An Information System Risk Management of a Higher Education Computing Environment
How to cite (IJASEIT) :
J. S. Suroso and M. A. Fakhrozi, “Assessment of Information System Risk Management with Octave Allegro at Education Institution,” in Procedia Computer Science, 2018, vol. 135, pp. 202-213. doi: 10.1016/j.procs.2018.08.167.
G. Strupczewski, “Defining cyber risk,” Safety Science, vol. 135, no. December 2020, 2021, doi: 10.1016/j.ssci.2020.105143.
S. A. Talesh, “Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as ‘Compliance Managers’ for Businesses,” Law & Social Inquiry, vol. 43, no. 2, pp. 417-440, 2018.
P. J. O. Management Studies Kuzmenko, O. v Kubí¡lek, J. Bozhenko, V. v Kushneryov, and I. Vida, “An Approach to Managing Innovation to Protect Financial Sector Against Cybercrime,” vol. 24, no. 2, 2021, doi: 10.17512/pjms.2021.24.2.17.
H. Tao et al., “Economic perspective analysis of protecting big data security and privacy,” Future Generation Computer Systems, vol. 98, pp. 660-671, 2019, doi: 10.1016/j.future.2019.03.042.
D. K. Citron and D. Solove, “Risk and Anxiety : A Theory of Data Breach Harms,” Texas Law Review, vol. 96:737, 2018.
M. Setapa, M. Mamat, H. A. Bakar, S. N. S. Yusuf, and S. Kazemian, “Enterprise Risk Management: Impact on Performance of Private Higher Educational Institutions In Malaysia,” Polish Journal of Management Studies, vol. 22, no. 1, pp. 485-501, 2020, doi: 10.17512/pjms.2020.22.1.31.
C. Joshi and U. Kumar, “Information security risks management framework - A step towards mitigating security risks in university network,” Journal of Information Security and Applications, vol. 35, pp. 128-137, 2017, doi: 10.1016/j.jisa.2017.06.006.
L. Paoli, J. Visschers, and C. Verstraete, “The impact of cybercrime on businesses : A novel conceptual framework and its application to Belgium,” Crime, Law and Social Change, 2018.
W. Sardjono, E. Selviyanti, W. G. Perdana, and Maryani, “Modeling of development of performance evaluation on health information systems implementation,” in Journal of Physics: Conference Series, Mar. 2020, vol. 1465, no. 1. doi: 10.1088/1742-6596/1465/1/012025.
T. Hidayat, O. Rukmana, and A. A. Nurrahman, “Design information system of registration and scheduling information laboratory of information systems and the decision of Bandung Islamic University,” in Journal of Physics: Conference Series, Feb. 2020, vol. 1469, no. 1. doi: 10.1088/1742-6596/1469/1/012134.
E. Selviyanti and W. Sardjono, “Risk management information systems assessment at the television broadcasting company,” in Journal of Physics: Conference Series, Mar. 2020, vol. 1465, no. 1. doi: 10.1088/1742-6596/1465/1/012016.
T. Žužek, L. Rihar, T. Berlec, and J. KuÅ¡ar, “Standard project risk analysis approach,” Business Systems Research, vol. 11, no. 2, pp. 149-158, Oct. 2020, doi: 10.2478/bsrj-2020-0021.
P. F. de A. Lima and C. Verbano, “Project Risk Management Implementation in SMEs: A Case Study from Italy,” Journal of Technology Management & Innovation, vol. 14, no. 1, 2019, [Online]. Available: http://jotmi.org
H. OÄevÄić, K. Nenadić, K. Å olić, and T. Keser, “The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents,” 2017.
O. v. Kondratyeva, O. A. Kondratyeva, and I. A. Kondratev, “The Risk Management Methodology of the Quality Reducing Process of Enterprise Management Information Systems Service Support,” in IOP Conference Series: Earth and Environmental Science, Mar. 2021, vol. 666, no. 6. doi: 10.1088/1755-1315/666/6/062128.
N. M. S. Algheriani, V. D. Majstorovic, S. Kirin, and V. Spasojevic Brkic, “Risk model for integrated management system,” Tehnicki Vjesnik, vol. 26, no. 6, pp. 1833-1840, Nov. 2019, doi: 10.17559/TV-20190123142317.
T. Karkoszka, “Risk Management System in Metallurgical Production,” Metalurgija, vol. 60, no. 1-2, pp. 133-136, 2021.
W. Zhu and Y. Jia, “The Research on Safety Management Information System of Railway Passenger Based on Risk Management Theory,” in IOP Conference Series: Earth and Environmental Science, Jan. 2018, vol. 108, no. 4. doi: 10.1088/1755-1315/108/4/042067.
B. Irvin Lamarca, “Cybersecurity Risk Assessment of the University of Northern Philippines using PRISM Approach,” in IOP Conference Series: Materials Science and Engineering, Jun. 2020, vol. 769, no. 1. doi: 10.1088/1757-899X/769/1/012066.
A. Amini and N. Jamil, “A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing,” in Journal of Physics: Conference Series, Jun. 2018, vol. 1018, no. 1. doi: 10.1088/1742-6596/1018/1/012004.
P. Foroudi, Q. Yu, S. Gupta, and M. M. Foroudi, “Enhancing university brand image and reputation through customer value co-creation behaviour,” Technological Forecasting and Social Change, vol. 138, pp. 218-227, Jan. 2019, doi: 10.1016/j.techfore.2018.09.006.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).