Sciweavers

1422 search results - page 8 / 285
» Information security and risk management
Sort
View
NSPW
2006
ACM
14 years 2 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
INFOCOM
2008
IEEE
14 years 3 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge
ACSAC
2007
IEEE
14 years 3 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
14 years 3 months ago
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
Identifying the risks associated with the implementation of clinical information systems (CIS) in health care organizations can be a major challenge for managers, clinicians, and ...
Guy Paré, Claude Sicotte, Mirou Jaana, Davi...
SSDBM
2002
IEEE
100views Database» more  SSDBM 2002»
14 years 1 months ago
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
Josep Domingo-Ferrer, Anna Oganian, Vicenç ...