Academic literature on the topic 'Information system (IS) risk'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information system (IS) risk.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information system (IS) risk"

1

Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.

Full text
Abstract:
Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.
APA, Harvard, Vancouver, ISO, and other styles
2

Nikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Information System and Risk Reassessment." Issues in Informing Science and Information Technology 7 (2010): 191–207. http://dx.doi.org/10.28945/1200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Durba, Mounica. "Risk Assessment of Information System." Asia-pacific Journal of Convergent Research Interchange 1, no. 3 (September 30, 2015): 31–41. http://dx.doi.org/10.21742/apjcri.2015.09.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MATSUYAMA, Satoshi, Masahiro INOUE, and Tetsuo SAKAI. "Underground risk management information system." Shigen-to-Sozai 122, no. 10/11 (2006): 528–36. http://dx.doi.org/10.2473/shigentosozai.122.528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Acree, John A. "Important risk information system (IRIS)." Preventive Veterinary Medicine 16, no. 1 (April 1993): 41. http://dx.doi.org/10.1016/0167-5877(93)90008-h.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zybin, Serhii, and Yana Bielozorova. "Risk-based Decision-making System for Information Processing Systems." International Journal of Information Technology and Computer Science 13, no. 5 (October 8, 2021): 1–18. http://dx.doi.org/10.5815/ijitcs.2021.05.01.

Full text
Abstract:
The article is dedicated to using the methodology of building a decision support system under threats and risks. This method has been developed by modifying the methods of targeted evaluation of options and is used for constructing a scheme of the decision support system. Decision support systems help to make correct and effective solution to shortage of time, incompleteness, uncertainty and unreliability of information, and taking into account the risks. When we are making decisions taking into account the risks, it is necessary to solve the following tasks: determination of quantitative characteristics of risk; determination of quantitative indicators for the effectiveness of decisions in the presence of risks; distribution of resources between means of countering threats, and means that are aimed at improving information security. The known methods for solving the first problem provide for the identification of risks (qualitative analysis), as well as the assessment of the probabilities and the extent of possible damage (quantitative analysis). However, at the same time, the task of assessing the effectiveness of decisions taking into account risks is not solved and remains at the discretion of the expert. The suggesting method of decision support under threats and risks has been developed by modifying the methods of targeted evaluation of options. The relative efficiency in supporting measures to develop measures has been calculated as a function of time given on a time interval. The main idea of the proposed approach to the analysis of the impact of threats and risks in decision-making is that events that cause threats or risks are considered as a part of the decision support system. Therefore, such models of threats or risks are included in the hierarchy of goals, their links with other system's parts and goals are established. The main functional modules that ensure the continuous and efficient operation of the decision support system are the following subsystems: subsystem for analysing problems, risks and threats; subsystem for the formation of goals and criteria; decision-making subsystem; subsystem of formation of the decisive rule and analysis of alternatives. Structural schemes of functioning are constructed for each subsystem. The given block diagram provides a full-fledged decision-making process.
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.

Full text
Abstract:
With the popularity of the Internet and global information continues to advance organizational information systems have become an important strategic resource for the survival of the importance of information security to protect its widespread concern. Once the information security organization information system is destroyed, the Organization for Security attribute information would cause tremendous impact the organization's business operation, the losses include not only economic, but also likely to organize image, reputation is a strategic competitive advantage even fatal injuries. However, the existing information systems of information security risk management approach to information system risk analysis and assessment with specific organizational environment and business background with fragmentation, lack of risk analysis and description of the formation process, carried only consider "technical" factors security decisions, lack of full expression to achieve the desired goal of a number of decisions on organizational decision-making. Therefore, the information system to carry information security risk management is essential.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Hai Bin, Fei Li, and Wen Qiong Li. "Risk Management of Information System Project." Applied Mechanics and Materials 357-360 (August 2013): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.357-360.2826.

