Understanding the risks caused by relying on information systems is an enduring research stream in the Information Systems (IS) discipline. With information systems becoming ubiquitous, IS risks permeate every aspect of life and effective risk mitigation increasingly requires a holistic structure. We use the largest and oldest publicly available risk collection to understand the developments of IS risks, its characteristics, and interdependencies. We review this data set using text mining techniques. Interestingly, we find that some types of IS risks tend to reoccur. We find that this database provides rich opportunities for learning from previous mistakes, which could help avoid similar problems in the future. Our contributions to theory i...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This paper reflects upon the conceptualization of risk management adopted in the field of informatio...
This paper reflects upon the conceptualization of risk management adopted in the field of informatio...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This paper reflects upon the conceptualization of risk management adopted in the field of informatio...
This paper reflects upon the conceptualization of risk management adopted in the field of informatio...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the first of two whose goal is to advance the discussion of IS risk by addressing li...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
Information systems development (ISD) has been part of the core of information systems for over 40 y...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...
This article is the second of two whose goal is to advance the discussion of IS risk by addressing l...