Você está na página 1de 8

A framework for integrated risk management in

information technology

Kakoli Bandyopadhyay
Assistant Professor, Department of Information Systems and Analysis,
Lamar University, Beaumont, Texas, USA
Peter P. Mykytyn
Professor, Department of Information Systems and Management Sciences,
University of Texas at Arlington, Arlington, Texas, USA
Kathleen Mykytyn
Doctoral Student, Department of Computer Information Systems and
Quantitative Analysis, University of Arkansas, Fayetteville, Arkansas, USA

Keywords example, Vitale (1986) has proposed a frame-


Information technology, Introduction work for identifying the strategic risks of IT.
Monitoring, Risk,
Risk management Business organizations annually invest hun- Rainer et al. (1991) have proposed a risk
dreds of billions of dollars in information analysis process for IT by combining quali-
Abstract technology (IT) (Barua et al., 1995). Spending tative and quantitative methodologies. Epich
The use of information technology
on IT accounts for almost a third of all and Persson (1994) have proposed a disaster
(IT) in organizations is subject to
various kinds of potential risks. expenditures and is the largest single item in recovery plan to reduce IT risks by metho-
Explores the environment of IT in the capital spending budget of US corpora- dically restituting business functions in the
organizations, identifies the prob- tions (Schnitt, 1993). Investment in IT event of a disaster. Eloff et al. (1993) have
able threats, and proposes a fra-
(exclusive of the amount spent on software) addressed the issue of risk monitoring to
mework for integrated risk
management. The risk manage- equals nearly half the spending on equipment ensure effective implementation of risk-con-
ment process has four major com- (Zuckerman, 1994). trol measures.
ponents risk identification, risk As spending on IT rises steeply, organiza- The purpose of our paper is to develop a
analysis, risk-reducing measures,
tions become increasingly technology-depen- framework for integrated risk management
and risk monitoring. The frame-
work can be used to guide organi- dent and, consequently, they become highly in IT. The framework includes the four major
zations in reducing the losses vulnerable to the risks of IT failure. There- risk-management components:
resulting from the realization of fore, IT risk-management is one of the 1 risk identification,
threats to IT use.
important issues facing information systems 2 risk analysis,
(IS) executives today. 3 risk-reducing measures, and
The objective of IT risk management is to 4 risk monitoring.
protect IT assets such as data, hardware,
software, personnel and facilities from all The framework does not emphasize any one
external (e.g. natural disasters) and internal particular component of the risk manage-
(e.g. technical failures, sabotage, unauthor- ment process but concentrates on the
ized access) threats so that the costs of losses sequential linkage of the four components to
resulting from the realization of such threats make up the entire system of IT risk man-
are minimized (Gottfried, 1989). The purpose agement. This approach is an improvement
is to avoid or lessen losses by selecting and over other approaches (that address one or
implementing the best combination of secur- more of the components in an isolated
ity measures (Rainer et al., 1991). manner), because it should enable managers
Four major components of risk manage- to smoothly move from one component to
ment have been identified in the literature another by identifying and understanding
(Rainer et al., 1991; Eloffr et al., 1993; Epich the possible courses of action in the different
and Persson, 1994; Lightle and Sprohge, 1992; steps. Thus, our framework should provide
Lochr et al., 1992; Vitale, 1986): IT managers with a comprehensive view of
1 risk identification, their overall risk management situation
2 risk analysis, (depicted in Figure 1).
3 risk-reducing measures, and The various elements of the integrated IT
4 risk monitoring
risk management framework are presented
Management Decision Frameworks that are currently available are in the rest of the paper. Following the
37/5 [1999] 437444 not comprehensive in that they describe only framework, managerial implications are dis-
# MCB University Press some subsets of these four major components cussed. Suggestions for future research are
[ISSN 0025-1747]
of the IT risk management process. For also made.
