{"title":"IT风险系统化","authors":"Georg Disterer","doi":"10.4236/jis.2019.104013","DOIUrl":null,"url":null,"abstract":"IT \nrisks—risks associated with the operation or use of information technology—have \ntaken on great importance in business, and IT risk management is accordingly \nimportant in the science and practice of information management. Therefore, it \nis necessary to systematize IT risks in order to plan, manage and control for \ndifferent risk-specific measures. In order to choose and implement suitable \nmeasures for managing IT risks, effect-based and cause-based \nprocedures are necessary. These procedures are explained in detail for IT \nsecurity risks because of their special importance.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Systematizing IT Risks\",\"authors\":\"Georg Disterer\",\"doi\":\"10.4236/jis.2019.104013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IT \\nrisks—risks associated with the operation or use of information technology—have \\ntaken on great importance in business, and IT risk management is accordingly \\nimportant in the science and practice of information management. Therefore, it \\nis necessary to systematize IT risks in order to plan, manage and control for \\ndifferent risk-specific measures. In order to choose and implement suitable \\nmeasures for managing IT risks, effect-based and cause-based \\nprocedures are necessary. These procedures are explained in detail for IT \\nsecurity risks because of their special importance.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/jis.2019.104013\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2019.104013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IT
risks—risks associated with the operation or use of information technology—have
taken on great importance in business, and IT risk management is accordingly
important in the science and practice of information management. Therefore, it
is necessary to systematize IT risks in order to plan, manage and control for
different risk-specific measures. In order to choose and implement suitable
measures for managing IT risks, effect-based and cause-based
procedures are necessary. These procedures are explained in detail for IT
security risks because of their special importance.