An information security ontology incorporating human-behavioural implications
SE Parkin, A van Moorsel, R Coles - Proceedings of the 2nd …, 2009 - dl.acm.org
Security managers often regard human behaviour as a security liability, but they should
accommodate it within their organisation's information security management procedures. To …
accommodate it within their organisation's information security management procedures. To …
A stealth approach to usable security: helping IT security managers to identify workable security solutions
S Parkin, A Van Moorsel, P Inglesant… - Proceedings of the 2010 …, 2010 - dl.acm.org
Recent advances in the research of usable security have produced many new security
mechanisms that improve usability. However, these mechanisms have not been widely …
mechanisms that improve usability. However, these mechanisms have not been widely …
Expert systems for information security management and audit. Implementation phase issues
M Kanatov, L Atymtayeva… - 2014 Joint 7th …, 2014 - ieeexplore.ieee.org
Auditing of information security constitutes a key part of security operations taken inside
organizations. Often information security problems must be addressed as quickly as …
organizations. Often information security problems must be addressed as quickly as …
Building a knowledge base for expert system in information security
L Atymtayeva, K Kozhakhmet, G Bortsova - Soft computing in artificial …, 2014 - Springer
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …
important. There is an urgent need in implementing and assessing information security at a …
Challenges of web-based information security knowledge sharing
D Feledi, S Fenz - 2012 Seventh international conference on …, 2012 - ieeexplore.ieee.org
Nowadays information systems play a vital role for organizations and individuals, which is
why their protection is becoming increasingly important. Often, solutions are developed for …
why their protection is becoming increasingly important. Often, solutions are developed for …
A multi-objective decision support framework for simulation-based security control selection
In this paper, we report on our ongoing research on simulation-based information security
risk assessment and multi-objective optimization of investment in security controls. We …
risk assessment and multi-objective optimization of investment in security controls. We …
[PDF][PDF] Expert system for security audit using fuzzy logic
K Kozhakhmet, G Bortsova, A Inoue… - … and cognitive science …, 2012 - academia.edu
Abstract Information security auditing plays key role in providing any organization's good
security level. Because of the high cost, time and human resource intensiveness, audit …
security level. Because of the high cost, time and human resource intensiveness, audit …
Assessing information security vulnerabilities and threats to implementing security mechanism and security policy audit
MAM Afifi - Journal of Computer Science, 2020 - research.skylineuniversity.ac.ae
In spite of the massive investment of money, time and efforts an organization devotes to
growth and enhancement with continuous improvements of a sound information security …
growth and enhancement with continuous improvements of a sound information security …
A collaborative ontology development tool for information security managers
This paper explores the need for a collaborative development tool to allow information
security experts to capture their interrelated knowledge in an ontology. Such a tool would …
security experts to capture their interrelated knowledge in an ontology. Such a tool would …
Development of expert system for information security audit
L Atymtayeva, K Kozhakhmet - International Journal of …, 2015 - search.proquest.com
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …
important. There is an urgent need in implementing and assessing information security at a …