Submitted by: Submitted by Treen1972
Views: 311
Words: 270
Pages: 2
Category: Philosophy and Psychology
Date Submitted: 02/04/2013 11:55 AM
Business Operations Outline
Field Selection
• Business Operations
Philosophical Concepts and Topics to be addressed
• Introduction to Business Operations
• Protocol and Methodology
• Risk Management
• Compliance and Business Integrity
• Business Growth for Business Operations
• Conclusion
Philosophical Assumptions to be evaluated
• Philosophical Assumptions Applicable to Realm of Health Policy/Business Operations
• Validation of Systematic Procedures to Ensure Processing Accuracy
• Organizational ISS violation prevention and training
• ISS position opportunities
Sources to be used for Argument of Justifiable or Desirable Assumptions
• Applicability of Philosophical Assumption to Attain Process Improvement
Chen, P., Kataria, G., & Krishnan, R. (2011, June). Correlated failures, diversification, and information security risk management. MIS Quarterly, 35(2), 397-A3.
Elms, E., LaPrade, J., & Maurer, M. (2008). Hacking of corporate information systems: Increasing threats and potential risk management techniques. CPCU eJournal, 6(2), 1-9.
Garfinkel, S. (2012, June). The cybersecurity risk. Communications of the ACM, 55(6), 29-32. doi:10.1145/2184319.2184330
Nafria, J. (2011, January). The need for an informational systems approach to security. TripleC: Open Access Journal for a Global Sustainable Information Society, 9(1), 93-122.
Spears, J., & Barki, H. (2010). User participation in information systems security risk
management. MIS Quarterly, 34(3), 503-527.
• ISS safeguard adequacy – Desirable
Carblanc, A., & Moers, S. (2003). Towards a culture of online security. OECD Observer (240),
30-31.
Kshetri, N. (2009, December). Positive externality, increasing returns, and the rise in cyber-crimes. Communications of the ACM, 52(12), 141-144.
Maskat, K., Shukran, M., Khairuddin, M., & Isa, M. (2011, December). Mobile agents in intrusion detection system: Review and analysis. Modern Applied Science, 5(6), 218-231. doi:10.5539/mas.v5n6p218