Collective information structuremodel for information security risk assessment (ISRA)

被引:4
|
作者
University Tun Hussein Onn Malaysia , Johor, Malaysia [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
J. Syst. Inf. Technol. | / 2卷 / 193-219期
关键词
Compendex;
D O I
10.1108/JSIT-02-2015-0013
中图分类号
学科分类号
摘要
Risk assessment
引用
收藏
相关论文
共 50 条
  • [31] Information Security Risk Assessment Methods for the Transportation Industry
    Deng Jing
    Song LaiQiang
    Wu XiaoBo
    INTERNATIONAL CONFERENCE ON SMART TRANSPORTATION AND CITY ENGINEERING 2021, 2021, 12050
  • [32] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [33] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [34] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [35] Towards a Risk Assessment Matrix for Information Security Workarounds
    Slabbert, Eugene
    Thomson, Kerry-Lynn
    Futcher, Lynn
    HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 2021, 613 : 164 - 178
  • [36] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [37] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 229 - 229
  • [38] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
  • [39] An initial insight into Information Security Risk Assessment practices
    Wangen, Gaute
    PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 999 - 1008
  • [40] The Validity of Information Security Risk Assessment Methods for Organizations
    Astakhova, L. V.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2020, 47 (04) : 241 - 247