Control priorization model for improving information security risk assessment
Evaluating particular assets for information security risk assessment should take into consideration the availability of adequate resources and return on investments (ROI). Despite the need for a good risk assessment framework, many of the existing frameworks lack of granularity guidelines and mostl...
| Main Author: | Al-Safwani, Nadher Mohammed Ahmed |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/5327/1/s93043.pdf https://etd.uum.edu.my/5327/2/s93043_abstract.pdf |
Similar Items
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014)
by: Zadeh, HassanHossein
Published: (2014)
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
Improving information system security by evaluating human factors
by: Soltanmohammadi, Saeed
Published: (2013)
by: Soltanmohammadi, Saeed
Published: (2013)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018)
by: Md. Zain, Zamhariah
Published: (2018)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
A conceptual framework of information security database audit and assessment in university based organization
by: Ul Hasan, Muneeb
Published: (2018)
by: Ul Hasan, Muneeb
Published: (2018)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
by: Zainudin, Mohd. Eyzuan
Published: (2010)
by: Zainudin, Mohd. Eyzuan
Published: (2010)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
by: Saud Alharbi, Talal Nasser
Published: (2018)
by: Saud Alharbi, Talal Nasser
Published: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
by: Alharbi, Talal Nasser Saud
Published: (2018)
by: Alharbi, Talal Nasser Saud
Published: (2018)
Information security awareness framework for enhancing security privacy among twitter users
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Awareness and acceptance analysis of information security policy
by: Muda, Mohd. Zuki
Published: (2010)
by: Muda, Mohd. Zuki
Published: (2010)
Triple scheme based on image steganography to improve imperceptibility and security
by: Hashim, Mohammed Mahdi
Published: (2022)
by: Hashim, Mohammed Mahdi
Published: (2022)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
An improved biclustering algorithm with overlapping control for identification of informative genes and pathways
by: Mohammad Kusairi, Rohani
Published: (2021)
by: Mohammad Kusairi, Rohani
Published: (2021)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
by: Mohammed, Alwuhayd Muteb
Published: (2014)
by: Mohammed, Alwuhayd Muteb
Published: (2014)
Usability based risk assessment model for sotware development process
by: Moorthy, Jayaletchumi Sambantha
Published: (2016)
by: Moorthy, Jayaletchumi Sambantha
Published: (2016)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Factors affecting the information security awareness in maldives customs service
by: Naaif, Ibrahim
Published: (2015)
by: Naaif, Ibrahim
Published: (2015)
Evaluating human factors of information security awareness in Taibah University
by: Alaskary, Abdulaziz Abdullah O.
Published: (2019)
by: Alaskary, Abdulaziz Abdullah O.
Published: (2019)
Harmonising software process improvement based on controls and risk assessment
by: Raja Mohamed Ali, Raja Zurina
Published: (2011)
by: Raja Mohamed Ali, Raja Zurina
Published: (2011)
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)
by: Asadi, Saman
Published: (2014)
Information security risk management awareness in e-government outsourced projects
by: Zalehah Muyet
Published: (2011)
by: Zalehah Muyet
Published: (2011)
Enhancement of information security management system by embedding corporate ethical virtue as ethical issues solution
by: Abd. Hashim, Nur Zafirah
Published: (2015)
by: Abd. Hashim, Nur Zafirah
Published: (2015)
Information security policy compliance model for public sector
by: Abd. Rahim, Fuad Harriz
Published: (2017)
by: Abd. Rahim, Fuad Harriz
Published: (2017)
Improving corporate governance through ICT risk management
by: Kalkabay, Bekzat
Published: (2010)
by: Kalkabay, Bekzat
Published: (2010)
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
by: Parham, Nima
Published: (2009)
by: Parham, Nima
Published: (2009)
Enhanced ontological query expansion model using bigram combinations and combined similarity measure for improving information retrieval
by: Raza, Muhammad Ahsan
Published: (2020)
by: Raza, Muhammad Ahsan
Published: (2020)
Physical security measures framework for Marib power plant (Yemen)
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
A service quality assessment instrument for the bioinformatics information sources
by: Abd. Aziz, Nursyarafina
Published: (2009)
by: Abd. Aziz, Nursyarafina
Published: (2009)
Educational and training model of security awareness on mobile devices for students
by: Din, Dzairol Adzriem
Published: (2012)
by: Din, Dzairol Adzriem
Published: (2012)
An improved resource allocation scheme for WiMAX using channel information
by: Awan, Khalid Mahmood
Published: (2014)
by: Awan, Khalid Mahmood
Published: (2014)
Extending the utaut model to examine security hesitation of mobile money in Somalia
by: Jama, Ayub Suleiman
Published: (2021)
by: Jama, Ayub Suleiman
Published: (2021)
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
Web-based assessment of information systems services quality in Malaysian government agencies
by: M. Masilamani, M. Poobalan
Published: (2005)
by: M. Masilamani, M. Poobalan
Published: (2005)
Secure-Spin with hashing to support mobility and security in wireless sensor network
by: Amri, Mohammad Hossein
Published: (2013)
by: Amri, Mohammad Hossein
Published: (2013)
An enhancement of toe model by investigating the influential factors of cloud adoption security objectives
by: Bhuiyan, Md. Yeahia
Published: (2018)
by: Bhuiyan, Md. Yeahia
Published: (2018)
A process based approach software certification model for agile and secure environment
by: Mohamed, Shafinah Farvin Packeer
Published: (2015)
by: Mohamed, Shafinah Farvin Packeer
Published: (2015)
Cybersecurity capability maturity model for critical information technology infrastructure among Nigeria financial organizations
by: Mohammed, Idi
Published: (2019)
by: Mohammed, Idi
Published: (2019)
Similar Items
-
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014) -
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013) -
Improving information system security by evaluating human factors
by: Soltanmohammadi, Saeed
Published: (2013) -
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018) -
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)