To see the other types of publications on this topic, follow the link: Security risk management approach.

Journal articles on the topic 'Security risk management approach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security risk management approach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Musman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.

Full text
Abstract:
This paper describes the Cyber Security Game (CSG). Cyber Security Game is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber environment by minimizing its mission risk. The risk score is calculated by using a mission impact model to compute the consequences of cyber incidents and combining that with the likelihood that attacks will succeed. The likeliho
APA, Harvard, Vancouver, ISO, and other styles
2

Petrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.

Full text
Abstract:
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that company has a competitive advantage. This article is relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies. The results of this research show that each manager must handle threats, bec
APA, Harvard, Vancouver, ISO, and other styles
3

Warren, M., and W. Hutchinson. "A security risk management approach for e‐commerce." Information Management & Computer Security 11, no. 5 (2003): 238–42. http://dx.doi.org/10.1108/09685220310509028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bell, Sandra. "The UK's Risk Management Approach to National Security." RUSI Journal 152, no. 3 (2007): 18–23. http://dx.doi.org/10.1080/03071840701472265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.

Full text
Abstract:
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it conta
APA, Harvard, Vancouver, ISO, and other styles
6

Janssen, Stef, Alexei Sharpanskykh, and Richard Curran. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations." Risk Analysis 39, no. 7 (2019): 1582–96. http://dx.doi.org/10.1111/risa.13278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bojanc, Rok, and Borka Jerman-Blažič. "An economic modelling approach to information security risk management." International Journal of Information Management 28, no. 5 (2008): 413–22. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wahlgren, Gunnar, and Stewart Kowalski. "IT Security Risk Management Model for Cloud Computing." International Journal of E-Entrepreneurship and Innovation 4, no. 4 (2013): 1–19. http://dx.doi.org/10.4018/ijeei.2013100101.

Full text
Abstract:
The authors combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework. With this combined framework the authors create a new approach to IT Security Risk Management where IT Security Risk Management is place at the strategic, tactical and operational levels of an organizational. In this paper the authors concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents. The authors present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA´s Risk IT F
APA, Harvard, Vancouver, ISO, and other styles
9

Kralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghadge, Abhijeet, Xie Fang, Samir Dani, and Jiju Antony. "Supply chain risk assessment approach for process quality risks." International Journal of Quality & Reliability Management 34, no. 7 (2017): 940–54. http://dx.doi.org/10.1108/ijqrm-01-2015-0010.

Full text
Abstract:
Purpose The purpose of this paper is to proactively analyse and mitigate the root causes of the product and security risks. The case study approach examines the effectiveness of the fuzzy logic approach for assessing the product and process-related failure modes within global supply chain context. Design/methodology/approach The case study of a Printed Circuit Board Company in China is used as a platform for conducting the research. Using data triangulation, the data are collected and analyzed through interviews, questionnaires, expert opinions and quantitative modelling for some interesting i
APA, Harvard, Vancouver, ISO, and other styles
11

Forte, Dario. "An integrated approach to security incident management." Network Security 2008, no. 2 (2008): 14–16. http://dx.doi.org/10.1016/s1353-4858(08)70019-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yagodkina, I. A., and T. P. Nikolaeva. "Risk management as a factor of business security." Issues of Risk Analysis 16, no. 1 (2019): 60–67. http://dx.doi.org/10.32686/1812-5220-2019-16-60-67.

Full text
Abstract:
The article substantiates the need to manage the security of business structures. The role of risk management as the basis for ensuring security for their successful operation in a competitive environment is defined. The Russian and foreign practice of risk management of entrepreneurship is considered. Attention is paid to the principles of enterprise risk management, given their characteristics. The approach to the formalization of the degree of risk is analyzed, its drawbacks are noted. The practice of identification, assessment and measurement of risks, their content is covered. A formula f
APA, Harvard, Vancouver, ISO, and other styles
13

Sancho, José Carlos, Andrés Caro, Mar Ávila, and Alberto Bravo. "New approach for threat classification and security risk estimations based on security event management." Future Generation Computer Systems 113 (December 2020): 488–505. http://dx.doi.org/10.1016/j.future.2020.07.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Padyab, Ali Mohammad, Tero Päivärinta, and Dan Harnesk. "Genre-Based Approach to Assessing Information and Knowledge Security Risks." International Journal of Knowledge Management 10, no. 2 (2014): 13–27. http://dx.doi.org/10.4018/ijkm.2014040102.

