Hausarbeiten logo
Shop
Shop
Tutorials
De En
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Go to shop › Computer Science - Commercial Information Technology

Vergleich des Risikoverständnisses in den Disziplinen Wirtschaftsinformatik und Soziologie

Comparison of the risk understanding in the disciplines Information Systems and Sociology

Title: Vergleich des Risikoverständnisses in den Disziplinen Wirtschaftsinformatik und Soziologie

Bachelor Thesis , 2010 , 59 Pages , Grade: 1,3

Autor:in: Thomas Niedermeier (Author)

Computer Science - Commercial Information Technology

Excerpt & Details   Look inside the ebook
Summary Excerpt Details

In the sociology of risk, there are two different fields of research: risk objectivism and risk constructivism. The former deals with the actual increase of danger due to greater pressures through new technologies. Risk constructivism deals with the conception, perception and evaluation of risks in the social environment. Beck is a representative of objectivism. In his view, risk is produced by modern society itself. New risks are constantly emerging as a result of technological progress. This means that humans create their own risk environment and must now deal with it. Luhmann sees risk from a systems theory perspective. A social system is a process of social interactions between acting entities. According to Luhmann, risk only arises when there is communication about it. Furthermore, Luhmann sees the distinction between risk and safety as misleading and illusory. He proposes the concept of risk and danger. Douglas and Wildavsky represent neither an objective nor constructive notion of risk. They see risk as a collective construct that is shaped by the social context of the respective actors. The perception of risk is a social process. With the help of the grid-group model, a society can be divided into four cultural forms with specific risk-related characteristics. The cultural forms are individualism, hierarchy, fatalism and egalitarianism. The understanding of risk in information systems is analyzed based on software project management and IT security. The challenge in software development is to find the best position between costs and performances in order to satisfy both internal and external stakeholders. This is attempted with four approaches to risk management: risk checklists, an analysis framework, process models and risk response strategies. In this connection, it‘s worth noting that risks are perceived differently. Different risk assessments arise in various countries and different management levels. In the area of IT security, the ranking of risks varies in different countries. This difference in ranking can be explained with the help of the technology threat avoidance theory. The evaluation of the consequences and information plays a role in countering the threat. There are also two sociological components. The first is the informal influence. ―Informal‖ is the quantity of information that makes its environment available. The second, ―normative‖ influence deals with social norms and demands that are used to counter the risk.

Excerpt


Table of Content

1 Introduction and Organization

2 Understanding of Risk in Sociology

2.1 The concept of risk society from Ulrich Beck

2.2 Risk as a Collective Construct from the Culture

2.3 Risk in the Context of Communications and Systems Theory from Luhmann

2.4 Risk and Govermantiality

3 Risks in Information Systems

3.1 Risks in Software Project Management

3.1.1 Definition of Project, Project Risks and Some Categorization

3.1.2 Management Understanding of Risk and their Limitation

3.1.3 Risk Management in Software Projects

3.1.4 Effect of Coordination and Uncertainty on Software Project Performance

3.1.5 Risk Categories and their Effect on Product and Process Performance

3.1.6 Critical Risks in Outsourced IT projects

3.1.7 Risk Factors, Categories and their Observance

3.1.8 Contingency Model of Software Project Risk Management

3.1.9 Risk Perception and Risk Propensity on the Decision to Continue a Project

3.2 Risks in the Field of IT Security

3.2.1 Development and Progress of IT Security: From Past to Present

3.2.2 Categorization of IT Security Threats

3.2.3 Ranking and Perception of IT Threats

3.2.4 Risk Perception: The Technology Threat Avoidance Theory

3.2.5 Risk Perception Amongst Managers

3.2.6 User Participation in IS Security Risk Management

3.2.7 IT Security From an Entrepreneurial Standpoint

3.2.8 Differences in Computer Ethics

4 Comparison of Risk understanding in Information Systems and Sociology

4.1 Comparison of Risk Characteristics

4.2 The Culture Theory in Information Systems

4.3 Risk Perception, Risk Environment and Risk Transformation

5 Discussion and Outlook

Research Objectives and Themes

The primary objective of this work is to identify and compare the sociological understanding of risk with the practical application and perception of risk within the fields of Information Systems, specifically Software Project Management and IT Security. It explores how sociological frameworks can be transferred to IT environments to explain organizational risk cultures and user behaviors.

  • Theoretical foundations of sociological risk research (Beck, Luhmann, Douglas, Foucault).
  • Risk identification and management strategies in software development projects.
  • Mechanisms of risk perception and threat avoidance in IT security (TTAT).
  • Cultural impacts and organizational awareness on risk management practices.

