Loading…
Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy
In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an orga...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 673 |
container_issue | |
container_start_page | 669 |
container_title | |
container_volume | |
creator | Jung-Ho Eom Young-Hyun Choi Seon-Ho Park Tai-Myoung Chung |
description | In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an organization conducts a baseline approach in information system which has very high value and risk, it could be result in significant harm or damage to an organization. In other case, it will be wasted security budget by spending a cost of detailed risk analysis. So, we presented practical qualitative initial risk analysis using matrix scaling method for selecting appropriate approach. Our method applied evaluation items reflecting business process and qualitative asset value. Our method indicates concrete evaluation method and result by assessing with investment expense, the usage of information system, distribution, security level, safeguard, etc. |
doi_str_mv | 10.1109/ICITIS.2010.5689486 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5689486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5689486</ieee_id><sourcerecordid>5689486</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-6d7de27cf4601c08c5f6d2b6ee03cd2ed6ba21b68ebb90c6b71385dbc636d7f33</originalsourceid><addsrcrecordid>eNpdkMtOhEAQRdsYE3XkC2bTP8DYD2hgaYgPkkmMkf2kH9Va2gKhwYS_lzjjxrup1K06d3EJ2XK245xVt03dtM3rTrDVyFVZZaU6I0lVlDwTWaaqTBbn5PpvEeKSJDF-sFW5KKTMr4h_mXXASU_4DRQ7nFAHOmL8pLrTYYkYqe9HGiGAnbB7-3fTwzD22r7TOK8hJsDvd9OugJ1HnBY69AHtckMuvA4RktPckPbhvq2f0v3zY1Pf7VOs2JQqVzgQhfWZYtyy0uZeOWEUAJPWCXDKaMGNKsGYilllCi7L3Bmr5Ip6KTdke4xFADgMI37pcTmcmpE_Pldaww</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jung-Ho Eom ; Young-Hyun Choi ; Seon-Ho Park ; Tai-Myoung Chung</creator><creatorcontrib>Jung-Ho Eom ; Young-Hyun Choi ; Seon-Ho Park ; Tai-Myoung Chung</creatorcontrib><description>In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an organization conducts a baseline approach in information system which has very high value and risk, it could be result in significant harm or damage to an organization. In other case, it will be wasted security budget by spending a cost of detailed risk analysis. So, we presented practical qualitative initial risk analysis using matrix scaling method for selecting appropriate approach. Our method applied evaluation items reflecting business process and qualitative asset value. Our method indicates concrete evaluation method and result by assessing with investment expense, the usage of information system, distribution, security level, safeguard, etc.</description><identifier>ISBN: 1424469422</identifier><identifier>ISBN: 9781424469420</identifier><identifier>EISBN: 9781424469437</identifier><identifier>EISBN: 1424469430</identifier><identifier>EISBN: 1424469414</identifier><identifier>EISBN: 9781424469413</identifier><identifier>DOI: 10.1109/ICITIS.2010.5689486</identifier><language>eng</language><publisher>IEEE</publisher><subject>Economics ; Europe ; initial risk analysis ; Production ; risk analysis ; Risk management ; security</subject><ispartof>2010 IEEE International Conference on Information Theory and Information Security, 2010, p.669-673</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5689486$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5689486$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jung-Ho Eom</creatorcontrib><creatorcontrib>Young-Hyun Choi</creatorcontrib><creatorcontrib>Seon-Ho Park</creatorcontrib><creatorcontrib>Tai-Myoung Chung</creatorcontrib><title>Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy</title><title>2010 IEEE International Conference on Information Theory and Information Security</title><addtitle>ICITIS</addtitle><description>In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an organization conducts a baseline approach in information system which has very high value and risk, it could be result in significant harm or damage to an organization. In other case, it will be wasted security budget by spending a cost of detailed risk analysis. So, we presented practical qualitative initial risk analysis using matrix scaling method for selecting appropriate approach. Our method applied evaluation items reflecting business process and qualitative asset value. Our method indicates concrete evaluation method and result by assessing with investment expense, the usage of information system, distribution, security level, safeguard, etc.