楼主: Barda-2025
86 0

[其他] Total Information Risk Management. Maximizing the Value of Data and Information [推广有奖]

  • 0关注
  • 2粉丝

已卖:143份资源

学科带头人

30%

还不是VIP/贵宾

-

威望
0
论坛币
18 个
通用积分
119.4777
学术水平
4 点
热心指数
13 点
信用等级
2 点
经验
20873 点
帖子
1749
精华
0
在线时间
761 小时
注册时间
2023-7-5
最后登录
2025-11-28

楼主
Barda-2025 发表于 2025-2-10 13:23:33 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
Data and infoormation assets management/数据资产管理
National University of Singapore

TextbookTotal Information Risk Management. Maximizing the Value of Data and Information Assets
Author(s): Alexander Borek

Description
This coursebook is divided into four parts: In the first part of the book, we introduce general concepts in information and risk management to bring you up to speed with the concepts that TIRM is based upon.
In the second part of the book, we explain the TIRM process in detail and how it can be implemented within an organization; we use a case study example to aid with understanding the process.
In the third part of the book, we present advanced risk assessment techniques and software tools, and ways to establish organizational support and employee engagement, which can be used to support and enhance TIRM.
The fourth part of the book offers a conclusion and outlook.


Chapter 1: Data and Information Assets
This chapter introduces key concepts about data and information assets and includes a discussion about the characteristics of data and information assets. This chapter also considers key concepts of data and information quality and explores the impact of having low-quality data and information assets.
Chapter 2: Enterprise Information Management
This chapter introduces the concept of enterprise information management (EIM) and discusses the key challenges and pressures for EIM today.

Chapter 3: How Data and Information Create Risk
This purpose of this chapter is to explain how data and information create risk in an organization. It starts with a short introduction to the anatomy of information risks, explores ways in which to mitigate risks, discusses how risk does not always have to have negative connotations, and moves on to explain why quantifying risk is worth the effort, before concluding with an explanation as to how risk management can help improve EIM.
Chapter 4: Introduction to Enterprise Risk Management
This chapter explores the well-established discipline of risk management, explaining what is risk, the processes associated with risk management, how to determine your organization’s risk appetite, and how risk can be assessed and treated. It concludes with a description of the role of a key player in TIRM: the chief risk officer.
Chapter 5: Overview of TIRM Process and Model
This chapter gives an overview of the various stages of the TIRM process and dicusses general aspects that need to be considered when applying the TIRM process. We also give an overview of the TIRM model, which is needed for stage B of the TIRM process.
Chapter 6: TIRM Process Stage A: Establish the Context
This chapter is the first of three that explain the three stages of the TIRM process. Here, you are shown how to set the motivation, goals, initial scope, responsibilities, and context of the TIRM process. Key areas, including how to establish the external environment, how to analyze the organization, and how to identify business objectives, measurement units, and risk criteria, are explained in this chapter. It also explains how to gain a thorough understanding of the information environment in which your particular business operates.
Chapter 7: TIRM Process Stage B: Information Risk Assessment
This chapter provides a step-by-step guide for implementing the information risk assessment stage of the TIRM process. The chapter demonstrates how to quantify the business impact of poor data and information quality, as well as illustrates how to identify information risks, analyze and quantify information risks, and evaluate and rank information risks.
Chapter 8: TIRM Process Stage C: Information Risk Treatment
This chapter provides a step-by-step guide for implementing the information risk treatment stage of the TIRM process. It covers the identification of causes of information risks, finding appropriate information risk treatments, calculating the costs and benefits, selecting and implementing information risk treatments, and verifying their effectiveness after implementation.

Chapter 9: Integrating the TIRM Process Within the Organization
This chapter gives a comprehensive illustration of how to integrate the TIRM process within an organization. It clarifies the roles and responsibilities that lead to successful integration and offers guiding principles for successful implementation.
Chapter 10: TIRM Process Application Example
Using a case study based on the authors’ experience of implementing TIRM in an energy utility, this chapter shows the practical application of the TIRM process. It also demonstrates the significant benefits that can accrue from improving the quality of data and information holdings.
Chapter 11: Risk Assessment Techniques for TIRM
This chapter examines the popular techniques used for risk management and goes on to explore how they may be used in the context of information risk management. Some of these may be familiar and some less so.
Chapter 12: Software Tools: Automated Methods for TIRM
This chapter considers how automated software solutions can support the TIRM and examines how some of the TIRM process stages can be automated. It continues with a discussion about what information management tools and technologies are currently available for detecting and mitigating information risks.
Chapter 13: Establishing Organizational Support and Employee
Engagement for TIRM
This chapter discusses strategies and concepts to overcome organizational resistance and increase employees’ support for TIRM. It draws on models published in the literature to show how employee “buy-in” might best be achieved.
Chapter 14: Conclusions and Outlook
In the final chapter, we gather together our thoughts on the book and hope that you and your organization will gain benefit from the book as a whole.



Total Information Risk Management. Maximizing the Value of Data and Information Assets.pdf (16.8 MB, 需要: RMB 19 元)


二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:information Informatio Maximizing Management formation

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
jg-xs1
拉您进交流群
GMT+8, 2025-12-9 03:53