IS-related operational risk: An exploratory analysis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Past research concerning information systems (IS) risk has mainly focused on development risk. However, the impact of any risk event that occurs once the system is operational can be far more extensive. Such events are due to what has been termed operational risk. Our research is concerned with operational risk that involves an IS - or IS-related operational risk - which has received little attention in the academic literature. Specifically, we seek to offer a comprehensive exploratory analysis of IS-related operational risk based on a database documenting hundreds of actual IS-related operational risk events. Our findings could help managers and researchers to achieve a better understanding of the risk exposure associated with operational ISs in their current business environment and with new information technology (IT) investments under consideration. This research could also assist organizations in achieving a higher level of strategic and economic alignment, through the use of a systematic IS risk management approach.

Original languageEnglish (US)
Title of host publication14th Americas Conference on Information Systems, AMCIS 2008
Pages2509-2514
Number of pages6
StatePublished - Dec 1 2008
Event14th Americas Conference on Information Systems, AMCIS 2008 - Toronto, ON, Canada
Duration: Aug 14 2008Aug 17 2008

Publication series

Name14th Americas Conference on Information Systems, AMCIS 2008
Volume4

Other

Other14th Americas Conference on Information Systems, AMCIS 2008
CountryCanada
CityToronto, ON
Period8/14/088/17/08

Keywords

  • Business process risk
  • Information systems risk
  • Operational risk

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Library and Information Sciences
  • Information Systems

Fingerprint Dive into the research topics of 'IS-related operational risk: An exploratory analysis'. Together they form a unique fingerprint.

Cite this