In information systems security, the objectives of risk analysis process are to help to identify new threats and vulnerabilities, to estimate their business impact and to provide a dynamic set of tools to control the security level of the information system. The identification of risk factors as well as the estimation of their business impact require tools for assessment of risk with multi-value scales according to different stakeholders’ point of view. Therefore, the purpose of this paper is to model risk analysis decision making problem using semantic network to develop the decision network and the Analytical Network Process (ANP) that allows solving complex problems taking into consideration quantitative and qualitative data. As a decisi...
Abstract—As e-Business and e-Commerce applications are increasingly exposed to a variety of informat...
Increasing complexity of risk management requires the use of more flexible approaches to measure inf...
Securing the organization critical information assets from sophisticated insider threats and outside...
In information systems security, the objectives of risk analysis process are to help to identify new...
Fuzzy linguistic quantifiers Maximum entropy method re p he r Laboratory (DEMATEL) approach to const...
Effective risk management is an important component of any successful security program. The main obj...
Risk is inherent and inseparable part of life and business. Always uncertainty condition arising fro...
In this study, an analytic network process (ANP), which can handle the interrelations between risk r...
The aim of this study is to analyze the dynamics of cognitive processes by means of the technique of...
Risk assessment performs a critical decision support role in maintenance decision making. This is th...
The management system of informational security is a part of the management system of an organizatio...
This research quantifies the maximum potential loss due to a breach of security to help decision mak...
One vital issue in the management of organization is the security of information. Managing informati...
The concept of this paper is to perform the improvement of the risk function analysis, assessment an...
Projects have got risks of failure, no matter how we plan and proceed, and e-governance projects are...
Abstract—As e-Business and e-Commerce applications are increasingly exposed to a variety of informat...
Increasing complexity of risk management requires the use of more flexible approaches to measure inf...
Securing the organization critical information assets from sophisticated insider threats and outside...
In information systems security, the objectives of risk analysis process are to help to identify new...
Fuzzy linguistic quantifiers Maximum entropy method re p he r Laboratory (DEMATEL) approach to const...
Effective risk management is an important component of any successful security program. The main obj...
Risk is inherent and inseparable part of life and business. Always uncertainty condition arising fro...
In this study, an analytic network process (ANP), which can handle the interrelations between risk r...
The aim of this study is to analyze the dynamics of cognitive processes by means of the technique of...
Risk assessment performs a critical decision support role in maintenance decision making. This is th...
The management system of informational security is a part of the management system of an organizatio...
This research quantifies the maximum potential loss due to a breach of security to help decision mak...
One vital issue in the management of organization is the security of information. Managing informati...
The concept of this paper is to perform the improvement of the risk function analysis, assessment an...
Projects have got risks of failure, no matter how we plan and proceed, and e-governance projects are...
Abstract—As e-Business and e-Commerce applications are increasingly exposed to a variety of informat...
Increasing complexity of risk management requires the use of more flexible approaches to measure inf...
Securing the organization critical information assets from sophisticated insider threats and outside...