Journal articles on the topic 'Information security risk'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security risk.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (July 24, 2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.
Full textPalvia, Pankaj. "Security Risk Management: Building and Information Security Risk." Journal of Information Privacy and Security 7, no. 4 (October 2011): 72–73. http://dx.doi.org/10.1080/15536548.2011.10855925.
Full textZawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (January 1, 2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.
Full textMeriah, Ines, and Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies." International Journal of Systems and Software Security and Protection 11, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.
Full textBodin, Lawrence D., Lawrence A. Gordon, and Martin P. Loeb. "Information security and risk management." Communications of the ACM 51, no. 4 (April 2008): 64–68. http://dx.doi.org/10.1145/1330311.1330325.
Full textJohnson, M. Eric, Eric Goetz, and Shari Lawrence Pfleeger. "Security through Information Risk Management." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 45–52. http://dx.doi.org/10.1109/msp.2009.77.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textAyatollahi, Haleh, and Ghazal Shagerdi. "Information Security Risk Assessment in Hospitals." Open Medical Informatics Journal 11, no. 1 (September 14, 2017): 37–43. http://dx.doi.org/10.2174/1874431101711010037.
Full textZhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Full textWu, Yong, Linping Wang, Dong Cheng, and Tao Dai. "Information security decisions of firms considering security risk interdependency." Expert Systems with Applications 178 (September 2021): 114990. http://dx.doi.org/10.1016/j.eswa.2021.114990.
Full textRevenkov, Pavel, and Dmitry Krupenko. "Mobile banking: Information Security Risk Assessment." Voprosy kiberbezopasnosti, no. 2(30) (2019): 21–28. http://dx.doi.org/10.21681/2311-3456-2019-2-21-28.
Full textGauci, Donald. "Management: Information Security: Risk and Reward." Journal of Petroleum Technology 59, no. 05 (May 1, 2007): 36–39. http://dx.doi.org/10.2118/0507-0036-jpt.
Full textPage, V., M. Dixon, and I. Choudhury. "Security risk mitigation for information systems." BT Technology Journal 25, no. 1 (January 2007): 118–27. http://dx.doi.org/10.1007/s10550-007-0014-8.
Full textKarabacak, Bilge, and Ibrahim Sogukpinar. "ISRAM: information security risk analysis method." Computers & Security 24, no. 2 (March 2005): 147–59. http://dx.doi.org/10.1016/j.cose.2004.07.004.
Full textWei, June, Binshan Lin, and Meiga Loho-Noya. "Development of an E-Healthcare Information Security Risk Assessment Method." Journal of Database Management 24, no. 1 (January 2013): 36–57. http://dx.doi.org/10.4018/jdm.2013010103.
Full textAnton, Nicolae, and Anișor Nedelcu. "The Systemic Approach to Information Protection in Relation to Risk in an Integrated Information Security System." Applied Mechanics and Materials 760 (May 2015): 689–94. http://dx.doi.org/10.4028/www.scientific.net/amm.760.689.
Full textKessler, Stacey R., Shani Pindek, Gary Kleinman, Stephanie A. Andel, and Paul E. Spector. "Information security climate and the assessment of information security risk among healthcare employees." Health Informatics Journal 26, no. 1 (March 14, 2019): 461–73. http://dx.doi.org/10.1177/1460458219832048.
Full textCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Full textKaushal, Priyanka, and Rizwan Khan. "A Review on Information Security." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 122. http://dx.doi.org/10.23956/ijarcsse.v8i4.646.
Full textWilliams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (September 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textZhao, Xia, Ling Xue, and Andrew B. Whinston. "Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements." Journal of Management Information Systems 30, no. 1 (July 2013): 123–52. http://dx.doi.org/10.2753/mis0742-1222300104.
Full textMokhor, Volodymyr, and Vasyl Tsurkan. "Probit-method for information security risk assessment." Collection "Information technology and security" 2, no. 1 (September 30, 2013): 65–71. http://dx.doi.org/10.20535/2411-1031.2013.2.1.58531.
Full textM. El Hadi, Mohamed. "Assessing Information Security Risk Management in Organizations." مجلة الجمعیة المصریة لنظم المعلومات وتکنولوجیا الحاسبات 14, no. 14 (April 1, 2014): 18–32. http://dx.doi.org/10.21608/jstc.2014.119449.
Full textGupta, Ayush. "Strategic Dimensions of Information Security Risk Management." Journal of Business Management and Information Systems 6, no. 2 (December 31, 2019): 1–9. http://dx.doi.org/10.48001/jbmis.2019.0602001.
Full textBorkhalenko, V. A. "Insurance mechanisms in information security risk management." Экономический анализ: теория и практика 16, no. 2 (February 27, 2017): 379–88. http://dx.doi.org/10.24891/ea.16.2.379.
