Taxonomy of information security risk assessment (ISRA)
A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …
Therefore, it must be protected as any other valuable asset. This is the objective of …
Information security maturity model for healthcare organizations in the United States
B Barnes, T Daim - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
Thisarticle provides a maturity model for information security for healthcare organizations in
the United States. Healthcare organizations are faced with increasing threats to the security …
the United States. Healthcare organizations are faced with increasing threats to the security …
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF
G Wangen, C Hallstensen, E Snekkenes - International Journal of …, 2018 - Springer
In general, an information security risk assessment (ISRA) method produces risk estimates,
where risk is the product of the probability of occurrence of an event and the associated …
where risk is the product of the probability of occurrence of an event and the associated …
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
The information society depends increasingly on risk assessment and management systems
as means to adequately protect its key information assets. The availability of these systems …
as means to adequately protect its key information assets. The availability of these systems …
Integrating information quality dimensions into information security risk management (ISRM)
Abstract Information security is becoming an important entity to most organizations due to
current trends in information transfer through a borderless and vulnerable world. This gives …
current trends in information transfer through a borderless and vulnerable world. This gives …
Information security risk analysis model using fuzzy decision theory
This paper proposes a risk analysis model for information security assessment, which
identifies and evaluates the sequence of events–referred to as alternatives–in a potential …
identifies and evaluates the sequence of events–referred to as alternatives–in a potential …
Information security risk assessment: a method comparison
G Wangen - Computer, 2017 - ieeexplore.ieee.org
Numerous methods for information security risk assessment (ISRA) are available, yet there
is little guidance on how to choose one. Through a comprehensive risk identification …
is little guidance on how to choose one. Through a comprehensive risk identification …
Agent based information security framework for hybrid cloud computing
MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …
to an unusual event, and the associated consequences for cloud organization. Information …
新一代电力信息网络安全架构的思考
王栋, 陈传鹏, 颜佳, 郭靓, 来风刚 - 电力系统自动化, 2016 - epjournal.csee.org.cn
能源互联网的崛起正在迅速改变电力信息网络系统架构, 电力信息网络面临着一系列新的安全
挑战. 以满足未来更高级别安全能力为出发点, 秉承继承创新, 自主可控, 协同对抗 …
挑战. 以满足未来更高级别安全能力为出发点, 秉承继承创新, 自主可控, 协同对抗 …
A risk assessment methodology for the Internet of Things
Letting both data producers and data consumers be aware of the levels of security and
privacy guaranteed within an IoT-based system represents an important goal to be pursued …
privacy guaranteed within an IoT-based system represents an important goal to be pursued …