Automated cyber and privacy risk management toolkit

G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …

An approach for risk prioritization in construction projects using analytic network process and decision making trial and evaluation laboratory

A Karamoozian, D Wu, CLP Chen, C Luo - IEEE Access, 2019 - ieeexplore.ieee.org
Construction projects always deal with different types of risks such as financial problems,
legal factors, availability of resources and other issues during the project lifecycle. According …

Information security vulnerability prediction based on business process model using machine learning approach

E Hariyanti, A Djunaidy, D Siahaan - Computers & Security, 2021 - Elsevier
Identifying information security vulnerabilities of a new business process resulting from a
business process redesign (BPR) must occur as early as possible. Organisations frequently …

[HTML][HTML] Enabling security risk assessment and management for business process models

DG Rosado, LE Sánchez, ÁJ Varela-Vaca… - Journal of Information …, 2024 - Elsevier
Business processes (BP) are considered the enterprise's cornerstone but are increasingly in
the spotlight of attacks. Therefore, the design of business processes must consider the …

[PDF][PDF] Cybersecurity risks of blockchain technology

IM Abdelwahed, N Ramadan… - International Journal of …, 2020 - academia.edu
Blockchain technology has become a paradigm shift to digital transactions. It has brought
massive potentials in many fields, such as financial services, energy, healthcare and Internet …

Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form

M Evans, Y He, C Luo, I Yevseyeva, H Janicke… - IEEE …, 2019 - ieeexplore.ieee.org
The objective of the research was to establish data relating to underlying causes of human
error which are the most common cause of information security incidents within a private …

[PDF][PDF] Актуальные проблемы кредитного риска в системе банковского кредитования России

ОХ Забун, ОВ Ваганова, НС Мельникова… - Экономика …, 2021 - researchgate.net
Purpose: to outline the urgent problems of credit risk in the system of bank lending in Russia.
Discussion: The article examines the role of lending in the development of the domestic …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

Sphere: Simulator of edge infrastructures for the optimization of performance and resources energy consumption

D Fernández-Cerero, A Fernández-Montes… - … Modelling Practice and …, 2020 - Elsevier
Edge computing constitutes a key paradigm to address the new requirements of areas such
as smart cars, industry 4.0, and health care, where massive amounts of heterogeneous data …

An efficient security data-driven approach for implementing risk assessment

A Shameli-Sendi - Journal of Information Security and Applications, 2020 - Elsevier
Abstract Information security implementation in an organization regardless of its business
processes will not be effective. Current approaches to risk assessment have moved towards …