-
1
-
-
33645967666
-
BS ISO/IEC 27001:2005 - Information Technology - Security Techniques - Information Security Management Systems - Requirements
-
British Standards Institution
-
British Standards Institution, "BS ISO/IEC 27001:2005 - Information Technology - Security Techniques - Information Security Management Systems - Requirements", 2005
-
(2005)
-
-
-
2
-
-
28044457328
-
BS ISO/IEC 27002:2005 - Information Technology - Security Techniques - Code of Practice for Information Security Management
-
British Standards Institution
-
British Standards Institution, "BS ISO/IEC 27002:2005 - Information Technology - Security Techniques - Code of Practice for Information Security Management", 2005
-
(2005)
-
-
-
4
-
-
70350691801
-
Human Vulnerabilities in Security Systems: White Paper
-
KTN Human Factors Working Group, Cyber Security Knowledge Transfer Network KTN
-
KTN Human Factors Working Group, "Human Vulnerabilities in Security Systems: White Paper", Cyber Security Knowledge Transfer Network (KTN), 2007
-
(2007)
-
-
-
5
-
-
44649188693
-
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies
-
Springer, pp
-
S.E. Parkin, R. Yassin Kassab, A. van Moorsel, "The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies", In Service Availability. 5th International Service Availability Symposium (ISAS 2008), Springer, pp 43-58, 2008
-
(2008)
Service Availability. 5th International Service Availability Symposium (ISAS
, pp. 43-58
-
-
Parkin, S.E.1
Yassin Kassab, R.2
van Moorsel, A.3
-
6
-
-
48249084117
-
Interactive Selection of ISO 27001 Controls under Multiple Objectives
-
Springer-Verlag GmbH, p
-
T. Neubauer, A. Ekelhart, S. Fenz, "Interactive Selection of ISO 27001 Controls under Multiple Objectives", Proceedings of the 23rd International Security Conference (SEC 2008), Springer-Verlag GmbH, p. 477-492, 2008
-
(2008)
Proceedings of the 23rd International Security Conference (SEC
, pp. 477-492
-
-
Neubauer, T.1
Ekelhart, A.2
Fenz, S.3
-
7
-
-
39849089088
-
A Psychometric Study of Information Technology Risks in the Workplace
-
Society for Risk Analysis
-
R. Coles, G. P. Hodgkinson, "A Psychometric Study of Information Technology Risks in the Workplace", Risk Analysis, 28(1), pp 81-93, Society for Risk Analysis, 2008
-
(2008)
Risk Analysis
, vol.28
, Issue.1
, pp. 81-93
-
-
Coles, R.1
Hodgkinson, G.P.2
-
8
-
-
70450164693
-
-
F. N. do Amaral, C. Bazilio, G. M. Hamazaki da Silva, A. Rademaker, E. H. Haeusler, An Ontology-Based Approach to the Formalization of Information Security Policies, Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp 1, 2006
-
F. N. do Amaral, C. Bazilio, G. M. Hamazaki da Silva, A. Rademaker, E. H. Haeusler, "An Ontology-Based Approach to the Formalization of Information Security Policies", Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp 1, 2006
-
-
-
-
9
-
-
77957909604
-
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security
-
A. Beautement, R. Coles, J. Griffin, B. Monahan, D. Pym, M.A. Sasse, M. Wonham, "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security", Workshop on Economics in Information Security (WEIS), 2008
-
(2008)
Workshop on Economics in Information Security (WEIS)
-
-
Beautement, A.1
Coles, R.2
Griffin, J.3
Monahan, B.4
Pym, D.5
Sasse, M.A.6
Wonham, M.7
-
11
-
-
0242444871
-
Making Passwords Secure and Usable
-
A. Adams, M. A. Sasse, P. Lunt, "Making Passwords Secure and Usable", Proceedings of HCI on People and Computers XII, pp 1-19, 1997
-
(1997)
Proceedings of HCI on People and Computers XII
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
12
-
-
70350660122
-
-
Newcastle University UK, last viewed 24/02/09
-
Newcastle University UK, "Trust Economics Website", http://www.trust-economics.org/, last viewed 24/02/09
-
Trust Economics Website
-
-
-
13
-
-
