An investigation of organizational information security risk analysis

SZ Jourdan - 2010 - etd.auburn.edu
… To better understand the current state of this information security risk analysis (ISRA) … a
group of information security professionals (N=32). The results of this initial investigation led to a …

An investigation of security risk & taxonomy of Cloud Computing environment

A Sharma, UK Singh, K Upreti… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
… Before deploying cloud computing-based applications, a security risk assessment in terms
of vulnerabilities must be … The investigation of the security risk in terms of vulnerabilities are: …

An investigation into modern water distribution network security: Risk and implications

GA Tularam, M Properjohn - Security Journal, 2011 - Springer
… Recent security breaches in Australia and abroad have led us to consider the issues of risk
and … Risk analysis methodologies to assess the vulnerability are outlined, along with possible …

The state of risk assessment practices in information security: An exploratory investigation

J Rees, J Allen - Journal of Organizational Computing and …, 2008 - Taylor & Francis
security riskrisk exist, particularly software project risk [Citation2], [Citation3]. The analysis
of these various risks typically occurs in the risk assessment (RA) phase or step of the security

Investigation of IT security and compliance challenges in security-as-a-service for cloud computing

H Al-Aqrabi, L Liu, J Xu, R Hill… - 2012 IEEE 15th …, 2012 - ieeexplore.ieee.org
… may ensure better compliance and better governance of security controls as per the risk
assessment models of user companies. However, the practical feasibility also needs to be …

[PDF][PDF] An investigation study for risk calculation of security vulnerabilities on android applications (in

RM Abdullah, AZ Abualkishik, NM Isaacc… - Indonesian Journal of …, 2022 - academia.edu
security risk if roles could obtain permission to unauthorized medical information. To reduce
security risk a new hybrid risk … The risk assessment metric is calculated using risk ranking …

[HTML][HTML] An investigation of mitigating the safety and security risks allied with oil and gas pipeline projects

L Kraidi, R Shah, W Matipa, F Borthwick - Journal of Pipeline Science and …, 2021 - Elsevier
… Oil and Gas Pipeline (OGP) projects face a wide range of safety and security Risk Factors
(… to mitigate the risk in OGP projects. This paper presents a prototype of the risk management …

User participation in information systems security risk management

JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
… of identifying and prioritizing IS security risk, and implementing … the process of managing
security risk and the controls (… , and people used to manage security risk, while the resulting …

A graphical approach to risk identification, motivated by empirical investigations

I Hogganvik, K Stølen - … on Model Driven Engineering Languages and …, 2006 - Springer
… In the following we refer to security risk analysis as security … From empirical investigations
[5] and field trials we know that … may jeopardize the value of the whole security analysis. …

How perceived security risk affects intention to use smart home devices: A reasoned action explanation

JE Klobas, T McGill, X Wang - Computers & Security, 2019 - Elsevier
… We also investigated the role of age and education … security risk into account when they
make decisions about adoption of smart home devices. Given the role of perceived security risk