Information Technology Risk Management Using Frap (A Case of Insurance Company)

Article Preview

Abstract:

The purpose of this study was to determine how the application of information technology and the risks of what might happen. Research methods used include literature studies, field studies by conducting observations, interview and study documentation. The approach used to conduct risk management of information technology is a method of Facilitated Risk Analysis Process (FRAP). The results are the discovery of the risks of using information technology. The conclusions of this study demonstrate the application of information technology is good enough because it takes only a little improvement in information technology risk management.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

857-860

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Fern, G. (2009). Don't Risk IT. The British Journal of Administrative Management. ISSN : 13535188.

Google Scholar

[2] Hughes, G. (2006). Five Steps to IT Risk management Best Practices. Risk Management, 53 (7), 34.

Google Scholar

[3] Kumsuprom.S., Corbitt.B., Pittayachawan.S., (2008). ICT Risk management in Organization : Case Studies in Thai Business, journal: 19th Australian Conference on Information system.

Google Scholar

[4] Masing, E. (2009). Tehnical Support : Improving Performance and Reduing Costs With IT Risk Management. Risk Management Vol 56, Iss. 8, ISSN : 00355593.

Google Scholar

[5] Pate-Cornell, E., Deleris, L. A. (2009). Failure Risks in The Inurance Industry : A Quantitative System Analysis. Risk and Management and Insurance Review, Vol 12, No. 2, 199-212, ISSN : 10981616.

DOI: 10.1111/j.1540-6296.2009.01162.x

Google Scholar

[6] Peltier, T. R. (2001). Informartion Security Risk Analysis 2nd Edition. Auerbach/CRC Press Release, Washingon D. C.

Google Scholar

[7] Purtell, T. (2007). A New View on IT Risk. Risk Management Vol 54, Iss. 10, ISSN : 00355593.

Google Scholar

[8] Rot. A (2009) Enterprise Information Technology Security: RIsk management perspective, Journal : Proceedings of the World Congress on Engineering and Computer Science 2009. Vol 2, ISBN: 978-988-18210-2-7.

Google Scholar

[9] Slay, J. & Koronios, A. (2006). Information Techology Security and Risk Management 3rd Edition. John Wiley & Sons Australia, Ltd, Australia.

Google Scholar

[10] Spremic.M., Popovic.M. (2008). Emerging Issue in IT Governance : implementing the corporate IT risk management model, journal : Wseas transaction on system. VOl. 7, issue 3, ISSN : 1109-2777.

Google Scholar

[11] Zhou, Xia & Xue, Ling. (2009). A Framework of Using Captive Insurance to Streamline IT Control and Compliance. Journal of Information Privacy and Security. ISSN : 15536548.

Google Scholar