An Approach to Visualising Information Security Knowledge
نویسنده
چکیده
This paper discusses the application of international standards and guidelines together with vendor sponsored accreditation programs in the development of information security curriculum and an approach for visualising
منابع مشابه
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملVisualising a DL Knowledge Base with DeLogViz
Ontologies are more than an elaborate approach to the definition and classification of information. They play a vital role in various web-oriented applications that makes a correct ontology one of the first priorities. In this paper, we present an ontology visualising and authoring tool which is enhanced by an interactive graphic user interface. With direct visual interpretation, ontology autho...
متن کاملDeveloping a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach
Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...
متن کاملEmpowering Users to become Effective Information Security and Privacy Managers in the Digital world through Computer Games
A general holistic understanding of information security and privacy issues is vital for the individual as well as for the society. Ambiguities concerning user's privacy, integrity and confidentiality are major obstacles towards a sound and functional electronic society. System designers ought to pay more attention to these threats in order to support the creation of reliable trust between cons...
متن کاملDESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کامل