IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis

The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis
View Sample PDF
Author(s): David Rehak (VSB – Technical University of Ostrava, Czech Republic)and Monika Grasseova (University of Defence, Czech Republic)
Copyright: 2012
Pages: 23
Source title: Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment
Source Author(s)/Editor(s): Mustafa Alshawi (University of Salford, UK)and Mohammed Arif (University of Salford, UK)
DOI: 10.4018/978-1-61350-311-9.ch007

Purchase

View The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis on the publisher's website for pricing and purchasing information.

Abstract

The chapter is focused mainly on assessing the factors of the external environment in the area of security of information systems in the organization through SWOT analysis. At first the method is characterized from the viewpoint of its purpose and nature. The emphasis is laid on the principles of SWOT analysis, the possible use of methods and tools, and also the most common problems occurring during the implementation of the analysis. The recommended methodical procedure for the implementation of SWOT analysis is described in another part of the chapter with individual phases and particular activities, which are appropriate to be carried out within these phases. The main part of the chapter is focused on the ways of semi-quantitative assessment of threats to the area of information systems of the organization, while evaluating their risks, and the assessment of opportunities, while evaluating their benefits. Both cases include a detailed description of procedure leading to an objective outcome during the classification of identified threats and opportunities according to the set criteria.

Related Content

Vincent Lennard Kraus. © 2023. 32 pages.
Tlou Maggie Masenya. © 2023. 16 pages.
Arzu Tufan, Gurkan Tuna. © 2023. 30 pages.
Wasswa Shafik. © 2023. 19 pages.
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell. © 2023. 23 pages.
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson. © 2023. 16 pages.
Jorja B. Wright, Darrell Norman Burrell. © 2023. 12 pages.
Body Bottom