A two-phase quantitative methodology for enterprise information security risk analysis

被引:0
|
作者
机构
[1] Bhattacharjee, Jaya
[2] Sengupta, Anirban
[3] Mazumdar, Chandan
[4] Barik, Mridul Sankar
来源
| 1600年 / CRL Publishing卷 / 29期
关键词
Security of data - Risk management - Risk assessment - Risk perception;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Analysis and design methodology for enterprise information system development
    Ye, W
    Chang, E
    Brankovic, L
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 88 - 93
  • [22] A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0
    Zhao, Shijun
    Zhang, Qianying
    [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 40 - 57
  • [23] Quantitative metallography of two-phase titanium alloys
    Chraponski, J
    Szkliniarz, W
    [J]. MATERIALS CHARACTERIZATION, 2001, 46 (2-3) : 149 - 154
  • [24] Statistics Based Information Security Risk Management Methodology
    Saluja, Upasna
    Idris, Dato Norbik Bashah
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 117 - 123
  • [25] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    [J]. INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [26] Enterprise architecture to enhance security and risk management of information systems
    School of Software, Tsinghua University, Beijing 100084, China
    [J]. Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):
  • [27] Two-phase methodology for customized product design and manufacturing
    Kamrani, Ali
    Smadi, Hazem
    Salhieh, Sa'Ed M.
    [J]. JOURNAL OF MANUFACTURING TECHNOLOGY MANAGEMENT, 2012, 23 (03) : 370 - 401
  • [28] METHODOLOGY OF QUANTITATIVE PHASE MAGNETIC ANALYSIS
    APAEV, BA
    GALKIN, BF
    [J]. INDUSTRIAL LABORATORY, 1990, 56 (10): : 1201 - 1203
  • [29] Quantitative phase-field modeling of two-phase growth
    Folch, R
    Plapp, M
    [J]. PHYSICAL REVIEW E, 2005, 72 (01):
  • [30] Two-Phase Security Protection for the Internet of Things Object
    Suryani, Vera
    Sulistyo, Selo
    Widyawan, Widyawan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1431 - 1437