Excerpt from the Book

3.1.2 Management Understanding of Risk and their Limitation

The risk-based understanding of information systems goes back to the management theory of the 80‘s (Bannerman 2008, 2). March and Shapira (March/Shapira 1987, 1-15) compared the traditional risk and decision theory with the decisions of managers from Canadian firms. At that time, risk was seen as a variation of the probability of a positive or negative result from a previous decision. Risk is still sometimes viewed in this light. 80% of managers only see negative consequences from risks. Results with a low probability are ignored due to a significance threshold. However, if the result has a significant consequential loss or risk, it falls back into the focus of the observer. Decisions with positive results are only linked with the decision-making alternatives. The best possible alternative is selected and a conclusion is drawn that it will have the most positive outcome. Managers float in the idea that they can control risk and that it therefore poses no danger. Risk perspective is not just a personal preference. Social norms and organizational expectations have a significant impact on the observer. As a result, the behavior of the manager is different from the management theory.

The findings of March and Shapira are transferred to software development. Bannerman (Bannerman 2008, 2-3) describes dealing with risk in software projects as identifying all possible risk factors before the project begins in order to reduce the probability of a negative result occurring. The identified risks are then estimated in order to find those with the most negative influence. These high risk factors are precisely controlled in order to avoid a potential loss. This process is constantly updated and maintained. However, risks can only be minimized by consulting predefined danger lists or by reaching a threshold. Bannerman sees four limitations based on this view of risk.

Summary of Chapters

1 Introduction and Organization: This chapter outlines the motivation for the study, establishing the connection between sociological risk theory and modern Information Systems challenges.

2 Understanding of Risk in Sociology: This section provides a theoretical overview of risk, covering objectivist and constructivist views from key thinkers like Beck, Douglas, Luhmann, and Foucault.

3 Risks in Information Systems: This chapter analyzes how risk is managed and perceived in Software Project Management and IT Security, including specific models like TTAT and contingency frameworks.

4 Comparison of Risk understanding in Information Systems and Sociology: This section synthesizes the findings, comparing sociological constructs with IT management practices to identify how culture influences risk perception.

5 Discussion and Outlook: The conclusion summarizes how sociological insights can enhance corporate risk culture and suggests directions for future research into the alignment of risk management with organizational values.

Key Words

Social risk theory, risk sociology, IT security risk, software project risk, Ulrich Beck, Niklas Luhmann, Mary Douglas, Michel Foucault, risk perception, grid-group model, IT security, software development, risk management, culture theory, corporate risk culture.

Frequently Asked Questions

What is the core focus of this research paper?

The paper examines the relationship between sociological theories of risk and the practical risk management approaches found in Information Systems, particularly within software project management and IT security.

What are the primary thematic fields covered in this study?

The main themes include the definition and sociological categorization of risk, practical risk management strategies in software projects, IT security threats, and the role of organizational culture in shaping risk perception.

What is the central research goal?

The goal is to bridge the gap between abstract sociological risk theories and applied IT risk management to better understand why organizations and individuals perceive and react to risks in specific, often culturally conditioned, ways.

Which scientific methods are employed?

The research primarily utilizes a comparative, theory-based analytical approach. It synthesizes literature from both sociology and information systems to establish a conceptual framework for interpreting risk management practices.

What is addressed in the main part of the paper?

The main body details the theoretical perspectives of sociologists (Beck, Luhmann, Douglas, Foucault) and analyzes technical risk management methods such as risk checklists, process models, and the Technology Threat Avoidance Theory (TTAT).

Which keywords characterize this work?

Key terms include social risk theory, risk sociology, IT security risk, software project risk, and organizational culture.

How does the author define risk in the context of IT Security?

Following Luhmann and others, the author distinguishes between risk (attributable to personal decisions) and danger (attributed to the external environment), arguing that security measures often create an "illusion of safety."

What role does the 'grid-group model' play in this analysis?

The grid-group model is used to classify different forms of social organization and their specific risk perceptions, which the author subsequently applies to explain varying levels of security policy adherence within corporate environments.

Excerpt out of 59 pages  - scroll top

Details

Title
Vergleich des Risikoverständnisses in den Disziplinen Wirtschaftsinformatik und Soziologie
Subtitle
Comparison of the risk understanding in the disciplines Information Systems and Sociology
College
Technical University of Munich
Grade
1,3
Author
Thomas Niedermeier (Author)
Publication Year
2010
Pages
59
Catalog Number
V162186
ISBN (eBook)
9783640763870
ISBN (Book)
9783640764228
Language
English
Tags
Social risk theory risk sociology IT security risk software project risk
Product Safety
GRIN Publishing GmbH
Quote paper
Thomas Niedermeier (Author), 2010, Vergleich des Risikoverständnisses in den Disziplinen Wirtschaftsinformatik und Soziologie, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/162186
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  59  pages
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Payment & Shipping
  • About us
  • Contact
  • Privacy
  • Terms
  • Imprint