Using Dashboards to Reach Acceptable Risk in Statistics Data Centers Through Risk Assessment and Impact

Part of the Service Science: Research and Innovations in the Service Economy book series (SSRI)


A well designed and integrated database used to present risk management information by using a dashboard interface supported by real time risk management data makes it easy for risk managers to reach a full understanding of the surrounding threats and allows them to find the proper and right controls to mitigate them. The chapter presents a case study for a statistics data center that shows that the calculation of total risk at the organization level is possible by using the proposed risk database that supports decision makers when threats hit the organization. The chapter also shows that presenting the risk level on a dashboard viewer makes risk level clearer for a decision maker in a statistics data center and assists in the creation of a tool to follow-up risk management since the time a threat hits till the time of its mitigation.


Data centers Risk management Dashboards 


  1. Almadhoob, A., Valverde, R.: Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans. J. Theor. Appl. Inf. Technol. 65(1), 274–292 (2014)Google Scholar
  2. Calder, A., Watkins, S.: I. T. Governance. A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page, London (2008)Google Scholar
  3. Dawson, C.W.: Projects in Computing and Information Systems: A Student’s Guide. Pearson Education, Harlow (2009)Google Scholar
  4. DeSouza, E., Valverde, R.: An employee-based risk management strategy for reducing security incidents in a Canadian PHIPA regulated environment. In: International Conference on Innovations in Computer Science and Information Technology (ICICSIT -2015), Hyderabad (2015)Google Scholar
  5. Harris, S.: CISSP All-in-One Exam Guide. McGraw-Hill Inc., New York (2008)Google Scholar
  6. Khan, N.A., Valverde, R.: The use of RFID based supply chain systems in data centers for the improvement of the performance of financial institutions. Eng. Manage. Res. 3(1), 1–24 (2014)CrossRefGoogle Scholar
  7. Kouns, J., Minoli, D.: Information technology risk management in entreprise environments. Wiley, Denvers (2010)Google Scholar
  8. Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. CRC Press, Boca Raton (2006)Google Scholar
  9. Nijburg, E., Valverde, R.: A business continuity monitoring model for distributed architectures: a case study. Int. J. Appl. Sci. Technol. 1(2), 5–14 (2011)Google Scholar
  10. Stephens, J., Valverde, R.: Security of e-procurement transactions in supply chain reengineering. Comput. Inf. Sci. 6(3), 1–20 (2013)Google Scholar
  11. Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800-30. risk management guide for information technology systems. National Institute of Standards and Technology, Gaithersburg (2002)Google Scholar
  12. Tan, D.: Quantitative risk analysis step-by-step. SANS Institute, Bethesda (2002)Google Scholar
  13. Wheeler, E.: Security risk management: building an information security risk management program from the ground up. Elsevier, Waltham (2011)Google Scholar
  14. Wolden, M., Valverde, R., Talla, M.: The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system. IFAC-PapersOnLine. 48(3), 1846–1852 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Dubai Statistics CenterDubaiUnited Arab Emirates
  2. 2.Department of Supply Chain and Business Technology ManagementConcordia UniversityMontrealCanada
  3. 3.CONAICMexico CityMexico

Personalised recommendations