A framework for estimating information security risk assessment method completeness

[1]  Gaute Wangen,et al.  Information Security Risk Assessment: A Method Comparison , 2017, Computer.

[2]  Vivek Agrawal,et al.  A Comparative Study on Information Security Risk Analysis Methods , 2017, J. Comput..

[3]  Stefan Fenz,et al.  Current challenges in information security risk management , 2014, Inf. Manag. Comput. Secur..

[4]  Jack Jones,et al.  Measuring and Managing Information Risk: A FAIR Approach , 2014 .

[5]  Lisa Rajbhandari,et al.  Risk Analysis Using "Conflicting Incentives" as an Alternative Notion of Risk , 2013 .

[6]  Lisa Rajbhandari,et al.  Using the Conflicting Incentives Risk Analysis Method , 2013, SEC.

[7]  Rabiah Ahmad,et al.  A conceptual framework of info structure for information security risk assessment (ISRA) , 2013, J. Inf. Secur. Appl..

[8]  Alan R. Hevner,et al.  POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .

[9]  Terje Aven,et al.  The risk concept - historical and recent development trends , 2012, Reliab. Eng. Syst. Saf..

[10]  Ketil Stølen,et al.  Risk Analysis of Changing and Evolving Systems Using CORAS , 2011, FOSAD.

[11]  Alan R. Hevner,et al.  Design Research in Information Systems: Theory and Practice , 2010 .

[12]  Kjell Jørgen Hole,et al.  Toward Risk Assessment of Large-Impact and Rare Events , 2010, IEEE Security & Privacy.

[13]  T. Aven Misconceptions of Risk , 2010 .

[14]  Alexander M. Millkey The Black Swan: The Impact of the Highly Improbable , 2009 .

[15]  Kouichi Sakurai,et al.  Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide , 2009, 2009 International Conference on Availability, Reliability and Security.

[16]  T. Aven,et al.  On risk defined as an event where the outcome is uncertain , 2009 .

[17]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[18]  James Stevens,et al.  Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process , 2007 .

[19]  Nassim Nicholas Taleb,et al.  The Black Swan: The Impact of the Highly Improbable , 2007 .

[20]  Ketil Stølen,et al.  The CORAS Model-based Method for Security Risk Analysis , 2006 .

[21]  Ibrahim Sogukpinar,et al.  ISRAM: information security risk analysis method , 2005, Comput. Secur..

[22]  Jason Edwin Stamp,et al.  A classification scheme for risk assessment methods. , 2004 .

[23]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[24]  Ingoo Han,et al.  The IS risk analysis based on a business model , 2003, Inf. Manag..

[25]  Daniel E. Geer,et al.  Information security is information risk management , 2001, NSPW '01.

[26]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[27]  D. B. Lichtenberg,et al.  Classification Scheme , 1955, April 1.