Sciweavers

3149 search results - page 15 / 630
» IT security risk management
Sort
View
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ESEM
2009
ACM
14 years 2 months ago
Software risk management barriers: An empirical study
This paper reports results from a survey of experienced project managers on their perception of software risk management. From a sample of 18 experienced project managers, we have...
Edzreena Edza Odzaly, Paul Sage Des Greer
SEC
2007
13 years 9 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
ICASSP
2011
IEEE
12 years 11 months ago
Risk management for trading in multiple frequencies
We present fundamental concepts of risk and propose two methods for risk management of a portfolio in this paper. Moreover, we introduce their novel extensions to trading in multi...
Mustafa U. Torun, Ali N. Akansu, Marco Avellaneda
CCS
2006
ACM
13 years 11 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen