Academic literature on the topic 'Security risk management approach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security risk management approach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security risk management approach"
Musman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.
Full textPetrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.
Full textWarren, M., and W. Hutchinson. "A security risk management approach for e‐commerce." Information Management & Computer Security 11, no. 5 (2003): 238–42. http://dx.doi.org/10.1108/09685220310509028.
Full textBell, Sandra. "The UK's Risk Management Approach to National Security." RUSI Journal 152, no. 3 (2007): 18–23. http://dx.doi.org/10.1080/03071840701472265.
Full textAnton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.
Full textJanssen, Stef, Alexei Sharpanskykh, and Richard Curran. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations." Risk Analysis 39, no. 7 (2019): 1582–96. http://dx.doi.org/10.1111/risa.13278.
Full textBojanc, Rok, and Borka Jerman-Blažič. "An economic modelling approach to information security risk management." International Journal of Information Management 28, no. 5 (2008): 413–22. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.002.
Full textWahlgren, Gunnar, and Stewart Kowalski. "IT Security Risk Management Model for Cloud Computing." International Journal of E-Entrepreneurship and Innovation 4, no. 4 (2013): 1–19. http://dx.doi.org/10.4018/ijeei.2013100101.
Full textKralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.
Full textGhadge, Abhijeet, Xie Fang, Samir Dani, and Jiju Antony. "Supply chain risk assessment approach for process quality risks." International Journal of Quality & Reliability Management 34, no. 7 (2017): 940–54. http://dx.doi.org/10.1108/ijqrm-01-2015-0010.
Full textDissertations / Theses on the topic "Security risk management approach"
Consolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.
Full textHomer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textCarlsson, Elin, and Moa Mattsson. "The MaRiQ model: A quantitative approach to risk management." Thesis, Uppsala universitet, Avdelningen för datalogi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385257.
Full textFagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.
Full textKailay, Muninder Pal. "A qualitative approach to computer security risk analysis and management for the commercial sector." Thesis, University of Birmingham, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487431.
Full textJackson, David P. "Intelligence-led risk management for homeland security: a collaborative approach for a common goal." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10624.
Full textBriouig, Mohamed. "Risk management in liquefied natural gas ports and marine terminals supply chains." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3013.
Full textLundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.
Full textHart, Jeremy. "A systems-based approach to integrating security risk management into the management practice & culture of a global multi-national organisation." Thesis, Middlesex University, 2018. http://eprints.mdx.ac.uk/25956/.
Full textSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textBooks on the topic "Security risk management approach"
Simulating security returns: A filtered historical simulation approach. Palgrave Pivot, 2014.
Find full textJ, Dorofee Audrey, ed. Managing information security risks: The OCTAVE approach. Addison-Wesley, 2002.
Find full textFoundation, Information Systems Audit and Control. Risks of customer relationship management: A security, control, and audit approach. Information Systems Audit and Control Foundation, 2003.
Find full textKailay, Muninder Pal. A qualitative approach to computer security risk analysis and management for the commercial sector. University of Birmingham, 1995.
Find full textPartnering with the private sector to secure critical infrastructure: Has the Department of Homeland Security abandoned the resilience-based approach? : hearing before the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 14, 2008. U.S. G.P.O., 2008.
Find full textPalmer, I. C. Computer security risk management. Jessica Kingsley, in association with the Control Risks Group, 1989.
Find full textKlipper, Sebastian. Information Security Risk Management. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08774-6.
Full textBlyth, Michael, ed. Risk and Security Management. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9780470387283.
Full textKlipper, Sebastian. Information Security Risk Management. Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9870-8.
Full textBook chapters on the topic "Security risk management approach"
Chopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.
Full textBishop, Matt, Sophie Engle, Deborah A. Frincke, et al. "A Risk Management Approach to the “Insider Threat”." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_6.
Full textIzvarina, Nataliya, Dmitriy Filev, and Anguelina Tepegendjiyan. "RISK-BASED AUDIT." In Business security management in modern conditions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635832a26.81416335.
Full textPaul, Stéphane, and Paul Varela. "Poster Support for an Obeya-Like Risk Management Approach." In Graphical Models for Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36537-0_8.
Full textSchauer, Stefan. "A Risk Management Approach for Highly Interconnected Networks." In Game Theory for Security and Risk Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75268-6_12.
