메뉴 건너뛰기




Volumn 290, Issue , 2008, Pages 3-16

Emergent risks In critical infrastructures

Author keywords

Emergent risk; Grocery retail; Health care; Information security

Indexed keywords

CRITICAL INFRASTRUCTURES; FOOD SUPPLY; HEALTH CARE; PUBLIC WORKS; SALES; SECURITY OF DATA; SUPPLY CHAINS;

EID: 55549148446     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-88523-0_1     Document Type: Article
Times cited : (10)

References (9)
  • 1
    • 55549093612 scopus 로고    scopus 로고
    • Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, New Hampshire
    • Center for Digital Strategies, Security through Information Risk Management: A Workshop for Information Security Executives, Tuck School of Business, Dartmouth College, Hanover, New Hampshire (mba.tuck.dartmouth.edu/digital/Programs/CorporateEvents/CISO2007.html) 2007.
    • (2007) Security through Information Risk Management: A Workshop for Information Security Executives
  • 3
    • 55549148636 scopus 로고    scopus 로고
    • Information Security Investment Case Study: The Manufacturing Sector
    • Technical Report, Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, New Hampshire
    • S. Dynes, Information Security Investment Case Study: The Manufacturing Sector, Technical Report, Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, New Hampshire (mba.tuck.dartmouth.edu/digital/Research/ResearchProjects/ InfoSecManufacturing.pdf), 2006.
    • (2006)
    • Dynes, S.1
  • 4
    • 77957889874 scopus 로고    scopus 로고
    • Costs to the U.S. economy of information infrastructure failures: Estimates from leld studies and economic data
    • presented at the
    • S. Dynes, E. Andrijcic and M. Johnson, Costs to the U.S. economy of information infrastructure failures: Estimates from leld studies and economic data, presented at the Workshop on the Economics of Information Security, 2006.
    • (2006) Workshop on the Economics of Information Security
    • Dynes, S.1    Andrijcic, E.2    Johnson, M.3
  • 5
    • 36248964709 scopus 로고    scopus 로고
    • Cyber security: Are economic incentives adequate?
    • E. Goetz and S. Shenoi Eds, Springer, Boston, Massachusetts, pp
    • S. Dynes, E. Goetz and M. Freeman, Cyber security: Are economic incentives adequate? in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 15-27, 2007.
    • (2007) Critical Infrastructure Protection , pp. 15-27
    • Dynes, S.1    Goetz, E.2    Freeman, M.3
  • 7
    • 85088269364 scopus 로고    scopus 로고
    • Categorization of supply chain risk management
    • C. Brindley Ed, Ashgate, Aldershot, United Kingdom, pp
    • A. Norrman and R. Lindroth, Categorization of supply chain risk management, in Supply Chain Risk, C. Brindley (Ed.), Ashgate, Aldershot, United Kingdom, pp. 14-27, 2004.
    • (2004) Supply Chain Risk , pp. 14-27
    • Norrman, A.1    Lindroth, R.2
  • 8
    • 55549143188 scopus 로고    scopus 로고
    • C. Watters, Analyzing corporate risks with RiskMAP, presented at the Second Annual I3P Process Control Systems Security Workshop, 2006.
    • C. Watters, Analyzing corporate risks with RiskMAP, presented at the Second Annual I3P Process Control Systems Security Workshop, 2006.
  • 9
    • 55549142041 scopus 로고    scopus 로고
    • Wikipedia, Zotob (computer worm) (en.wikipedia.org/wiki/Zotob), 2005.
    • Wikipedia, Zotob (computer worm) (en.wikipedia.org/wiki/Zotob), 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.