An integrated conceptual model for information system security risk management supported by enterprise architecture management

N Mayer, J Aubert, E Grandry, C Feltus… - Software & Systems …, 2019 - Springer
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

An extension of business process model and notation for security risk management

O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …

Securing business processes using security risk-oriented patterns

N Ahmed, R Matulevičius - Computer Standards & Interfaces, 2014 - Elsevier
Business process modelling and security engineering are two important concerns when
developing information system. However current practices report that security is addressed …

Risk-oriented design approach for forensic-ready software systems

L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …

Towards definition of secure business processes

O Altuhhova, R Matulevičius, N Ahmed - Advanced Information Systems …, 2012 - Springer
Business process modelling is one of the major aspects in the modern system development.
Recently business process model and notation (BPMN) has become a standard technique …

Assessing risks and opportunities in enterprise architecture using an extended ADT approach

S Sousa, D Marosin, K Gaaloul… - 2013 17th IEEE …, 2013 - ieeexplore.ieee.org
At every step in creating an enterprise design, architects encounter risks and opportunities.
In most cases, risk assessment and treatment is done using the company's internal …

Survey on information system security risk management alignment

W Abbass, A Baina, M Bellafkih - … International Conference on …, 2016 - ieeexplore.ieee.org
Nowadays, the business services of organizations depend widely on Information Systems
(IS). However, these systems may face potential failure or risks that could lead to a business …

“Less give more”: evaluate and zoning android applications

MF Ab Razak, NB Anuar, R Salleh, A Firdaus, M Faiz… - Measurement, 2019 - Elsevier
The Android security mechanism is the first approach to protect data, system resource as
well as reduce the impact of malware. Past malware studies tend to investigate the novel …

Towards security risk-oriented misuse cases

I Soomro, N Ahmed - … : BPM 2012 International Workshops, Tallinn, Estonia …, 2013 - Springer
Security has turn out to be a necessity of information systems (ISs) and information per se.
Nevertheless, existing practices report on numerous cases when security aspects were …