Annotated Outline

Submitted by: Submitted by

Views: 311

Words: 270

Pages: 2

Category: Philosophy and Psychology

Date Submitted: 02/04/2013 11:55 AM

Report This Essay

Business Operations Outline

Field Selection

• Business Operations

Philosophical Concepts and Topics to be addressed

• Introduction to Business Operations

• Protocol and Methodology

• Risk Management

• Compliance and Business Integrity

• Business Growth for Business Operations

• Conclusion

Philosophical Assumptions to be evaluated

• Philosophical Assumptions Applicable to Realm of Health Policy/Business Operations

• Validation of Systematic Procedures to Ensure Processing Accuracy

• Organizational ISS violation prevention and training

• ISS position opportunities

Sources to be used for Argument of Justifiable or Desirable Assumptions

• Applicability of Philosophical Assumption to Attain Process Improvement

Chen, P., Kataria, G., & Krishnan, R. (2011, June). Correlated failures, diversification, and information security risk management. MIS Quarterly, 35(2), 397-A3.

Elms, E., LaPrade, J., & Maurer, M. (2008). Hacking of corporate information systems: Increasing threats and potential risk management techniques. CPCU eJournal, 6(2), 1-9.

Garfinkel, S. (2012, June). The cybersecurity risk. Communications of the ACM, 55(6), 29-32. doi:10.1145/2184319.2184330

Nafria, J. (2011, January). The need for an informational systems approach to security. TripleC: Open Access Journal for a Global Sustainable Information Society, 9(1), 93-122.

Spears, J., & Barki, H. (2010). User participation in information systems security risk

management. MIS Quarterly, 34(3), 503-527.

• ISS safeguard adequacy – Desirable

Carblanc, A., & Moers, S. (2003). Towards a culture of online security. OECD Observer (240),

30-31.

Kshetri, N. (2009, December). Positive externality, increasing returns, and the rise in cyber-crimes. Communications of the ACM, 52(12), 141-144.

Maskat, K., Shukran, M., Khairuddin, M., & Isa, M. (2011, December). Mobile agents in intrusion detection system: Review and analysis. Modern Applied Science, 5(6), 218-231. doi:10.5539/mas.v5n6p218