[ 437 ]
Kakoli Bandyopadhyay, There are potential risks associated with the
Peter P. Mykytyn and A framework for integrated IT risk deployment of IT at all three levels. The
Kathleen Mykytyn management different types of IT risks at various levels
A framework for integrated
risk management in The framework, integrating the four sequen- are summarized in Table I.
information technology tial steps of:
Management Decision 1 risk identification, Application level
37/5 [1999] 437444
2 risk analysis, The application level concentrates on the
3 risk-reducing measures, and risks of technical or implementation failure
4 risk monitoring, of IT applications. Such risks may arise from
both internal and external sources (Rainer
is presented in Figure 1. The application of
et al., 1991). External threats are:
this framework should take place as early as . natural disasters,
the planning stage of systems development . acts of competitors,
and continue throughout the development . hackers, and
process. A sequential, in-depth discussion of . computer viruses.
the specific elements in the proposed frame-
work is presented next. Internal threats to IT assets may come from
either authorized or unauthorized physical
access leading to system abuse. These threats
Risk identification can damage or destroy IT assets such as
hardware, software, data, personnel, and
Risk management for IT begins with the risk facilities.
identification process, which allows organi- An empirical study (Loch et al., 1992) on
zations to determine early the potential computer security reveals that, at the appli-
impact of the realization of internal and cation level, IS managers consider natural
external threats on the entire IT environ- disasters and employee accidental actions to
ment. The first step toward risk identifica- represent the greatest level of risk. They also
tion is to define the IT environment. The IT view the mainframe-computing environment
environment consists of three levels: to be more secure than the microcomputer
1 the application level, environment.
2 the organizational level, and
3 the interorganizational level. Organizational level
At the organizational level, the focus is on the
Figure 1 impact of IT throughout all functional areas
A framework for integrated IT risk management of the organization rather than on any
isolated application. Businesses are increas-
ingly deploying IT at the organizational level
to achieve competitive advantage. Recent
studies (Barua et al., 1995) indicate that the
impact of IT is positive on capacity utiliza-
tion, inventory turnover, and product quality
at the organization level. Examples of cases
of strategic information systems (SIS) that
have positively affected the performance at
the organization level include Merrill
Lynch's Cash Management Account (CMA),
American Hospital Supply's ASAP order
entry system, and American Airlines'
SABRE reservation system (Kemerer and
Sosa, 1991).
The growing reliance on IT to obtain
strategic benefits for the organization can
make the organization subject to various
types of risks. A major study of strategic
risks of IS was conducted by Vitale (1986). He
collected several examples from field work,
the trade and business press, and consulting
work to show how an initial IS success could
eventually contribute to a firm's failure. An
organization investing heavily in IT may
have to continue doing so in order to remain
viable. If the organization cannot commit
[ 438 ]
Kakoli Bandyopadhyay, Table I
Peter P. Mykytyn and Overview of risk identification process
Kathleen Mykytyn
A framework for integrated IT environment Type of risk
risk management in
information technology Application level Natural disasters
Management Decision Competition
37/5 [1999] 437444 Hackers
Viruses
Data security risk: destruction of/denial of access to vital data
Organizational level Strategic/sustainability risk: lack of continuous IT investment to sustain competitive
advantage
Data security risk: destruction of/denial of access to vital data
Legal risk: violation of competitors' and customers' rights through use of IT
Suppliers' and customers' increased bargaining power owing to acquisition of skills
from company-provided IT expertise
Interorganizational Data security risk: destruction of/denial of access to vital data
level Natural disasters
Hackers
Weak and ineffective control

itself to continually invest in upgrading antitrust laws because its successful use of
rapidly changing technology, it may become strategic information systems (the SABRE
vulnerable to competitors with more re- reservation system) led to competitors'
sources. Many organizations provide IT tools claims of unfair practice. On another occa-
and expertise to suppliers and customers as sion, Dun & Bradstreet was held liable for an
an integral part of the total business devel- erroneous credit report on a construction
opment. In the process, however, suppliers contractor (Lightle and Sprohge, 1992).
and customers may acquire enough skills to
enhance their bargaining power. Also, docu- Interorganizational level
menting and maintaining strategic IT appli- Here, the focus is on the IT risks of organi-
cations may take more time and effort than zations operating in a networked environ-
the benefits gained. This may eventually ment.
