Automated cyber and privacy risk management toolkit
G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …
number of risk assessment methodologies and software tools are available, it is most often …
An approach for risk prioritization in construction projects using analytic network process and decision making trial and evaluation laboratory
Construction projects always deal with different types of risks such as financial problems,
legal factors, availability of resources and other issues during the project lifecycle. According …
legal factors, availability of resources and other issues during the project lifecycle. According …
Information security vulnerability prediction based on business process model using machine learning approach
Identifying information security vulnerabilities of a new business process resulting from a
business process redesign (BPR) must occur as early as possible. Organisations frequently …
business process redesign (BPR) must occur as early as possible. Organisations frequently …
[HTML][HTML] Enabling security risk assessment and management for business process models
Business processes (BP) are considered the enterprise's cornerstone but are increasingly in
the spotlight of attacks. Therefore, the design of business processes must consider the …
the spotlight of attacks. Therefore, the design of business processes must consider the …
[PDF][PDF] Cybersecurity risks of blockchain technology
IM Abdelwahed, N Ramadan… - International Journal of …, 2020 - academia.edu
Blockchain technology has become a paradigm shift to digital transactions. It has brought
massive potentials in many fields, such as financial services, energy, healthcare and Internet …
massive potentials in many fields, such as financial services, energy, healthcare and Internet …
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
The objective of the research was to establish data relating to underlying causes of human
error which are the most common cause of information security incidents within a private …
error which are the most common cause of information security incidents within a private …
[PDF][PDF] Актуальные проблемы кредитного риска в системе банковского кредитования России
ОХ Забун, ОВ Ваганова, НС Мельникова… - Экономика …, 2021 - researchgate.net
Purpose: to outline the urgent problems of credit risk in the system of bank lending in Russia.
Discussion: The article examines the role of lending in the development of the domestic …
Discussion: The article examines the role of lending in the development of the domestic …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
Sphere: Simulator of edge infrastructures for the optimization of performance and resources energy consumption
D Fernández-Cerero, A Fernández-Montes… - … Modelling Practice and …, 2020 - Elsevier
Edge computing constitutes a key paradigm to address the new requirements of areas such
as smart cars, industry 4.0, and health care, where massive amounts of heterogeneous data …
as smart cars, industry 4.0, and health care, where massive amounts of heterogeneous data …
An efficient security data-driven approach for implementing risk assessment
A Shameli-Sendi - Journal of Information Security and Applications, 2020 - Elsevier
Abstract Information security implementation in an organization regardless of its business
processes will not be effective. Current approaches to risk assessment have moved towards …
processes will not be effective. Current approaches to risk assessment have moved towards …