Academic literature on the topic 'Information security risk'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security risk.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security risk"
Kuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (July 24, 2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.
Full textPalvia, Pankaj. "Security Risk Management: Building and Information Security Risk." Journal of Information Privacy and Security 7, no. 4 (October 2011): 72–73. http://dx.doi.org/10.1080/15536548.2011.10855925.
Full textZawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (January 1, 2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.
Full textMeriah, Ines, and Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies." International Journal of Systems and Software Security and Protection 11, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.
Full textBodin, Lawrence D., Lawrence A. Gordon, and Martin P. Loeb. "Information security and risk management." Communications of the ACM 51, no. 4 (April 2008): 64–68. http://dx.doi.org/10.1145/1330311.1330325.
Full textJohnson, M. Eric, Eric Goetz, and Shari Lawrence Pfleeger. "Security through Information Risk Management." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 45–52. http://dx.doi.org/10.1109/msp.2009.77.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textAyatollahi, Haleh, and Ghazal Shagerdi. "Information Security Risk Assessment in Hospitals." Open Medical Informatics Journal 11, no. 1 (September 14, 2017): 37–43. http://dx.doi.org/10.2174/1874431101711010037.
Full textZhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Full textDissertations / Theses on the topic "Information security risk"
Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textFaizi, Ana. "Information Security Risk Assessment in Cloud." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76120.
Full textLurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textCho, Sungback. "Risk analysis and management for information security." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404796.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textHayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textLategan, Neil. "Epirismm: an enterprise information risk management model." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/541.
Full textSedlack, Derek J. "Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/299.
Full textBooks on the topic "Information security risk"
Information security risk analysis. 2nd ed. Boca Raton: Auerbach Publications, 2005.
Find full textInformation security risk analysis. 3rd ed. Boca Raton, FL: Auerbach Publications, 2010.
Find full textKlipper, Sebastian. Information Security Risk Management. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08774-6.
Full textKlipper, Sebastian. Information Security Risk Management. Wiesbaden: Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9870-8.
Full textHarkins, Malcolm. Managing Risk and Information Security. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5114-9.
Full textHarkins, Malcolm W. Managing Risk and Information Security. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1455-8.
Full textCalder, Alan. Information security risk management for ISO27001/ISO27002. Cambridgeshire: IT Governance Pub., 2010.
Find full textWheeler, Evan. Security risk management: Building an information security risk management program from the ground up. Amsterdam: Syngress, 2011.
Find full textBook chapters on the topic "Information security risk"
Basin, David, Patrick Schaller, and Michael Schläpfer. "Risk Management." In Applied Information Security, 117–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_8.
Full textvon Solms, S. H., and R. von Solms. "IT Risk Management." In Information Security Governance, 1–14. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_8.
Full textDashti, Salimeh, Paolo Giorgini, and Elda Paja. "Information Security Risk Management." In Lecture Notes in Business Information Processing, 18–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70241-4_2.
Full textOlson, David L., and Desheng Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 149–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60608-7_11.
Full textOlson, David L., and Desheng Wu. "Information Systems Security Risk." In Enterprise Risk Management Models, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11474-8_3.
Full textOlson, David L., and Desheng Dash Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53785-5_11.
Full textKaryda, Maria. "Information Security Risk Treatment." In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1450-1.
Full textBijon, Khalid Zaman, Ram Krishnan, and Ravi Sandhu. "Risk-Aware RBAC Sessions." In Information Systems Security, 59–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_5.
Full textArmando, Alessandro, Michele Bezzi, Nadia Metoui, and Antonino Sabetta. "Risk-Aware Information Disclosure." In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 266–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9_17.
Full textMcIlwraith, Angus. "Employee risk." In Information Security and Employee Behaviour, 29–53. 2nd ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9780429281785-3.
Full textConference papers on the topic "Information security risk"
Dreyfuss, Michael, and Yahel Giat. "Identifying Security Risk Modules in Information Systems." In InSITE 2016: Informing Science + IT Education Conferences: Lithuania. Informing Science Institute, 2016. http://dx.doi.org/10.28945/3436.
Full textGrishaeva, Svetlana A., and Vitaly I. Borzov. "Information Security Risk Management." In 2020 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2020. http://dx.doi.org/10.1109/itqmis51053.2020.9322901.
Full textBlakley, Bob, Ellen McDermott, and Dan Geer. "Information security is information risk management." In the 2001 workshop. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/508171.508187.
Full textZivic, Predrag. "Information risk and security modeling." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2005. http://dx.doi.org/10.1117/12.604602.
Full textTukur, Yusuf Muhammad. "Mobile Information Security Risk Calculator." In 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, 2019. http://dx.doi.org/10.1109/ficloudw.2019.00031.
Full textSemin, Valeriy G., Elena G. Shmakova, and Alexei B. Los. "The information security risk management." In 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2017. http://dx.doi.org/10.1109/itmqis.2017.8085774.
Full textMattord, Herbert J. "Rethinking risk-based information security." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409921.
Full textRenaud, Karen, and Merrill Warkentin. "Risk Homeostasis in Information Security." In NSPW '17: 2017 New Security Paradigms Workshop. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3171533.3171534.
Full textKiran, K. V. D., L. S. S. Reddy, Velagapudi Pavan Kumar, and Kalluri Krishna Sai Dheeraj. "Information security Risk Management in Critical informative Systems." In 2014 Conference on IT in Business, Industry and Government (CSIBIG). IEEE, 2014. http://dx.doi.org/10.1109/csibig.2014.7056942.
Full textKlets, Dmytro, Igor V. Gritsuk, Andrii Makovetskyi, Nickolay Bulgakov, Mikhail Podrigalo, Ihor Kyrychenko, Olena Volska, and Nikolai Kyzminec. "Information Security Risk Management of Vehicles." In WCX World Congress Experience. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2018. http://dx.doi.org/10.4271/2018-01-0015.
Full textReports on the topic "Information security risk"
Heuer, Jr, and Richards J. Crime and Security Risk: Background Information for Security Personnel. Fort Belvoir, VA: Defense Technical Information Center, August 1993. http://dx.doi.org/10.21236/ada269733.
Full textCaralli, Richard A., James F. Stevens, Lisa R. Young, and William R. Wilson. Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process. Fort Belvoir, VA: Defense Technical Information Center, May 2007. http://dx.doi.org/10.21236/ada470450.
Full textLippiatt, Barbara C., and Sieglinde K. Fuller. An analytical approach to cost-effective, risk-based budgeting for federal information system security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7385.
Full textErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Full textGarcía-Mantilla, Daniel. PLAC Network Best Practices Series: Target-Income Design of Incentives, Benchmark Portfolios and Performance Metrics for Pension Funds. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003599.
Full textIdris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.
Full textKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), February 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textKramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.
Full textManaging information security risk :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-39.
Full textGuide for applying the risk management framework to federal information systems : a security life cycle approach. National Institute of Standards and Technology, June 2014. http://dx.doi.org/10.6028/nist.sp.800-37r1.
Full text