Journal articles on the topic 'Security risk management approach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security risk management approach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Musman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.
Full textPetrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.
Full textWarren, M., and W. Hutchinson. "A security risk management approach for e‐commerce." Information Management & Computer Security 11, no. 5 (2003): 238–42. http://dx.doi.org/10.1108/09685220310509028.
Full textBell, Sandra. "The UK's Risk Management Approach to National Security." RUSI Journal 152, no. 3 (2007): 18–23. http://dx.doi.org/10.1080/03071840701472265.
Full textAnton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.
Full textJanssen, Stef, Alexei Sharpanskykh, and Richard Curran. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations." Risk Analysis 39, no. 7 (2019): 1582–96. http://dx.doi.org/10.1111/risa.13278.
Full textBojanc, Rok, and Borka Jerman-Blažič. "An economic modelling approach to information security risk management." International Journal of Information Management 28, no. 5 (2008): 413–22. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.002.
Full textWahlgren, Gunnar, and Stewart Kowalski. "IT Security Risk Management Model for Cloud Computing." International Journal of E-Entrepreneurship and Innovation 4, no. 4 (2013): 1–19. http://dx.doi.org/10.4018/ijeei.2013100101.
Full textKralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.
Full textGhadge, Abhijeet, Xie Fang, Samir Dani, and Jiju Antony. "Supply chain risk assessment approach for process quality risks." International Journal of Quality & Reliability Management 34, no. 7 (2017): 940–54. http://dx.doi.org/10.1108/ijqrm-01-2015-0010.
Full textForte, Dario. "An integrated approach to security incident management." Network Security 2008, no. 2 (2008): 14–16. http://dx.doi.org/10.1016/s1353-4858(08)70019-9.
Full textYagodkina, I. A., and T. P. Nikolaeva. "Risk management as a factor of business security." Issues of Risk Analysis 16, no. 1 (2019): 60–67. http://dx.doi.org/10.32686/1812-5220-2019-16-60-67.
Full textSancho, José Carlos, Andrés Caro, Mar Ávila, and Alberto Bravo. "New approach for threat classification and security risk estimations based on security event management." Future Generation Computer Systems 113 (December 2020): 488–505. http://dx.doi.org/10.1016/j.future.2020.07.015.
Full textPadyab, Ali Mohammad, Tero Päivärinta, and Dan Harnesk. "Genre-Based Approach to Assessing Information and Knowledge Security Risks." International Journal of Knowledge Management 10, no. 2 (2014): 13–27. http://dx.doi.org/10.4018/ijkm.2014040102.
Full textTsoumas, Vassilis, and Theodore Tryfonas. "From risk analysis to effective security management: towards an automated approach." Information Management & Computer Security 12, no. 1 (2004): 91–101. http://dx.doi.org/10.1108/09685220410518856.
Full textSaxena, Anjali, and Nitin Seth. "Supply chain risk and security management: an interpretive structural modelling approach." International Journal of Logistics Economics and Globalisation 4, no. 1/2 (2012): 117. http://dx.doi.org/10.1504/ijleg.2012.047217.
Full textAkinwumi, D. A., G. B. Iwasokun, B. K. Alese, and S. A. Oluwadare. "A review of game theory approach to cyber security risk management." Nigerian Journal of Technology 36, no. 4 (2018): 1271. http://dx.doi.org/10.4314/njt.v36i4.38.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full textFenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.
Full textForte, Dario. "Security standardization in incident management: the ITIL approach." Network Security 2007, no. 1 (2007): 14–16. http://dx.doi.org/10.1016/s1353-4858(07)70007-7.
Full textRodica, Bulai, Ciorbă Dumitru, Poştaru Andrei, and Rostislav Călin. "Methodology and algorithm of information security risk management for local infrastructure." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 399–410. http://dx.doi.org/10.24989/ocg.v325.33.
Full textIlvonen, Ilona, Jari J. Jussila, and Hannu Kärkkäinen. "Towards a Business-Driven Process Model for Knowledge Security Risk Management." International Journal of Knowledge Management 11, no. 4 (2015): 1–18. http://dx.doi.org/10.4018/ijkm.2015100101.
Full textUriadnikova, Inga, and Vasyl Zaplatynskyi. "MANAGEMENT OF COMPLEX SOCIAL HUMAN SECURITY SYSTEMS." JOURNAL of Donetsk mining institute, no. 1 (2021): 135–42. http://dx.doi.org/10.31474/1999-981x-2021-1-135-142.
Full textSTRAUSS, CHRISTINE, and CHRISTIAN STUMMER. "MULTIOBJECTIVE DECISION SUPPORT IN IT-RISK MANAGEMENT." International Journal of Information Technology & Decision Making 01, no. 02 (2002): 251–68. http://dx.doi.org/10.1142/s0219622002000154.
Full textRios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." Sensors 20, no. 16 (2020): 4404. http://dx.doi.org/10.3390/s20164404.
Full textKasum, Josip, Jelena Žanić Mikuličić, and Vinka Kolić. "Safety Issues, Security and Risk Management in Nautical Tourism." Transactions on Maritime Science 7, no. 02 (2018): 184–88. http://dx.doi.org/10.7225/toms.v07.n02.008.
Full textKure, Halima, Shareeful Islam, and Mohammad Razzaque. "An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System." Applied Sciences 8, no. 6 (2018): 898. http://dx.doi.org/10.3390/app8060898.
Full textBrožová, Helena, Libor Šup, J. Rydval, M. Sadok, and P. Bednar. "Information Security Management: ANP Based Approach for Risk Analysis and Decision Making." Agris on-line Papers in Economics and Informatics VIII, no. 1 (2016): 13–23. http://dx.doi.org/10.7160/aol.2016.080102.
