Academic literature on the topic 'Information system (IS) risk'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information system (IS) risk.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information system (IS) risk"
Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Full textNikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Information System and Risk Reassessment." Issues in Informing Science and Information Technology 7 (2010): 191–207. http://dx.doi.org/10.28945/1200.
Full textDurba, Mounica. "Risk Assessment of Information System." Asia-pacific Journal of Convergent Research Interchange 1, no. 3 (September 30, 2015): 31–41. http://dx.doi.org/10.21742/apjcri.2015.09.03.
Full textMATSUYAMA, Satoshi, Masahiro INOUE, and Tetsuo SAKAI. "Underground risk management information system." Shigen-to-Sozai 122, no. 10/11 (2006): 528–36. http://dx.doi.org/10.2473/shigentosozai.122.528.
Full textAcree, John A. "Important risk information system (IRIS)." Preventive Veterinary Medicine 16, no. 1 (April 1993): 41. http://dx.doi.org/10.1016/0167-5877(93)90008-h.
Full textZybin, Serhii, and Yana Bielozorova. "Risk-based Decision-making System for Information Processing Systems." International Journal of Information Technology and Computer Science 13, no. 5 (October 8, 2021): 1–18. http://dx.doi.org/10.5815/ijitcs.2021.05.01.
Full textCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Full textLiu, Hai Bin, Fei Li, and Wen Qiong Li. "Risk Management of Information System Project." Applied Mechanics and Materials 357-360 (August 2013): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.357-360.2826.
Full textPontius, Frederick W. "Tapping USEPA's Integrated Risk Information System." Journal - American Water Works Association 85, no. 6 (June 1993): 22–108. http://dx.doi.org/10.1002/j.1551-8833.1993.tb06001.x.
Full textВладимир Викторович, Москвичев,, Ничепорчук, Валерий Васильевич, Постникова, Ульяна Сергеевна, and Тасейко, Ольга Викторовна. "Information system of territorial risk assessment." Вычислительные технологии, no. 6 (December 23, 2022): 115–23. http://dx.doi.org/10.25743/ict.2022.27.6.010.
Full textDissertations / Theses on the topic "Information system (IS) risk"
Goto, Masato, Akira Hattori, Takami Yasuda, and Shigeki Yokoi. "Local Risk Management Information Sharing System." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2006. http://hdl.handle.net/2237/10438.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textMpanza, Brian Vusumuzi. "Evaluation of Transwerk Risk Management Information System." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50346.
Full textENGLISH ABSTRACT: In the last decade, the use of computers has proliferated the industrial arena in South Africa. Due to frequent changes in computer programs and developments in the computing field, users have often been adversely affected. Users experience problems with computer programs that are not user friendly. Usability is about satisfying the user needs by allowing the user to accomplish their goals quickly, efficiently and easily. Thus it is crucial that industries invest in computer programs that offer optimum usability. In this research an attempt is made to provide a framework for methodology that can be used to test and evaluate usability in the Transwerk Risk Management Information System, that is Computer Assisted Risk Management Systems (CARMS). I first consider the difference between unusable and usable programs. Usability properties are then identified including properties enhancing effectiveness, efficiency, flexibility, laemability and attitude of the computer program. The CARMS components or modules and users were identified. Usability problems were identified that cause the users to be selective and discouraged to use other components of CARMS. To further verified and address the usability problems identified, the whole program needs to be tested and evaluated. The methodology was laid for how to do usability testing and evaluation in computer program that are currently in use like CARMS. Benefits and limitations of testing and evaluating usability were detailed in this research. It is recommended that, testing and evaluating usability should be done to prevent errors, dissatisfaction and to improve usability of the CARMS program.
AFRIKAANSE OPSOMMING: In die laaste dekade het die gebruik van rekenaars uitgebrei in die industriele arena in Suid-Afrika. Weens gereelde veranderings in rekenaar programme en ontwikkellings in die informatika veld is gebruikers gereeld nadelig geraak. Gebruikers ervaar probleme met rekenaar programme wat nie gebruikersvriendelik is nie. Bruikbaarheid het te make met bevrediging van gebruikersbehoeftes deur hulle in staat te stel om hulle doelwitte vinnig, doelmatig en maklik te bereik. Dit is dus van kritiese belang dat industriee investeer in rekenaar programme wat optimale bruikbaarheid bied. In hierdie navorsing word gepoog om 'n raamwerk vir metodologie wat gebruik kan word om die bruikbaarheid van die "Transwerk Risk Management Information System" (dit is "Computer Assisted Risk Management Systems" of CARMS) te toets en te evalueer. Ek bespreek eerstens die verskil tussen onbruikbare en bruikbare programme. Bruikbaarheidseienskappe word dan geidentifiseer, insluitend eienskappe wat doeltreffendheid, doelmatigheid, buigsaamheid, aanleerbaarheid en houding van die rekenaar program verbeter. Die CARMS komponente of modules en gebruikers is geidentifiseer. Bruikbaarheidsprobleme is geidentifiseer wat veroorsaak dat gebruikers selektief raak en ontmoedig raak om ander komponente van CARMS te gebruik. Om verder die geidentifiseerde bruikbaarheidsprobleme te verifieer en adreseer moet die hele program getoets en evalueer word. Die metodologie is vasgele waarvolgens bruikbaarheidstoetsing en evaluasie van rekenaar programme wat tans in gebruik is (soos CARMS) gedoen kan word. Voordele en beperkings van bruikbaarheidstoetsing en -evaluasie is in hierdie navorsing vervat. Dit word aanbeveel dat bruikbaarheidstoetsing en -evaluasie gedoen moet word om foute en ontevredenheid te voorkom en om die bruikbaarheid van die CARMS program te verbeter.
