Risk Management In Private Sector

International Journal of Computer Trends and Technology (IJCTT)          
© 2019 by IJCTT Journal
Volume-67 Issue-5
Year of Publication : 2019
Authors : Rahul Reddy Nadikattu
DOI :  10.14445/22312803/IJCTT-V67I5P133


MLA Style:Rahul Reddy Nadikattu"Risk Management In Private Sector" International Journal of Computer Trends and Technology 67.5 (2019):202-207.

APA Style: Rahul Reddy Nadikattu (2019) Risk Management In Private Sector International Journal of Computer Trends and Technology, 67(5), 202-207.

The present study focuses on the critical areas of a typical Information Technology in the Private Sector within the USA that has narrowed down economic and national security assurance within the USA. The process of risk management in the IT Sector within the USA in regards to the structuring and management of risk associated with its strategic planning. Thus the article insights on the role of risk management to meet the success rate. The risk environment of the Private Sector`s IT in the USA is inherently dynamic and complex. Hence articles highlight each component of risk management and its role to overcome the associated risk.

[1] A. Rostami, J. Sommerville, I.L. Wong, and C. Lee, "Risk management implementation in small and medium enterprises in the UK construction industry", Engineering, Co n s t r u c t i o n a n d A r c h i t e c t u r a l Management, 2015, 22, 91-107. https:// doi.org/10.1108/ECAM-04-2014-0057
[2] K.S. Namahoot, and T. Laohavichien, "Assessing the intentions to use internet banking: The role of perceived risk and trust as mediating factors", International Journal of Bank Marketing, 2018, 36, 2, 256-276
[3] T. Aven, "Risk assessment and risk management: review of recent advances on their foundation", 2016, European Journal of Operational Research, 253, 1–13.
[4] T.J. Andersen, "Global Derivatives: A Strategic Risk Management Perspective", Pearson Education, London, 2005
[5] J. Fraser and B. Simkins (Eds.). (2010). "Enterprise risk management: Today`s leading research and best practices for tomorrow`s executives" 2010, 3, John Wiley & Sons. 178
[6] Z. A. Collier, D. DiMase, S. Walters, M.M. Tehranipoor, J.H. Lambert, I. Linkov, "Cybersecurity standards: Managing risk and creating resilience". Computer, 2014, 47(9), 70-76.
[7] G. Stoneburner, A. Goguen, A. Feringa, "Risk management guide for information technology systems". National Institute of Standards and Technology Special Publication, 2001, 800(30)
[8] B. Tiganoaia, A. Niculescu, O. Negoita, M. Popescu, M, "A New Sustainable Model for R i s k M a n a g e m e n t — RiMM". Sustainability, 2019, 11, 1178.
[9] Y. Haimes Yacov, and G. Clyde Chittester. “A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent SCADA Systems.” Journal of Homeland Security and Emergency Management 2.2 (2005).
[10] S. Maserang, "Project Management: Tools & Techniques". MSIS 488: Systems Analysis & Design 2013, (15)

Risk management, IT Department, Risk Factors, Risk Processes