메뉴 건너뛰기




Volumn 18, Issue 4, 2008, Pages 255-277

The state of risk assessment practices in information security: An exploratory investigation

Author keywords

Information systems risk management; Information systems security; Information technology management practices; Risk assessment

Indexed keywords


EID: 55049124085     PISSN: 10919392     EISSN: None     Source Type: Journal    
DOI: 10.1080/10919390802421242     Document Type: Article
Times cited : (17)

References (22)
  • 1
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • D. W. Straub and R. J. Welke, "Coping with systems risk: Security planning models for management decision making," MIS Quarterly, vol. 22, no. 4, pp. 441-469, 1998.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 3
    • 0034899940 scopus 로고    scopus 로고
    • An integrative contingency model of software project risk management
    • H. S. Barki, S. Rivard, and J. Talbot, "An integrative contingency model of software project risk management," Journal of Management Information Systems, vol. 17, no. 4, pp. 37-69, 2001.
    • (2001) Journal of Management Information Systems , vol.17 , Issue.4 , pp. 37-69
    • Barki, H.S.1    Rivard, S.2    Talbot, J.3
  • 4
    • 1142273446 scopus 로고    scopus 로고
    • PFIRES: A policy framework for information security
    • J. Rees, S. Bandyopadhyay, and E. H. Spafford, "PFIRES: A policy framework for information security," Communications of the ACM, vol. 46, no. 7, pp. 101-106, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.7 , pp. 101-106
    • Rees, J.1    Bandyopadhyay, S.2    Spafford, E.H.3
  • 7
    • 0028731436 scopus 로고
    • TOPM: A formal approach to the optimization of information technology risk management
    • K. P. Badenhorst and J. H. P. Eloff, "TOPM: A formal approach to the optimization of information technology risk management," Computers & Security, vol. 13, no. 5, pp. 411-435, 1994.
    • (1994) Computers & Security , vol.13 , Issue.5 , pp. 411-435
    • Badenhorst, K.P.1    Eloff, J.H.P.2
  • 8
    • 55049093339 scopus 로고    scopus 로고
    • Client issues for critical infrastructure protection
    • R. Mogull and R. Wagner, "Client issues for critical infrastructure protection," Gartner Group Research Note K-20-7776, 2003.
    • (2003) Gartner Group Research Note , vol.K-20-7776
    • Mogull, R.1    Wagner, R.2
  • 10
    • 0030658708 scopus 로고    scopus 로고
    • Risk analysis: Requirements, conflicts and problems
    • Z. Ciechanowicz, "Risk analysis: Requirements, conflicts and problems," Computers & Security, vol. 16, no. 3, pp. 223-232, 1997.
    • (1997) Computers & Security , vol.16 , Issue.3 , pp. 223-232
    • Ciechanowicz, Z.1
  • 11
    • 0025862343 scopus 로고
    • Applications of probabilistic risk assessments: The selection of appropriate tools
    • J. Linnerooth-Bayer and B. Wahlstrom, "Applications of probabilistic risk assessments: The selection of appropriate tools," Risk Analysis, vol. 11, no. 2, pp. 239-248 1991.
    • (1991) Risk Analysis , vol.11 , Issue.2 , pp. 239-248
    • Linnerooth-Bayer, J.1    Wahlstrom, B.2
  • 12
    • 0034581332 scopus 로고    scopus 로고
    • A modeling framework for exposing risks in complex systems
    • J. Sharit, "A modeling framework for exposing risks in complex systems," Risk Analysis, vol. 20, no. 4, pp. 469-482, 2000.
    • (2000) Risk Analysis , vol.20 , Issue.4 , pp. 469-482
    • Sharit, J.1
  • 13
    • 0019540987 scopus 로고
    • On the quantitative definition of risk
    • S. Kaplan and B. J. Garrick, "On the quantitative definition of risk," Risk Analysis, vol. 1, no. 1, pp. 11-27, 1981.
    • (1981) Risk Analysis , vol.1 , Issue.1 , pp. 11-27
    • Kaplan, S.1    Garrick, B.J.2
  • 15
    • 55249117122 scopus 로고
    • A stochastic dominance approach to risk analysis of computer systems
    • Dec
    • G. V Post and J. D. Diltz, "A stochastic dominance approach to risk analysis of computer systems," MIS Quarterly, pp. 363-375, Dec. 1986.
    • (1986) MIS Quarterly , pp. 363-375
    • Post, G.V.1    Diltz, J.D.2
  • 16
    • 72249114849 scopus 로고
    • Information systems success: The quest for the dependent variable
    • W. H. Delone and E. R. Mclean, "Information systems success: The quest for the dependent variable," Information Systems Research, vol. 3, no. 1, pp. 60-95, 1992.
    • (1992) Information Systems Research , vol.3 , Issue.1 , pp. 60-95
    • Delone, W.H.1    Mclean, E.R.2
  • 17
    • 0031482189 scopus 로고    scopus 로고
    • A respecification and extension of the DeLone and McLean Model of IS success
    • P. B. Seddon, "A respecification and extension of the DeLone and McLean Model of IS success," Information Systems Research, vol. 8, no. 3, pp. 240-253, 1997.
    • (1997) Information Systems Research , vol.8 , Issue.3 , pp. 240-253
    • Seddon, P.B.1
  • 18
    • 0036004587 scopus 로고    scopus 로고
    • Assessing the validity of IS success models: An empirical test and theoretical analysis
    • A. Rai, S. S. Lang, and R. B. Welker, "Assessing the validity of IS success models: An empirical test and theoretical analysis," Information Systems Research, vol. 13, no. 1, pp. 50-69, 2002.
    • (2002) Information Systems Research , vol.13 , Issue.1 , pp. 50-69
    • Rai, A.1    Lang, S.S.2    Welker, R.B.3
  • 19
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • D. W. Straub, Jr., "Effective IS security: An empirical study," Information Systems Research, vol. 1, no. 3, pp. 255-276, 1990.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub Jr., D.W.1
  • 20
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • K. Campbell, L. A. Gordon, M. P. Loeb, and L. Zhou, "The economic cost of publicly announced information security breaches: Empirical evidence from the stock market," Journal of Computer Security, vol. 11, pp. 431-447, 2003.
    • (2003) Journal of Computer Security , vol.11 , pp. 431-447
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 21
    • 7444242205 scopus 로고    scopus 로고
    • The effect of Internet security breach announcements on market value of breached firms and Internet security developers
    • Forthcoming
    • H. Cavusoglu, B. Mishra, and S. Raghunathan, "The effect of Internet security breach announcements on market value of breached firms and Internet security developers," International Journal of Electronic Commerce (Forthcoming), 2004.
    • (2004) International Journal of Electronic Commerce
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.