An Information System Risk Management of a Higher Education Computing Environment
Abstract
Keywords
Full Text:
PDFReferences
J. S. Suroso and M. A. Fakhrozi, “Assessment of Information System Risk Management with Octave Allegro at Education Institution,†in Procedia Computer Science, 2018, vol. 135, pp. 202–213. doi: 10.1016/j.procs.2018.08.167.
G. Strupczewski, “Defining cyber risk,†Safety Science, vol. 135, no. December 2020, 2021, doi: 10.1016/j.ssci.2020.105143.
S. A. Talesh, “Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as ‘Compliance Managers’ for Businesses,†Law & Social Inquiry, vol. 43, no. 2, pp. 417–440, 2018.
P. J. O. Management Studies Kuzmenko, O. v Kubálek, J. Bozhenko, V. v Kushneryov, and I. Vida, “An Approach to Managing Innovation to Protect Financial Sector Against Cybercrime,†vol. 24, no. 2, 2021, doi: 10.17512/pjms.2021.24.2.17.
H. Tao et al., “Economic perspective analysis of protecting big data security and privacy,†Future Generation Computer Systems, vol. 98, pp. 660–671, 2019, doi: 10.1016/j.future.2019.03.042.
D. K. Citron and D. Solove, “Risk and Anxiety : A Theory of Data Breach Harms,†Texas Law Review, vol. 96:737, 2018.
M. Setapa, M. Mamat, H. A. Bakar, S. N. S. Yusuf, and S. Kazemian, “Enterprise Risk Management: Impact on Performance of Private Higher Educational Institutions In Malaysia,†Polish Journal of Management Studies, vol. 22, no. 1, pp. 485–501, 2020, doi: 10.17512/pjms.2020.22.1.31.
C. Joshi and U. Kumar, “Information security risks management framework – A step towards mitigating security risks in university network,†Journal of Information Security and Applications, vol. 35, pp. 128–137, 2017, doi: 10.1016/j.jisa.2017.06.006.
L. Paoli, J. Visschers, and C. Verstraete, “The impact of cybercrime on businesses : A novel conceptual framework and its application to Belgium,†Crime, Law and Social Change, 2018.
W. Sardjono, E. Selviyanti, W. G. Perdana, and Maryani, “Modeling of development of performance evaluation on health information systems implementation,†in Journal of Physics: Conference Series, Mar. 2020, vol. 1465, no. 1. doi: 10.1088/1742-6596/1465/1/012025.
T. Hidayat, O. Rukmana, and A. A. Nurrahman, “Design information system of registration and scheduling information laboratory of information systems and the decision of Bandung Islamic University,†in Journal of Physics: Conference Series, Feb. 2020, vol. 1469, no. 1. doi: 10.1088/1742-6596/1469/1/012134.
E. Selviyanti and W. Sardjono, “Risk management information systems assessment at the television broadcasting company,†in Journal of Physics: Conference Series, Mar. 2020, vol. 1465, no. 1. doi: 10.1088/1742-6596/1465/1/012016.
T. Žužek, L. Rihar, T. Berlec, and J. Kušar, “Standard project risk analysis approach,†Business Systems Research, vol. 11, no. 2, pp. 149–158, Oct. 2020, doi: 10.2478/bsrj-2020-0021.
P. F. de A. Lima and C. Verbano, “Project Risk Management Implementation in SMEs: A Case Study from Italy,†Journal of Technology Management & Innovation, vol. 14, no. 1, 2019, [Online]. Available: http://jotmi.org
H. OÄevÄić, K. Nenadić, K. Å olić, and T. Keser, “The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents,†2017.
O. v. Kondratyeva, O. A. Kondratyeva, and I. A. Kondratev, “The Risk Management Methodology of the Quality Reducing Process of Enterprise Management Information Systems Service Support,†in IOP Conference Series: Earth and Environmental Science, Mar. 2021, vol. 666, no. 6. doi: 10.1088/1755-1315/666/6/062128.
N. M. S. Algheriani, V. D. Majstorovic, S. Kirin, and V. Spasojevic Brkic, “Risk model for integrated management system,†Tehnicki Vjesnik, vol. 26, no. 6, pp. 1833–1840, Nov. 2019, doi: 10.17559/TV-20190123142317.
T. Karkoszka, “Risk Management System in Metallurgical Production,†Metalurgija, vol. 60, no. 1–2, pp. 133–136, 2021.
W. Zhu and Y. Jia, “The Research on Safety Management Information System of Railway Passenger Based on Risk Management Theory,†in IOP Conference Series: Earth and Environmental Science, Jan. 2018, vol. 108, no. 4. doi: 10.1088/1755-1315/108/4/042067.
B. Irvin Lamarca, “Cybersecurity Risk Assessment of the University of Northern Philippines using PRISM Approach,†in IOP Conference Series: Materials Science and Engineering, Jun. 2020, vol. 769, no. 1. doi: 10.1088/1757-899X/769/1/012066.
A. Amini and N. Jamil, “A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing,†in Journal of Physics: Conference Series, Jun. 2018, vol. 1018, no. 1. doi: 10.1088/1742-6596/1018/1/012004.
P. Foroudi, Q. Yu, S. Gupta, and M. M. Foroudi, “Enhancing university brand image and reputation through customer value co-creation behaviour,†Technological Forecasting and Social Change, vol. 138, pp. 218–227, Jan. 2019, doi: 10.1016/j.techfore.2018.09.006.
DOI: http://dx.doi.org/10.18517/ijaseit.12.2.13953
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development