TY - JOUR AB - Purpose– The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results. Design/methodology/approach– To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases. The challenges have been identified based on literature surveys and industry feedback. Findings– As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs. cost trade-offs. The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need. Originality/value– The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management. Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way. Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs. VL - 22 IS - 5 SN - 0968-5227 DO - 10.1108/IMCS-07-2013-0053 UR - https://doi.org/10.1108/IMCS-07-2013-0053 AU - Fenz Stefan AU - Heurix Johannes AU - Neubauer Thomas AU - Pechstein Fabian PY - 2014 Y1 - 2014/01/01 TI - Current challenges in information security risk management T2 - Information Management & Computer Security PB - Emerald Group Publishing Limited SP - 410 EP - 430 Y2 - 2024/04/25 ER -