Risk =
probability * impact
Two conceptualizations of IT risk
IT Risk definition
The potential for an unplanned event involving Information Technology (IT) to threaten an enterprise objective.
4 types of risk
4A Framework: IT Risk from Business Perspective
Availability
Access (confidentiality)
Accuracy (integrity)
Agility
Availability risk
Keeping systems (and their business processes) running. And recovering from interruptions.
Access (confidentiality) risk
Ensuring appropriate access to data and systems, so that the right people have the access they need, the wrong people don’t, and sensitive information is not misused.
Accuracy (integrity) risk
Providing correct, timely, and complete information that meets the requirements of management, staff, customers, suppliers, and regulators.
Agility risk
Being able to make necessary business changes with appropriate cost and speed.
Technical response to malicious codes
Disclosure Strategy, 5 questions
CIO’s Communication of IT Incident with? (IVK)
Managing risks 2 dimensions
2. Downside risk (cost if happens) (tolerable vs. intolerable)
Managing risks 4 strategies
Identity and Access Management (IAM)
Identifying, authenticating, and authorizing people to have access to applications, systems, or networks.
Identity and Access Management (IAM) - 2 types
IT Risk Management: Three Core Disciplines
Create risk governance processes (identify & manage risk)
Create a risk-aware culture
Reduce IT complexity (e.g., spaghetti systems)
Customer Contact Strategies (what to say)
Defensive
Accommodative
Moderation
Image Renewal
Customer Contact Strategies: Defensive Strategy components
Denial (frame that no breach crisis exists)
Excuses (minimize organization’s responsibility)
Customer Contact Strategies: Accommodative Strategy components
Apology (explicitly apologizing)
Remedial action (take steps to repair and control the damage)
Customer Contact Strategies: Moderation Strategy components
Ingratiation (make stakeholders like the organization)
Justification (minimize perceived damage)
Customer Contact Strategies: Image Renewal Strategy components
Correction commitment (reassure stakeholders that firm takes whatever steps are necessary to avoid similar breach incidents in the future)
Stakeholder commitment (reassuring stakeholders that firm is committed to providing the best services and/or product)
Value commitment (reassuring stakeholders that the firm is committed to its core values)
Effect of crisis strategies on stock price change - Highly-reputable firms
None of the customer contact strategies has a significant influence on stock price
Effect of crisis strategies on stock price change - Normal firms
Defensive: Negative but non-significant influence
Accommodative: Negative but non-significant influence
Moderation: Positive influence
Image Renewal: Positive influence