RISK ANALYSIS AND RISK MANAGEMENT MODELS FOR INFORMATION-SYSTEMS SECURITY APPLICATIONS

被引:0
|
作者
GUARRO, SB
机构
关键词
D O I
10.1016/0951-8320(89)90027-6
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
引用
收藏
页码:109 / 130
页数:22
相关论文
共 50 条
  • [31] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [32] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [33] INFORMATION-SYSTEMS MANAGEMENT
    BENJAMIN, RI
    HARVARD BUSINESS REVIEW, 1982, 60 (01) : 174 - 174
  • [34] Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention
    Huang G.
    Xu X.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [35] MANAGEMENT INFORMATION-SYSTEMS
    MULLAN, C
    LUNDSTROM, R
    POLICE CHIEF, 1985, 52 (04): : 28 - 30
  • [36] INFORMATION-SYSTEMS MANAGEMENT
    HICKEY, JT
    HARVARD BUSINESS REVIEW, 1981, 59 (06) : 190 - 190
  • [37] Risk analysis for security applications
    Kiekintveld, Christopher
    Marecki, Janusz
    Paruchuri, Praveen
    Sycara, Katia
    Informatica (Ljubljana), 2010, 34 (02) : 127 - 128
  • [38] INFORMATION-SYSTEMS IN SCIENCE AND MANAGEMENT - COMPARATIVE ANALYSIS
    RYZHOV, VS
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1975, (12): : 3 - 9
  • [39] Risk Analysis for Security Applications
    Kiekintveld, Christopher
    Marecki, Janusz
    Paruchuri, Praveen
    Sycara, Katia
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (02): : 127 - 128
  • [40] MANAGEMENT INFORMATION-SYSTEMS PLANNING - ANALYSIS AND TECHNIQUES
    GUPTA, YP
    TECHNOVATION, 1989, 9 (01) : 63 - 81