Full text
Abstract:
Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organization- and knowledge-centric identification and analysis of security risks. In order to operationalize the genre-based approach, we suggest the use of a genre-based analytical method for identifying organizational communication patterns
APA, Harvard, Vancouver, ISO, and other styles
15

Tsoumas, Vassilis, and Theodore Tryfonas. "From risk analysis to effective security management: towards an automated approach." Information Management & Computer Security 12, no. 1 (2004): 91–101. http://dx.doi.org/10.1108/09685220410518856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Saxena, Anjali, and Nitin Seth. "Supply chain risk and security management: an interpretive structural modelling approach." International Journal of Logistics Economics and Globalisation 4, no. 1/2 (2012): 117. http://dx.doi.org/10.1504/ijleg.2012.047217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Akinwumi, D. A., G. B. Iwasokun, B. K. Alese, and S. A. Oluwadare. "A review of game theory approach to cyber security risk management." Nigerian Journal of Technology 36, no. 4 (2018): 1271. http://dx.doi.org/10.4314/njt.v36i4.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Litvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.

Full text
Abstract:
The article is devoted to the assessment of information security risks in automated systems of class "1". An adapted approach to the assessment of information security risks in such automated systems using the Methodology and requirements of the standards of GSTU SUIB 1.0 / ISO / IEC 27001: 2010 and GSTU SUIB 2.0 / ISO / IEC 27002: 2010 is proposed. The efficiency and methods of implementation of the approach are proved on the example of consideration of real threats and vulnerabilities of class 1 automated systems. The main requirement for the creation of information security management syste
APA, Harvard, Vancouver, ISO, and other styles
19

Fenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.

Full text
Abstract:
Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous chal
APA, Harvard, Vancouver, ISO, and other styles
20

Forte, Dario. "Security standardization in incident management: the ITIL approach." Network Security 2007, no. 1 (2007): 14–16. http://dx.doi.org/10.1016/s1353-4858(07)70007-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rodica, Bulai, Ciorbă Dumitru, Poştaru Andrei, and Rostislav Călin. "Methodology and algorithm of information security risk management for local infrastructure." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 399–410. http://dx.doi.org/10.24989/ocg.v325.33.

Full text
Abstract:
The complexity of information security does not resume to mere technicality, transferring significant liability to proper management. Risk analysis in information security is a powerful tool that comes in handy for managers in making decisions about the implementation of efficient information management systems, in order to achieve the organization's mission.
 As a part of risk management, risk analysis is the systematic implementation of methods, techniques and management practices to assess the context, identify, analyze, evaluate, treat, monitor and communicate the risks for the inform
APA, Harvard, Vancouver, ISO, and other styles
22

Ilvonen, Ilona, Jari J. Jussila, and Hannu Kärkkäinen. "Towards a Business-Driven Process Model for Knowledge Security Risk Management." International Journal of Knowledge Management 11, no. 4 (2015): 1–18. http://dx.doi.org/10.4018/ijkm.2015100101.

Full text
Abstract:
The purpose of this paper is to introduce a model to manage knowledge security risks in organizations. Knowledge security risk management is a sensemaking process that should be carried out by managers, and the proposed model works as a tool for the sensemaking process. The model is illustrated with an analytical case example. The process model helps to identify knowledge security risks and provides a comprehensive approach to evaluating and balancing the costs and benefits of knowledge sharing and knowledge risk management. The paper addresses calls for research on the emerging topic of knowl
APA, Harvard, Vancouver, ISO, and other styles
23

Uriadnikova, Inga, and Vasyl Zaplatynskyi. "MANAGEMENT OF COMPLEX SOCIAL HUMAN SECURITY SYSTEMS." JOURNAL of Donetsk mining institute, no. 1 (2021): 135–42. http://dx.doi.org/10.31474/1999-981x-2021-1-135-142.

