Skip to main content

Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEA

  • Conference paper
  • First Online:
Proceedings of International Conference on Information Technology and Applications

Abstract

The emergence of the COVID-19 pandemic led several organizations around the world and in the most varied areas of activity, to move from the intention to implement a digital transformation in the medium/long-term, to an instant obligation to apply the digital transformation. The organizations’ ability to adapt immediately meant their survival and even in some cases a positive evolution of their business. The digital transformation applied in an abrupt way has uncovered some critical factors for its success. One of the most relevant factors will be information security. Many of the digital systems put into operation more intensively during the pandemic, have shown to be highly fragile on issues related to information security. One relevant problem of the organizations is the low effectiveness and efficiency of financial, human, and material resources, allocated to the reduction or mitigation of the risks identified in their information systems. This study aims to offer a new method for prioritizing security risks. The new proposed method directs the organizations resources to more effectively and efficiently actions to reduce or mitigate the identified vulnerabilities of the information system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Griffin D, Denholm J (2020) This isn’t the first global pandemic, and it won’t be the last. 2020. [Online]. Available: https://theconversation.com/this-isnt-the-first-global-pandemic-and-it-wont-be-the-last-heres-what-weve-learned-from-4-others-throughout-history-136231. Acedido em 13 5 2021

  2. Carroll N, Conboy K (2020) Normalising the “New normal”: changing tech-driven work practices under pandemic time pressure. Int J Inf 55

    Google Scholar 

  3. Ågerfalk PJ (2020) Artificial intelligence as digital agency. Eur J Inf Syst 1(29):1–8

    Article  Google Scholar 

  4. Papagiannidis S, Harris J, Morton D (2020) WHO led the digital transformation of your company? A reflection of IT related challenges during the pandemic. Int J Inf Manage

    Google Scholar 

  5. Silva MM, Gusmão APHd, Poleto T, Silva LC, Costa APCS (2014) A multidimensional approach to information security risk management using FMEA and fuzzy theory. Int J Inf Manag 34:733–740

    Google Scholar 

  6. Schmittner C, Gruber T, Puschner P, Schoitsch E (2014) Security application of failure mode and effect analysis. In: International conference on computer safety, reliability, and security

    Google Scholar 

  7. Patel SC, Graham JH, Ralston PAS (2008) Quantitatively assessing the vulnerability of critical information systems: a new method for evaluating security enhancements. Int J Inf Manag 28(6):483–491

    Google Scholar 

  8. I. S. O. (ISO) e I. International electrotechnical commission, ISO/IEC 27005, Information technology—security techniques—information security risk management (2008)

    Google Scholar 

  9. Bojanc R, Blazic BJ (2008) An economic modelling approach to information security risk management. Int J Inf Manag 28:413–422

    Google Scholar 

  10. I. E. Commission, IEC 61508, Functional safety of electrical/electronic/programmable electronic safety-related systems (E/E/PE, or E/E/PES) (2010)

    Google Scholar 

  11. I. S. O. (ISO), ISO/IEC 27000 - Information technology — Security techniques — Information security management systems—overview and vocabulary. International Standardization Organization, 2018. [Online]. Available: https://www.iso.org/standard/73906.html. Acedido em 20 5 2021

  12. I. S. O. (ISO) ISO/IEC 27001—Information Security Management, International Standardization Organization, 2013. [Online]. Available: https://www.iso.org/isoiec-27001-information-security.html. Acedido em 22 5 2021

  13. I. S. O. (ISO) e I. E. C. (IEC), ISO/IEC:27002: information technology—security techniques—code of practice for information security management

    Google Scholar 

  14. Ozkan S, Karabacak B (2010) Collaborative risk method for information security management practices: a case context within Turkey. Int J Inf Manag 30(6):567–572

    Google Scholar 

  15. Abdullah K, Mohd Rohani J, Ngadiman M (2005) Development of FMEA information system for manufacturing industry. In: 3rd international conference on modeling and analysis of semiconductor manufacturing, Singapore

    Google Scholar 

  16. D. o. D. (US), MIL-P-1629: procedures for performing a failure mode, effects and Criticality analysis

    Google Scholar 

  17. McDemortt RE, Mikulak RJ, Beauregard MR (2009) The basics of FMEA (2nd). Taylor & Francis Group, New York

    Google Scholar 

  18. Lin Q-L, Wang D-J, Lin W-G, Liu H-C (2014) Human reliability assessment for medical devices based on failure mode and effects analysis and fuzzy linguistic theory. Saf Sci 62:248–256

    Google Scholar 

  19. Goodman S (1996) Design for manufacturability at midwest industries, Harvard: Lecture

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Costa, I., Guarda, T. (2022). Information System Security Risk Priority Number: A New Method for Evaluating and Prioritization Security Risk in Information System Applying FMEA. In: Ullah, A., Anwar, S., Rocha, Á., Gill, S. (eds) Proceedings of International Conference on Information Technology and Applications. Lecture Notes in Networks and Systems, vol 350. Springer, Singapore. https://doi.org/10.1007/978-981-16-7618-5_49

Download citation

Publish with us

Policies and ethics