نتایج جستجو برای: risk information

تعداد نتایج: 2013105  

Journal: :I. J. Network Security 2014
Chien-Cheng Huang Kwo-Jean Farn Frank Yeong-Sung Lin

The international standard of information security risk management (ISO/IEC 27005:2011(E)) adopts an iterative approach and risk assessment methodology of information security incident scenarios analyses, applying the principle of 80/20 to calculate, and therefore should be able to save cost and to increase its effectiveness. On such a basis, we propose a rigorous and systematic approach to add...

2007
Ai Cheo Yeo Md. Mahbubur Rahim Leon Miri

To protect information technology assets, effective risk management strategies need to be implemented. However, there is little empirical evidence on the factors that affect the successful undertaking of risk assessment. It is also not clearly known exactly how various factors affect the different stages of risk assessment and whether all factors are equally important across all stages. This re...

Journal: :IJHISI 2013
Fábio Costa Patrícia Santos João Varajão Luís Torres Pereira Vitor Costa

In modern day’s institutions, risk management plays a crucial role as it aims to minimize the likelihood of adverse events and contributes to improve the quality of services delivery. In health care, an effective risk management is only possible if supported by information systems that can produce high quality measures and meaningful risk indicators. These indicators will then allow the healthc...

2010
Yanxia Zheng Shaoyuan Feng Na Jiang Qingyi Meng

The reclaimed utilization of urban wastewater is an indispensable way for solving the crisis of urban water resource. In order to meet the needs of reclaimed water pollution control,the risk assessment model for reclaimed water utilization in basin are established. GIS was employed to derive all the data and evaluate model in order to get spatial variance and distribution of the risk levels on ...

Journal: :CAIS 2011
Stefan Fenz Andreas Ekelhart Thomas Neubauer

This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. As companies are increasingly exposed to information security threats, decision makers are per...

2017
Sneza Dojkovski Sharman Lichtenstein Matthew J. Warren

An effective information security culture is vital to the success of information systems governance, risk management and compliance. Small and medium size enterprises (SMEs) face special challenges developing an information security culture as they may lack the information security knowledge, skills and behaviours of large organisations. This paper reports the main findings from an interpretive...

2002
Josep Domingo-Ferrer Anna Oganian Vicenç Torra

Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contribution of specific respondents. This paper shows how to use information-theoretic concepts to measure disclosure risk for tabular data. The proposed disclosure risk measure is compatible with a broad class of disclosure...

Journal: :J. of Management Information Systems 2006
Lili Sun Rajendra P. Srivastava Theodore J. Mock

This study develops an alternative methodology for the risk analysis of information systems security (ISS). an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk factors, related countermeasures, an...

Journal: :Journal of Financial Stability 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید