Sciweavers

1422 search results - page 20 / 285
» Information security and risk management
Sort
View
ESSOS
2009
Springer
14 years 3 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
EUSFLAT
2007
154views Fuzzy Logic» more  EUSFLAT 2007»
13 years 10 months ago
Bounds for Value at Risk for Asymptotically Dependent Assets - the Copula Approach
The theory of copulas provides a useful tool for modeling dependence in risk management. In insurance and finance, as well as in other applications, dependence of extreme events ...
Piotr Jaworski
IEEESP
2007
98views more  IEEESP 2007»
13 years 8 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
SOUPS
2006
ACM
14 years 2 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ECIS
2003
13 years 10 months ago
ICT corporate infrastructures and risk: a dual perspective
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
Claudio U. Ciborra, Daniel Osei-joehene