Course: Enterprise Risk Management
LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF.
Due Date – 1 day
The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.
For your week 6 research paper, please address the following in a properly formatted research paper:
Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live
Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.