Full text
Abstract:
Risk and its management of information system project has not been too much attention, while its play an important role in the success of information system project. Risk categories, consequences, drivers and action approaches are analyzed and risk management procedure of information system project is proposed in order to carry out effective risk management during information system project management.
APA, Harvard, Vancouver, ISO, and other styles
9

Pontius, Frederick W. "Tapping USEPA's Integrated Risk Information System." Journal - American Water Works Association 85, no. 6 (June 1993): 22–108. http://dx.doi.org/10.1002/j.1551-8833.1993.tb06001.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Владимир Викторович, Москвичев,, Ничепорчук, Валерий Васильевич, Постникова, Ульяна Сергеевна, and Тасейко, Ольга Викторовна. "Information system of territorial risk assessment." Вычислительные технологии, no. 6 (December 23, 2022): 115–23. http://dx.doi.org/10.25743/ict.2022.27.6.010.

Full text
Abstract:
В работе представлен процесс создания интеллектуальной системы, предназначенной для оценки и управления рисками. Риск может иметь антропогенный, природный или социальный характер и относиться к различным территориальным группам. Сложность структурирования и сбора информации о государственной территориальной безопасности, а также различные методы оценки рисков обусловливают необходимость разработки модульной многозадачной системы. Модель поддержки системы управления информацией формализует проблемную область для обоснования совместного использования инновационных технологий. На основе модели разработана архитектура системы. Эта архитектура определяет состав, функциональные возможности, интерфейсы взаимодействия, а также организацию информационных ресурсов, которые использовались для поддержки управления. Здесь представлен результат работы прототипа информационной системы. The paper presents the process of creating an intelligent system designed to assess and manage risks. The risk can be anthropogenic, natural, or social in nature, and relate to different territorial groups. The complexity of structuring and collecting information on the state territorial security as well as various risk assessment methods, necessitates the development of a modular multitask system. The information management system support model formalizes the problem area to justify the joint use of innovation technologies. Based on the model, system architecture has been developed. This architecture defines the composition, functionality, interaction interfaces, and organization of information resources, that were used to support management. The operation results of the system prototype is presented.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information system (IS) risk"

1

Goto, Masato, Akira Hattori, Takami Yasuda, and Shigeki Yokoi. "Local Risk Management Information Sharing System." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2006. http://hdl.handle.net/2237/10438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Farahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.

Full text
Abstract:
The Internet and information systems have enabled businesses to reduce costs, attain greater market reach, and develop closer business partnerships along with improved customer relationships. However, using the Internet has led to new risks and concerns. This research provides a management perspective on the issues confronting CIOs and IT managers. It outlines the current state of the art of information security, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a model for classification of threats and control measures. It also develops a scheme for probabilistic evaluation of the impact of security threats with some illustrative examples. It involves validation of information assets and probabilities of success of attacks on those assets in organizations and evaluates the expected damages of these attacks. The research outlines some suggested control measures and presents some cost models for quantifying damages from these attacks and compares the tangible and intangible costs of these attacks. This research also develops a risk management system for information systems security incidents in five stages: 1- Resource and application value analysis, 2- Vulnerability and risk analysis, 3- Computation of losses due to threats and benefits of control measures, 4- Selection of control measures, and 5- Implementation of alternatives. The outcome of this research should help decision makers to select the appropriate control measure(s) to minimize damage or loss due to security incidents. Finally, some recommendations for future work are provided to improve the management of security in organizations.
APA, Harvard, Vancouver, ISO, and other styles
3