Full text
Abstract:
Purpose: scientific substantiation of social security based on the principles of management of complex systems and an example of the application of mathematical modeling to determine internal risks in a complex social system.. Methods: use of elements of mathematical modeling, in particular the theory of optimal control and linear programming; analysis of the content of the concept of “security paradox”, logical-determinant assessment of this concept. Results: it is proposed to apply the principles of management of complex systems to ensure the social security of groups of people and society.
APA, Harvard, Vancouver, ISO, and other styles
24

STRAUSS, CHRISTINE, and CHRISTIAN STUMMER. "MULTIOBJECTIVE DECISION SUPPORT IN IT-RISK MANAGEMENT." International Journal of Information Technology & Decision Making 01, no. 02 (2002): 251–68. http://dx.doi.org/10.1142/s0219622002000154.

Full text
Abstract:
Security issues in information management are increasingly moving towards the centre of corporate interests. This paper presents a multiobjective modelling approach that interactively assists IT managers in their attempts to reduce a given risk by evaluating and selecting portfolios (i.e. bundles) of security measures. The proposed multi-step procedure identifies attractive portfolio candidates and finally establishes the "best" one with respect to the decision-maker's preferences. Our model and its possible application are demonstrated by means of a numerical example based on real-world data
APA, Harvard, Vancouver, ISO, and other styles
25

Rios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." Sensors 20, no. 16 (2020): 4404. http://dx.doi.org/10.3390/s20164404.

Full text
Abstract:
Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, we propose a comprehensive methodology that enables informed decisions on security protection for smart grid systems by the continuous assessment of cyber risks. The solution is based on the use of attack defense trees modelled on the system and compu
APA, Harvard, Vancouver, ISO, and other styles
26

Kasum, Josip, Jelena Žanić Mikuličić, and Vinka Kolić. "Safety Issues, Security and Risk Management in Nautical Tourism." Transactions on Maritime Science 7, no. 02 (2018): 184–88. http://dx.doi.org/10.7225/toms.v07.n02.008.

Full text
Abstract:
The relatively new nautical market gave rise to a special kind of tourism. Nautical tourism as a system has the characteristics of a traffic system with all its peculiarities. Nautical tourism is steadily increasing. In countries nurturing this type of economic activity, nautical tourism has the characteristics of mass tourism. Nautical tourism is a complex system consisting of and using various forms of technical and technological processes. As such it is exposed to various risks. Therefore, this paper proposes a systematic approach to the development of safety measures in nautical tourism.
APA, Harvard, Vancouver, ISO, and other styles
27

Kure, Halima, Shareeful Islam, and Mohammad Razzaque. "An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System." Applied Sciences 8, no. 6 (2018): 898. http://dx.doi.org/10.3390/app8060898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Brožová, Helena, Libor Šup, J. Rydval, M. Sadok, and P. Bednar. "Information Security Management: ANP Based Approach for Risk Analysis and Decision Making." Agris on-line Papers in Economics and Informatics VIII, no. 1 (2016): 13–23. http://dx.doi.org/10.7160/aol.2016.080102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

López, David, and Oscar Pastor. "Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains." Information & Security: An International Journal 29 (2013): 69–76. http://dx.doi.org/10.11610/isij.2905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Vogt, Tom, Edvin Spahovic, Thomas Doms, et al. "A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems." SAE International Journal of Transportation Cybersecurity and Privacy 4, no. 1 (2021): 39–58. http://dx.doi.org/10.4271/11-04-01-0003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Onischenko, M., O. Dutchenko, and S. Shpitshuz. "ECONOMIC SECURITY AS A CONDITION OF EFFICIENT FUNCTIONING OF THE ENTERPRISE." Vìsnik Sumsʹkogo deržavnogo unìversitetu, no. 1 (2019): 36–42. http://dx.doi.org/10.21272/1817-9215.2019.1-5.

