Total Information Risk Management Maximizing the Value of Data and Information Assets 1st Edition by Alexander Borek, Ajith Kumar Parlikad, Jela Webb, Philip Woodall – Ebook PDF Instant Download/Delivery. 0124055478, 978-0124055476
Full download Total Information Risk Management Maximizing the Value of Data and Information Assets 1st Edition after payment
Product details:
ISBN 10: 0124055478
ISBN 13: 978-0124055476
Author: Alexander Borek (Author), Ajith Kumar Parlikad, Jela Webb, Philip Woodall
Many talk about the unlimited opportunities of data and information assets. But, bad data and information can also severely hurt your business and create considerable risk. Managing risk is a new angle to selling data quality projects to upper managers who do not want to take the time to learn about the value of data quality.
Total Information Risk Management provides you with a step by step process to identify, quantify and mitigate the risks arising from poor data and information assets. It is based on novel research from the Distributed Information and Automation Laboratory at the University of Cambridge and has been proven to be successful across many different industries.
In particular, this book shows data managers and IT professionals how to:
- Complete a convincing business case for any data quality, data governance, Big Data, EIM, business intelligence, business analytics and IT projects
- Develop a clear link between data quality and your organization’s business objectives
- Identify data quality “pain points” that have the highest impact on your organization’s success
- Get stronger “buy-in” from senior executives for data quality improvement
- Manage data and information assets for business value in your organization
This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers.
- Shows how to manage information risk using a holistic approach by examining data and information assets from all sources
- Offers varied perspectives of an author team that brings together academics, practitioners and researchers (both technical and managerial) to provide a comprehensive guide
- Provides real-life case studies with practical insight into the management of information risk and offers a basis for broader discussion among managers and practitioners
Total Information Risk Management Maximizing the Value of Data and Information Assets 1st Table of contents:
Part 1: Total Information Risk Management Background
Chapter 1: Data and Information Assets
- Where Napoleon Meets Michael Porter: Data and Information as Assets
- How Data and Information Have Become the Most Important Assets of the 21st Century
- What Are Data and Information Assets?
- The Analogy to Traditional Manufacturing: How Raw Data is Transformed into Information Products
- Life Cycle of Data and Information Assets
- Quality of Data and Information Assets
- How Data and Information Assets Influence Organizational Success
- Why We Need Better Methods to Understand and Measure the Impact of Data and Information Quality
- References
Chapter 2: Enterprise Information Management
- What is Enterprise Information Management?
- Big Data and How it Requires New Thinking in EIM
- Further Challenges for EIM
- Summary
- References
Chapter 3: How Data and Information Create Risk
- Introduction
- Introduction to the Anatomy of Information Risks
- Sources of Information Risk
- Different Ways to Mitigate Information Risk
- The Upside of Information Risk
- The Case for Quantifying Information Risk
- Why Risk Management Becomes Important for Information Management
- References
Chapter 4: Introduction to Enterprise Risk Management
- Introduction
- What is Risk?
- What is Enterprise Risk Management?
- What is the Generic Risk Management Process?
- Assessment of Risk
- Risk Appetite and Risk Criteria
- Treatment of Risk
- Chief Risk Officer
- Summary
- References
Part 2: Total Information Risk Management Process
Chapter 5: Overview of TIRM Process and Model
- Introduction
- What Does the Word “Total” Stand for in TIRM?
- Stages of the TIRM Process
- Communicate and Consult
- Monitor and Review
- TIRM Model: Quantifying Information Risk
- Determining Risk Appetite for TIRM
- Summary
- References
Chapter 6: TIRM Process Stage A: Establish the Context
- Introduction
- TIRM Project Kickoff
- Step A1: Set the Motivation, Goals, Initial Scope, Responsibilities, and Context of the TIRM Process
- Step A2: Establish the External Environment
- Step A3: Analyze the Organization
- Step A4: Identifying Business Objectives, Measurement Units, and Risk Criteria
- Step A5: Understand the Information Environment
- Summary
- References
Chapter 7: TIRM Process Stage B: Information Risk Assessment
- Introduction
- Step B1: Analyze Tasks in Each Business Process
- Step B2: Examine Information Needed for Each Task
- Step B3: Identify Information Quality Problems During Task Execution
- Step B4: Identify Consequences of Information Quality Problems
- Step B5: Identify for Each Consequence the Business Objectives that are Affected
- Step B6: Examine Existing Risk Controls
- Step B7: Estimate Likelihood and Impact of Each Consequence
- Step B8: Refine Numbers and Verify Results
- Step B9: Evaluate and Rank Information Risks
- Summary
Chapter 8: TIRM Process Stage C: Information Risk Treatment
- Introduction
- Step C1: Analyze Causes of Information Quality Problems
- Step C2: Identify and Describe Treatment Options
- Step C3: Estimate Costs, Benefits, and Risks of Treatment Options
- Step C4: Evaluate and Select Treatment Options
- Step C5: Communicate the Results to Stakeholders
- Step C6: Develop Information Risk Treatment Plans
- Step C7: Implement Information Risk Treatment Plans
- Step C8: Verify Effectiveness of Information Risk Treatments
- Summary
- References
Chapter 9: Integrating the TIRM Process within the Organization
- Introduction
- Roles and Responsibilities for TIRM
- The Relationship Between TIRM and EIM
- TIRM Integrated with ERM
- Summary
- References
Chapter 10: TIRM Process Application Example
- Introduction
- Stage A: Establish the Context
- Stage B: Information Risk Assessment
- Stage C: Information Risk Treatment
- Summary
Part 3: Total Information Risk Management Techniques
Chapter 11: Risk Assessment Techniques for TIRM
- Introduction
- Brainstorming
- Semi-structured and Structured Interviews
- Delphi Method
- Checklists
- Monte Carlo Simulation
- Risk Indices
- Structured “What If” Technique
- Scenario Analysis
- FN Curves
- Root Cause Analysis
- Failure Mode Effect and Criticality Analysis
- Fault-Tree Analysis
- Bow-Tie Diagrams
- Risk Matrix
- Summary
Chapter 12: Software Tools: Automated Methods for TIRM
- Introduction
- Automating the Understanding the Information Environment Step
- Identifying Information Quality Problems During Task Execution
- INFORAS: A Risk Analysis Tool Covering Stage B of TIRM
- Software Tools for Detecting and Treating Information Risks
- Conclusion
- References
Chapter 13: Establishing Organizational Support and Employee Engagement for TIRM
- Introduction
- Establish Organizational Support and Changing Organizational Culture
- Employee Engagement in TIRM
- Summary
People also search for Total Information Risk Management Maximizing the Value of Data and Information Assets 1st:
what is risk management information system
information security risk management program
risk management list
what is information risk management
what are the 3 components of risk management