메뉴 건너뛰기




Volumn , Issue , 2009, Pages 80-85

Ontology-based decision support for information security risk management

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKERS; DECISION SUPPORTS; E-COMMERCE APPLICATIONS; EBUSINESS; INFORMATION SECURITY; IT SECURITY; MANAGEMENT SOFTWARE; ONTOLOGY-BASED; RISK MITIGATION; SECURITY ISSUES; SOFTWARE SOLUTION;

EID: 70349102097     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICONS.2009.8     Document Type: Conference Paper
Times cited : (23)

References (26)
  • 2
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • Jan.-Feb.
    • M. Bishop, "What is computer security?" IEEE Sec. Priv. Mag., vol.1, no.1, pp. 67-69, Jan.-Feb. 2003.
    • (2003) IEEE Sec. Priv. Mag. , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 3
    • 50349098286 scopus 로고    scopus 로고
    • Online. Available
    • BSI, "IT Grundschutz Manual," 2004. [Online]. Available: http://www.bsi.de/english/gshb/manual/download/index.html
    • (2004) IT Grundschutz Manual
  • 5
    • 55249089094 scopus 로고
    • The growing risks of information systems success
    • December
    • M. Vitale, "The growing risks of information systems success," MIS Quarterly, vol.10, no.4, pp. 327-334, December 1986.
    • (1986) MIS Quarterly , vol.10 , Issue.4 , pp. 327-334
    • Vitale, M.1
  • 6
    • 33847748221 scopus 로고    scopus 로고
    • Is information security under control?: Investigating quality in information security management
    • DOI 10.1109/MSP.2007.11
    • W. Baker and L. Wallace, "Is information security under control?: Investigating quality in information security management," IEEE Security and Privacy, vol.5, no.1, pp. 36-44, 2007. (Pubitemid 46384607)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.1 , pp. 36-44
    • Baker, W.H.1    Wallace, L.2
  • 7
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • December
    • R. Baskerville, "Information systems security design methods: Implications for information systems development," ACM Computing Surveys, vol.25, no.4, pp. 375-414, December 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 9
    • 34848920878 scopus 로고    scopus 로고
    • Necessary measures: Metric-driven information security risk assessment and decision making
    • DOI 10.1145/1290958.1290969, 1290969
    • W. Baker, L. Rees, and P. Tippett, "Necessary measures: metric-driven information security risk assessment and decision making," Communications of the ACM, vol.50, no.10, pp. 101-106, 2007. (Pubitemid 47505006)
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 101-106
    • Baker, W.H.1    Rees, L.P.2    Tippett, P.S.3
  • 10
    • 2942625232 scopus 로고    scopus 로고
    • Coming Up Short on Financial Measurement
    • C. D. Ittner and D. F. Larcker, "Coming Up Short On Financial Measurement," Havard Business Review, vol.81, no.11, 2003.
    • (2003) Havard Business Review , vol.81 , Issue.11
    • Ittner, C.D.1    Larcker, D.F.2
  • 11
    • 0032324668 scopus 로고    scopus 로고
    • Challenges to the practical implementation of modeling and valuing real options
    • D. M. Lander and G. E. Pinches, "Challenges to the practical implementation of modelling and valuing real options," The Quarterly Review of Economics and Finance, vol.38, pp. 537-567, 1998. (Pubitemid 128180039)
    • (1998) Quarterly Review of Economics and Finance , vol.38 , Issue.3 PART 1 , pp. 537-567
    • Lander, D.M.1    Pinches, G.E.2
  • 13
    • 24944559544 scopus 로고
    • FIPS, National Bureau of Standards, Federal Information Processing Standards Publications (FIPS PUB) August
    • FIPS, "Guideline for automatic data processing risk analysis," National Bureau of Standards, Federal Information Processing Standards Publications (FIPS PUB) 65, August 1975.
    • (1975) Guideline for Automatic Data Processing Risk Analysis , vol.65
  • 15
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • T. Finne, "A conceptual framework for information security management," Computers & Security, vol.17, pp. 303-307, 1998. (Pubitemid 128400523)
    • (1998) Computers and Security , vol.17 , Issue.4 , pp. 303-307
    • Finne, T.1
  • 16
  • 18
    • 42149112876 scopus 로고    scopus 로고
    • Information security and risk management
    • April
    • L. Bodin, L. Gordon, and M. Loeb, "Information security and risk management," Communications of the ACM, vol.51, no.4, pp. 64-68, April 2008.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 64-68
    • Bodin, L.1    Gordon, L.2    Loeb, M.3
  • 19
    • 9744234714 scopus 로고
    • One approach to risk assessment
    • February
    • B. Farquhar, "One approach to risk assessment," Computers and Security, vol.10, no.10, pp. 21-23, February 1991.
    • (1991) Computers and Security , vol.10 , Issue.10 , pp. 21-23
    • Farquhar, B.1
  • 20
    • 1842829828 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-830, July
    • G. Stoneburner, A. Goguen, and A. Feringa, "Risk management guide for information technology systems," National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-830, July 2002.
    • (2002) Risk Management Guide for Information Technology Systems
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 21
    • 33846674492 scopus 로고    scopus 로고
    • Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, Tech. Rep., August
    • C. Alberts, A. Dorofee, J. Stevens, and C. Woody, "Introduction to the OCTAVE approach," Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, Tech. Rep., August 2003.
    • (2003) Introduction to the OCTAVE Approach
    • Alberts, C.1    Dorofee, A.2    Stevens, J.3    Woody, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.