Control priorization model for improving information security risk assessment
Evaluating particular assets for information security risk assessment should take into consideration the availability of adequate resources and return on investments (ROI). Despite the need for a good risk assessment framework, many of the existing frameworks lack of granularity guidelines and mostl...
| Main Author: | Al-Safwani, Nadher Mohammed Ahmed |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/5327/1/s93043.pdf https://etd.uum.edu.my/5327/2/s93043_abstract.pdf |
Similar Items
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014)
by: Zadeh, HassanHossein
Published: (2014)
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Improving information system security by evaluating human factors
by: Soltanmohammadi, Saeed
Published: (2013)
by: Soltanmohammadi, Saeed
Published: (2013)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018)
by: Md. Zain, Zamhariah
Published: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
A conceptual framework of information security database audit and assessment in university based organization
by: Ul Hasan, Muneeb
Published: (2018)
by: Ul Hasan, Muneeb
Published: (2018)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
by: Zainudin, Mohd. Eyzuan
Published: (2010)
by: Zainudin, Mohd. Eyzuan
Published: (2010)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
by: Saud Alharbi, Talal Nasser
Published: (2018)
by: Saud Alharbi, Talal Nasser
Published: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
by: Alharbi, Talal Nasser Saud
Published: (2018)
by: Alharbi, Talal Nasser Saud
Published: (2018)
Information security awareness framework for enhancing security privacy among twitter users
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
Triple scheme based on image steganography to improve imperceptibility and security
by: Hashim, Mohammed Mahdi
Published: (2022)
by: Hashim, Mohammed Mahdi
Published: (2022)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Awareness and acceptance analysis of information security policy
by: Muda, Mohd. Zuki
Published: (2010)
by: Muda, Mohd. Zuki
Published: (2010)
An improved biclustering algorithm with overlapping control for identification of informative genes and pathways
by: Mohammad Kusairi, Rohani
Published: (2021)
by: Mohammad Kusairi, Rohani
Published: (2021)
Harmonising software process improvement based on controls and risk assessment
by: Raja Mohamed Ali, Raja Zurina
Published: (2011)
by: Raja Mohamed Ali, Raja Zurina
Published: (2011)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)
by: Asadi, Saman
Published: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
by: Mohammed, Alwuhayd Muteb
Published: (2014)
by: Mohammed, Alwuhayd Muteb
Published: (2014)
Usability based risk assessment model for sotware development process
by: Moorthy, Jayaletchumi Sambantha
Published: (2016)
by: Moorthy, Jayaletchumi Sambantha
Published: (2016)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Factors affecting the information security awareness in maldives customs service
by: Naaif, Ibrahim
Published: (2015)
by: Naaif, Ibrahim
Published: (2015)
Evaluating human factors of information security awareness in Taibah University
by: Alaskary, Abdulaziz Abdullah O.
Published: (2019)
by: Alaskary, Abdulaziz Abdullah O.
Published: (2019)
Information security risk management awareness in e-government outsourced projects
by: Zalehah Muyet
Published: (2011)
by: Zalehah Muyet
Published: (2011)
Evaluation model for knowledge sharing in information security professional virtual community / Alireza Tamjidyamcholo
by: Tamjidyamcholo, Alireza
Published: (2014)
by: Tamjidyamcholo, Alireza
Published: (2014)
An enhanced risk identification and assessment model to improve software risk management / Ahdieh Sadat Khatavakhotan
by: Ahdieh Sadat, Khatavakhotan
Published: (2017)
by: Ahdieh Sadat, Khatavakhotan
Published: (2017)
Information security policy compliance model for public sector
by: Abd. Rahim, Fuad Harriz
Published: (2017)
by: Abd. Rahim, Fuad Harriz
Published: (2017)
Enhancement of information security management system by embedding corporate ethical virtue as ethical issues solution
by: Abd. Hashim, Nur Zafirah
Published: (2015)
by: Abd. Hashim, Nur Zafirah
Published: (2015)
Improving corporate governance through ICT risk management
by: Kalkabay, Bekzat
Published: (2010)
by: Kalkabay, Bekzat
Published: (2010)
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
by: Parham, Nima
Published: (2009)
by: Parham, Nima
Published: (2009)
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
Enhanced ontological query expansion model using bigram combinations and combined similarity measure for improving information retrieval
by: Raza, Muhammad Ahsan
Published: (2020)
by: Raza, Muhammad Ahsan
Published: (2020)
Physical security measures framework for Marib power plant (Yemen)
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
Educational and training model of security awareness on mobile devices for students
by: Din, Dzairol Adzriem
Published: (2012)
by: Din, Dzairol Adzriem
Published: (2012)
A service quality assessment instrument for the bioinformatics information sources
by: Abd. Aziz, Nursyarafina
Published: (2009)
by: Abd. Aziz, Nursyarafina
Published: (2009)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
An improved resource allocation scheme for WiMAX using channel information
by: Awan, Khalid Mahmood
Published: (2014)
by: Awan, Khalid Mahmood
Published: (2014)
The analysis and development of secure software assessment model (SSAM)
by: Apau, Mohd. Nazer
Published: (2007)
by: Apau, Mohd. Nazer
Published: (2007)
Similar Items
-
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014) -
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013) -
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019) -
Improving information system security by evaluating human factors
by: Soltanmohammadi, Saeed
Published: (2013) -
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018)