make an organization concentrate more on The most striking and powerful uses of IT
IT and neglect its core business (Vitale, 1986). today involve networks that surpass organi-
Another study by Lightle and Sprohge
zational boundaries. These are automated IS
(1992) identified three types of organizational
shared by two or more organizations. Recent
risks from the internal auditors' perspective:
growth in the use of these interorganiza-
1 sustainability risk,
tional systems (IOS) has contributed to
2 data security risk, and
3 legal risk. increased productivity, flexibility, and com-
petitiveness (Cash et al., 1992). Examples of
The sustainability risk refers to the risk IOS include inter-corporate electronic mail
associated with the sustainability of com- systems, electronic data interchange (EDI)
petitive advantage from the deployment of IT systems permitting buyers and suppliers to
applications on a long-term basis. In the exchange standardized business documents
beginning, the benefits accrued from IT electronically, and inter-corporate electronic
applications enable firms to outperform their graphics data interchange of engineering
rivals. The competitive edge is, however,
documentation (Riggins et al., 1994). Inter-
often short-lived because the competitors are
organizational systems bear a tremendous
eventually able to imitate all IT applications.
impact on the competitive environment by
The data security risk arises from the
improving efficiencies and economies of
strategic use of data within an organization.
Organizations have become largely depen- scale in production and distribution through
dent on data for their survival and success tying EDI and just-in-time (JIT) inventory
amidst intense competition. They run the management together, reducing cost through
risk of incurring substantial losses from the electronic purchasing and ordering, and
denial of access to, or destruction of their adding value to products and services (Cash
data. Finally, the legal risk refers to the et al., 1992). For example, firms such as Levi
probability of loss due to violation of the Strauss (apparel manufacturer), K-Mart (dis-
rights of competitors and customers through count retailer), Supervalue (grocery retailer),
the use of IT. For example, American Air- and Bergen Brunswig (pharmaceutical
lines was charged with the violation of wholesaler) have significantly reduced their
[ 439 ]
Kakoli Bandyopadhyay, inventory holding costs through the use of metrics, and survey questionnaires (Rainer
Peter P. Mykytyn and EDI (Premkumar et al., 1994). et al., 1991).
Kathleen Mykytyn The Delphi technique can be used for both
A framework for integrated When organizations operate in a net-
risk management in worked environment, IT plays an important quantitative and qualitative risk analysis
information technology role in enhancing interfirm relationships. At (Rainer et al., 1991). This technique is used
Management Decision the same time, the IT risks of organizations along with other methodologies to obtain a
37/5 [1999] 437444
compound. A study by Lightle and Sprohge general agreement among managers regard-
(1992) noted that the data security risk of a ing estimated value of IT assets as well as
distributed environment was high. Loch probability estimates for the realization of
et al. (1992) indicate that most managers view various threats.
the external environment to represent the Rainer et al. (1991) have proposed a
greatest level of risk. The top three threats methodology combining quantitative and
for the networked environment are: qualitative approaches to risk analysis. This
1 natural disasters, method suggests employing a value chain
2 intrusion by computer hackers, and analysis for determining the risks inherent
3 weak and ineffective control. in alternative uses of IT. The authors assert
that this combination method is more effec-
Much of the scant empirical research on IT tive than any single method because of its
risk management has addressed IT risks only flexibility in considering a wide variety of IT
at the application level. This comes from an assets, all possible threats, and vulnerabil-
isolated, partial view of the impact of IT. ities.
Today, this closed world assumption of We have not digressed into a detailed
searching only within a specific domain to explanation of all the risk analysis
evaluate the risks associated with IT is methodologies as these have been adequately
unrealistic. It is necessary to adopt a holistic reported in the literature. There is little
view and assess potential threats to IT by empirical evidence to establish the super-
considering the entire spectrum of the IT iority of one risk analysis method over
environment. As the overall impact of IT another. The literature (March and Shapira,
pervades the organization and its environ- 1987) indicates that many organizations deal
ment, IT risk management should focus on IT with risk depending on their managers'
risks at all three levels: perception of and attitude toward risk. These
1 application, organizations employ countermeasures
2 organizational, and depending on the perceived importance of IT
3 interorganizational. risks and do not employ any structured
method to measure the overall IT risks.
