, and the assessment of opportunities, while evaluating their benefits. Both cases include a detailed description of procedure leading to an objective outcome during the classification of identified threats and opportunities according to the set criteria.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.