Mpanza, Brian Vusumuzi. "Evaluation of Transwerk Risk Management Information System." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50346.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2005.
ENGLISH ABSTRACT: In the last decade, the use of computers has proliferated the industrial arena in South Africa. Due to frequent changes in computer programs and developments in the computing field, users have often been adversely affected. Users experience problems with computer programs that are not user friendly. Usability is about satisfying the user needs by allowing the user to accomplish their goals quickly, efficiently and easily. Thus it is crucial that industries invest in computer programs that offer optimum usability. In this research an attempt is made to provide a framework for methodology that can be used to test and evaluate usability in the Transwerk Risk Management Information System, that is Computer Assisted Risk Management Systems (CARMS). I first consider the difference between unusable and usable programs. Usability properties are then identified including properties enhancing effectiveness, efficiency, flexibility, laemability and attitude of the computer program. The CARMS components or modules and users were identified. Usability problems were identified that cause the users to be selective and discouraged to use other components of CARMS. To further verified and address the usability problems identified, the whole program needs to be tested and evaluated. The methodology was laid for how to do usability testing and evaluation in computer program that are currently in use like CARMS. Benefits and limitations of testing and evaluating usability were detailed in this research. It is recommended that, testing and evaluating usability should be done to prevent errors, dissatisfaction and to improve usability of the CARMS program.
AFRIKAANSE OPSOMMING: In die laaste dekade het die gebruik van rekenaars uitgebrei in die industriele arena in Suid-Afrika. Weens gereelde veranderings in rekenaar programme en ontwikkellings in die informatika veld is gebruikers gereeld nadelig geraak. Gebruikers ervaar probleme met rekenaar programme wat nie gebruikersvriendelik is nie. Bruikbaarheid het te make met bevrediging van gebruikersbehoeftes deur hulle in staat te stel om hulle doelwitte vinnig, doelmatig en maklik te bereik. Dit is dus van kritiese belang dat industriee investeer in rekenaar programme wat optimale bruikbaarheid bied. In hierdie navorsing word gepoog om 'n raamwerk vir metodologie wat gebruik kan word om die bruikbaarheid van die "Transwerk Risk Management Information System" (dit is "Computer Assisted Risk Management Systems" of CARMS) te toets en te evalueer. Ek bespreek eerstens die verskil tussen onbruikbare en bruikbare programme. Bruikbaarheidseienskappe word dan geidentifiseer, insluitend eienskappe wat doeltreffendheid, doelmatigheid, buigsaamheid, aanleerbaarheid en houding van die rekenaar program verbeter. Die CARMS komponente of modules en gebruikers is geidentifiseer. Bruikbaarheidsprobleme is geidentifiseer wat veroorsaak dat gebruikers selektief raak en ontmoedig raak om ander komponente van CARMS te gebruik. Om verder die geidentifiseerde bruikbaarheidsprobleme te verifieer en adreseer moet die hele program getoets en evalueer word. Die metodologie is vasgele waarvolgens bruikbaarheidstoetsing en evaluasie van rekenaar programme wat tans in gebruik is (soos CARMS) gedoen kan word. Voordele en beperkings van bruikbaarheidstoetsing en -evaluasie is in hierdie navorsing vervat. Dit word aanbeveel dat bruikbaarheidstoetsing en -evaluasie gedoen moet word om foute en ontevredenheid te voorkom en om die bruikbaarheid van die CARMS program te verbeter.
APA, Harvard, Vancouver, ISO, and other styles
4

Svinčiaková, Ľudmila. "Posouzení informačního systému podniku služeb a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232610.

Full text
Abstract:
The paper focuses on a company which is currently in a difficult situation because of the escalation of problems with established information system. The company must also confront the problems with the introduction of a new program supporting core business processes. The only IT company employee often gets in the situations he is unable to solve practically or because of little time time. The aim of this work was to analyse established information system, identify its weaknesses, where there are risks and propose measures to improve and eliminate the identified risks. Own analysis of the information system through interviews with selected staff is followed up with questionnaire methods of ZEFIS portal. After finding the gaps and analysis of the identified risks the measures to eliminate the risks, recommendations for improvement and correcting the shortcomings of the system have been proposed.
APA, Harvard, Vancouver, ISO, and other styles
5