Svinčiaková, Ľudmila. "Posouzení informačního systému podniku služeb a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232610.
Full textOren, Gadi. "A probabilistic approach to risk management in mission-critical information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43115.
Full textIncludes bibliographical references (p. 111-112) and index.
In the nuclear, aerospace and chemical industries, the need for risk management is straightforward. When a system failure mode may cause a very high cost in lives or economic value, risk management becomes a necessity. In its short history, Information Technology (IT) came to be a crucial part and sometimes the platform of business activities for many large companies such as telecommunication or financial services organizations. However, due to scale and complexity, risk management methods used by other industries are not widely applied in IT.In this thesis, we investigate how probabilistic risk assessments methods used in other industries can be applied to IT network environments. A comparison is done using a number of possible approaches, improvements to these approaches are suggested, and different tradeoffs are discussed. The thesis examines ways to apply probabilistic risk assessment to a Service Oriented Architecture environment (where each service is an application or a business process that depends on other services, local and networked resources) to estimate the service reliability, availability, expected costs over time and the importance measures of elements and configurations. Finally, a method of performing cost benefit analysis is presented to estimate the implication of changing the services-supporting infrastructure, while taking into consideration the varying impact of different services to the business.A case study is used to demonstrate the methods suggested in the thesis. The case study compares four different configurations, showing how equipment failure and human error can be placed into a single framework and addressed as a single system. The implications and application of the results are discussed and recommendations for further research are provided.
by Gadi Oren.
S.M.
Radtke, Stephen W. "An analysis of the XYZ/ABC Company's risk control management information system." Online version, 1999. http://www.uwstout.edu/lib/thesis/1999/1999radtkes.pdf.
Full textLurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textConforti, Raffaele. "Managing risk in process-aware information systems." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/77828/1/Raffaele_Conforti_Thesis.pdf.
Full textAlem, Mohammad. "Event-based risk management of large scale information technology projects." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/11392.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textBooks on the topic "Information system (IS) risk"
Managing Risk in Information Systems. Sudbury: Jones & Bartlett Publishers, Incorporated, 2010.
Find full textnigs, Hans-Peter Ko. IT-risiko-management mit system: Von den grundlagen bis zur realisierung: ein praxisorientierter leitfaden. 2nd ed. Wiesbaden: Friedr. Vieweg & Sohn Verlag/GWV Fachverlage, Wiesbaden, 2006.
Find full textInformation security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.
Find full textBeroggi, Giampiero E. G. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. Boston, MA: Springer US, 1998.
Find full textMargetts, Helen. Information systems and risk: Public sector studies. London: City University Business School, 1992.
Find full textGelinas, Ulric J. Accounting information systems. 8th ed. Mason, Ohio: South-Western/ Cengage Learning, 2010.
Find full textGelinas, Ulric J. Accounting information systems. 7th ed. Mason, Ohio: Thomson/South-Western, 2008.
Find full textG, Sutton Steve, ed. Accounting information systems. 5th ed. Cincinnati, Ohio: South-Western/Thomson Learning, 2002.
Find full textGelinas, Ulric J. Accounting information systems. 2nd ed. Cincinnati, Ohio: South-Western Pub. Co., 1993.
Find full textGelinas, Ulric J. Accounting information systems. Boston: PWS-Kent Pub. Co., 1990.
Find full textBook chapters on the topic "Information system (IS) risk"
Stavert-Dobson, Adrian. "Risk and Risk Management." In Health Information Systems, 23–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26612-1_2.
Full textAmedzro St-Hilaire, Walter. "Strengths and Weaknesses of the Enterprise’s Information System." In Digital Risk Governance, 73–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_8.
Full textAmedzro St-Hilaire, Walter. "Securing the Information System of Enterprises and Institutions." In Digital Risk Governance, 85–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_9.
Full textChopra, Abhishek, and Mukund Chaudhary. "Initial Risk Assessment." In Implementing an Information Security Management System, 59–76. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_4.