Full text
Abstract:
The article is devoted to the actual issues of providing economic security of the enterprise. Investigated the concept of economic security of the enterprise and its components have been analyzed. The article analyzes the international experience of ensuring economic security of enterprises. Risks and threats to the economic security of enterprises are classified and the stages of forming a financial risk management system are defined. The necessity of an integrated approach to ensuring economic security as a factor in the effective functioning of the enterprise is suggested. Keywords: economi
APA, Harvard, Vancouver, ISO, and other styles
32

HERASYMENKO, O. M. "RISK IDENTIFICATION AS A TOOL FOR ECONOMIC SECURITY FOR RISK-ORIENTED APPROACH TO BUSINESS MANAGEMENT." CHERKASY UNIVERSITY BULLETIN: ECONOMICS SCIENCES, no. 4 (2018): 22–33. http://dx.doi.org/10.31651/2076-5843-2018-4-22-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Michelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.

Full text
Abstract:
Data protection, information and IT security became number one priorities in these fast- paced days that top management needs to focus on. A number of IT solutions have been developed on the market to address the security challenges that require prompt actions. These solutions contribute to a control environment that is robust and stand the potential threats. This research describes the framework of governance, risk and compliance and provides an integrated, holistic approach which helps to increase process performance and to ensure that the organization follows its own rules, risk appetite, a
APA, Harvard, Vancouver, ISO, and other styles
34

Cao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.

Full text
Abstract:
With the popularity of the Internet and global information continues to advance organizational information systems have become an important strategic resource for the survival of the importance of information security to protect its widespread concern. Once the information security organization information system is destroyed, the Organization for Security attribute information would cause tremendous impact the organization's business operation, the losses include not only economic, but also likely to organize image, reputation is a strategic competitive advantage even fatal injuries. However,
APA, Harvard, Vancouver, ISO, and other styles
35

Talabeigi, Elham, and Seyyed Gholamreza Jalali Naeeini. "Information security risk management and incompatible parts of organization." Journal of Industrial Engineering and Management 9, no. 4 (2016): 964. http://dx.doi.org/10.3926/jiem.2032.

Full text
Abstract:
Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization.Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than
APA, Harvard, Vancouver, ISO, and other styles
36

Meyer, Miriam. "Terrorism – Prisons and Risk Management." European Criminal Law Review 11, no. 1 (2021): 88–111. http://dx.doi.org/10.5771/2193-5505-2021-1-88.

Full text
Abstract:
Coping with Islamist and right-wing terrorism and extremism requires a holistic approach. This paper examines the role of prisons on two levels in this context: as part of the state risk management, i.e. the role of prisons in the security architecture on the one hand, and risk management in prisons on the other hand. By highlighting the importance of an individualised perspective on the incarcerated persons bearing in mind the heterogeneity of the phenomenon, the paper also intends to raise interest beyond the purely dogmatic issues and to include the perspective of prisons in the discussion
APA, Harvard, Vancouver, ISO, and other styles
37

Azarskaya, Maya A., and Valery L. Pozdeev. "Information support of economic security risk management of an enterprise." Tyumen State University Herald. Social, Economic, and Law Research 5, no. 3 (2019): 179–92. http://dx.doi.org/10.21684/2411-7897-2019-5-3-179-192.

Full text
Abstract:
Enterprises are an important component of the economic development of the state as they provide not only employment, but also the GDP of the country. In the recent years, the economic situation has become more complicated, which determines the negative social and economic results of the development of enterprises in the real sector of the economy. This has caused numerous studies in the field of economic security of enterprises. However, most of the researchers have not yet come to a unanimous agreement on these issues, including the conceptual apparatus and the content of the economic securit
APA, Harvard, Vancouver, ISO, and other styles
38

Jović, Zorica. "UPRAVLJANJE RIZICIMA I INTERNA REVIZIJA." FBIM Transactions 9, no. 1 (2021): 48–57. http://dx.doi.org/10.12709/fbim.09.09.01.05.