Oren, Gadi. "A probabilistic approach to risk management in mission-critical information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43115.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008.
Includes bibliographical references (p. 111-112) and index.
In the nuclear, aerospace and chemical industries, the need for risk management is straightforward. When a system failure mode may cause a very high cost in lives or economic value, risk management becomes a necessity. In its short history, Information Technology (IT) came to be a crucial part and sometimes the platform of business activities for many large companies such as telecommunication or financial services organizations. However, due to scale and complexity, risk management methods used by other industries are not widely applied in IT.In this thesis, we investigate how probabilistic risk assessments methods used in other industries can be applied to IT network environments. A comparison is done using a number of possible approaches, improvements to these approaches are suggested, and different tradeoffs are discussed. The thesis examines ways to apply probabilistic risk assessment to a Service Oriented Architecture environment (where each service is an application or a business process that depends on other services, local and networked resources) to estimate the service reliability, availability, expected costs over time and the importance measures of elements and configurations. Finally, a method of performing cost benefit analysis is presented to estimate the implication of changing the services-supporting infrastructure, while taking into consideration the varying impact of different services to the business.A case study is used to demonstrate the methods suggested in the thesis. The case study compares four different configurations, showing how equipment failure and human error can be placed into a single framework and addressed as a single system. The implications and application of the results are discussed and recommendations for further research are provided.
by Gadi Oren.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
6

Radtke, Stephen W. "An analysis of the XYZ/ABC Company's risk control management information system." Online version, 1999. http://www.uwstout.edu/lib/thesis/1999/1999radtkes.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Conforti, Raffaele. "Managing risk in process-aware information systems." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/77828/1/Raffaele_Conforti_Thesis.pdf.

Full text
Abstract:
This research contributes a fully-operational approach for managing business process risk in near real-time. The approach consists of a language for defining risks on top of process models, a technique to detect such risks as they eventuate during the execution of business processes, a recommender system for making risk-informed decisions, and a technique to automatically mitigate the detected risks when they are no longer tolerable. Through the incorporation of risk management elements in all stages of the lifecycle of business processes, this work contributes to the effective integration of the fields of Business Process Management and Risk Management.
APA, Harvard, Vancouver, ISO, and other styles
9

Alem, Mohammad. "Event-based risk management of large scale information technology projects." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/11392.

Full text
Abstract:
Globalisation has come as a double-edged blade for information technology (IT) companies; providing growth opportunities and yet posing many challenges. Software development is moving from a monolithic model to a distributed approach, where many entities and organisations are involved in the development process. Risk management an important area to deal with all the kinds of technical and social issues within companies planning and programming schedules, and this new way of working requires more attention to be paid to the temporal, socio-cultural and control aspects than before. Multinational companies like IBM have begun to consider how to address the distributed nature of its projects across the globe. With outlets across the globe, the company finds various people of different cultures, languages and ethics working on a single and bigger IT projects from different locations. Other IT companies are facing the same problems, despite there being many kinds of approaches available to handle risk management in large scale IT companies. IBM commissioned the Distributed Risk Management Process (DRiMaP) model as a suitable solution. This model focused on the collaborative and on-going control aspects, and paid attention to the need for risk managers, project managers and management to include risk management into all phases of projects and the business cycle. The authors of the DRiMaP model did not subject it to extensive testing. This research sets out to evaluate, improve and extend the model process and thereby develop a new and dynamic approach to distributed information systems development. To do this, this research compares and contrasts the model with other risk management approaches. An Evolutionary Model is developed, and this is subjected to empirical testing through a hybrid constructive research approach. A survey is used to draw out the observations of project participants, a structured interview gathered the opinions of project experts, a software tool was developed to implement the model, and SysML and Monte Carlo methods were applied to this to simulate the functioning of the model. The Evolutionary Model was found to partially address the shortcomings of the DRiMaP model, and to provide a valuable platform for the development of an enterprise risk management solution.
APA, Harvard, Vancouver, ISO, and other styles
10