Full textLópez, David, and Oscar Pastor. "Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains." Information & Security: An International Journal 29 (2013): 69–76. http://dx.doi.org/10.11610/isij.2905.
Full textVogt, Tom, Edvin Spahovic, Thomas Doms, et al. "A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems." SAE International Journal of Transportation Cybersecurity and Privacy 4, no. 1 (2021): 39–58. http://dx.doi.org/10.4271/11-04-01-0003.
Full textOnischenko, M., O. Dutchenko, and S. Shpitshuz. "ECONOMIC SECURITY AS A CONDITION OF EFFICIENT FUNCTIONING OF THE ENTERPRISE." Vìsnik Sumsʹkogo deržavnogo unìversitetu, no. 1 (2019): 36–42. http://dx.doi.org/10.21272/1817-9215.2019.1-5.
Full textHERASYMENKO, O. M. "RISK IDENTIFICATION AS A TOOL FOR ECONOMIC SECURITY FOR RISK-ORIENTED APPROACH TO BUSINESS MANAGEMENT." CHERKASY UNIVERSITY BULLETIN: ECONOMICS SCIENCES, no. 4 (2018): 22–33. http://dx.doi.org/10.31651/2076-5843-2018-4-22-33.
Full textMichelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Full textCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Full textTalabeigi, Elham, and Seyyed Gholamreza Jalali Naeeini. "Information security risk management and incompatible parts of organization." Journal of Industrial Engineering and Management 9, no. 4 (2016): 964. http://dx.doi.org/10.3926/jiem.2032.
Full textMeyer, Miriam. "Terrorism – Prisons and Risk Management." European Criminal Law Review 11, no. 1 (2021): 88–111. http://dx.doi.org/10.5771/2193-5505-2021-1-88.
Full textAzarskaya, Maya A., and Valery L. Pozdeev. "Information support of economic security risk management of an enterprise." Tyumen State University Herald. Social, Economic, and Law Research 5, no. 3 (2019): 179–92. http://dx.doi.org/10.21684/2411-7897-2019-5-3-179-192.
Full textJović, Zorica. "UPRAVLJANJE RIZICIMA I INTERNA REVIZIJA." FBIM Transactions 9, no. 1 (2021): 48–57. http://dx.doi.org/10.12709/fbim.09.09.01.05.
Full textOstapiuk, Nataliia, Oleksandra Karmaza, Mykola Kurylo, and Gennady Timchenko. "Economic security in investment projects management: convergence of accounting mechanisms." Investment Management and Financial Innovations 14, no. 3 (2017): 353–60. http://dx.doi.org/10.21511/imfi.14(3-2).2017.06.
Full textBergström, Erik, Martin Lundgren, and Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective." Information & Computer Security 27, no. 3 (2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.
Full textKhan, Muhammad Naveed, Pervaiz Akhtar, and Yasmin Merali. "Strategies and effective decision-making against terrorism affecting supply chain risk management and security." Industrial Management & Data Systems 118, no. 7 (2018): 1528–46. http://dx.doi.org/10.1108/imds-09-2017-0449.
Full textArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Full textSilva, Maisa Mendonça, Ana Paula Henriques de Gusmão, Thiago Poleto, Lúcio Camara e. Silva, and Ana Paula Cabral Seixas Costa. "A multidimensional approach to information security risk management using FMEA and fuzzy theory." International Journal of Information Management 34, no. 6 (2014): 733–40. http://dx.doi.org/10.1016/j.ijinfomgt.2014.07.005.
Full textFESENKO, O., V. LYSYUK, and Z. SAKHAROVA. "RISK-ORIENTED APPROACH TO LABOR PROTECTION AT GRAIN PROCESS ENTERPRISES." Grain Products and Mixed Fodder’s 19, no. 1 (2019): 4–10. http://dx.doi.org/10.15673/gpmf.v19i1.1313.
Full textKumah, Peace, Winfred Yaokumah, and Eric Saviour Aryee Okai. "A conceptual model and empirical assessment of HR security risk management." Information & Computer Security 27, no. 3 (2019): 411–33. http://dx.doi.org/10.1108/ics-05-2018-0057.
Full textVarsos, Dimitrios S., Stergiani A. Giannakou, and Nikitas A. Assimakopoulos. "A Systems Approach to Information Security for the Twenty-First Century Organization." Acta Europeana Systemica 8 (July 10, 2020): 167–78. http://dx.doi.org/10.14428/aes.v8i1.56343.
Full textAldini, Alessandro, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, and Jonathan Guislain. "Design and validation of a trust-based opportunity-enabled risk management system." Information & Computer Security 25, no. 1 (2017): 2–25. http://dx.doi.org/10.1108/ics-05-2016-0037.
Full textSarkar, Jaydip. "Short-term management of repeated self-harm in secure institutions." Advances in Psychiatric Treatment 17, no. 6 (2011): 435–46. http://dx.doi.org/10.1192/apt.bp.110.008045.
Full textMcEntire, PhD, David A. "The historical challenges facing emergency management and homeland security." Journal of Emergency Management 5, no. 4 (2007): 17. http://dx.doi.org/10.5055/jem.2007.0011.
Full textZAKHAROV, Vladimir Ya, Elena N. LUDUSHKINA, Elena V. KORNILOVA, and Marina V. KISLINSKAYA. "Security of complex economic systems: Risk management of their digital transformation." Economic Analysis: Theory and Practice 20, no. 4 (2021): 592–623. http://dx.doi.org/10.24891/ea.20.4.592.
Full text