메뉴 건너뛰기




Volumn 23, Issue 3, 2008, Pages 185-202

Analysing business losses caused by information systems risk: A business process analysis approach

Author keywords

Business impact analysis; Business process analysis; Information systems outsourcing; Information systems risk; Information systems services

Indexed keywords


EID: 49749086940     PISSN: 02683962     EISSN: 14664437     Source Type: Journal    
DOI: 10.1057/palgrave.jit.2000122     Document Type: Article
Times cited : (56)

References (64)
  • 1
    • 85013137347 scopus 로고    scopus 로고
    • The Effects of Outsourcing on Information Security
    • Alner, M. (2001). The Effects of Outsourcing on Information Security, Information Systems Security 10(2): 35-43.
    • (2001) Information Systems Security , vol.10 , Issue.2 , pp. 35-43
    • Alner, M.1
  • 7
    • 16344391307 scopus 로고    scopus 로고
    • Special Issue on Action Research in Information Systems: Making IS research relevant to practice - foreword
    • Baskerville, R.I. and Myers, M.D. (2004). Special Issue on Action Research in Information Systems: Making IS research relevant to practice - foreword, MIS Quarterly 28(3): 329-335.
    • (2004) MIS Quarterly , vol.28 , Issue.3 , pp. 329-335
    • Baskerville, R.I.1    Myers, M.D.2
  • 8
    • 0041379357 scopus 로고    scopus 로고
    • A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection
    • Baskerville, R.I. and Portougal, V. (2003). A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection, Journal of Database Management 14(2): 1-13.
    • (2003) Journal of Database Management , vol.14 , Issue.2 , pp. 1-13
    • Baskerville, R.I.1    Portougal, V.2
  • 9
    • 55249084997 scopus 로고
    • The Case Research Strategy in Studies of Information Systems
    • Benbasat, I., Goldstein, D.K. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems, MIS Quarterly 11(3): 369-386.
    • (1987) MIS Quarterly , vol.11 , Issue.3 , pp. 369-386
    • Benbasat, I.1    Goldstein, D.K.2    Mead, M.3
  • 12
    • 0000160406 scopus 로고
    • From Framework Through Experience to Learning: The essential nature of action research
    • H.-E. Nissen and H.K. Klein eds, Amsterdam: North-Holland
    • Checkland, P. (1991). From Framework Through Experience to Learning: The essential nature of action research, in H.-E. Nissen and H.K. Klein (eds.) Information Systems Research: Contemporary approaches & emergent traditions, Amsterdam: North-Holland.
    • (1991) Information Systems Research: Contemporary approaches & emergent traditions
    • Checkland, P.1
  • 13
    • 29144447958 scopus 로고    scopus 로고
    • Centre for Analysis of Risk and Regulation at the London School of Economics and Political Science, Discussion paper No, 27
    • Ciborra, C. (2004). Digital Technologies and the Duality of Risk, Centre for Analysis of Risk and Regulation at the London School of Economics and Political Science, Discussion paper No : 27, 1-20.
    • (2004) Digital Technologies and the Duality of Risk , pp. 1-20
    • Ciborra, C.1
  • 15
    • 0027702789 scopus 로고
    • Securing your Business Process
    • Collins, B.S. and Mathews, S. (1993). Securing your Business Process, Computers & Security 12(7): 629-634.
    • (1993) Computers & Security , vol.12 , Issue.7 , pp. 629-634
    • Collins, B.S.1    Mathews, S.2
  • 16
    • 0011420610 scopus 로고
    • Information Systems Outsourcing by Large American Industrial Firms: Choices and impacts
    • Collins, J.S. and Milien, R.A. (1995). Information Systems Outsourcing by Large American Industrial Firms: Choices and impacts, Information Resources Management Journal 8(1): 5-13.
    • (1995) Information Resources Management Journal , vol.8 , Issue.1 , pp. 5-13
    • Collins, J.S.1    Milien, R.A.2
  • 17
    • 10244236477 scopus 로고    scopus 로고
    • Sarbanes-Oxley and IT Governance: New guidance on IT control and compliance
    • Damianides, M. (2005). Sarbanes-Oxley and IT Governance: New guidance on IT control and compliance, Information Systems Management 22(1): 77-85.
    • (2005) Information Systems Management , vol.22 , Issue.1 , pp. 77-85
    • Damianides, M.1
  • 18
    • 49749108866 scopus 로고
    • Information Protection and Business Process Reengineering
    • DeMaio, H.B. (1995). Information Protection and Business Process Reengineering, Information Systems Security 3(4): 5-10.
    • (1995) Information Systems Security , vol.3 , Issue.4 , pp. 5-10
    • DeMaio, H.B.1
  • 19
    • 49749150459 scopus 로고    scopus 로고
