{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:09:52Z","timestamp":1772716192293,"version":"3.50.1"},"reference-count":41,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2021,7,4]]},"DOI":"10.1080\/08874417.2019.1647767","type":"journal-article","created":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T13:46:47Z","timestamp":1565704007000},"page":"328-344","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Information Technology Operational Risk: A Teaching Case"],"prefix":"10.1080","volume":"61","author":[{"given":"Janice C.","family":"Sipior","sequence":"first","affiliation":[{"name":"Villanova University","place":["Villanova, USA"]}]},{"given":"Danielle R.","family":"Lombardi","sequence":"additional","affiliation":[{"name":"Villanova University","place":["Villanova, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3506-7438","authenticated-orcid":false,"given":"Renata","family":"Gabryelczyk","sequence":"additional","affiliation":[{"name":"University of Warsaw","place":["Warsaw, Poland"]}]}],"member":"301","published-online":{"date-parts":[[2019,8,13]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"Basel Committee on Banking Supervision (BCBS). Basel committee on banking supervision basel III: finalising post-crisis reforms; 2017 Dec [accessed 2019 May 25]. https:\/\/www.bis.org\/bcbs\/publ\/d424.pdf."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2012.03.001"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2012.04.005"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2009.07.020"},{"key":"e_1_3_2_6_1","doi-asserted-by":"crossref","unstructured":"World Economic Forum. The global risk report 2019a; 2019 Jan 15 [accessed 2019 May 22]. https:\/\/www.weforum.org\/reports\/the-global-risks-report-2019.","DOI":"10.1016\/S1361-3723(19)30016-8"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00275"},{"key":"e_1_3_2_8_1","first-page":"1","volume-title":"International Conference on Information Resource Management 2012;","author":"Bauer S","unstructured":"Bauer S A literature review on operational IT risks and regulations of institutions in the financial service sector. International Conference on Information Resource Management 2012; Vienna, Austria. p. 1\u201314. [accessed 2019 May 25]. https:\/\/pdfs.semanticscholar.org\/bd61\/0013b7cd28fd9b06b1d17c10b7207419f2a3.pdf."},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-02-2016-0053"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2013.15"},{"key":"e_1_3_2_11_1","unstructured":"Bauer S Bernroider EWN. IT operational risk awareness building in banking companies: A preliminary research design highlighting the importance of risk cultures and control systems. CONF-IRM Proceedings. 2013;56."},{"key":"e_1_3_2_12_1","unstructured":"Recruiter.com. Career outlook for risk management Specialists. Recruiter; 2019 [accessed 2019 May 25]. https:\/\/www.recruiter.com\/careers\/risk-management-specialists\/outlook\/."},{"key":"e_1_3_2_13_1","unstructured":"FERMA. Federation of European risk management associations. [accessed 2019 May 24]. https:\/\/www.ferma.eu."},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-07-2015-0061"},{"key":"e_1_3_2_15_1","unstructured":"Tranchard S The new ISO 31000 keeps risk management simple; 2018 Feb 15 [accessed May 22]. https:\/\/www.iso.org\/news\/ref2263.html."},{"key":"e_1_3_2_16_1","unstructured":"British Standards Institute. BS31100 (BS 31100) Code of practice for risk management and guidance for ISO31000; 2011 [accessed 2019 May 25]. https:\/\/www.itgovernance.co.uk\/shop\/product\/bs31100-bs-31100-code-of-practice-for-risk-management-and-guidance-for-iso31000."},{"key":"e_1_3_2_17_1","unstructured":"Standards Australia\/Standards New Zealand. Risk management AS\/NZS 3100:2009; 2010 Aug [accessed 2019 May 25]. https:\/\/www.finance.gov.au\/sites\/default\/files\/COV_216905_Risk_Management_Fact_Sheet_FA3_23082010_0.pdf."},{"key":"e_1_3_2_18_1","volume-title":"Mastering operational risk","author":"Blunden T","year":"2010","unstructured":"Blunden T, Thirlwell J. Mastering operational risk. Harlow (England): Pearson Education Limited; 2010."},{"key":"e_1_3_2_19_1","unstructured":"Power M The invention of operational risk. CARR ESRC Center for Analysis of Risk and Regulation; 2003 Jun [accessed 2019 May 25]. http:\/\/eprints.lse.ac.uk\/21368\/1\/DP16.pdf."},{"key":"e_1_3_2_20_1","unstructured":"Basel Committee on Banking Regulation (BCBR). Working paper on the regulatory treatment of operational risk. Bank for International Settlements; 2001 Sep [accessed 2019 May 25]. https:\/\/www.bis.org\/publ\/bcbs_wp8.pdf."