ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information Systems Security Risk
Enterprise Risk Management Models
◽
10.1007/978-3-642-11474-8_3
◽
2010
◽
pp. 27-42
Author(s):
David L. Olson
◽
Desheng Wu
Keyword(s):
Information Systems
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
Download Full-text
Related Documents
Cited By
References
Information Systems Security Risk
Springer Texts in Business and Economics - Enterprise Risk Management Models
◽
10.1007/978-3-662-60608-7_11
◽
2020
◽
pp. 149-164
Author(s):
David L. Olson
◽
Desheng Wu
Keyword(s):
Information Systems
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
Download Full-text
Information Systems Security Risk Assessment: Harmonization with International Accounting Standards
2008 International Conference on Computational Intelligence for Modelling Control & Automation
◽
10.1109/cimca.2008.26
◽
2008
◽
Cited By ~ 4
Author(s):
Adrian Munteanu
◽
Doina Fotache
◽
Octavian Dospinescu
Keyword(s):
Risk Assessment
◽
Information Systems
◽
Accounting Standards
◽
International Accounting
◽
International Accounting Standards
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Assessment
Download Full-text
A Probabilistic Estimation Model for Information Systems Security Risk Analysis
2009 International Conference on Management and Service Science
◽
10.1109/icmss.2009.5303998
◽
2009
◽
Cited By ~ 1
Author(s):
Nan Feng
◽
Jing Xie
◽
Deying Fang
Keyword(s):
Information Systems
◽
Risk Analysis
◽
Security Risk
◽
Information Systems Security
◽
Estimation Model
◽
Probabilistic Estimation
◽
Systems Security
Download Full-text
Filling the SIEM-system nodes with the technique for calculating objective assessment to improve the reliability of expert evaluation in the technique of the information systems security risk calculation
2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)
◽
10.1109/dynamics.2016.7818961
◽
2016
◽
Author(s):
A. Z. Abdenov
◽
V. A. Trushin
Keyword(s):
Information Systems
◽
Objective Assessment
◽
Expert Evaluation
◽
Security Risk
◽
Information Systems Security
◽
Risk Calculation
◽
Systems Security
◽
System Nodes
Download Full-text
User Participation in Information Systems Security Risk Management
MIS Quarterly
◽
10.2307/25750689
◽
2010
◽
Vol 34
(3)
◽
pp. 503
◽
Cited By ~ 147
Author(s):
Spears
◽
Barki
Keyword(s):
Risk Management
◽
Information Systems
◽
User Participation
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Management
Download Full-text
Information Systems Security Risk
Springer Texts in Business and Economics - Enterprise Risk Management Models
◽
10.1007/978-3-662-53785-5_11
◽
2017
◽
pp. 145-160
Author(s):
David L. Olson
◽
Desheng Dash Wu
Keyword(s):
Information Systems
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
Download Full-text
Domain Model for Information Systems Security Risk Management
Fundamentals of Secure System Modelling
◽
10.1007/978-3-319-61717-6_2
◽
2017
◽
pp. 17-30
Author(s):
Raimundas Matulevičius
Keyword(s):
Risk Management
◽
Information Systems
◽
Domain Model
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Management
Download Full-text
An information systems security risk assessment model under uncertain environment
Applied Soft Computing
◽
10.1016/j.asoc.2010.06.005
◽
2011
◽
Vol 11
(7)
◽
pp. 4332-4340
◽
Cited By ~ 37
Author(s):
Nan Feng
◽
Minqiang Li
Keyword(s):
Risk Assessment
◽
Information Systems
◽
Assessment Model
◽
Risk Assessment Model
◽
Security Risk
◽
Information Systems Security
◽
Uncertain Environment
◽
Systems Security
◽
Security Risk Assessment
Download Full-text
An Integrative Model of Information Security Awareness for Assessing Information Systems Security Risk
2012 45th Hawaii International Conference on System Sciences
◽
10.1109/hicss.2012.104
◽
2012
◽
Cited By ~ 11
Author(s):
Roberto J. Mejias
Keyword(s):
Information Systems
◽
Information Security
◽
Integrative Model
◽
Security Awareness
◽
Security Risk
◽
Information Systems Security
◽
Information Security Awareness
◽
Systems Security
Download Full-text
Index Reduction for Information Systems Security Risk Assessment Based on Rough Set Theory and Hierarchic Analysis
2009 Third International Symposium on Intelligent Information Technology Application
◽
10.1109/iita.2009.425
◽
2009
◽
Author(s):
Yu Fu
◽
Xiaoping Wu
◽
Tingting Zhu
Keyword(s):
Risk Assessment
◽
Information Systems
◽
Set Theory
◽
Rough Set
◽
Rough Set Theory
◽
Security Risk
◽
Information Systems Security
◽
Index Reduction
◽
Systems Security
◽
Security Risk Assessment
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close