Information security risk management and incompatible parts of organization

Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a n...

Full description

Bibliographic Details
Main Authors: Elham Talabeigi, Seyyed Gholamreza Jalali Naeeini
Format: Article
Language:English
Published: OmniaScience 2016-11-01
Series:Journal of Industrial Engineering and Management
Subjects:
Online Access:http://www.jiem.org/index.php/jiem/article/view/2032
_version_ 1811338502963462144
author Elham Talabeigi
Seyyed Gholamreza Jalali Naeeini
author_facet Elham Talabeigi
Seyyed Gholamreza Jalali Naeeini
author_sort Elham Talabeigi
collection DOAJ
description Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value:  The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.
first_indexed 2024-04-13T18:11:49Z
format Article
id doaj.art-0f880e99f6974441b989ee353312c0be
institution Directory Open Access Journal
issn 2013-8423
2013-0953
language English
last_indexed 2024-04-13T18:11:49Z
publishDate 2016-11-01
publisher OmniaScience
record_format Article
series Journal of Industrial Engineering and Management
spelling doaj.art-0f880e99f6974441b989ee353312c0be2022-12-22T02:35:51ZengOmniaScienceJournal of Industrial Engineering and Management2013-84232013-09532016-11-019496497710.3926/jiem.2032454Information security risk management and incompatible parts of organizationElham Talabeigi0Seyyed Gholamreza Jalali Naeeini1Chabahar International UniversityIran University of Science and TechnologyPurpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value:  The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.http://www.jiem.org/index.php/jiem/article/view/2032Coalitional game theory, Incompatible Parts, Risk management, Security.
spellingShingle Elham Talabeigi
Seyyed Gholamreza Jalali Naeeini
Information security risk management and incompatible parts of organization
Journal of Industrial Engineering and Management
Coalitional game theory, Incompatible Parts, Risk management, Security.
title Information security risk management and incompatible parts of organization
title_full Information security risk management and incompatible parts of organization
title_fullStr Information security risk management and incompatible parts of organization
title_full_unstemmed Information security risk management and incompatible parts of organization
title_short Information security risk management and incompatible parts of organization
title_sort information security risk management and incompatible parts of organization
topic Coalitional game theory, Incompatible Parts, Risk management, Security.
url http://www.jiem.org/index.php/jiem/article/view/2032
work_keys_str_mv AT elhamtalabeigi informationsecurityriskmanagementandincompatiblepartsoforganization
AT seyyedgholamrezajalalinaeeini informationsecurityriskmanagementandincompatiblepartsoforganization