Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
This paper reports results from a survey of experienced project managers on their perception of software risk management. From a sample of 18 experienced project managers, we have...
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
We present fundamental concepts of risk and propose two methods for risk management of a portfolio in this paper. Moreover, we introduce their novel extensions to trading in multi...
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...