ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
User Participation in Information Systems Security Risk Management
MIS Quarterly
◽
10.2307/25750689
◽
2010
◽
Vol 34
(3)
◽
pp. 503
◽
Cited By ~ 147
Author(s):
Spears
◽
Barki
Keyword(s):
Risk Management
◽
Information Systems
◽
User Participation
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Management
Download Full-text
Related Documents
Cited By
References
Domain Model for Information Systems Security Risk Management
Fundamentals of Secure System Modelling
◽
10.1007/978-3-319-61717-6_2
◽
2017
◽
pp. 17-30
Author(s):
Raimundas Matulevičius
Keyword(s):
Risk Management
◽
Information Systems
◽
Domain Model
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Management
Download Full-text
A Data-driven Assessment Model for Information Systems Security Risk Management
Journal of Computers
◽
10.4304/jcp.7.12.3103-3109
◽
2012
◽
Vol 7
(12)
◽
Cited By ~ 3
Author(s):
Nan Feng
◽
Xue Yu
Keyword(s):
Risk Management
◽
Information Systems
◽
Assessment Model
◽
Data Driven
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Management
Download Full-text
Information Systems Security Risk
Springer Texts in Business and Economics - Enterprise Risk Management Models
◽
10.1007/978-3-662-60608-7_11
◽
2020
◽
pp. 149-164
Author(s):
David L. Olson
◽
Desheng Wu
Keyword(s):
Information Systems
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
Download Full-text
Information Systems Security Risk Assessment: Harmonization with International Accounting Standards
2008 International Conference on Computational Intelligence for Modelling Control & Automation
◽
10.1109/cimca.2008.26
◽
2008
◽
Cited By ~ 4
Author(s):
Adrian Munteanu
◽
Doina Fotache
◽
Octavian Dospinescu
Keyword(s):
Risk Assessment
◽
Information Systems
◽
Accounting Standards
◽
International Accounting
◽
International Accounting Standards
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
◽
Security Risk Assessment
Download Full-text
Risk analysis and risk management models for information systems security applications
Reliability Engineering & System Safety
◽
10.1016/0951-8320(89)90027-6
◽
1989
◽
Vol 25
(2)
◽
pp. 109-130
Author(s):
Sergio B. Guarro
Keyword(s):
Risk Management
◽
Information Systems
◽
Risk Analysis
◽
Information Systems Security
◽
Security Applications
◽
Management Models
◽
Systems Security
Download Full-text
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development
Notes on Numerical Fluid Mechanics and Multidisciplinary Design - Active Flow and Combustion Control 2018
◽
10.1007/978-3-540-69534-9_40
◽
2008
◽
pp. 541-555
◽
Cited By ~ 37
Author(s):
Raimundas Matulevičius
◽
Nicolas Mayer
◽
Haralambos Mouratidis
◽
Eric Dubois
◽
Patrick Heymans
◽
...
Keyword(s):
Risk Management
◽
Information Systems
◽
Systems Development
◽
Information Systems Development
◽
Security Risk
◽
Security Risk Management
◽
Early Phases
Download Full-text
Information Systems Security Risk
Enterprise Risk Management Models
◽
10.1007/978-3-642-11474-8_3
◽
2010
◽
pp. 27-42
Author(s):
David L. Olson
◽
Desheng Wu
Keyword(s):
Information Systems
◽
Security Risk
◽
Information Systems Security
◽
Systems Security
Download Full-text
A Probabilistic Estimation Model for Information Systems Security Risk Analysis
2009 International Conference on Management and Service Science
◽
10.1109/icmss.2009.5303998
◽
2009
◽
Cited By ~ 1
Author(s):
Nan Feng
◽
Jing Xie
◽
Deying Fang
Keyword(s):
Information Systems
◽
Risk Analysis
◽
Security Risk
◽
Information Systems Security
◽
Estimation Model
◽
Probabilistic Estimation
◽
Systems Security
Download Full-text
Filling the SIEM-system nodes with the technique for calculating objective assessment to improve the reliability of expert evaluation in the technique of the information systems security risk calculation
2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)
◽
10.1109/dynamics.2016.7818961
◽
2016
◽
Author(s):
A. Z. Abdenov
◽
V. A. Trushin
Keyword(s):
Information Systems
◽
Objective Assessment
◽
Expert Evaluation
◽
Security Risk
◽
Information Systems Security
◽
Risk Calculation
◽
Systems Security
◽
System Nodes
Download Full-text
Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2014.050617
◽
2014
◽
Vol 5
(6)
◽
Author(s):
S. FARIS
◽
S.EL HASNAOUI
◽
H.MEDROMI
◽
H.IGUER
◽
A.SAYOUTI
Keyword(s):
Risk Management
◽
Information Systems
◽
Information Security
◽
Security Risk
◽
Multi Agent Systems
◽
Agent Systems
◽
Multi Agent
◽
Information Security Risk
◽
Security Risk Management
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close