An information security ontology incorporating human-behavioural implications

SE Parkin, A van Moorsel, R Coles - Proceedings of the 2nd …, 2009 - dl.acm.org
Security managers often regard human behaviour as a security liability, but they should
accommodate it within their organisation's information security management procedures. To …

A stealth approach to usable security: helping IT security managers to identify workable security solutions

S Parkin, A Van Moorsel, P Inglesant… - Proceedings of the 2010 …, 2010 - dl.acm.org
Recent advances in the research of usable security have produced many new security
mechanisms that improve usability. However, these mechanisms have not been widely …

Expert systems for information security management and audit. Implementation phase issues

M Kanatov, L Atymtayeva… - 2014 Joint 7th …, 2014 - ieeexplore.ieee.org
Auditing of information security constitutes a key part of security operations taken inside
organizations. Often information security problems must be addressed as quickly as …

Building a knowledge base for expert system in information security

L Atymtayeva, K Kozhakhmet, G Bortsova - Soft computing in artificial …, 2014 - Springer
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …

Challenges of web-based information security knowledge sharing

D Feledi, S Fenz - 2012 Seventh international conference on …, 2012 - ieeexplore.ieee.org
Nowadays information systems play a vital role for organizations and individuals, which is
why their protection is becoming increasingly important. Often, solutions are developed for …

A multi-objective decision support framework for simulation-based security control selection

E Kiesling, C Strausß, C Stummer - 2012 Seventh international …, 2012 - ieeexplore.ieee.org
In this paper, we report on our ongoing research on simulation-based information security
risk assessment and multi-objective optimization of investment in security controls. We …

[PDF][PDF] Expert system for security audit using fuzzy logic

K Kozhakhmet, G Bortsova, A Inoue… - … and cognitive science …, 2012 - academia.edu
Abstract Information security auditing plays key role in providing any organization's good
security level. Because of the high cost, time and human resource intensiveness, audit …

Assessing information security vulnerabilities and threats to implementing security mechanism and security policy audit

MAM Afifi - Journal of Computer Science, 2020 - research.skylineuniversity.ac.ae
In spite of the massive investment of money, time and efforts an organization devotes to
growth and enhancement with continuous improvements of a sound information security …

A collaborative ontology development tool for information security managers

JC Mace, S Parkin, A van Moorsel - … of the 4th symposium on computer …, 2010 - dl.acm.org
This paper explores the need for a collaborative development tool to allow information
security experts to capture their interrelated knowledge in an ontology. Such a tool would …

Development of expert system for information security audit

L Atymtayeva, K Kozhakhmet - International Journal of …, 2015 - search.proquest.com
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …