Taxonomy of information security risk assessment (ISRA)

A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …

Information security maturity model for healthcare organizations in the United States

B Barnes, T Daim - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
Thisarticle provides a maturity model for information security for healthcare organizations in
the United States. Healthcare organizations are faced with increasing threats to the security …

A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF

G Wangen, C Hallstensen, E Snekkenes - International Journal of …, 2018 - Springer
In general, an information security risk assessment (ISRA) method produces risk estimates,
where risk is the product of the probability of occurrence of an event and the associated …

Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals

A Santos-Olmo, LE Sánchez, DG Rosado… - Frontiers of Computer …, 2024 - Springer
The information society depends increasingly on risk assessment and management systems
as means to adequately protect its key information assets. The availability of these systems …

Integrating information quality dimensions into information security risk management (ISRM)

P Shamala, R Ahmad, A Zolait, M Sedek - Journal of Information Security …, 2017 - Elsevier
Abstract Information security is becoming an important entity to most organizations due to
current trends in information transfer through a borderless and vulnerable world. This gives …

Information security risk analysis model using fuzzy decision theory

APH de Gusmão, LC e Silva, MM Silva, T Poleto… - International Journal of …, 2016 - Elsevier
This paper proposes a risk analysis model for information security assessment, which
identifies and evaluates the sequence of events–referred to as alternatives–in a potential …

Information security risk assessment: a method comparison

G Wangen - Computer, 2017 - ieeexplore.ieee.org
Numerous methods for information security risk assessment (ISRA) are available, yet there
is little guidance on how to choose one. Through a comprehensive risk identification …

Agent based information security framework for hybrid cloud computing

MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …

新一代电力信息网络安全架构的思考

王栋, 陈传鹏, 颜佳, 郭靓, 来风刚 - 电力系统自动化, 2016 - epjournal.csee.org.cn
能源互联网的崛起正在迅速改变电力信息网络系统架构, 电力信息网络面临着一系列新的安全
挑战. 以满足未来更高级别安全能力为出发点, 秉承继承创新, 自主可控, 协同对抗 …

A risk assessment methodology for the Internet of Things

S Sicari, A Rizzardi, D Miorandi… - Computer …, 2018 - Elsevier
Letting both data producers and data consumers be aware of the levels of security and
privacy guaranteed within an IoT-based system represents an important goal to be pursued …