<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Faculty of Management, University of Tehran</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2008-5893</Issn>
				<Volume>7</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2015</Year>
					<Month>03</Month>
					<Day>21</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Identifying Organizational Information Security Risks Using Fuzzy Delphi</ArticleTitle>
<VernacularTitle>شناسایی ریسک‌های امنیت اطلاعات سازمانی با استفاده از روش دلفی فازی در صنعت بانکداری</VernacularTitle>
			<FirstPage>163</FirstPage>
			<LastPage>184</LastPage>
			<ELocationID EIdType="pii">53555</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2015.53555</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Parisa</FirstName>
					<LastName>Mousavi</LastName>
<Affiliation>MSc. Student, Information Technology Management, Faculty of Accounting and  Management, Kharazmi University of Tehran</Affiliation>

</Author>
<Author>
					<FirstName>Reza</FirstName>
					<LastName>Yousefizenouz</LastName>
<Affiliation>Assistant Prof., Faculty of Accounting and  Management, Kharazmi University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Akbar</FirstName>
					<LastName>Hasanpoor</LastName>
<Affiliation>Assistant Prof., Faculty of Accounting and  Management, Kharazmi University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2014</Year>
					<Month>09</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>Most organizations need to information systems to survive and thrive. Therefore, they should seriously protect their information assets. Creating structured and justifiable exchanges between cost, security and mission control systems security risks is essential. This is important in the planning and development of such systems. Initial appropriate decisions can reduce costs and increase ease of control risk. The first step in the risk management process is the identification of risk. The purpose of this study is identifying the most important enterprise information security risks. This study is application and view research method is descriptive. In this study, a model is presented to identify information security risks, according to ISO 27002 and cobit 4 and study the documents and using by fuzzy Delphi method and opinions of experts, which include 10 of the IT professionals of the Bank, have been presented. In this template 6 factors and 20 subfactors of information security risk factors have been identified for the Bank.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Fuzzy Delphi</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">information security</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">risk identifying</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Risk Management</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_53555_e7d253571231a0e9a2c9ef8db5456a67.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
