Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information for a given organisation. We argue that the traditional orientation of these methodologies, towards the identification and assessment of technical information assets, obscures key risks associated with the cultivation and deployment of organisational knowledge. Our argument is developed through an illustrative case study in which a well-documented methodology is applied to a complex data back-up process. This process is seen to depend, in subtle and often informal ways, on knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security m...
Three deficiencies exist in the organisational practice of information security risk management: ris...
The current information security standards still advocate the use of risk assessment in the prioriti...
The current information security standards still advocate the use of risk assessment in the prioriti...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized leakage...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
This paper helps us to understand the emerging concept of knowledge management by exploring the rela...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
Organizations apply information security risk assessment (ISRA) methodologies to systematically and ...
Contemporary methods for assessing information security risks have adopted mainly technical views on...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
The data collection process for risk assessment highly depends on the security experience of securit...
Abstract:- Organisational Information Systems – as well as related performance and control systems- ...
In practice, there is a massive time lag between data loss and its cause identification. The existin...
Three deficiencies exist in the organisational practice of information security risk management: ris...
The current information security standards still advocate the use of risk assessment in the prioriti...
The current information security standards still advocate the use of risk assessment in the prioriti...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized leakage...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
This paper helps us to understand the emerging concept of knowledge management by exploring the rela...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
Organizations apply information security risk assessment (ISRA) methodologies to systematically and ...
Contemporary methods for assessing information security risks have adopted mainly technical views on...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
The data collection process for risk assessment highly depends on the security experience of securit...
Abstract:- Organisational Information Systems – as well as related performance and control systems- ...
In practice, there is a massive time lag between data loss and its cause identification. The existin...
Three deficiencies exist in the organisational practice of information security risk management: ris...
The current information security standards still advocate the use of risk assessment in the prioriti...
The current information security standards still advocate the use of risk assessment in the prioriti...