Results 101 to 110 of about 14,261,936 (322)
A framework for estimating information security risk assessment method completeness
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization.
G. Wangen+2 more
semanticscholar +1 more source
An Overview of Economic Approaches to Information Security Management [PDF]
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core +2 more sources
A Cross-Layer Security Analysis for Process-Aware Information Systems [PDF]
Information security in Process-aware Information System (PAIS) relies on many factors, including security of business process and the underlying system and technologies. Moreover, humans can be the weakest link that creates pathway to vulnerabilities, or the worst enemy that compromises a well-defended system.
arxiv
Information Security Risk Management
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent ...
Salimeh Dashti, P. Giorgini, Elda Paja
semanticscholar +1 more source
January 28th was Data Privacy Day, a day to reflect on what you can do to protect the privacy of yourself and others. Aside from oversharing data, the best approach you can take is to use Multi-Factor Authentication (MFA) on your personal and University ...
University of Maine System Information Security+1 more
core +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang+8 more
doaj +1 more source
Information Security: A Saga of Security Measures
In the time of extreme proclivity of users towards internet and its services, it is almost implied to worry for the concerned security of highly confidential information. So, are the available safety trends and the continuous endeavor in this domain towards unfolding new techniques with enhanced features suggest pioneering concerns of the associated ...
Neha Tyagi+4 more
openaire +2 more sources
Some problems arising out of the cross-disciplinary nature of information systems security [PDF]
Tung-chien Wang
openalex +1 more source