Information and cyber security maturity models: a systematic literature review

A Rabii, S Assoul, K Ouazzani Touhami… - Information & Computer …, 2020 - emerald.com
Purpose This paper aims to clarify the uncertainty reflected in the current state of information
security maturity evaluation where it has not enough matured and converged so that a …

[PDF][PDF] Comparative analysis of software development methodologies for security requirement analysis: Towards healthcare security practice

P Yeng, S Wolthusen, B Yang - Information Systems (Sofia), 2020 - academia.edu
Reducing time to market (TTM), dynamic requirement changes and increasing profit to
service providers are some of the features that are most interesting to software developers …

[PDF][PDF] Towards a quantitative approach for security assurance metrics

GK Weldehawaryat, B Katt - The 12th International Conference on …, 2018 - researchgate.net
The need for effective and efficient evaluation schemes of security assurance is growing in
many organizations, especially Small and Medium Enterprises (SMEs). Although there are …

A multi-perspective methodology for evaluating the security maturity of data centers

MVM Lima, RMF Lima, FAA Lins - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Threats to information security can have great impact on business finances and company's
reputation. Traditional methodologies for evaluating the maturity of data centers investigate …

An adaptation assessment framework for runtime security assurance case evolution

S Jahan - 2021 - search.proquest.com
Self-adaptive systems (SASs) have emerged as an important technology to support the
advancement of autonomous technology. SASs adapt their behaviors at runtime to continue …

[PDF][PDF] A Hybrid Strategy Using Human Centered Design and Agile Methodologies to Develop an Error Taxonomy to Assist Businesses in Avoiding and Repairing …

Y Mou - 2022 - opus4.kobv.de
Companies often utilize error taxonomies to handle software problems. Agile and scrum-
based software engineering procedures leverage software testing and quality management …

[PDF][PDF] Maturity of organisational security governance

M Renne - repository.tudelft.nl
When I started my graduation thesis journey in February this year, I wouldn't have guessed
that it would have resulted in the thesis that lies before you. Most projects I had done so far …

The Need for Accreditation Speed

V Lindskog - 2022 - diva-portal.org
Security requirements on information systems needs a way to be verified for fulfilment.
Accreditation is a tool to measure the level of compliance of the security requirements …

Realizing User Privacy and Security Issues in Edutainment e-Solutions

OA Alsaadoun, BA Lawati - HCI in Games: First International Conference …, 2019 - Springer
Edutainment set a unique approach for incorporating learning enriched with dynamic
platforms of multimedia end enjoyment. Computerized systems built with edutainment …

[引用][C] Ferramenta de apoio a auditoria de programa de segurança de software

MS Freire - 2014