Essays on Information Assurance Systems and Risk Assessment Model Term Paper

Download full paperFile format: .doc, available for editing

The paper "Information Assurance Systems and Risk Assessment Model" is a brilliant example of a term paper on management. Risk, in case of varied operational decisions, is seen as a focus of single determinants of behavior arising from risk theories. (Stephenson, 2004) Various unresolved contradictions can be reconciled by examining the usefulness of placing risk propensity and risk proportion in a more central role than has been previously recognized through effective risk assessment programs. Based on such analysis, it is believed that the propensity of risk dominates both the actual and perceived characteristics of the situation as a determinant of risk behavior.

(Stephenson, 2004) Such an observation can safely justify the finding that suggests that apart from being central to any and every business or organization, the risk is something that entrepreneurs in general, are averse to. This can be attributed to the fact that at the end of the day, any loss of information has far-reaching implications of its own and is deeply rooted in the genesis of risk-taking and management. Coming back to the issue of the risk-averse nature of businesses in the context of the XYZ organization, the one question we need to ask before proceeding any further is whether a mere risk assessment is enough to act as a strong foundation for resolving all those difficulties arising out of risk management in case of information management and assurance systems. The answer is, no.

And more and more organizations in the health care arena are beginning to recognize this basic premise, which has led to creativity in the sphere of risk management strategies. It has become necessary, therefore, to keep reinventing the methods and strategies to be used in order to overcome the perils enumerated above, in a timely and cost-effective manner.

(Brussin, 2006) Another creative aspect attributed to the entire gamut of activities concerning risk management in this sphere adheres to the notion of utmost good faith that has been lately used to expand the protection for the insurer from pre-contractual fraud to include post-contractual fraud as well.

References

Brussin, D (2006). Professional penetration testing for better Security. CISSP

Stephenson, P (2004). Getting the Whole Picture. The Center for Digital Forensic Studies.

Reliance Insurance Industries. URL: www.relianceinsurance.com (Accessed during: February, 2008).

Wentling RM, Palma-Rivas N (1999) Components of effective diversity training programmes. International Journal of Training and Development.

Marquardt, Michael J. (1996) Building the learning organization: A systems approach to quantum improvement. Mc-Graw Hill.

Skyrme, D. J. (1999) Knowledge Management Solutions - The IT Contribution. David Skyrme Associates Limited

Boisot, M. and Cox, B (1999). The i-space: a framework for analyzing the

evolution of social computing. Technovation, 19 (9), p. 525-536.

Kirk, J (1999), Information in organizations: directions for information

management, Information Research, 4 (3)

Eaton, J. and Bawden, D. (1991). What kind of resource is information?

International Journal of Information Management, 11 (2), 156-165.

Davenport, T.; (1999). Is knowledge management just good information

management? Mastering information. London: Financial Times

Jones, M. (1995). Organisational learning: collectivist mind or cognitivist metaphor? Accounting, Management and Information Technology, 5 (1), 61-77.

Wilson, T D (2002). The non sense of Knowledge Management. Information

Research, 8(1). Last accessed at http://informationr.net/ir/8-

1/paper141.html

Langley, E., Seybrooks, J., Ryder, D. (2003). Information audot as a holistic

approach: a case study. Last accessed on thr 3rd November 2003 at URL

http://www.sla.org/division/dst/LangleySLA062003.pdf

Ansari, S.L., 1977. An integrated approach to control system design. Acc. Organizations Society 2, 101–112.

Daft, R.L., Macintosh, N.B., 1984. The nature and use of formal control systems for management control and strategy implementation.J. Manage. 10, 43–66.

Ferreira, A, Otley, D., 2005. The Design and Use of Management Control Systems: An Extended Framework for Analysis, Social Science Research Network. http://papers.ssrn.com/sol3/papers.cfm?abstract id=682984.

Kaplan, R.S., Norton, D.P., 1992. The balanced scorecard—measures that drive performance. Harvard Bus. Rev.(January–February).

Merchant, K.A., 1998. Modern Management Control Systems: Text and Cases. Prentice-Hall, Upper Saddle River, NJ.

Miller, P., 1998. The margins of accounting. Europ. Acc. Rev. 7, 605–621.

Simons, R., 1995. Levers of Control: How Managers Use Innovative Control Systems to Drive Strategic Renewal. Harvard Business School Press, Boston, MA.

Lumpkin, G. T. and Dess, G. G. (1996). Clarifying the Entrepreneurial Orientation

Construct and Linking It to Performance. Academy of Management Review, 21

(1), 135-172.

Nahapiet, J., & Ghoshal, S. (1998). Social capital, intellectual capital, and the

organizational advantage. Academy of Management Review, 23(2), 242-266.

Download full paperFile format: .doc, available for editing
Contact Us