Results 241 to 250 of about 2,389,131 (303)
Regional health security architecture in ASEAN countries: Lessons from regional CDC models and Japan's strategic partnership for ACPHEED development. [PDF]
Miyano S +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyberinsurance in IT Security Management
IEEE Security & Privacy Magazine, 2007Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security investments that reduce risk. Although cyberinsurance has evolved, industry has been slow to adopt it as a risk management tool.
Walter S. Baer, Andrew Parkinson
openaire +1 more source
Proceedings of the 46th Annual Southeast Regional Conference on XX, 2008
Threats (accidental or malicious) are potential causes of unwanted events that can result in harm to the assets of the organization and may affect the profit and/or a company reputation. A risk management process (qualitative or quantitative) is needed in order to identify, describe, and analyze the possible vulnerabilities that could affect the ...
openaire +1 more source
Threats (accidental or malicious) are potential causes of unwanted events that can result in harm to the assets of the organization and may affect the profit and/or a company reputation. A risk management process (qualitative or quantitative) is needed in order to identify, describe, and analyze the possible vulnerabilities that could affect the ...
openaire +1 more source
Managing Outsourced IT Projects' Security Risks
Proceedings of the 2018 10th International Conference on Information Management and Engineering, 2018In recent years, IT outsourcing business practices has become widespread across different types of organizations in an endeavor to enhance their business operations and achieve competitive services. While IT outsourcing brings several benefits to organizations such as cost reductions, access to highly skilled human experts, and access to the latest ...
Moneef Almutairi, Stephen Riddle
openaire +1 more source
Is Managing IT Security a Mirage?
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015The purpose of this panel is to provide a forum to discuss the main IT security issues confronting organizations today. The panelists and attendees will discuss the existing gap between current IT security practices vs. best practices based on survey trends on IT security for the past 5 years, explore popular models used to justify IT security ...
Conrad Shayo +4 more
openaire +1 more source
IT Security Risk Management Model for Handling IT-Related Security Incidents
2018Managing IT-related security incidents is an important issue facing many organizations in Sweden and around the world. To deal with this growing problem, the authors have used a design science approach to develop an artifact to measure different organizations' capabilities and maturity to handle IT-related security incidents.
Gunnar Wahlgren, Stewart James Kowalski
openaire +1 more source