    • accessed 3 April, 2007
    • Department of Trade and Industry (2007). Business Continuity Management, Impact Analysis [www document]http://www.dti.gov.uk/sectors/infosec/ infosecadvice/continuitymanagement/impactanalysis/page33399.html(accessed 3 April, 2007).
    • (2007) Business Continuity Management, Impact Analysis [www document]
  • 20
    • 70449576952 scopus 로고    scopus 로고
    • Realizing Benefits of an Information Security Program
    • Dhillon, G. (2004). Realizing Benefits of an Information Security Program, Business Process Management 10(3): 260-261.
    • (2004) Business Process Management , vol.10 , Issue.3 , pp. 260-261
    • Dhillon, G.1
  • 21
    • 0034516080 scopus 로고    scopus 로고
    • Information Security Management: An approach to combine process certification and product evaluation
    • Eloff, M.M. and von Solms, S.H. (2000). Information Security Management: An approach to combine process certification and product evaluation, Computers & Security 19(8): 698-709.
    • (2000) Computers & Security , vol.19 , Issue.8 , pp. 698-709
    • Eloff, M.M.1    von Solms, S.H.2
  • 22
    • 85013069388 scopus 로고    scopus 로고
    • Outsourcing Security: The need, the risks, the providers, and the process
    • Endorf, C. (2004). Outsourcing Security: The need, the risks, the providers, and the process, Information Security Management 12(6): 17-23.
    • (2004) Information Security Management , vol.12 , Issue.6 , pp. 17-23
    • Endorf, C.1
  • 23
    • 0642264602 scopus 로고
    • A Security Framework for Information Systems Outsourcing
    • Fink, D. (1994). A Security Framework for Information Systems Outsourcing, Information Management & Computer Security 2(4): 3-8.
    • (1994) Information Management & Computer Security , vol.2 , Issue.4 , pp. 3-8
    • Fink, D.1
  • 25
    • 0002638021 scopus 로고
    • Choosing Appropriate Information Systems Research Approaches
    • H.-E. Nissen and H.K. Klein eds, Amsterdam: North-Holland
    • Galliers, R.D. (1991). Choosing Appropriate Information Systems Research Approaches, in H.-E. Nissen and H.K. Klein (eds.) Information Systems Research: Contemporary approaches & emergent traditions, Amsterdam: North-Holland.
    • (1991) Information Systems Research: Contemporary approaches & emergent traditions
    • Galliers, R.D.1
  • 26
    • 85013136025 scopus 로고    scopus 로고
    • The Finaincial Impact of IT Security Breaches: What do investors think
    • Garg, A., Curtis, J. and Halper, H. (2003a). The Finaincial Impact of IT Security Breaches: What do investors think, Information Systems Security 12(1): 22-33.
    • (2003) Information Systems Security , vol.12 , Issue.1 , pp. 22-33
    • Garg, A.1    Curtis, J.2    Halper, H.3
  • 28
    • 4944234006 scopus 로고    scopus 로고
    • Return on Information Security Investments, Myths vs Realities
    • Gordon, L.A. and Loeb, M.P. (2002). Return on Information Security Investments, Myths vs Realities, Strategic Finance 84(5): 26-31.
    • (2002) Strategic Finance , vol.84 , Issue.5 , pp. 26-31
    • Gordon, L.A.1    Loeb, M.P.2
  • 29
    • 85017361394 scopus 로고    scopus 로고
    • The Impact of Virus Attack Announcements on the Market Value of Firms
    • Hovav, A. and D'Arcy, J. (2004). The Impact of Virus Attack Announcements on the Market Value of Firms, Information Systems Security 13(2): 32-40.
    • (2004) Information Systems Security , vol.13 , Issue.2 , pp. 32-40
    • Hovav, A.1    D'Arcy, J.2
  • 30
    • 33751161222 scopus 로고    scopus 로고
    • A Longitudinal Study of Information Systems Threat Categories: The enduring problem of human error
    • Im, G.P. and Baskerville, R.L. (2005). A Longitudinal Study of Information Systems Threat Categories: The enduring problem of human error, The DATA BASE for Advances in Information Systems 36(4): 68-79.
    • (2005) The DATA BASE for Advances in Information Systems , vol.36 , Issue.4 , pp. 68-79
    • Im, G.P.1    Baskerville, R.L.2
  • 32
    • 0001841217 scopus 로고    scopus 로고
    • Business Process Change: A study of methodologies, techniques and tools
    • Kettinger, W.J., Teng, J. and Guha, S. (1997). Business Process Change: A study of methodologies, techniques and tools, MIS Quarterly 21(1): 55-80.
    • (1997) MIS Quarterly , vol.21 , Issue.1 , pp. 55-80
    • Kettinger, W.J.1    Teng, J.2    Guha, S.3
  • 33
    • 1242265180 scopus 로고    scopus 로고
    • Information Security Considerations in IS/IT Outsourcing Projects: A descriptive case study of two sectors