Following the identification of the IT envir-
March and Shapira (1987) found that the
onment and the associated IT risks, the
perceptions of risk actually held by managers
related vulnerabilities of IT assets need to be were much different from the theoretical
determined. This provides the basis on which concepts of risk which involved estimating
risk management decisions are made. the probabilities of possible outcomes and
choosing from among alternative actions.
Managers were mostly unaffected by prob-
Risk analysis ability estimates of possible outcomes. Most
Several methodologies are currently avail- managers did not consider uncertainty of
able to comprehend and fathom the extent of possible outcomes as a significant risk. To
losses of IT assets from the realization of them, a risky choice was one that might have
internal and external threats identified in the a negative outcome. Managers were more
previous section. These methodologies are concerned about the volume of risk than the
probability of loss. The procedures for ana-
categorized as quantitative, qualitative, or a
lyzing IT risks are summarized in Table II.
combination of both.
Quantitative approaches to risk analysis
are based on expected value analysis, i.e.
they assign dollar values to the various risks Risk-reducing measures
using probability theory. These methodolo- Implementing measures to reduce IT risks is
gies include annualized loss expectancy the third phase in our proposed risk man-
(ALE), the Courtney method, and the Liver- agement framework (Figure 1). Once the IT
more risk analysis methodolgy (LRAM) assets and the many different threats to
(Rainer et al., 1991). which they are exposed are identified and the
Qualitative approaches use descriptive related vulnerabilities assessed, necessary
variables for analyzing IT risks. These ap- steps should be taken to ensure that the
proaches include scenario analysis, Fuzzy entire IT environment is protected from all
[ 440 ]
Kakoli Bandyopadhyay, Table II
Peter P. Mykytyn and Overview of risk analysis process
Kathleen Mykytyn
A framework for integrated Risk analysis approaches Procedures
risk management in
information technology Quantitative approaches Expected value analysis
Management Decision Annualized loss expectancy (ALE)
37/5 [1999] 437444 Courtney method
Livermore risk analysis methodology (LRAM)
Qualitative approaches Scenario analysis
Fuzzy metrics
Survey questionnaires
Combined quantitative and qualitative approaches Delphi technique
Value chain analysis

sources of threats to the greatest extent developing and maintaining an effective


possible. The various security measures that written plan of how organizations will con-
may be implemented to mitigate different tinue to operate in the event of interruptions
types of risks are discussed here. The mea- of business functions'' (Andrews, 1990).
sures for reducing IT risks are summarized Several researchers have explicitly
in Table III. addressed the value-added capabilities that a
DRP offers to an organization. According to
Measures for reducing losses from natural Toigo (1992), a DRP offers an organization the
disasters security and integrity of its data processing
An investigative study by Loch et al. (1992) capability. Epich and Persson (1994) assert
indicated that at both application and inter- that a DRP ensures the protection of initial
organizational levels, IS managers consid- business assets and the methodical restitu-
ered natural disasters to represent the tion of business functions in the event of a
greatest level of risk. Many researchers (see disaster. Thus, a DRP can help an organiza-
Epich and Persson, 1994; Toigo, 1992) have tion considerably in avoiding major business
emphasized the importance of disaster losses such as duration of business interrup-
recovery planning by drawing attention to tions, lost revenue, lost customers, and lost
the positive correlation between the like- market share.
lihood of an organization's full recovery from Disaster recovery planning can also reduce
a disaster and the existence of a disaster losses that indirectly affect an organization's
recovery plan (DRP). Disaster recovery performance in the event of a disaster.
planning has been defined as ``the process of These losses come from employee stress,
legal exposure, insurance premiums, and
Table III customer dissatisfaction. A DRP helps
Overview of risk reducing process generate awareness among employees about
the after-effects of a disaster. This con-
Type of risk Risk-reducing measures sciousness helps employees better prepare
Natural disasters Disaster recovery plan (DRP) for a disaster and leaves them ready to face
Data security risks Backup files the aftermath (Epich and Persson, 1994).
