Information security risk management: An empirical study on the importance and practices in ICT outsourcing
暂无分享,去创建一个
Nik Zulkarnaen Khidzir | Azlinah Mohamed | Noor Habibah Hj Arshad | A. Mohamed | N. Arshad | Nik Zulkarnaen Bin Khidzir
[1] J. Wreathall,et al. Knowledge-base for the new human reliability analysis method, A Technique for Human Error Analysis (ATHEANA) , 1996 .
[2] H. Schneider. Failure mode and effect analysis : FMEA from theory to execution , 1996 .
[3] Ira S. Winkler. Information Security Is INFORMATION Security , 2007 .
[4] Amanda Andress,et al. Surviving Security: How to Integrate People, Process, and Technology, Second Edition , 2001 .
[5] A. Mohamed,et al. Information security risk factors: Critical threats vulnerabilities in ICT outsourcing , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[6] A. Sloper. Meeting the challenge of outsourcing , 2004 .
[7] S. Barman,et al. Writing Information Security Policies , 2001 .
[8] Azlinah Mohamed,et al. Inherent risks in ICT outsourcing projects , 2007 .
[9] Ibrahim Sogukpinar,et al. ISRAM: information security risk analysis method , 2005, Comput. Secur..
[10] Ketil Stølen,et al. The CORAS methodology: model-based risk assessment using UML and UP , 2003 .
[11] John Haigh,et al. Probabilistic Risk Analysis: Foundations and Methods , 2003 .
[12] Suzanne Rivard,et al. A framework for information technology outsourcing risk management , 2005, DATB.
[13] Les Labuschagne,et al. A framework for comparing different information security risk analysis methodologies , 2005 .