Full textFazlida, M. R., and Jamaliah Said. "Information Security: Risk, Governance and Implementation Setback." Procedia Economics and Finance 28 (2015): 243–48. http://dx.doi.org/10.1016/s2212-5671(15)01106-5.
Full textGUAN, Ji-zheng, Ming-tao LEI, Xiao-lu ZHU, and Jian-yi LIU. "Knowledge-based information security risk assessment method." Journal of China Universities of Posts and Telecommunications 20 (December 2013): 60–63. http://dx.doi.org/10.1016/s1005-8885(13)60220-4.
Full textPoore, Ralph Spencer. "Valuing Information Assets for Security Risk Management." Information Systems Security 9, no. 4 (September 2000): 1–7. http://dx.doi.org/10.1201/1086/43311.9.4.20000910/31364.4.
Full textWangen, Gaute. "Information Security Risk Assessment: A Method Comparison." Computer 50, no. 4 (April 2017): 52–61. http://dx.doi.org/10.1109/mc.2017.107.
Full textRyan, Julie J. C. H., and Daniel J. Ryan. "Performance Metrics for Information Security Risk Management." IEEE Security & Privacy 6, no. 5 (September 2008): 38–44. http://dx.doi.org/10.1109/msp.2008.125.
Full textWei, June, Lai C. Liu, Kai S. Koong, and Yi Li. "A risk assessment model for information security." International Journal of Business and Systems Research 5, no. 2 (2011): 158. http://dx.doi.org/10.1504/ijbsr.2011.038800.
Full textTaylor, Richard G. "Potential Problems with Information Security Risk Assessments." Information Security Journal: A Global Perspective 24, no. 4-6 (October 27, 2015): 177–84. http://dx.doi.org/10.1080/19393555.2015.1092620.
Full textFenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.
Full textChan, C. L. "Information Security Risk Modeling Using Bayesian Index." Computer Journal 54, no. 4 (July 30, 2010): 628–38. http://dx.doi.org/10.1093/comjnl/bxq059.
Full textEl Hadi, Mohamed M. "Assessing Information Security Risk Management in Organizations." Compunet ( The Egyptian Information Journal ) 13, no. 14 (April 2014): 18–32. http://dx.doi.org/10.12816/0014066.
Full textKochar, Subir, Sachin Goyal, Ratish Agarwal, and Mahesh Pawar. "Enhancing Information Security Risk Management for Organizations." International Journal of Computer & Organization Trends 19, no. 1 (April 25, 2015): 36–41. http://dx.doi.org/10.14445/22492593/ijcot-v19p306.
Full textShameli-Sendi, Alireza, Rouzbeh Aghababaei-Barzegar, and Mohamed Cheriet. "Taxonomy of information security risk assessment (ISRA)." Computers & Security 57 (March 2016): 14–30. http://dx.doi.org/10.1016/j.cose.2015.11.001.
Full textZahoruyko, L. V., T. A. Martʹyanova, and A. V. Skyrda. "Models of information technology security risk analysis." Optoelectronic information-power technologies 40, no. 2 (2021): 16–20. http://dx.doi.org/10.31649/1681-7893-2020-40-2-16-20.
Full textMitchell, Ruth C., Rita Marcella, and Graeme Baxter. "Corporate information security management." New Library World 100, no. 5 (September 1, 1999): 213–27. http://dx.doi.org/10.1108/03074809910285888.
Full textMejias, Roberto J., and Pierre A. Balthazard. "A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies." Journal of Information Privacy and Security 10, no. 4 (October 2, 2014): 160–85. http://dx.doi.org/10.1080/15536548.2014.974407.
Full textMichelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textLabuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (August 1, 2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.
Full textMichael, Katina. "Security Risk Management: Building an Information Security Risk Management Program from the Ground Up." Computers & Security 31, no. 2 (March 2012): 249–50. http://dx.doi.org/10.1016/j.cose.2011.12.011.
Full textShamala, Palaniappan, Rabiah Ahmad, Ali Hussein Zolait, and Shahrin bin Sahib. "Collective information structure model for Information Security Risk Assessment (ISRA)." Journal of Systems and Information Technology 17, no. 2 (May 11, 2015): 193–219. http://dx.doi.org/10.1108/jsit-02-2015-0013.
Full textSHAHBAZYAN, Marine. "Information Security in the System of Ensuring National Security." WISDOM 9, no. 2 (December 25, 2017): 92–97. http://dx.doi.org/10.24234/wisdom.v9i2.193.
Full textAnton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.
Full textMokhor, Volodymyr, Oleksandr Bakalynskyi, and Vasyl Tsurkan. "Risk assessment presentation of information security by the risks map." Collection "Information technology and security" 6, no. 2 (December 30, 2018): 94–104. http://dx.doi.org/10.20535/2411-1031.2018.6.2.153494.
Full textCollmann, J. "Assessing information security risk in dual-use health information systems." International Congress Series 1281 (May 2005): 296–301. http://dx.doi.org/10.1016/j.ics.2005.03.364.
Full text