Password control Thus, disaster recovery planning can reduce
Access codes the level of employee stress. In many
Fingerprinting organizations, a DRP is installed to reduce
Palm printing legal risks (Toigo, 1992). In many industries,
Hand geometry legal requirements mandate the installation
Retinal screening of a DRP. For example, national banks in the
Voice recognition USA must comply with the 1983 Banking
Data encryption Circular 177 (BC-177), which states that banks
Call-back modems must develop the means to reduce the impact
Computer viruses Monitoring computer usage and/or risk of losing data processing support
Stringent audit procedures (Toigo, 1992). The circular holds managers
Employee education legally liable for a bank's failure that is due
Use of company-provided software only to insufficient preparedness to face a com-
Virus-scanning and virus-removing software puter outage. Existence of a DRP can reduce
Strategic risks Patent protection insurance premiums for business interrup-
Innovative search for new ways to compete tion coverage. An adequate DRP ensures
Formal planning and control procedures
return to an acceptable level of operation in
Legal risks Expert consultants to reduce legal risks
the least possible time. This enables firms to
[ 441 ]
Kakoli Bandyopadhyay, provide uninterrupted service to customers. Measures for reducing strategic risks
Peter P. Mykytyn and The continuity of customer service provides Strategic risks arise mainly from an organi-
Kathleen Mykytyn
A framework for integrated greater customer satisfaction. zation's inability to sustain its competitive
risk management in advantage from the use of IT. Vitale (1986)
information technology Measures for reducing data security risks posits that the first step toward managing
Management Decision Data security risks may arise from author- strategic risks is to understand them. The
37/5 [1999] 437444
ized or unauthorized access to IT assets in key to understanding strategic risks is
either a stand-alone or a networked environ- dependent on an organization's ability to
ment. Even authorized access may pose a foresee the long-term benefits from a new
potential risk in the form of sabotage. For a system, assess the resources and capabilities
stand-alone system, data security can be of its potential competitors, assess its own
improved by generating backup files, and financial and technical strengths, and align
introducing password control and access its IT strategy with its overall business
codes (Bidgoli and Azarmsa, 1989). Some strategy.
other ways of restricting IT access to Once an organization has carefully
authorized users are fingerprinting, palm- assessed its strategic risks, appropriate
printing, signature analysis, hand geometry, measures can be taken to reduce them. Two
retinal screening, and voice recognition such measures have been suggested by Day
(Loch et al., 1992; Fried, 1993; Bidgoli and (1984). The first measure is patent protection.
Azarmsa, 1989). Fingerprinting requires the Patent protection hinders competing firms
matching of a user's fingerprints against a from copying the system, which provides a
template that contains his fingerprints before competitive edge. The second measure is to
gaining IT access. Palm-printing entails indulge in an innovative search for new ways
scanning of the palm for identification. to compete. Support and commitment from
Hand geometry electronically compares the the top is also essential for an organization
characteristics of the user's hand such as facing exposure to strategic risks (Vitale,
finger length and thickness against 1986). Additionally, formal planning and
information stored in the computer. Retinal control techniques, the use of external
screening involves scanning of the pattern of consultants, or a steering committee can help
the blood vessels in the back-of-the-eye retina a firm to mitigate strategic risks (Ahituv
to compare with a pre-stored picture. Voice et al., 1994).
recognition matches the user's voice with the
voice pattern stored on templates. In the Measures for reducing legal risks
event of sabotage by an authorized user, Organizations deploying IT for competitive
these measures are effective in tracking advantage can also face legal risks due to
possible violation of anti-trust laws and
down the saboteur.
In a networked environment, data encryp- violation of privacy (Lightle and Sprohge,
1992) as explained before. Policies and pro-
tion and call-back modems offer effective
cedures should be created to promote the
security measures (Fried, 1993). Encryption
understanding of potential legal risks. This
involves the encoding of plain text into
understanding will encourage organizations
unreadable scrambled text during transmis-
to obtain help from legal experts to design
sion. Many companies have built crypto-
controls to subdue such risks (Lightle and
graphic protection for protecting data
Sprohge, 1992).