</description><subject>Economics</subject><subject>Europe</subject><subject>initial risk analysis</subject><subject>Production</subject><subject>risk analysis</subject><subject>Risk management</subject><subject>security</subject><isbn>1424469422</isbn><isbn>9781424469420</isbn><isbn>9781424469437</isbn><isbn>1424469430</isbn><isbn>1424469414</isbn><isbn>9781424469413</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpdkMtOhEAQRdsYE3XkC2bTP8DYD2hgaYgPkkmMkf2kH9Va2gKhwYS_lzjjxrup1K06d3EJ2XK245xVt03dtM3rTrDVyFVZZaU6I0lVlDwTWaaqTBbn5PpvEeKSJDF-sFW5KKTMr4h_mXXASU_4DRQ7nFAHOmL8pLrTYYkYqe9HGiGAnbB7-3fTwzD22r7TOK8hJsDvd9OugJ1HnBY69AHtckMuvA4RktPckPbhvq2f0v3zY1Pf7VOs2JQqVzgQhfWZYtyy0uZeOWEUAJPWCXDKaMGNKsGYilllCi7L3Bmr5Ip6KTdke4xFADgMI37pcTmcmpE_Pldaww</recordid><startdate>201012</startdate><enddate>201012</enddate><creator>Jung-Ho Eom</creator><creator>Young-Hyun Choi</creator><creator>Seon-Ho Park</creator><creator>Tai-Myoung Chung</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201012</creationdate><title>Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy</title><author>Jung-Ho Eom ; Young-Hyun Choi ; Seon-Ho Park ; Tai-Myoung Chung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-6d7de27cf4601c08c5f6d2b6ee03cd2ed6ba21b68ebb90c6b71385dbc636d7f33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Economics</topic><topic>Europe</topic><topic>initial risk analysis</topic><topic>Production</topic><topic>risk analysis</topic><topic>Risk management</topic><topic>security</topic><toplevel>online_resources</toplevel><creatorcontrib>Jung-Ho Eom</creatorcontrib><creatorcontrib>Young-Hyun Choi</creatorcontrib><creatorcontrib>Seon-Ho Park</creatorcontrib><creatorcontrib>Tai-Myoung Chung</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jung-Ho Eom</au><au>Young-Hyun Choi</au><au>Seon-Ho Park</au><au>Tai-Myoung Chung</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy</atitle><btitle>2010 IEEE International Conference on Information Theory and Information Security</btitle><stitle>ICITIS</stitle><date>2010-12</date><risdate>2010</risdate><spage>669</spage><epage>673</epage><pages>669-673</pages><isbn>1424469422</isbn><isbn>9781424469420</isbn><eisbn>9781424469437</eisbn><eisbn>1424469430</eisbn><eisbn>1424469414</eisbn><eisbn>9781424469413</eisbn><abstract>In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an organization conducts a baseline approach in information system which has very high value and risk, it could be result in significant harm or damage to an organization. In other case, it will be wasted security budget by spending a cost of detailed risk analysis. So, we presented practical qualitative initial risk analysis using matrix scaling method for selecting appropriate approach. Our method applied evaluation items reflecting business process and qualitative asset value. Our method indicates concrete evaluation method and result by assessing with investment expense, the usage of information system, distribution, security level, safeguard, etc.</abstract><pub>IEEE</pub><doi>10.1109/ICITIS.2010.5689486</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424469422 |
ispartof | 2010 IEEE International Conference on Information Theory and Information Security, 2010, p.669-673 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5689486 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Economics Europe initial risk analysis Production risk analysis Risk management security |
title | Qualitative initial risk analysis for selecting risk analysis approach suitable for IT security policy |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T06%3A05%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Qualitative%20initial%20risk%20analysis%20for%20selecting%20risk%20analysis%20approach%20suitable%20for%20IT%20security%20policy&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Information%20Theory%20and%20Information%20Security&rft.au=Jung-Ho%20Eom&rft.date=2010-12&rft.spage=669&rft.epage=673&rft.pages=669-673&rft.isbn=1424469422&rft.isbn_list=9781424469420&rft_id=info:doi/10.1109/ICITIS.2010.5689486&rft.eisbn=9781424469437&rft.eisbn_list=1424469430&rft.eisbn_list=1424469414&rft.eisbn_list=9781424469413&rft_dat=%3Cieee_6IE%3E5689486%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-6d7de27cf4601c08c5f6d2b6ee03cd2ed6ba21b68ebb90c6b71385dbc636d7f33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5689486&rfr_iscdi=true |