A Sharma, UK Singh, K Upreti… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
… Before deploying cloud computing-based applications, a securityrisk assessment in terms of vulnerabilities must be … The investigation of the securityrisk in terms of vulnerabilities are: …
GA Tularam, M Properjohn - Security Journal, 2011 - Springer
… Recent security breaches in Australia and abroad have led us to consider the issues of risk and … Risk analysis methodologies to assess the vulnerability are outlined, along with possible …
J Rees, J Allen - Journal of Organizational Computing and …, 2008 - Taylor & Francis
… securityrisk … risk exist, particularly software project risk [Citation2], [Citation3]. The analysis of these various risks typically occurs in the risk assessment (RA) phase or step of the security …
… may ensure better compliance and better governance of security controls as per the risk assessment models of user companies. However, the practical feasibility also needs to be …
… securityrisk if roles could obtain permission to unauthorized medical information. To reduce securityrisk a new hybrid risk … The risk assessment metric is calculated using risk ranking …
L Kraidi, R Shah, W Matipa, F Borthwick - Journal of Pipeline Science and …, 2021 - Elsevier
… Oil and Gas Pipeline (OGP) projects face a wide range of safety and securityRisk Factors (… to mitigate the risk in OGP projects. This paper presents a prototype of the risk management …
… of identifying and prioritizing IS securityrisk, and implementing … the process of managing securityrisk and the controls (… , and people used to manage securityrisk, while the resulting …
I Hogganvik, K Stølen - … on Model Driven Engineering Languages and …, 2006 - Springer
… In the following we refer to securityrisk analysis as security … From empirical investigations [5] and field trials we know that … may jeopardize the value of the whole security analysis. …
… We also investigated the role of age and education … securityrisk into account when they make decisions about adoption of smart home devices. Given the role of perceived securityrisk …