Research Article | Open Access | Download PDF
Volume 67 | Issue 5 | Year 2019 | Article Id. IJCTT-V67I5P133 | DOI : https://doi.org/10.14445/22312803/IJCTT-V67I5P133
Risk Management In Private Sector
Rahul Reddy Nadikattu
Citation :
Rahul Reddy Nadikattu, "Risk Management In Private Sector," International Journal of Computer Trends and Technology (IJCTT), vol. 67, no. 5, pp. 202-207, 2019. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V67I5P133
Abstract
The present study focuses on the critical areas of a typical Information Technology in the Private Sector within the USA that has narrowed down economic and national security assurance within the USA. The process of risk management in the IT Sector within the USA in regards to the structuring and management of risk associated with its strategic planning. Thus the article insights on the role of risk management to meet the success rate. The risk environment of the Private Sector`s IT in the USA is inherently dynamic and complex. Hence articles highlight each component of risk management and its role to overcome the associated risk.
Keywords
Risk management, IT Department, Risk Factors, Risk Processes
References
[1] A. Rostami, J. Sommerville, I.L. Wong, and C. Lee, "Risk management implementation in small and medium enterprises in the UK construction industry", Engineering, Co n s t r u c t i o n a n d A r c h i t e c t u r a l Management, 2015, 22, 91-107. https:// doi.org/10.1108/ECAM-04-2014-0057
[2] K.S. Namahoot, and T. Laohavichien, "Assessing the intentions to use internet banking: The role of perceived risk and trust as mediating factors", International Journal of Bank Marketing, 2018, 36, 2, 256-276
[3] T. Aven, "Risk assessment and risk management: review of recent advances on their foundation", 2016, European Journal of Operational Research, 253, 1–13.
[4] T.J. Andersen, "Global Derivatives: A Strategic Risk Management Perspective", Pearson Education, London, 2005
[5] J. Fraser and B. Simkins (Eds.). (2010). "Enterprise risk management: Today`s leading research and best practices for tomorrow`s executives" 2010, 3, John Wiley & Sons. 178
[6] Z. A. Collier, D. DiMase, S. Walters, M.M. Tehranipoor, J.H. Lambert, I. Linkov, "Cybersecurity standards: Managing risk and creating resilience". Computer, 2014, 47(9), 70-76.
[7] G. Stoneburner, A. Goguen, A. Feringa, "Risk management guide for information technology systems". National Institute of Standards and Technology Special Publication, 2001, 800(30)
[8] B. Tiganoaia, A. Niculescu, O. Negoita, M. Popescu, M, "A New Sustainable Model for R i s k M a n a g e m e n t — RiMM". Sustainability, 2019, 11, 1178.
[9] Y. Haimes Yacov, and G. Clyde Chittester. “A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent SCADA Systems.” Journal of Homeland Security and Emergency Management 2.2 (2005).
[10] S. Maserang, "Project Management: Tools & Techniques". MSIS 488: Systems Analysis & Design 2013, (15)