    • Khalfan, A.M. (2004). Information Security Considerations in IS/IT Outsourcing Projects: A descriptive case study of two sectors, International Journal of Information Management 24(1): 29-42.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 29-42
    • Khalfan, A.M.1
  • 35
    • 49749116745 scopus 로고    scopus 로고
    • Adverse Events in Hospitals: The contribution of poor information systems
    • Turku, Finland
    • Lederman, R. (2004). Adverse Events in Hospitals: The contribution of poor information systems, in European Conference on Information Systems, (Turku, Finland, 2004).
    • (2004) European Conference on Information Systems
    • Lederman, R.1
  • 36
    • 25144515646 scopus 로고    scopus 로고
    • Managing Hospital Databases: Can large hospitals really protect patient data?
    • Lederman, R. (2005). Managing Hospital Databases: Can large hospitals really protect patient data? Health Informatics 11(3): 201-210.
    • (2005) Health Informatics , vol.11 , Issue.3 , pp. 201-210
    • Lederman, R.1
  • 38
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today's reality, yesterday's understanding
    • Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992). Threats to Information Systems: Today's reality, yesterday's understanding, MIS Quarterly 16(2): 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 40
    • 84905581473 scopus 로고    scopus 로고
    • A Process Oriented Framework for Assessing the Business Value of Information Technology
    • Mooney, J., Gurbaxani, V. and Kraemer, K. (1996). A Process Oriented Framework for Assessing the Business Value of Information Technology, The DATABASE for Advances in Information Systems 27(2): 68-81.
    • (1996) The DATABASE for Advances in Information Systems , vol.27 , Issue.2 , pp. 68-81
    • Mooney, J.1    Gurbaxani, V.2    Kraemer, K.3
  • 41
    • 0030386217 scopus 로고    scopus 로고
    • Electronic Communications Risk Management: A checklist for business managers
    • Moulton, R.T. and Moulton, M.E. (1996). Electronic Communications Risk Management: A checklist for business managers, Computers & Security 15(5): 377-386.
    • (1996) Computers & Security , vol.15 , Issue.5 , pp. 377-386
    • Moulton, R.T.1    Moulton, M.E.2
  • 43
    • 49749097504 scopus 로고    scopus 로고
    • Information Technology Security Engagements - An Evolving Speciality
    • Nearon, B.H. (2000). Information Technology Security Engagements - An Evolving Speciality, The CPA Journal 70(7): 29-33.
    • (2000) The CPA Journal , vol.70 , Issue.7 , pp. 29-33
    • Nearon, B.H.1
  • 45
    • 27144549861 scopus 로고    scopus 로고
    • Information Technology and the Board of Directors
    • Nolan, R. and McFarlan, W. (2005). Information Technology and the Board of Directors, Harvard Business Review 83(10): 96-106.
    • (2005) Harvard Business Review , vol.83 , Issue.10 , pp. 96-106
    • Nolan, R.1    McFarlan, W.2
  • 46
    • 27844604199 scopus 로고    scopus 로고
    • Strategically Managing Risk in the Information Age: A holistic approach
    • Olson, E.G. (2005). Strategically Managing Risk in the Information Age: A holistic approach, Journal of Business Strategy 26(6): 45-54.
    • (2005) Journal of Business Strategy , vol.26 , Issue.6 , pp. 45-54
    • Olson, E.G.1
  • 47
    • 77955704149 scopus 로고    scopus 로고
    • The Real Cost of Computer Crime
    • Ott, J.L. (2003). The Real Cost of Computer Crime, Information Systems Security 12(1): 2-4.
    • (2003) Information Systems Security , vol.12 , Issue.1 , pp. 2-4
    • Ott, J.L.1
  • 48
    • 85013137337 scopus 로고    scopus 로고
    • Information Security Policy Framework: Best practices for security policy in the E-commerce age
    • Palmer, M.E., Robinson, C., Patilla, J.C and Moser, E.P. (2001). Information Security Policy Framework: Best practices for security policy in the E-commerce age, Information Systems Security 10(2): 13-27.
    • (2001) Information Systems Security , vol.10 , Issue.2 , pp. 13-27
    • Palmer, M.E.1    Robinson, C.2    Patilla, J.C.3    Moser, E.P.4
  • 50
    • 84973818294 scopus 로고
    • Three Dilemmas in Action Research
    • Rapoport, R.N. (1970). Three Dilemmas in Action Research, Human Relations 23(6): 499-513.
    • (1970) Human Relations , vol.23 , Issue.6 , pp. 499-513
    • Rapoport, R.N.1
  • 51
    • 85014614766 scopus 로고    scopus 로고
    • Three Decades of Risk Research: Accomplishments and new challenges
