Control priorization model for improving information security risk assessment
Evaluating particular assets for information security risk assessment should take into consideration the availability of adequate resources and return on investments (ROI). Despite the need for a good risk assessment framework, many of the existing frameworks lack of granularity guidelines and mostl...
| Auteur principal: | Al-Safwani, Nadher Mohammed Ahmed |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2014
|
| Sujets: | |
| Accès en ligne: | https://etd.uum.edu.my/5327/1/s93043.pdf https://etd.uum.edu.my/5327/2/s93043_abstract.pdf |
Documents similaires
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013)
par: Soltanmohammadi, Saeed
Publié: (2013)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
par: Md. Zain, Zamhariah
Publié: (2018)
par: Md. Zain, Zamhariah
Publié: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
A conceptual framework of information security database audit and assessment in university based organization
par: Ul Hasan, Muneeb
Publié: (2018)
par: Ul Hasan, Muneeb
Publié: (2018)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
par: Saud Alharbi, Talal Nasser
Publié: (2018)
par: Saud Alharbi, Talal Nasser
Publié: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
par: Alharbi, Talal Nasser Saud
Publié: (2018)
par: Alharbi, Talal Nasser Saud
Publié: (2018)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022)
par: Hashim, Mohammed Mahdi
Publié: (2022)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
An improved biclustering algorithm with overlapping control for identification of informative genes and pathways
par: Mohammad Kusairi, Rohani
Publié: (2021)
par: Mohammad Kusairi, Rohani
Publié: (2021)
Harmonising software process improvement based on controls and risk assessment
par: Raja Mohamed Ali, Raja Zurina
Publié: (2011)
par: Raja Mohamed Ali, Raja Zurina
Publié: (2011)
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023)
par: Yau, Ti Dun
Publié: (2023)
Value focused assessment of information system security
par: Asadi, Saman
Publié: (2014)
par: Asadi, Saman
Publié: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
Usability based risk assessment model for sotware development process
par: Moorthy, Jayaletchumi Sambantha
Publié: (2016)
par: Moorthy, Jayaletchumi Sambantha
Publié: (2016)
Users' perception of the information security policy at Universiti Teknologi Malaysia
par: Sharif, Haniza
Publié: (2009)
par: Sharif, Haniza
Publié: (2009)
Factors affecting the information security awareness in maldives customs service
par: Naaif, Ibrahim
Publié: (2015)
par: Naaif, Ibrahim
Publié: (2015)
Evaluating human factors of information security awareness in Taibah University
par: Alaskary, Abdulaziz Abdullah O.
Publié: (2019)
par: Alaskary, Abdulaziz Abdullah O.
Publié: (2019)
Information security risk management awareness in e-government outsourced projects
par: Zalehah Muyet
Publié: (2011)
par: Zalehah Muyet
Publié: (2011)
Evaluation model for knowledge sharing in information security professional virtual community / Alireza Tamjidyamcholo
par: Tamjidyamcholo, Alireza
Publié: (2014)
par: Tamjidyamcholo, Alireza
Publié: (2014)
An enhanced risk identification and assessment model to improve software risk management / Ahdieh Sadat Khatavakhotan
par: Ahdieh Sadat, Khatavakhotan
Publié: (2017)
par: Ahdieh Sadat, Khatavakhotan
Publié: (2017)
Information security policy compliance model for public sector
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
Enhancement of information security management system by embedding corporate ethical virtue as ethical issues solution
par: Abd. Hashim, Nur Zafirah
Publié: (2015)
par: Abd. Hashim, Nur Zafirah
Publié: (2015)
Improving corporate governance through ICT risk management
par: Kalkabay, Bekzat
Publié: (2010)
par: Kalkabay, Bekzat
Publié: (2010)
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
par: Parham, Nima
Publié: (2009)
par: Parham, Nima
Publié: (2009)
Information security awareness model in social networking for teenagers
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
Enhanced ontological query expansion model using bigram combinations and combined similarity measure for improving information retrieval
par: Raza, Muhammad Ahsan
Publié: (2020)
par: Raza, Muhammad Ahsan
Publié: (2020)
Physical security measures framework for Marib power plant (Yemen)
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
par: Nurul’Adilah , Nazri
Publié: (2022)
par: Nurul’Adilah , Nazri
Publié: (2022)
Educational and training model of security awareness on mobile devices for students
par: Din, Dzairol Adzriem
Publié: (2012)
par: Din, Dzairol Adzriem
Publié: (2012)
A service quality assessment instrument for the bioinformatics information sources
par: Abd. Aziz, Nursyarafina
Publié: (2009)
par: Abd. Aziz, Nursyarafina
Publié: (2009)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
par: Mohamed Shabbir Hamza , Abdulnabi
Publié: (2018)
par: Mohamed Shabbir Hamza , Abdulnabi
Publié: (2018)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
par: Tan, Wai Beng
Publié: (2011)
par: Tan, Wai Beng
Publié: (2011)
An improved resource allocation scheme for WiMAX using channel information
par: Awan, Khalid Mahmood
Publié: (2014)
par: Awan, Khalid Mahmood
Publié: (2014)
The analysis and development of secure software assessment model (SSAM)
par: Apau, Mohd. Nazer
Publié: (2007)
par: Apau, Mohd. Nazer
Publié: (2007)
Documents similaires
-
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014) -
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013) -
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019) -
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013) -
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
par: Md. Zain, Zamhariah
Publié: (2018)