Enterprise risk management: how do firms integrate cyber risk?
نویسندگان
چکیده
Purpose The purpose of this study is to examine how companies integrate cyber risk into their enterprise management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds millions dollars. Consequently, has one the gravest risks facing organizations, attracted boardroom-level attention. On other hand, already manage many kinds difficult growing risks, that firms lose less than 1% annual revenues as a result incidents. Therefore, should appropriately address risk? Is it indeed materially different kind area, or simply just more can seamlessly be integrated existing (ERM) practices? Design/methodology/approach authors performed thematic analysis based on semi-structured interviews, non-probabilistic, purposive sampling, answer two main questions. First, do generally? And second, are they integrating these processes? Findings find there considerable variation in approach sophistication ERM practices, such whether driven like an auditing function, champion. also despite novelty risk, most often seen operational (similar workplace accidents fraud), rather strategic emerging from, for example, technology innovation R&D. Research limitations/implications generalization results limited by sample size interviewed. While attempted interview managers across wide firms, were clear limitations scope. That being said, fortunate able practices small large, private publicly traded companies, from variety business sectors. Practical implications believe finding important because present evidence while may new, does not require specialized handling processes track at level. choose provide special accommodations attention data collection neither necessary nor required all situations. Originality/value This research only papers that, best authors’ knowledge, examines
منابع مشابه
How to Integrate Trust Management into a Risk Analysis Process
In order to apply suitable security services for an existing or newly designed information system, one has to perform a security analysis auditing the system for vulnerabilities, threats, and risks. Based on the audit results effective safeguards are selected, designed, and configured. The security analysis process is standardized by a set of so-called Common Criteria (CC) [8] which provides a ...
متن کاملOptimized enterprise risk management
Today's enterprises face the daunting task of complying with an increasing number of intricate and constantly evolving laws and regulations. While some individual regulations such as Basel II or the USA Patriot Act necessitate the use of risk-based approaches to achieve compliance, the heightened cost and risk of compliance activities have resulted in a general tendency of enterprises to integr...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Management research review
سال: 2023
ISSN: ['2040-8269', '2040-8277']
DOI: https://doi.org/10.1108/mrr-10-2021-0774