Full textChopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System, 77–102. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.
Full textCai, Huali, Wanjin Tang, Yuexiang Yang, Lizhi Wang, and Xia Liu. "Product Quality Risk Information Collecting System." In Lecture Notes in Electrical Engineering, 763–68. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4844-9_101.
Full textO’Carroll, Patrick W., Eve Powell-Griner, Deborah Holtzman, and G. David Williamson. "Risk Factor Information Systems." In Health Informatics, 316–34. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/0-387-22745-8_16.
Full textOlson, David L., and Desheng Dash Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53785-5_11.
Full textTomines, Alan. "Risk Factor Information Systems." In Health Informatics, 329–53. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4237-9_18.
Full textOlson, David L., and Desheng Wu. "Information Systems Security Risk." In Enterprise Risk Management Models, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11474-8_3.
Full textConference papers on the topic "Information system (IS) risk"
"Research of Information System Security Risk." In 2018 2nd International Conference on Systems, Computing, and Applications. Francis Academic Press, 2018. http://dx.doi.org/10.25236/systca.18.024.
Full textZaiqiang, Huo. "Engineering Project Risk Appraisal Information System." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.681.
Full textHuo Cuifeng and Teng Yanyan. "Risks and risk management in the development of information system." In 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA). IEEE, 2010. http://dx.doi.org/10.1109/iccsna.2010.5588835.
Full textBellagamba, S., F. Paglietti, and B. C. D. Staffa. "The advantages of using a Geographic Information System to evaluate risk in highly contaminated sites." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120151.
Full textBoranbayev, Askar, Seilkhan Boranbayev, Assel Nurusheva, Kuanysh Yersakhanov, and Yerzhan Seitkulov. "A Software System for Risk Management of Information Systems*." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747045.
Full textTrcek, Denis. "System Dynamics Based Risk Management for Distributed Information Systems." In 2009 Fourth International Conference on Systems. IEEE, 2009. http://dx.doi.org/10.1109/icons.2009.40.
Full textTsumoto, Shusaku, Shigeki Yokoyama, and Kimiko Matsuoka. "Mining Risk Information in Hospital Information Systems as Risk Mining." In 2007 IEEE/ICME International Conference on Complex Medical Engineering. IEEE, 2007. http://dx.doi.org/10.1109/iccme.2007.4382082.
Full textSharma, Ashok. "Risk related Interdependencies in Information System Projects." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809076.
Full textAbbass, Wissam, Amine Baina, and Mostafa Bellafkih. "Improvement of information system security risk management." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7805039.
Full textXU, PENG, MEIRONG CHEN, LIFANG FENG, YANG XU, DANCHEN WANG, and XIAOMEI ZHONG. "A RISK ASSESSMENT METHOD IN INFORMATION SYSTEM." In Conference on Uncertainty Modelling in Knowledge Engineering and Decision Making (FLINS 2016). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813146976_0167.
Full textReports on the topic "Information system (IS) risk"
Kerr, S. B., R. R. Bonczek, C. W. McGinn, M. L. Land, L. D. Bloom, B. E. Sample, and F. G. Dolislager. The risk assessment information system. Office of Scientific and Technical Information (OSTI), June 1998. http://dx.doi.org/10.2172/663527.
Full textStoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.
Full textSmith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.
Full textJansma, R. M., S. K. Fletcher, M. D. Murphy, J. J. Lim, and G. D. Wyss. Risk-based assessment of the surety of information systems. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/285501.
Full textLippiatt, Barbara C., and Sieglinde K. Fuller. An analytical approach to cost-effective, risk-based budgeting for federal information system security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7385.
Full textDroppo, J. G. Jr, J. W. Buck, D. L. Strenge, and M. R. Siegel. Analysis of health impact inputs to the US Department of Energy's risk information system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/6517304.
Full textBoyens, Jon, Celia Paulsen, Nadya Bartol, Stephany A. Shankles, and Rama Moorthy. Notional Supply Chain Risk Management Practices for Federal Information Systems. Gaithersburg, MD: National Institute of Standards and Technology, October 2012. http://dx.doi.org/10.6028/nist.ir.7622.
Full textBernknopf, R. L. A geographic information system (GIS) based risk assessment model for the identification of environmental hazards. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1994. http://dx.doi.org/10.4095/193879.
Full textBoyens, Jon M., Celia Paulsen, Rama Moorthy, and Nadya Bartol. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. National Institute of Standards and Technology, April 2015. http://dx.doi.org/10.6028/nist.sp.800-161.
Full textKennedy, Alan, Jonathon Brame, Taylor Rycroft, Matthew Wood, Valerie Zemba, Charles Weiss, Matthew Hull, Cary Hill, Charles Geraci, and Igor Linkov. A definition and categorization system for advanced materials : the foundation for risk-informed environmental health and safety testing. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41803.
Full text