},{"key":"e_1_3_2_21_1","first-page":"1","volume-title":"European Conference on Information Systems Proceedings","author":"Osken CL","year":"2016","unstructured":"Osken CL, Onay C An operational risk management framework for financial services industry. European Conference on Information Systems Proceedings 2016; \u0130stanbul, Turkey. 1\u201310."},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2005.09.015"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2014.19"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2018.07.021"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1373006"},{"key":"e_1_3_2_26_1","unstructured":"Ponemon Institute. 2018 cost of a data breach study; 2018 [accessed 2019 Jul 5]. https:\/\/www.ibm.com\/security\/data-breach?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h\u21b5Security&ccy=US&cm_mc_uid=58687360095015621576685&cm_mc_sid_50200000=98661261562157668510&cm_mc_sid_52640000=93761471562157668516."},{"key":"e_1_3_2_27_1","unstructured":"Ackerman G G-20 urged to treat cyber-attacks as threat to global economy. Bloomberg; 2013 Jun 13 [accessed 2019 Jul 5]. https:\/\/www.bloomberg.com\/news\/2013-06-13\/g-20-urged-to-treat-cyber-attacks-as-threat-to-economy.html."},{"key":"e_1_3_2_28_1","unstructured":"World Economic Forum. Centre for cybersecurity; 2019b [accessed 2019 Jul 5]. https:\/\/www.weforum.org\/centre-for-cybersecurity."},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_2_30_1","volume-title":"Beating IT risks","author":"Jordan E","year":"2005","unstructured":"Jordan E, Silcock L. Beating IT risks. Chichester (England): John Wiley & Sons; 2005."},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS"},{"key":"e_1_3_2_32_1","unstructured":"Grimes RA IT\u2019s 9 biggest security threats. CSO Online; 2017 Aug 10 [accessed 2019 May 25]. https:\/\/www.csoonline.com\/article\/3215111\/security-it-s-9-biggest-security-threats.html."},{"key":"e_1_3_2_33_1","unstructured":"Digital Commerce 360. (n.d.). Global Amazon prime day sales from 2015 to 2018 (in billion U.S. dollars). In Statista - The Statistics Portal; 2018 Aug [accessed 2019 May 25]. https:\/\/www.statista.com\/statistics\/728120\/annual-amazon-prime-day-sales\/."},{"key":"e_1_3_2_34_1","unstructured":"Deloitte. The payroll operations survey summary of results; 2014 Dec [accessed 2019 May 25]. https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/human-capital\/us-hc-payroll-operations-survey-summary-results-010715.pdf."},{"key":"e_1_3_2_35_1","first-page":"71","article-title":"Teaching information systems with cases","volume":"52","author":"Prat N","year":"2012","unstructured":"Prat N. Teaching information systems with cases. J Comput Inf Syst. 2012;52:71\u201381.","journal-title":"J Comput Inf Syst"},{"key":"e_1_3_2_36_1","first-page":"1","volume-title":"America\u2019s Conference on Information Systems Proceedings","author":"Dunaway M","year":"2017","unstructured":"Dunaway M Collaboration in a data analytics curricula: an active learning approach. America\u2019s Conference on Information Systems Proceedings 2017; Boston, MA. p. 1\u20138."},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.2304\/eerj.2012.11.3.369"},{"key":"e_1_3_2_38_1","unstructured":"EQF. Descriptors defining levels in the European qualifications framework (EQF). European Commission. [accessed 2019 May 25] https:\/\/ec.europa.eu\/ploteus\/en\/content\/descriptors-page."},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685229910292664"},{"key":"e_1_3_2_40_1","unstructured":"Ernst & Young Global Limited. Ransomware: should you pay the ransom?; 2016 Aug 11 [accessed 2019 Jul 5]. https:\/\/advisory.ey.com\/cybersecurity\/should-you-pay-the-ransom."},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1181492"},{"key":"e_1_3_2_42_1","doi-asserted-by":"crossref","unstructured":"Topi H Valacich JS Wright RT Kaiser KM Nunamaker JF Sipior JC deVreede GJ 2010: curriculum guidelines for undergraduate degree programs in information systems; 2010 [accessed 2019 Jul 5]. https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/is-2010-acm-final.pdf.","DOI":"10.17705\/1CAIS.02618"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2019.1647767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:15:18Z","timestamp":1772712918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2019.1647767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,13]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7,4]]}},"alternative-id":["10.1080\/08874417.2019.1647767"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2019.1647767","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}