scholarly journals Implementation Octave-S and Iso 27001controls in Risk Management Information Systems

Author(s):  
Stephanus Stephanus

Extensive use of information technology in companies put IT into a position which is of considerable concern, especially in large companies that put IT becomes a strategic part of the company. The importance of IT division, make the companies willing to pay big to get the benefits offered by IT itself, but on the other hand appears disappointment incurred from investments are not comparable with the results obtained. Until the threat appear and disrupt the business of the company. By doing risk management using the OCTAVE-S, particularly in smaller companies, can help companies to be growing, the company can find out the weaknesses and threats that may arise that could disrupt the company's business, helped by the standard controls that are owned by the ISO / EIC 27001 : 2005 helps companies to prepare implement ISO / EIC 27001:2005 later.

Author(s):  
Youcef Baghdadi

This chapter introduces the concept-oriented course architecture (COCA); an architecture that utilizes IS concept as a fundamental building block to guide a methodology for designing and teaching IS courses. COCA aims at supporting rapid composition of IS course/curriculum out of a sound and complete set of IS concepts provided by well-specified business models, market or standardization organizations such as ACM and IEEE. COCA is defined, composed of three roles: (R1) concept providers, (R2) a concepts registry, and (R3) IS course/curriculum designers. These roles interact through four operations in order to design/teach an IS course/curriculum: (O1) publish, (O2) consider, (O3) validate, and (O4) teach. This methodology, based on a flexible, scalable, well-specified architecture of the IS concepts and their organization, will assist the complex and resource-consuming task of designing and teaching IS courses in the information age, where the IS tools, including management information systems (MIS) and information technology (IT) are rapidly evolving.


2018 ◽  
Vol 7 (1) ◽  
pp. 39-51 ◽  
Author(s):  
Jhony Pereira Moraes ◽  
Sidimar Meira Sagaz ◽  
Geneia Lucas Dos Santos ◽  
Deison Alencar Lucietto

Este artigo teve por objetivo descrever usos e aplicações de três ferramentas de gestão presentes no ambiente empresarial contemporâneo: a Tecnologia da Informação (TI), os Sistemas de Informações Gerenciais (SIG) e a Gestão do Conhecimento (GC). Foi realizada revisão narrativa de literatura. Verificou-se que o fluxo de informações funciona como o elemento unificador entre TI, SIG e a GC. Ao possibilitarem o uso adequado de informações e de pessoas com vistas ao alcance dos objetivos organizacionais, fomentam a criação de vantagens competitivas. Identificou-se, então, que a introdução dessas ferramentas, ao alterar processos internos e externos, contribui para o desenvolvimento das organizações.Palavras-Chave: Tecnologia da Informação. Sistemas de Informações Gerenciais. Gestão do Conhecimento. Vantagem Competitiva. Abstract: This article aims to describe uses and applications of three management tools present in the contemporary business environment: Information Technology (IT), Information Systems Management (ISM) and Knowledge Management (KM). A narrative review of the literature was performed. It was verified that the information flow works as the unifying element between IT, ISM and KM. By enabling the proper use of information and people to achieve the organizational objectives, they promote the creation of competitive advantages. It was identified, then, that the introduction of these tools, by altering internal and external processes, contributes to the development of organizations.Keywords: Information Technology. Management Information Systems. Knowledge management. Competitive advantage.


Sign in / Sign up

Export Citation Format

Share Document