Event Title

Information Security Risk Management

Session

Information Systems and Security

Description

Through this paper is i would like to address the issue of information security risk management as well as how organizations perceive risk. During the work I did not make any significant difference from how local organizations or companies in Kosovo operate alongside international ones; this is because there is little difference in the way they operate. In Kosovo as well as internationally, organizations are at risk of perhaps the same nature, except for the probability that they may be greater based on the nature of the organization and the global perception that our institutions and organizations have in our country. In addition, this paper will elaborate on the risk management process, the steps and considerations that must be taken into account to consider that proper and necessary information security management is in place. The forms and ways that are considered appropriate risk management practices in the information and security industry will be discussed.

Keywords:

information systems, risk management, management systems

Session Chair

Naim Preniqi

Session Co-Chair

Blerton Abazi

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-550-19-2

Location

Pristina, Kosovo

Start Date

26-10-2019 1:30 PM

End Date

26-10-2019 3:30 PM

DOI

10.33107/ubt-ic.2019.71

This document is currently not available here.

Share

COinS
 
Oct 26th, 1:30 PM Oct 26th, 3:30 PM

Information Security Risk Management

Pristina, Kosovo

Through this paper is i would like to address the issue of information security risk management as well as how organizations perceive risk. During the work I did not make any significant difference from how local organizations or companies in Kosovo operate alongside international ones; this is because there is little difference in the way they operate. In Kosovo as well as internationally, organizations are at risk of perhaps the same nature, except for the probability that they may be greater based on the nature of the organization and the global perception that our institutions and organizations have in our country. In addition, this paper will elaborate on the risk management process, the steps and considerations that must be taken into account to consider that proper and necessary information security management is in place. The forms and ways that are considered appropriate risk management practices in the information and security industry will be discussed.