passing across networks. For example,
General Motors uses ANSI X.9 cryptography
to protect data passing through its EDI net-
work (Fried, 1993). A call-back modem con- Risk monitoring
firms the authenticity of a user trying to gain The risk monitoring component of IT risk
access by calling him back. management is an additional layer to safe-
guard the IT environment. Active risk mon-
Measures for reducing risks from computer itoring ensures that effective counter-
viruses measures to control risks are appropriately
Several measures to prevent infection from implemented (Eloff et al., 1993). The results of
computer viruses are available. These implementing risk-reducing measures are
include the use of passwords, back-up pro- evaluated to determine if the expectation that
cedures, employee education, consistent risk management reduces loss is met. Then,
security policies, use of company-provided appropriate adjustments must be made so
software, use of virus-scanning and virus- that the organization remains prepared
removing software, stringent audit pro- against the exposure to risks. Thus, risk
cedures, and monitoring of computer usage monitoring not only evaluates the perfor-
(Loch et al., 1992). mance of risk-reducing measures but also
[ 442 ]
Kakoli Bandyopadhyay, serves as a continuing audit function. A Consequently, their perception of risk is
Peter P. Mykytyn and number of audit tools, such as computer affected by factors such as mood and feelings
Kathleen Mykytyn assisted audit tools and techniques (CAATT),
A framework for integrated making the measurement of risk very sub-
risk management in and measurement tools for tracking Web jective. The implication is that IS managers
information technology sites (On Technology Corporation's Audit- must change their way of thinking about
Management Decision Track, Tucows Interactive Limited's Net- risk. Managers must be encouraged to take
37/5 [1999] 437444
Gravity, etc.) are being used for auditing three major steps: first, they must recognize
(Gascoyne, 1993; Dryden, 1995). The com- the concept of risk at all three levels
monly used procedures for IT risk monitor- application, organizational, and interorgani-
ing are summarized in Table IV. zational; second, they must undergo training
in decision theory approaches to risk man-
agement; and third, they must actively par-
Managerial implications ticipate in the estimation of their
organization's overall IT risk. Without a
Even though IT risk management is one of
change in the managers' orientation, it
the important issues facing IS executives,
becomes extremely difficult to persuade them
most organizations do not have a tested and
to adequately invest in IT security measures.
up-to-date risk management method (Rainer
Managers must thoroughly comprehend the
et al., 1991; Vitale, 1986). Since organizations
value of their IT assets, IT risks at different
are increasingly becoming technology-
levels, and the related vulnerabilities of IT
dependent, they are also becoming more
assets to these various risks. This under-
vulnerable to IT threats. Thus, it behoves
standing of the overall impact of IT risks on
organizations to perform their risk analyses
the entire organization and its environment
correctly, determine the risk level, and take
will provide management with a foundation
measures accordingly. The framework
for substantial and prudent investment in the
described in this paper is designed to provide
IT risk management process.
IS managers with an integrated systems view
of all the major issues involved in the
identification and analysis of risks and the
implementation and control of risk-reducing Considerations for future research
measures. The presentation of this ``whole The proposed integrated IT risk management
picture'' (Figure 1) should enable managers framework can lead to research in several
to relate the different components of the risk important directions in the future.
management process with one another and Researchers can examine whether managers
understand the contents of each component using this framework:
(summarized in Tables I-IV). 1 develop a greater degree of awareness for
Risk identification and analysis should the impact of IT risks on the organization
precede any risk management decisions. and its environment;
Our framework should help organizations 2 adequately invest in IT risk management
become more aware of their dependence on methods; and
the reliable functioning of IT by identifying 3 are actually able to manage their IT risks
the potential threats from all external and better or more effectively than others.
internal sources. Without such awareness,
firms would not be convinced about their Without more research in these areas, most
susceptibility to these threats and the value of the risk management-related problems
of implementing risk-reducing measures for discussed in this paper will not be solved. At
their continued operations and eventual the same time, management will continue to
survival. remain skeptical about investing in a com-
The difficulty arises from the inability of prehensive risk management program.
most managers to conceive risk from a
decision theory perspective (March and References
Ahituv, N., Neumann,S. and Riley, H.N. (1994),
Shapira, 1987). Managers generally do not
Principles of Information Systems for
rely on precise probability estimates.
Management, 4th ed., Wm C. Brown Commu-
nications, Inc., Dubuque, IA.
Table IV Andrews, W.C. (1990), ``Contingency planning
Overview of risk monitoring process for physical disasters'', Journal of Systems
Activities Procedures Management, pp. 28-32.
