Javascript must be enabled to continue!
Current challenges in information security risk management
View through CrossRef
Purpose
– The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results.
Design/methodology/approach
– To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases. The challenges have been identified based on literature surveys and industry feedback.
Findings
– As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs. cost trade-offs. The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need.
Originality/value
– The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management. Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way. Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs.
Title: Current challenges in information security risk management
Description:
Purpose
– The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems.
Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results.
Design/methodology/approach
– To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases.
The challenges have been identified based on literature surveys and industry feedback.
Findings
– As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs.
cost trade-offs.
The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need.
Originality/value
– The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management.
Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way.
Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs.
Related Results
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Abstract. Introduction. The article examines the place of personnel security as a component of the system of economic security at enterprises. The main approaches to the formation ...
The influence of logistics management on food security in Ghana
The influence of logistics management on food security in Ghana
Research problem warehouse
Food insecurity has been reported to be increasing in Ghana despite recent government logistics infrastructure (warehouses) efforts. It is important to u...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
TOOLS OF ECONOMIC DIPLOMACY IN ENSURING FOOD SECURITY
TOOLS OF ECONOMIC DIPLOMACY IN ENSURING FOOD SECURITY
Purpose. The aim of the article is to study the role of tools of economic diplomacy in ensuring food security, identification of effective measures that contribute to the stability...
GERMANY'S SECURITY MANAGEMENT IN THE LIGHT OF THE INTEGRATED SECURITY – CURRENT STATE AND PROSPECTS
GERMANY'S SECURITY MANAGEMENT IN THE LIGHT OF THE INTEGRATED SECURITY – CURRENT STATE AND PROSPECTS
In June 2023, the Federal Government of Germany presented the first national security strategy (NSS). The NSS promotes Integrated Security as a new foreign and security policy. How...