Full text
Abstract:
People undertake risk management activities to identify, assess, manage, and control all types of events or situations. This can range from a single project or narrowly defined types of risk, for example, market risk, to the threats and opportunities faced by the organization. Organizations are under pressure to identify all business risks they face - social, ethical, and environmental risks as well as financial and operational - and to explain that they are being managed at an acceptable level. Risk management is a basic element of corporate governance. Management is responsible for establish
APA, Harvard, Vancouver, ISO, and other styles
39

Ostapiuk, Nataliia, Oleksandra Karmaza, Mykola Kurylo, and Gennady Timchenko. "Economic security in investment projects management: convergence of accounting mechanisms." Investment Management and Financial Innovations 14, no. 3 (2017): 353–60. http://dx.doi.org/10.21511/imfi.14(3-2).2017.06.

Full text
Abstract:
Implementation of business processes in Ukraine has become more structured in recent years. If previously the only goal was to get the most profitable investment and pay-off in the short term, and the attention to drawbacks and considerable riskiness of these projects was given already in case of their occurrence, now there is another management approach. Thus, the decision to attract additional funds involves a detailed analysis of the potential and existing risks of the project. The management focuses on continuous monitoring of the project implementation. Accordingly, it is necessary to dev
APA, Harvard, Vancouver, ISO, and other styles
40

Bergström, Erik, Martin Lundgren, and Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective." Information & Computer Security 27, no. 3 (2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.

Full text
Abstract:
Purpose The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices. Design/methodology/approach The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel. Findings Managerial and organisational concerns that go beyond a technical perspective have been found, which affect the
APA, Harvard, Vancouver, ISO, and other styles
41

Khan, Muhammad Naveed, Pervaiz Akhtar, and Yasmin Merali. "Strategies and effective decision-making against terrorism affecting supply chain risk management and security." Industrial Management & Data Systems 118, no. 7 (2018): 1528–46. http://dx.doi.org/10.1108/imds-09-2017-0449.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the knowledge gaps in the published research on terrorism-related risk in supply chains, and to develop a framework of strategies and effective decision-making to enable practitioners to address terrorism-related risks in supply chain risk management (SCRM) and security. Design/methodology/approach The study adopts a novel combination of triangulated methods comprising a systematic literature review (SLR), text mining and network analysis. These methods have not been jointly utilized in past studies, and the approach constitutes a rigorous me
APA, Harvard, Vancouver, ISO, and other styles
42

Argyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.

Full text
Abstract:
Purpose The selection of security configurations for complex information systems is a cumbersome process. Decision-making regarding the choice of security countermeasures has to take into consideration a multitude of, often conflicting, functional and non-functional system goals. Therefore, a structured method to support crucial security decisions during a system’s design that can take account of risk whilst providing feedback on the optimal decisions within specific scenarios would be valuable. Design/methodology/approach Secure Tropos is a well-established security requirements engineering m
APA, Harvard, Vancouver, ISO, and other styles
43

Silva, Maisa Mendonça, Ana Paula Henriques de Gusmão, Thiago Poleto, Lúcio Camara e. Silva, and Ana Paula Cabral Seixas Costa. "A multidimensional approach to information security risk management using FMEA and fuzzy theory." International Journal of Information Management 34, no. 6 (2014): 733–40. http://dx.doi.org/10.1016/j.ijinfomgt.2014.07.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

FESENKO, O., V. LYSYUK, and Z. SAKHAROVA. "RISK-ORIENTED APPROACH TO LABOR PROTECTION AT GRAIN PROCESS ENTERPRISES." Grain Products and Mixed Fodder’s 19, no. 1 (2019): 4–10. http://dx.doi.org/10.15673/gpmf.v19i1.1313.

Full text
Abstract:
The article focuses on the introduction of a risk-oriented approach to labor protection at the enterprises of the grain processing industry. Such an approach is imperative in modern conditions in accordance with the Concept of reforming the system of labor protection management. This will involve the introduction of the proactive principle of “preventive actions” (prevention of hazardous events and situations) instead of the existing reactive principle of “corrective actions” (response to hazardous events and situations). A risk-oriented approach to occupational safety and health is the basis
APA, Harvard, Vancouver, ISO, and other styles
45

Kumah, Peace, Winfred Yaokumah, and Eric Saviour Aryee Okai. "A conceptual model and empirical assessment of HR security risk management." Information & Computer Security 27, no. 3 (2019): 411–33. http://dx.doi.org/10.1108/ics-05-2018-0057.