70350641571
-
Trust Economics Feasibility Study
-
IEEE Computer Society, pp
-
R. Coles, J. Griffin, H. Johnson, B. Monahan, S.E. Parkin, D. Pym, M.A. Sasse, A. van Moorsel, "Trust Economics Feasibility Study", In 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), IEEE Computer Society, pp A45-A50, 2008
-
(2008)
38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN
-
-
Coles, R.1
Griffin, J.2
Johnson, H.3
Monahan, B.4
Parkin, S.E.5
Pym, D.6
Sasse, M.A.7
van Moorsel, A.8
-
14
-
-
39749101462
-
Security Ontologies: Improving Quantitative Risk Analysis
-
pp
-
A. Ekelhart, S. Fenz, M. Klemen, E. Weippl, "Security Ontologies: Improving Quantitative Risk Analysis", pp.156a, 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
-
(2007)
40th Annual Hawaii International Conference on System Sciences (HICSS'07)
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
15
-
-
70350690212
-
The Economics of Information Security
-
Cyber Security Knowledge Transfer Network (KTN) & Economic & Social Research Council ESRC
-
Cyber Security Knowledge Transfer Network (KTN) & Economic & Social Research Council (ESRC), "The Economics of Information Security", ESRC Seminar Series, 2008
-
(2008)
ESRC Seminar Series
-
-
-
17
-
-
70350693946
-
-
W3C, OWL Web Ontology Language Overview, http://www.w3.org/ TR/owl-features/, 2004, last viewed 24/02/09
-
W3C, "OWL Web Ontology Language Overview", http://www.w3.org/ TR/owl-features/, 2004, last viewed 24/02/09
-
-
-
-
18
-
-
33244454674
-
-
Stanford Center for Biomedical Informatics Research, last viewed 24/02/09
-
Stanford Center for Biomedical Informatics Research, "The Protégé Ontology Editor and Knowledge Acquisition System", http://protege.stanford.edu/, last viewed 24/02/09
-
The Protégé Ontology Editor and Knowledge Acquisition System
-
-
-
19
-
-
84900482702
-
Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
-
P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem". Personal and Ubiquitous Computing, 8(6), pp 391-401, 2004
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.2
Delgado de la Flor, J.3
Joseph, M.4
-
20
-
-
70350665921
-
-
Information Security Awareness Forum (ISAF) & Information Assurance Advisory Council IAAC, last viewed 24/02/09
-
Information Security Awareness Forum (ISAF) & Information Assurance Advisory Council (IAAC), "Creating a Strong Information Handling Culture", http://www.iaac.org.uk/Portals/0/23176\-DIAN\-A5\-PEOPLE\-15\-4. pdf, last viewed 24/02/09
-
Creating a Strong Information Handling Culture
-
-
-
22
-
-
8344270973
-
An Ontology for Modelling Security: The Tropos Approach
-
H. Mouratidis, P. Giorgini, G. A. Manson, "An Ontology for Modelling Security: The Tropos Approach", 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES), pp 1387-1394, 2003
-
(2003)
7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES)
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
23
-
-
33748188062
-
A Quantitative Method for ISO 17799 Gap Analysis
-
B. Karabacak & I. Sogukpinar, "A Quantitative Method for ISO 17799 Gap Analysis", Computers & Security, 25(6), pp 413-419, 2006
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 413-419
-
-
Karabacak, B.1
Sogukpinar, I.2
-
24
-
-
29744447253
-
Business-Driven Application Security: From Modeling to Managing Secure Applications
-
N. Nagaratnam, A. J. Nadalin, M. Hondo, M. McIntosh, P. Austel, "Business-Driven Application Security: From Modeling to Managing Secure Applications", IBM Systems Journal, 44(4), pp 847-868, 2005
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
, pp. 847-868
-
-
Nagaratnam, N.1
Nadalin, A.J.2
Hondo, M.3
McIntosh, M.4
Austel, P.5
-
26
-
-
0036173202
-
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
-
G. Magklaras & S. Furnell, "Insider Threat Prediction Tool: Evaluating the probability of IT misuse", Computers & Security, vol. 21, no. 1, pp 62-73, 2002