    • Renn, O. (1998). Three Decades of Risk Research: Accomplishments and new challenges, Journal of Risk Research 1(1): 49-71.
    • (1998) Journal of Risk Research , vol.1 , Issue.1 , pp. 49-71
    • Renn, O.1
  • 52
    • 38249000806 scopus 로고
    • Information Management Strategy - An Evolutionary Process
    • Reponen, T. (1993). Information Management Strategy - An Evolutionary Process, Scandinavian Journal of Management 9(9): 189-209.
    • (1993) Scandinavian Journal of Management , vol.9 , Issue.9 , pp. 189-209
    • Reponen, T.1
  • 53
    • 49749097861 scopus 로고    scopus 로고
    • Royal Canadian Mounted Police (1981). Security in the EDP environment, in Security Information Publication. Canada: Royal Canadian Mounted Police.
    • Royal Canadian Mounted Police (1981). Security in the EDP environment, in Security Information Publication. Canada: Royal Canadian Mounted Police.
  • 54
    • 0031337118 scopus 로고    scopus 로고
    • Managing Security for Outsourcing Contracts
    • Sherwood, J. (1997). Managing Security for Outsourcing Contracts, Computers & Security 16(7): 603-609.
    • (1997) Computers & Security , vol.16 , Issue.7 , pp. 603-609
    • Sherwood, J.1
  • 55
    • 33645880065 scopus 로고    scopus 로고
    • A Prototype for Assessing Information Technology Risks in Health Care
    • Smith, E. and Eloff, J.H.P. (2002). A Prototype for Assessing Information Technology Risks in Health Care, Computers & Security 21(2): 266-284.
    • (2002) Computers & Security , vol.21 , Issue.2 , pp. 266-284
    • Smith, E.1    Eloff, J.H.P.2
  • 56
    • 3042857071 scopus 로고    scopus 로고
    • On Risk: Perception and direction
    • Stewart, A. (2004). On Risk: Perception and direction, Computers & Security 23(5): 362-370.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 362-370
    • Stewart, A.1
  • 57
    • 85013027847 scopus 로고    scopus 로고
    • Recognizing and Preparing Loss Estimates from Cyber-Attacks
    • Stevenson-Smith, G. (2004). Recognizing and Preparing Loss Estimates from Cyber-Attacks, Information Systems Security 12(6): 46-58.
    • (2004) Information Systems Security , vol.12 , Issue.6 , pp. 46-58
    • Stevenson-Smith, G.1
  • 58
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998). Coping with Systems Risk: Security planning models for management decision making, MIS Quarterly 22(4): 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 59
    • 0000400750 scopus 로고
    • An Assessment of the Scientific Merits of Action Research
    • Susman, G.I. and Evered, R.D. (1978). An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly 23(4): 582-603.
    • (1978) Administrative Science Quarterly , vol.23 , Issue.4 , pp. 582-603
    • Susman, G.I.1    Evered, R.D.2
  • 61
    • 0035780469 scopus 로고    scopus 로고
    • Embedding Security Practices in Contemporary Information Systems Development Approaches
    • Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001). Embedding Security Practices in Contemporary Information Systems Development Approaches, Information Management & Computer Security 9(4): 183-197.
    • (2001) Information Management & Computer Security , vol.9 , Issue.4 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 62
    • 0036067283 scopus 로고    scopus 로고
    • The Information Security Management Toolbox - Taking the Pain Out of Security Management
    • Vermeulen, C. and von Solms, R. (2002). The Information Security Management Toolbox - Taking the Pain Out of Security Management, Information Management & Computer Security 10(3): 119-125.
    • (2002) Information Management & Computer Security , vol.10 , Issue.3 , pp. 119-125
    • Vermeulen, C.1    von Solms, R.2
  • 63
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the Gate: Threats to information security
    • Whitman, M.E. (2003). Enemy at the Gate: Threats to information security, Communications of the ACM 46(8): 91-95.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 64
    • 0042948034 scopus 로고
    • Research Methods in Information Systems: Using action research
    • E. Mumford, R. Hirschheim, G. Fitzgerald and T. Wood-Harper eds, Amsterdam: North-Holland, pp
    • Wood-Harper, T. (1985). Research Methods in Information Systems: Using action research, in E. Mumford, R. Hirschheim, G. Fitzgerald and T. Wood-Harper (eds.) Research Methods in Information Systems, Amsterdam: North-Holland, pp. 169-191.
    • (1985) Research Methods in Information Systems , pp. 169-191
    • Wood-Harper, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.