Lec 6 Flashcards
What is IT RISK?
Risk = probability * impact
Two conceptualisation:
1) risk as a probable negative impact
2) risk as both negative and positive impact
Downside risk: probable negative outcome
Upside risk: probable positive outcome
IT RISK:
The potential for an unplanned event involving information technology to threaten an enterprise objective
It risk from business perspective (4)
Availability; keeping systems and their business processes running and recovering from interruptions
Access: ensuring appropriate access to data and systems so that the right people have access they need and had people not, sensitive info is not misused
Accuracy: providing correct timely and complete info that meets managers, staff, suppliers etc requirements
Agility : to make necessary business changes with appropriate cost and speed
It risk management: 3 core disciplines
Reduce IT complexity - procedures and policies that provide an enterprise level view of all IT risks
It allows small managers to identify and obtain resources for risk, and allows senior managers with a clear view of the major risks facing the firm
Creates risk aware culture -
Reduces uncertainty for revealing risks (risk aware behaviour)
Risks less likely to be buried or rejected
Create risk governance processes - identify and manage risks
Foundation improves risk management by removing unknown complexities
Customer contact strategy: disclosure strategy
Disclosure to all public when it’s in a favour able position for business
Risk escalator strategy
Companies are like people walking up a down escalator, you have to keep moving to stay in place. One speed switch for all escalators. If your are a better clover you increase spread ( makes hard for competitors)
Non incumbents take risk, have to speed up the escalator (they get sloppy, stumble, and slide back)
More sharing and transfer of data - between our system and with partners - causes more accidents
Managing risks
Downside risk ( is cost if happens) Cost of protection
Low cost of protection and tolerable downside risk = lowest priority
Low cost of protection and intolerable downside risk = mitigate asap
High cost of protection and tolerable downside risk = bear the risk
High cost of protection and intolerable downside risk = capitalise costs of risk mitigation
The high and intolerable is the hardest to make decisions
High cost and tolerable for that managers should understand that sometimes things won’t work (hacker incident may happen)
Not that IT has gotten something wrong
Just what we’ve decided to live with some risk
Options for security and availability policy
- Everything is at least a certain amount safe
- Category level: we have different levels of safety
Everything in the same level is equally safe
Anyone with sufficient access rights can get access to the data in that category
Under or over protection
Some monitoring but more trusting - Service and data level: for each service / data item we have a unique security level
No under or over protection
More oh
Slow as we can longer give people access to a category and trust them to behave
We monitor access to important data
Crisis response strategies in data breach
Defensive
Accommodative strategy
Moderation strategy
Image renewal strategy
Crisis response strategies in data breach - DEFENSIVE STRATEGY
Defensive strategy:
Strategy components: denial = seeking to frame that no breach crisis exists (E.g. no example Not used by the firms)
Strategy components: excuse = seeking to minimise the organisations responsibility for the breach (claiming that the breach occurred due to third party negligence)
Evoke suspicion and perceptions of dishonesty unless the firm is completely not responsible for the crisis (e.g. a natural disaster or terror attack)
Crisis response strategies in data breach - ACCOMODATIVE STRATEGY
Strategy components: apology= explicitly apologising for the occcurance of the breach (e.g. explicitly stating that the organisation apologised for the breach)
Strategy components: remedial actions= taking steps to repair and control the damage (r.g. Offering free credit monitoring services, offering financial compensations)
It can include suspicions that:
The breach is severe and there may be looming legal and financial liabilities
Crisis response strategies in data breach - MODERATION STRATEGY
Strategy components: ingratiation= seeking to make the stakeholders like the organisation (e.g. stating that the firm has a strong history of data privacy, stating that the firm has a strong history of valuing the relationship with the stakeholders and the trust the stakeholders have in the firm)
Justification= seeking to minimise the perceived damage associated with the breach (stating that the firm does not believe that the lost data have been or will be misused, strong that the lost data were encrypted and password protected, stating that the breach is an isolated act)
More acceptable as:
Neither denying responsibilities (like defensive strategy)
Nor inducing suspicion of severity and legal liabilities
Justification: firm has knowledge on the nature and severity of the breach
Crisis response strategies in data breach - IMAGE RENEWAL STRATEGY
Correction commitment = reassuring stakeholders that the organisation will take whatever steps are necessary to avoid similar breach incidents in the future (e.g. claiming bag the firm has implemented security measures to prevent a recurrence of such an attack)
Stakeholder commitment = reassuring stakeholders that the firm is committed to providing the best services and or products in spite of the breach incidents (e.g claiming that the firm is committed to assisting the stakeholder, claiming that the firm is committed to protecting stakeholder data)
Value commitment = reassuring stakeholders that the firm is committed to its core values( e.g. claiming that the firm takes security of customer data extremely seriously, claiming that the firm values the stakeholders privacy, claiming that safeguarding the privacy of a stakeholder data is a top priority
Effect of crisis strategies in stock price change
All 4 for highly repeatable firms has no significant influence
There is a negative but non significant influence for lowly reputable firms in defensive and accomodative strategies
And a positive influence in lowly reputable firms in moderation and image renewal strategies
Highly reputable firms have demonstrated many capabilities over the years. Investors discount one negative as bad things happen to all