In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent an effective information security controls assessment in organizations. This dissertation develops a methodology that address...
AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize th...
We suggested some methods for information security risk factors assessment. These methods are based ...
The business process of an organization can’t be done properly without appropriate information manag...
In an era where use and dependence of information systems is significantly high, the threat of incid...
For organizations, the protection of information is of utmost importance. Throughout the years, orga...
Several methodologies based on the international standard ISO/IEC 27001 have been developed for mode...
“Information is the lifeblood of any organisation and everything an organisation does involves using...
Managing a large number of Information Security controls with slight impact may increase the extra e...
Information security control assessment provides a comprehensive control analysis approach to assist...
Organizations use different types of information system to reach their goals. Decision makers are re...
This study deals with the problem of prioritization of Information Security Controls where most orga...
Information security control assessment provides a comprehensive control analysis approach to assist...
This paper presents findings of an empirical study of information system (IS) security values adhere...
One vital issue in the management of organization is the security of information. Managing informati...
The concept of an e-government system is to provide access to government services anywhere at any ti...
AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize th...
We suggested some methods for information security risk factors assessment. These methods are based ...
The business process of an organization can’t be done properly without appropriate information manag...
In an era where use and dependence of information systems is significantly high, the threat of incid...
For organizations, the protection of information is of utmost importance. Throughout the years, orga...
Several methodologies based on the international standard ISO/IEC 27001 have been developed for mode...
“Information is the lifeblood of any organisation and everything an organisation does involves using...
Managing a large number of Information Security controls with slight impact may increase the extra e...
Information security control assessment provides a comprehensive control analysis approach to assist...
Organizations use different types of information system to reach their goals. Decision makers are re...
This study deals with the problem of prioritization of Information Security Controls where most orga...
Information security control assessment provides a comprehensive control analysis approach to assist...
This paper presents findings of an empirical study of information system (IS) security values adhere...
One vital issue in the management of organization is the security of information. Managing informati...
The concept of an e-government system is to provide access to government services anywhere at any ti...
AbstractImprecise or vague importance as well as satisfaction levels of criteria may characterize th...
We suggested some methods for information security risk factors assessment. These methods are based ...
The business process of an organization can’t be done properly without appropriate information manag...