Barua, A., Kriebel, C.H. and Mukhopadhyay, T.
Ensuring risk-preparedness of Implementation of appropriate risk-reducing measures
(1995), ``Information technologies and busi-
firm
ness value: an analytical and empirical in-
Continuing audit functions Measurement tools for tracking Web sites vestigation'', Information Systems Research,
Computer assisted audit tools and techniques (CAATT) Vol. 6 No. 1, pp. 3-23.

[ 443 ]
Kakoli Bandyopadhyay, Bidgoli, H. and Azarmsa, R. (1989), ``Computer Lightle, S. and Sprohge, H. (1992), ``Strategic
Peter P. Mykytyn and security: new managerial concern for the information system risk'', Internal Auditing,
Kathleen Mykytyn 1980s and beyond'', Journal of Systems pp. 31-6.
A framework for integrated
risk management in Management, pp. 21-7. Loch, K.D., Carr H.H. and Warkentin, M.E. (1992),
information technology Cash, J.I., McFarlan, F.W., McKenney, J.L. and ``Threats to information systems: today's
Management Decision Applegate, L.M. (1992), Corporate Information reality, yesterday's understanding'', MIS
37/5 [1999] 437444 Quarterly, Vol. 16 No. 2, pp. 173-86.
Systems Management, Irwin, Inc., Homewood,
March, J.G. and Shapira, Z. (1987), ``Managerial
IL.
perspectives on risk and risk taking'',
Day, G.S. (1984), Strategic Market Planning: The
Management Science, Vol. 33 No. 11,
Pursuit of Competitive Advantage, West
pp. 1404-18.
Publishing Company, St Paul, MN. Premkumar, G., Ramamurthy, K. and Nilkanta, S.
Dryden, P. (1995), ``Managers beef up network (1994), ``Implementation of electronic data
security with AuditTrack'', Computerworld, interchange: an innovation diffusion per-
Vol. 29 No. 16, pp. 53-5. spective'', Journal of Management
Eloff, J.H.P., Labuschagne L. and Badenhorst, Information Systems, Vol. 11 No. 2, pp. 157-86.
K.P. (1993), ``A comparative framework for Rainer, R.K., Snyder, C.A. and Carr, H.H. (1991),
risk analysis methods'', Computers & ``Risk analysis for information technology'',
Security, Vol. 12 No. 6, pp. 597-603. Journal of Management Information Systems,
Epich, R. and Persson, J. (1994), ``A fire drill for Vol. 8 No. 1, pp. 129-47.
business'', Information Strategy: The Execu- Riggins, F.J., Kriebel, C.H. and Mukhopadhyay,
tive's Journal, pp. 44-7. T. (1994), ``The growth of interorganizational
Fried, L. (1993), ``Distributed information systems in the presence of network external-
security'', Information Systems Management, ities'', Management Science, Vol. 40 No. 8,
pp. 984-98.
pp. 56-65.
Schnitt, D.L. (1993), ``Reengineering the
Gascoyne, R.J.N. (1993), ``Information technology:
organization using IT'', Journal of Systems
CAATTs it if you can'', Singapore Accountant,
Management, pp. 14-23.
Vol. 9 No. 6, p. 19.
Toigo, J.W. (1992), Disaster Recovery Planning:
Gottfried, I.S. (1989), ``When disaster strikes'',
Managing Risk and Catastrophe in
Journal of Information Systems Management, Information Systems, Yourdan Press Comput-
pp. 86-9. ing Services, Prentice-Hall, Englewood Cliffs,
Kemerer, C.F. and Sosa, G.L. (1991), ``Systems NJ.
development risks in strategic information Vitale, M.R. (1986), ``The growing risks of infor-
systems'', Information & Software mation systems success'', MIS Quarterly,
Technology, Vol. 33 No. 3, pp. 212-23. Vol. 10 No. 4, pp. 327-34.

Application questions
2 What is your organization's risk manage-
1 Are information technology decisions in ment plan? Are there any areas which you
organizations best taken by IT specialists think might need addressing based on the
or general managers, or a combination of authors' arguments/discussions?
the two?

[ 444 ]

Você também pode gostar