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Full text
Abstract:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic Security Template (GST), aiming to feed back the lessons learned from real world security incidents to the ISMS. It adapts graphical Goal Structuring Notations (GSN), to present the lessons learned in a structured manner through mapping them to the security requirements of the ISMS. The suitability of the GST has been confirmed by demonstrating that instances of the GST can be produced from real world security incidents of different countries based on in-depth analysis of case studies. The usability of the GST has been evaluated using a series of empirical studies. The GST is empirically evaluated in terms of its given effectiveness in assisting the communication of the lessons learned from security incidents as compared to the traditional text based approach alone. The results show that the GST can help to improve the accuracy and reduce the mental efforts in assisting the identification of the lessons learned from security incidents and the results are statistically significant. The GST is further evaluated to determine whether users can apply the GST to structure insights derived from a specific security incident. The results show that students with a computer science background can create an instance of the GST. The acceptability of the GST is assessed in a healthcare organisation. Strengths and weaknesses are identified and the GST has been adjusted to fit into organisational needs. The GST is then further tested to examine its capability to feed back the security lessons to the ISMS. The results show that, by using the GST, lessons identified from security incidents from one healthcare organisation in a specific country can be transferred to another and can indeed inform the improvements of the ISMS. In summary, the GST provides a unified way to feed back the lessons learned to the ISMS. It fosters an environment where different stakeholders can speak the same language while exchanging the lessons learned from the security incidents around the world.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information system (IS) risk"

1

Managing Risk in Information Systems. Sudbury: Jones & Bartlett Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

nigs, Hans-Peter Ko. IT-risiko-management mit system: Von den grundlagen bis zur realisierung: ein praxisorientierter leitfaden. 2nd ed. Wiesbaden: Friedr. Vieweg & Sohn Verlag/GWV Fachverlage, Wiesbaden, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Information security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beroggi, Giampiero E. G. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. Boston, MA: Springer US, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Margetts, Helen. Information systems and risk: Public sector studies. London: City University Business School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gelinas, Ulric J. Accounting information systems. 8th ed. Mason, Ohio: South-Western/ Cengage Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gelinas, Ulric J. Accounting information systems. 7th ed. Mason, Ohio: Thomson/South-Western, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

G, Sutton Steve, ed. Accounting information systems. 5th ed. Cincinnati, Ohio: South-Western/Thomson Learning, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gelinas, Ulric J. Accounting information systems. 2nd ed. Cincinnati, Ohio: South-Western Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gelinas, Ulric J. Accounting information systems. Boston: PWS-Kent Pub. Co., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information system (IS) risk"

1

Stavert-Dobson, Adrian. "Risk and Risk Management." In Health Information Systems, 23–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26612-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amedzro St-Hilaire, Walter. "Strengths and Weaknesses of the Enterprise’s Information System." In Digital Risk Governance, 73–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amedzro St-Hilaire, Walter. "Securing the Information System of Enterprises and Institutions." In Digital Risk Governance, 85–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chopra, Abhishek, and Mukund Chaudhary. "Initial Risk Assessment." In Implementing an Information Security Management System, 59–76. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System, 77–102. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Huali, Wanjin Tang, Yuexiang Yang, Lizhi Wang, and Xia Liu. "Product Quality Risk Information Collecting System." In Lecture Notes in Electrical Engineering, 763–68. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4844-9_101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

O’Carroll, Patrick W., Eve Powell-Griner, Deborah Holtzman, and G. David Williamson. "Risk Factor Information Systems." In Health Informatics, 316–34. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/0-387-22745-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Olson, David L., and Desheng Dash Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53785-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tomines, Alan. "Risk Factor Information Systems." In Health Informatics, 329–53. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4237-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olson, David L., and Desheng Wu. "Information Systems Security Risk." In Enterprise Risk Management Models, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11474-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information system (IS) risk"

