作者
Mariana Gerber, Rossouw Von Solms
发表日期
2005/2/1
期刊
Computers & security
卷号
24
期号
1
页码范围
16-30
出版商
Elsevier Advanced Technology
简介
Linked together, organisations can exchange information and engage in transactions in ways unanticipated before, the emphasis being on information, which became core to most business activities and without which business will fail to operate [Owens S. Information security management :an introduction. London: British Standards Institution; 1998. pp. 1–2]. Consequently, to contribute to ensuring business continuity, the protection of information resources had to be pursued. Risk analysis was traditionally used to analyse risks posing a threat to mostly IT assets [Jung C, Han I, Suh B. Risk analysis for electronic commerce using case-based reasoning. International Journal of Intelligent Systems in Accounting, Finance & Management 1999;8:61–73. John Wiley & Sons, Ltd., p. 62]. Resulting in recommendations for the implementation of appropriate security measures, to reduce those identified high priority risks to an …
引用总数
2004200520062007200820092010201120122013201420152016201720182019202020212022202320241591321222013122521131516151912519106
学术搜索中的文章