Full text
Abstract:
Purpose This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage information security risks. Design/methodology/approach The conceptual model is developed based on the agency theory and the review of theoretical, empirical and practitioner literature. Following, empirical data are collected through a survey from 134 IT professionals, internal audit personnel and HR managers working within five major industry sectors in a developing country to test the organizational differences in
APA, Harvard, Vancouver, ISO, and other styles
46

Varsos, Dimitrios S., Stergiani A. Giannakou, and Nikitas A. Assimakopoulos. "A Systems Approach to Information Security for the Twenty-First Century Organization." Acta Europeana Systemica 8 (July 10, 2020): 167–78. http://dx.doi.org/10.14428/aes.v8i1.56343.

Full text
Abstract:
A crisis resulting from disruptive events that threaten to harm the organization or its stakeholders can originate from a plethora of sources. Data breaches, unauthorized disclosures of confidential information, and data leaks, are on the news almost daily. Most guidelines and standards published by prominent International Standards Organizations hold that risk-based thinking supports public, private, and community enterprises (referred for convenience in this work by the generic term “organization”) in determining the forces that could cause their key and enabling processes to deviate from pl
APA, Harvard, Vancouver, ISO, and other styles
47

Aldini, Alessandro, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, and Jonathan Guislain. "Design and validation of a trust-based opportunity-enabled risk management system." Information & Computer Security 25, no. 1 (2017): 2–25. http://dx.doi.org/10.1108/ics-05-2016-0037.

Full text
Abstract:
Purpose The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets. Design/methodology/approach OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and oppor
APA, Harvard, Vancouver, ISO, and other styles
48

Sarkar, Jaydip. "Short-term management of repeated self-harm in secure institutions." Advances in Psychiatric Treatment 17, no. 6 (2011): 435–46. http://dx.doi.org/10.1192/apt.bp.110.008045.

Full text
Abstract:
SummaryThe challenge of managing repeated self-harm and the high risk of morbidity and mortality are compounded in forensic patients, where there are additional risks of harm to others, absconding and security breaches. There is an urgent need for clinically sound, practice-based and theoretically grounded strategies for managing these associated risks. This is essential as available UK guidelines appear inadequate for this group of patients. This article promotes a pragmatic approach to assessing the risk of self-harm clinically to arrive at hierarchical risk judgements. It further suggests a
APA, Harvard, Vancouver, ISO, and other styles
49

McEntire, PhD, David A. "The historical challenges facing emergency management and homeland security." Journal of Emergency Management 5, no. 4 (2007): 17. http://dx.doi.org/10.5055/jem.2007.0011.

Full text
Abstract:
This article discusses thirteen challenges facing emergency management and homeland security. These include the tension between national security and the all-hazards approach, apathy, the disconnect between development and disasters, the subsidization of risk, the paper plan syndrome, a reactive approach, a firstresponder orientation, limited budgets, insufficient personnel, heavy work loads, political appointees, poor management, and politics. The article concludes with a discussion and recommendations for the future.
APA, Harvard, Vancouver, ISO, and other styles
50

ZAKHAROV, Vladimir Ya, Elena N. LUDUSHKINA, Elena V. KORNILOVA, and Marina V. KISLINSKAYA. "Security of complex economic systems: Risk management of their digital transformation." Economic Analysis: Theory and Practice 20, no. 4 (2021): 592–623. http://dx.doi.org/10.24891/ea.20.4.592.

Full text
Abstract:
Subject. The article presents an overview of recent results of foreign and domestic studies on the security of complex economic systems in the process of their digital transformation. During the deployment of Industry 4.0 technologies, the frequency, diversity and level of digital risks are growing faster than digital security tools for complex systems are evolving. This will offset the benefits of digital transformation, and can lead to large-scale failures. Objectives. The aim is to identify sources of new threats, vulnerability areas of complex systems and possible losses, assess the result
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!