Kansei Information Security Assessment (KISA): Characterizing Trust as Stimuli for User Emotional Assessment in Information Security
نویسندگان
چکیده
منابع مشابه
E-Government Information Security Trust Assessment Model
The establishment of trust in e-government information security is of prominent importance for the full use of the actual potential of e-government. In this article, the trust creation mechanism to e-government information security is analyzed, and the model for the assessment of trust is suggested. The model is based on integration of reputation values calculated according to trust data collec...
متن کاملInformation Security Risk Assessment in Hospitals
Background To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective The aim of this study was to assess the risks threatening information security in the hospitals located in one of t...
متن کاملCollective information structure model for Information Security Risk Assessment (ISRA)
Purpose – Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However, the existence of numerous different types of risk assessment methods, standards, guidelines and specifications readily available causes the organizations to face the daunting ta...
متن کاملInformation Asset Valuation Method for Information Technology Security Risk Assessment
The information security strategic plan is necessarily comprehensive, including business processes, people, and physical infrastructure, as well as the information system. The Security risk evaluation needs the calculating asset value to predict the impact and consequence of security incidents. The return on security investment (ROSI) is defining the value for all invested in terms of security ...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2016
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2016/v9is1/106846