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.1
Furnell, S.2
-
27
-
-
0030409989
-
Towards a Framework to Verify Knowledge Sharing Technology
-
A. Gómez-Pérez, "Towards a Framework to Verify Knowledge Sharing Technology", Expert Systems with Applications, Vol. 11, No. 4, pp 519-529, 1996
-
(1996)
Expert Systems with Applications
, vol.11
, Issue.4
, pp. 519-529
-
-
Gómez-Pérez, A.1
-
32
-
-
57849125076
-
Eliciting Security Requirements through Misuse Activities
-
F. A. Braz, E. B. Fernandez, M. VanHilst, "Eliciting Security Requirements through Misuse Activities", Proceedings of the 2008 19th International Conference on Database and Expert Systems Application (DEXA), Pages 328-333, 2008
-
(2008)
Proceedings of the 2008 19th International Conference on Database and Expert Systems Application (DEXA)
, pp. 328-333
-
-
Braz, F.A.1
Fernandez, E.B.2
VanHilst, M.3
-
33
-
-
50049109224
-
-
S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, and E. Weippl, Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard, Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing (PRDC2007), IEEE Computer Society, pp 381-388, 2007
-
S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, and E. Weippl, "Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard", Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing (PRDC2007), IEEE Computer Society, pp 381-388, 2007
-
-
-
-
35
-
-
84869138544
-
An Ontological Approach Applied to Information Security and Trust
-
A. Vorobiev & N. Bekmamedova, "An Ontological Approach Applied to Information Security and Trust", ACIS 2007 Proceedings, 2007
-
(2007)
ACIS 2007 Proceedings
-
-
Vorobiev, A.1
Bekmamedova, N.2
-
37
-
-
33746416682
-
A Target-Centric Ontology for Intrusion Detection
-
J. Undercoffer, J. Pinkston, A. Joshi, T. Finin, "A Target-Centric Ontology for Intrusion Detection", In Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems, 2004
-
(2004)
Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems
-
-
Undercoffer, J.1
Pinkston, J.2
Joshi, A.3
Finin, T.4
-
38
-
-
84953384559
-
Building Problem Domain Ontology from Security Requirements in Regulatory Documents
-
S. Lee, R. Gandhi, D. Muthurajan, D. Yavagal, G. Ahn, "Building Problem Domain Ontology from Security Requirements in Regulatory Documents", Proceedings of the 2006 international workshop on Software engineering for secure systems, pp 43-50, 2006
-
(2006)
Proceedings of the 2006 international workshop on Software engineering for secure systems
, pp. 43-50
-
-
Lee, S.1
Gandhi, R.2
Muthurajan, D.3
Yavagal, D.4
Ahn, G.5
-
39
-
-
51449100841
-
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
-
IEEE Computer Society, pp
-
G. Goluch, A. Ekelhart, S. Fenz, S. Jakoubi, S. Tjoa and T. Mueck, "Integration of an Ontological Information Security Concept in Risk Aware Business Process Management", Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS 2008), IEEE Computer Society, pp 377-385, 2008
-
(2008)
Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS
, pp. 377-385
-
-
Goluch, G.1
Ekelhart, A.2
Fenz, S.3
Jakoubi, S.4
Tjoa, S.5
Mueck, T.6
-
41
-
-
70350651716
-
-
S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, R. F. Trzeciak, Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, CMU/SEI-2006-TR-026, Carnegie Mellon University, 2006
-
S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, R. F. Trzeciak, "Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis", CMU/SEI-2006-TR-026, Carnegie Mellon University, 2006
-
-
-
-
42
-
-
70350643359
-
-
University College London, last viewed 19/05/09
-
University College London, "Human Centred Systems Group", http://hornbeam.cs.ucl.ac.uk/hcs/index.html, last viewed 19/05/09
-
Human Centred Systems Group
-
-
|