Objectives IJTCS aims at publishing high quality research papers, reflective studies, case studies and "lessons learned" notes on any aspect of teaching, learning and research across the disciplines as well as the role of the case study as a teaching and research methodology. Each of these areas is a focus of interest and such diversity is reflected in the structure of the editorial team and the Editorial Board, providing specialisms in different areas. The journal's goal is to produce papers of different kinds, from classroom-based empirical studies through comparisons of pedagogic approaches across institutions or countries and of different types from the practical to the theoretical. Case studies that provide insight on proven strategies or teaching patterns are also welcomed.
Information technology risks pose more threats to organisations in three categories: Therefore, modern organisations have to face the challenging new and increasing threats from IT risks in more sophisticated manners.
This task is difficult if it is not properly given due care by top management and implemented diligently with duty of care by the responsible teams. The main objective of the paper is to develop an information technology risk management framework for International Islamic University Malaysia IIUM based upon series of consultant group discussions, risk management formulation, business process identification, quantification of risk weightage and classification of core risk factors in a university environment.
The proposed risk management method has been applied to IIUM case.
This study uses an action research approach with the active involvement of the researchers and stakeholders in order to identify, analyse and respond to risks.
The analysis draws upon both empirical research and a real case study. The study finds that top management acknowledges the important pervasive role of information technology in organisations and that consequential threats originating and created from the use of IT hardware and software can be detrimental to organisational effectiveness and efficiency.
The dangers could cause financial, privacy, security and data losses. The framework, however, can be applied to other Malaysia public and private universities.
Moreover, it is also suitable for replication in non-academic institutions with a few minor adjustments. Keywords — information technology; risk management; action research; Malaysia universities; public sector 1. IT refers to the technical means available—equipment and attendant techniques, which is essentially activity-based, supply-oriented and technology- and delivery-focused.
Whereas, IS, on the other hand, are business applications, more or less IT-based. While many definitions offered from different perspectives, IT risk in this study adopt the definition of IT risk being the uncertainty that a foreseeable loss or damage can result for such uncertain probabilistic events.
IT risk nature depends largely on types of assets, information or projects. Each IT hardware, software, system or project has its own inherent and incidental risk associated to it. This chapter classifies IT risk into three types, namely: IT security requirements in modern organisations might stem from within the organisation work practices, corporate regulations, organisational policies or the environment market trends and data protection acts.
Because of this, there is a need for the identification and implementation of security controls to ensure that assets, data and information are protected against potential threats. One cannot reasonably develop IT security policies and procedures without clearly understanding the systems, assets, data and information that must be protected and how valuable they are to the enterprise.
In addition, one must determine the probability that the assets will be threatened. This paper aims to answer the following research questions and objectives respectively: IHLs include public and private universities.case raised a number of issues regarding the security culture at the university and management of security function.
The case also highlights the issues of lack of training and access control. CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology.
Find out how Westminster achieved customer satisfaction ratings of 90 percent for its IT caninariojana.com, for more examples of high performance like this one, please check out the entire What Works volume in the ICMA Bookstore (caninariojana.com).
Risk Management ITSL Information Technology Solutions for Livelihoods IVR Interactive Voice Response JLG Joint-Liability Group LIFFE London International Financial Futures & This study presents these topics and case studies through a specific lens by looking at two of the major.
Drawing on case study material, this paper explores the politics of career and resource competition that is a medium and outcome of IT investment strategies and system development priorities. This is achieved by examining the manner in which different managers and operating divisions in the case.
Microsoft Dynamics AX Case Studies. Learn how our clients have benefited from working with us as their Microsoft Dynamics , formerly Dynamics AX, partner.