1

"Research of Information System Security Risk." In 2018 2nd International Conference on Systems, Computing, and Applications. Francis Academic Press, 2018. http://dx.doi.org/10.25236/systca.18.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zaiqiang, Huo. "Engineering Project Risk Appraisal Information System." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huo Cuifeng and Teng Yanyan. "Risks and risk management in the development of information system." In 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA). IEEE, 2010. http://dx.doi.org/10.1109/iccsna.2010.5588835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bellagamba, S., F. Paglietti, and B. C. D. Staffa. "The advantages of using a Geographic Information System to evaluate risk in highly contaminated sites." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boranbayev, Askar, Seilkhan Boranbayev, Assel Nurusheva, Kuanysh Yersakhanov, and Yerzhan Seitkulov. "A Software System for Risk Management of Information Systems*." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trcek, Denis. "System Dynamics Based Risk Management for Distributed Information Systems." In 2009 Fourth International Conference on Systems. IEEE, 2009. http://dx.doi.org/10.1109/icons.2009.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tsumoto, Shusaku, Shigeki Yokoyama, and Kimiko Matsuoka. "Mining Risk Information in Hospital Information Systems as Risk Mining." In 2007 IEEE/ICME International Conference on Complex Medical Engineering. IEEE, 2007. http://dx.doi.org/10.1109/iccme.2007.4382082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Ashok. "Risk related Interdependencies in Information System Projects." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abbass, Wissam, Amine Baina, and Mostafa Bellafkih. "Improvement of information system security risk management." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7805039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

XU, PENG, MEIRONG CHEN, LIFANG FENG, YANG XU, DANCHEN WANG, and XIAOMEI ZHONG. "A RISK ASSESSMENT METHOD IN INFORMATION SYSTEM." In Conference on Uncertainty Modelling in Knowledge Engineering and Decision Making (FLINS 2016). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813146976_0167.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information system (IS) risk"

1

Kerr, S. B., R. R. Bonczek, C. W. McGinn, M. L. Land, L. D. Bloom, B. E. Sample, and F. G. Dolislager. The risk assessment information system. Office of Scientific and Technical Information (OSTI), June 1998. http://dx.doi.org/10.2172/663527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jansma, R. M., S. K. Fletcher, M. D. Murphy, J. J. Lim, and G. D. Wyss. Risk-based assessment of the surety of information systems. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/285501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lippiatt, Barbara C., and Sieglinde K. Fuller. An analytical approach to cost-effective, risk-based budgeting for federal information system security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Droppo, J. G. Jr, J. W. Buck, D. L. Strenge, and M. R. Siegel. Analysis of health impact inputs to the US Department of Energy's risk information system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/6517304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boyens, Jon, Celia Paulsen, Nadya Bartol, Stephany A. Shankles, and Rama Moorthy. Notional Supply Chain Risk Management Practices for Federal Information Systems. Gaithersburg, MD: National Institute of Standards and Technology, October 2012. http://dx.doi.org/10.6028/nist.ir.7622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bernknopf, R. L. A geographic information system (GIS) based risk assessment model for the identification of environmental hazards. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1994. http://dx.doi.org/10.4095/193879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boyens, Jon M., Celia Paulsen, Rama Moorthy, and Nadya Bartol. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. National Institute of Standards and Technology, April 2015. http://dx.doi.org/10.6028/nist.sp.800-161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kennedy, Alan, Jonathon Brame, Taylor Rycroft, Matthew Wood, Valerie Zemba, Charles Weiss, Matthew Hull, Cary Hill, Charles Geraci, and Igor Linkov. A definition and categorization system for advanced materials : the foundation for risk-informed environmental health and safety testing. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41803.

Full text
Abstract:
Novel materials with unique or enhanced properties relative to conventional materials are being developed at an increasing rate. These materials are often referred to as advanced materials (AdMs) and they enable technological innovations that can benefit society. Despite their benefits, however, the unique characteristics of many AdMs, including many nanomaterials, are poorly understood and may pose environmental safety and occupational health (ESOH) risks that are not readily determined by traditional risk assessment methods. To assess these risks while keeping up with the pace of development, technology developers and risk assessors frequently employ risk-screening methods that depend on a clear definition for the materials that are to be assessed (e.g., engineered nanomaterial) as well as a method for binning materials into categories for ESOH risk prioritization. In this study, we aim to establish a practitioner-driven definition for AdMs and a practitioner-validated framework for categorizing AdMs into conceptual groupings based on material characteristics. The definition and categorization framework established here serve as a first step in determining if and when there is a need for specific ESOH and regulatory screening for an AdM as well as the type and extent of risk-related information that should be collected or generated for AdMs and AdM-enabled technologies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography