{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:14:55Z","timestamp":1651839295229},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p>Every system, when connected to a network, is susceptible to threat of being hacked. It is important to protect all systems of an organization in real-time in a cost-effective manner. This article presents a well-designed and integrated database for risk management data using a dashboard interface in real-time risk that makes it easy for risk managers to reach a understanding the level of threats to be able to apply right controls to mitigate them. In this article, a case study of a data center for a statistical management institute is presented that proposes the calculation of total risk at the organization level by using the proposed risk database. A digital dashboard is also designed for presenting the risk level results so that decision makers can apply counter measures. The risk level on a dashboard viewer makes it easy for decision maker to understand the overall risk level at the statistics data center and assists in the creation of a tool to follow-up risk management since the time a threat hits until the time of its mitigation.<\/jats:p>","DOI":"10.4018\/ijitsa.2020010102","type":"journal-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T13:57:55Z","timestamp":1571839075000},"page":"27-45","source":"Crossref","is-referenced-by-count":0,"title":["Risk Management via Digital Dashboards in Statistics Data Centers"],"prefix":"10.4018","volume":"13","author":[{"given":"Atif","family":"Amin","sequence":"first","affiliation":[{"name":"Dubai Statistics Center, Dubai, Saudi Arabia"}]},{"given":"Raul","family":"Valverde","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Quebec, Canada"}]},{"given":"Malleswara","family":"Talla","sequence":"additional","affiliation":[{"name":"Ryerson University, Toronto, Ontario, Canada"}]}],"member":"2432","reference":[{"issue":"1","key":"IJITSA.2020010102-0","first-page":"274","article-title":"Cybercrime Prevention in The Kingdom of Bahrain via IT Security Audit Plans.","volume":"65","author":"A.Almadhoob","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"IJITSA.2020010102-1","author":"A.Calder","year":"2008","journal-title":"A Manager\u2019s Guide to Data Security and ISO 27001\/ISO 27002"},{"key":"IJITSA.2020010102-2","volume":"Vol. 5","author":"J.Cano","year":"2017","journal-title":"The AREM Window: A Strategy to Anticipate Risk and Threats to Enterprise Cyber Security"},{"key":"IJITSA.2020010102-3","unstructured":"DeSouza, E., & Valverde, R. (2015). An Employee-based Risk Management Strategy for reducing security incidents in a Canadian PHIPA Regulated Environment. In Proceedings of the International Conference on Innovations in Computer Science and Information Technology (ICICSIT 2015), Hyderabad, India. Academic Press."},{"key":"IJITSA.2020010102-4","doi-asserted-by":"publisher","DOI":"10.1057\/rm.2009.4"},{"key":"IJITSA.2020010102-5","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A., & Neubauer, T. (2011). Information Security Risk Management: In which security solutions is it worth investing? CAIS, 28, 22.","DOI":"10.17705\/1CAIS.02822"},{"key":"IJITSA.2020010102-6","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"IJITSA.2020010102-7","author":"S.Harris","year":"2008","journal-title":"CISSP all-in-one exam guide"},{"issue":"1","key":"IJITSA.2020010102-8","first-page":"12","article-title":"Managing drivers and boundaries of information technology risk management (ITRM) to increase Egyptian hotels market share.","volume":"1","author":"G. S.Khalifa","year":"2017","journal-title":"International Journal on Recent Trends in Business and Tourism"},{"key":"IJITSA.2020010102-9","doi-asserted-by":"publisher","DOI":"10.5539\/emr.v3n1p24"},{"key":"IJITSA.2020010102-10","author":"J.Koons","year":"2010","journal-title":"Information Technology Risk Management in Enterprise Environments"},{"key":"IJITSA.2020010102-11","doi-asserted-by":"publisher","DOI":"10.5220\/0006641601710178"},{"key":"IJITSA.2020010102-12","author":"D.Landoll","year":"2006","journal-title":"The security risk assessment handbook: A complete guide for performing security risk assessments"},{"key":"IJITSA.2020010102-13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00041-2"},{"issue":"2","key":"IJITSA.2020010102-14","first-page":"5","article-title":"A Business Continuity Monitoring Model for Distributed Architectures: A Case Study.","volume":"1","author":"E.Nijburg","year":"2011","journal-title":"International Journal of Applied Science and Technology"},{"key":"IJITSA.2020010102-15","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1458066"},{"key":"IJITSA.2020010102-16","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"issue":"46","key":"IJITSA.2020010102-17","first-page":"5","article-title":"Indicators and metrics used in the enterprise risk management (ERM).","volume":"4","author":"E.Scarlat","year":"2012","journal-title":"Economic Computation and Economic Cybernetics Studies and Research Journal"},{"key":"IJITSA.2020010102-18","doi-asserted-by":"crossref","unstructured":"Stephens, J. & Valverde R. (2013). Security of e-procurement transactions in supply chain reengineering. Computer and Information Science, 6(3).","DOI":"10.5539\/cis.v6n3p1"},{"key":"IJITSA.2020010102-19","author":"G.Stoneburner","year":"2002","journal-title":"Sp 800-30. risk management guide for information technology systems"},{"key":"IJITSA.2020010102-20","author":"D.Tan","year":"2002","journal-title":"Quantitative Risk Analysis Step-By-Step"},{"key":"IJITSA.2020010102-21","unstructured":"Valverde, R. (2008). The ontological evaluation of the requirements model when shifting from a traditional to a component-based paradigm in information systems re-engineering [Doctoral dissertation]. University of Southern Queensland."},{"key":"IJITSA.2020010102-22","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-010-0139-z"},{"key":"IJITSA.2020010102-23","author":"E.Wheeler","year":"2011","journal-title":"Security risk management: Building an information security risk management program from the Ground Up"},{"key":"IJITSA.2020010102-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.06.355"}],"container-title":["International Journal of Information Technologies and Systems Approach"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=240763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T11:57:31Z","timestamp":1651838251000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITSA.2020010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijitsa.2020010102","relation":{},"ISSN":["1935-570X","1935-5718"],"issn-type":[{"value":"1935-570X","type":"print"},{"value":"1935-5718","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}