Privacy has been frequently identified as a main concern for systems that deal with personal information. However, much of existing work on privacy requirements deals with them as a …
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information available on multiple sources, including social media. The information could be used to …
Security risk management is a knowledge-intensive procedure that requires monitoring and capturing relevant information that can assist in making the right decision by managers. In …
Development of metrics that are valuable for assessing security and decision making is an important element of efficient counteraction to cyber threats. The paper proposes an …
T Li, Z Chen - Journal of Systems and Software, 2020 - Elsevier
Although academia has recognized the importance of explicitly specifying security requirements in early stages of system developments for years, in reality, many projects mix …
DP Pereira, C Hirata, S Nadjm-Tehrani - Journal of Information Security and …, 2019 - Elsevier
Considerations of safety and security in the early stage of system life cycle are essential to collect and prioritize operation needs, determine feasibility of the desired system, and …
B Best, J Jurjens, B Nuseibeh - 29th International Conference …, 2007 - ieeexplore.ieee.org
Given the explosive growth of digitally stored information in modern enterprises, distributed information systems together with search engines are increasingly used in companies. By …
Ö Kafali, J Jones, M Petruso, L Williams… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Policy design is an important part of software development. As security breaches increase in variety, designing a security policy that addresses all potential breaches becomes a …
Modern information systems are characterized by huge security related data streams. For cyber security management in such systems, novel models and techniques for efficient …