IT Risks

نویسندگان

  • Linda Wilbanks
  • D. Richard Kuhn
  • Wesley Chou
چکیده

“Risk management” is a common phrase when managing information, used by everyone from the chief information security officer to the programmer to explain how we identify, assess, and prioritize risks. It thus reflects how we manage uncertainty as we attempt to control the probability and effect of unfortunate events. Depending on your IT-related experience and area of work, your view of risks will differ. Perhaps you’ve experienced a risk-related project failure during development or post release, perhaps someone has stolen personally identifiable information, or perhaps a hardware or software failure resulted in a financial loss. These are some risks we’ve come to accept, and mitigation strategies are part of our development approaches and everyday work. Most IT professionals would agree that IT is good at identifying and managing the risks—but is this really the case? Or has risk management become simply buzz word for us?

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تحلیلی بر خطرات معمول زندگی و نقش آن در قلمرو مسئولیت مدنی

Abstract Normal risks are limitations of social life that are different in various situations and are not separable from the essence of life. When these risks make damages to persons, the main question is that weather the approach of tort law towards the compensation of them should be different from other risks or not and what is their role in liability. In this research, after using analyti...

متن کامل

Development of a Generic Risk Matrix to Manage Project Risks

A generic risk matrix is presented for use identifying and assessing project risks quickly and cost effectively. It assists project managers with few resources to perform project risk analysis. The generic risk matrix (GRM) contains a broad set of risks that are categorized and ranked according to their potential impact and probability of occurrence. The matrix assists PMs in quickly identifyin...

متن کامل

A New Approach to Project Risk Responses Selection with Inter-dependent Risks

Risks are natural and inherent characteristics of major projects. Risks are usually considered independently in analysis of risk responses. However, most risks are dependent on each other and dependent risks are rare in the real world. This paper proposes a model for proper risk response selection from the responses portfolio with the purpose of optimization of defined criteria for projects. Th...

متن کامل

Suppliers Selection in Consideration of Risks by a Neural Network

Faced with the dynamic demands of a changing market, companies are facing fierce competition, which forces them to consider more and more new approaches to improve quality, reduce costs, produce on time, control their risks and remain successful in the face of any disruption. It is clear that the choice of appropriate suppliers is one of the key factors in increasing the competitiveness of comp...

متن کامل

A New Extended Analytical Hierarchy Process Technique with Incomplete Interval-valued Information for Risk Assessment in IT Outsourcing

Information technology (IT) outsourcing has been recognized as a new methodology in many organizations. Yet making an appropriate decision with regard to selection and use of these methodologies may impose uncertainties and risks. Estimating the occurrence probability of risks and their impacts organizations goals may reduce their threats. In this study, an extended analytical hierarchical proc...

متن کامل

A model of existing risks in Iran’s insurance industry

Iranian insurance industry requires a mutation and serious change so that it can be addressed on the world field. One thing, which could considerably help the Iranian insurance companies, is strategic management. However, the results of researches indicate that many processes of strategy are leading to the failure in organizations and this, in addition to imposing additional expenditures to org...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IT Professional

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2014