Full textLi, Xichun, Mahmoud Al-Shawabkeh, and Zhiyuan Li. "Security Risk Management Approach for Improving Information Security Return of Investment." In Recent Developments in Data Science and Business Analytics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72745-5_22.
Full textVan Herreweghen, Els. "A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications." In Information Security Management, Education and Privacy. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8145-6_21.
Full textKamhoua, Charles A., Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, and Manuel Rodriguez. "Security and Interdependency in a Public Cloud: A Game-Theoretic Approach." In Game Theory for Security and Risk Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75268-6_11.
Full textRajbhandari, Lisa, and Einar Arthur Snekkenes. "Mapping between Classical Risk Management and Game Theoretical Approaches." In Communications and Multimedia Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24712-5_12.
Full textRaptis, Dimitris, Theo Dimitrakos, Bjørn Axel Gran, and Ketil Stølen. "The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain." In Advanced Communications and Multimedia Security. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35612-9_13.
Full textConference papers on the topic "Security risk management approach"
Mahopo, Bessy, Hanifa Abdullah, and Mathias Mujinga. "A formal qualitative risk management approach for IT security." In 2015 Information Security for South Africa (ISSA). IEEE, 2015. http://dx.doi.org/10.1109/issa.2015.7335053.
Full textDatta Ray, Partha, Rajgopal Harnoor, and Mariana Hentea. "Smart power grid security: A unified risk management approach." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678681.
Full textNaudet, Yannick, Nicolas Mayer, and Christophe Feltus. "Towards a Systemic Approach for Information Security Risk Management." In 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.76.
Full textDorca, Vasile, Radu Munteanu, Sorin Popescu, Adrian Chioreanu, and Claudius Peleskei. "Agile approach with Kanban in information security risk management." In 2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 2016. http://dx.doi.org/10.1109/aqtr.2016.7501278.
Full textJi, Yi, Danyan Wen, Haiquan Wang, and Chunhe Xia. "A logic-based approach to network security risk assessment." In 2009 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM). IEEE, 2009. http://dx.doi.org/10.1109/cccm.2009.5267887.
Full textNeill, Mike. "An Integrated Approach to Operational Risk Management – The Role of Process Safety Management." In SPE Health, Safety, Security, Environment, & Social Responsibility Conference - North America. Society of Petroleum Engineers, 2017. http://dx.doi.org/10.2118/184477-ms.
Full textJimenez, Hernando, Ian Stults, and Dimitri Mavris. "A Morphological Approach for Proactive Risk Management in Civil Aviation Security." In 47th AIAA Aerospace Sciences Meeting including The New Horizons Forum and Aerospace Exposition. American Institute of Aeronautics and Astronautics, 2009. http://dx.doi.org/10.2514/6.2009-1636.
Full textPapadaki, Katerina, and Nineta Polemi. "Towards a Systematic Approach for Improving Information Security Risk Management Methods." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394150.
Full textPapadaki, Ekaterini, Despina Polemi, and Dimitrios Kon/nos Damilos. "A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk Management." In 2008 The Third International Conference on Internet Monitoring and Protection. IEEE, 2008. http://dx.doi.org/10.1109/icimp.2008.19.
Full textIlvonen, Ilona, Jari Jussila, Hannu Karkkainen, and Tero Paivarinta. "Knowledge Security Risk Management in Contemporary Companies -- Toward a Proactive Approach." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.472.
Full textReports on the topic "Security risk management approach"
Ek, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.
Full textARMY SAFETY CENTER FORT RUCKER AL. Army Ground Risk Management Publication: Countermeasure, Vol 21, No 4, April 2000. Water Safety... A Risk Management Approach. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada376108.
Full textDay, Clifford E. Risk Management Security: Improving the United States Air Force Protection Level Asset Security System. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada407686.
Full textAwadalla, N. G. A risk management approach to nuclear waste inventory versus storage capacity. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/332194.
Full textMorgeson, J. D., Jason A. Dechant, Yev Kirpichevsky, Yazmin Seda-Sanabria, and Enrique E. Matheu. A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605156.
Full textForrest, Robert, Jason Christian Reinhardt, Timothy A. Wheeler, and Adam David Williams. A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1408805.
Full textARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382959.
Full textARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada383265.
Full textARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada372996.
Full textCollier, Zachary, Thomas Polmateer, and James Lambert. Risk Management Decision Making for Security and Trust in Hardware Supply Chains. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317287.
Full text