In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance
The literature on Information Security suggests that Information Security is a strategic undertaking...
This paper examines using a requirements management tool as a common thread to managing the complexi...
In information society and business world, there are different levels of needs for information secur...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
Abstract. In this paper we present an approach for specifying and prioritizing information security ...
In this paper we present an approach for specifying and prioritizing information security requiremen...
This paper provides a set of guidelines that can be used for prescribing a methodology or a detailed...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
In this work we introduce the principle of comprehensible security, which demands that the security ...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
This paper proposes to address the need for more innovation in organisational information security b...
Information Systems are increasingly becoming essential to the success of business organizations. Th...
Due to capacities of any organisations, every organisation has a limitation spending on information ...
A well-run information security program provides a structured approach to the management of risk to ...
The literature on Information Security suggests that Information Security is a strategic undertaking...
This paper examines using a requirements management tool as a common thread to managing the complexi...
In information society and business world, there are different levels of needs for information secur...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
Abstract. In this paper we present an approach for specifying and prioritizing information security ...
In this paper we present an approach for specifying and prioritizing information security requiremen...
This paper provides a set of guidelines that can be used for prescribing a methodology or a detailed...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
In this work we introduce the principle of comprehensible security, which demands that the security ...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
This paper proposes to address the need for more innovation in organisational information security b...
Information Systems are increasingly becoming essential to the success of business organizations. Th...
Due to capacities of any organisations, every organisation has a limitation spending on information ...
A well-run information security program provides a structured approach to the management of risk to ...
The literature on Information Security suggests that Information Security is a strategic undertaking...
This paper examines using a requirements management tool as a common thread to managing the complexi...
In information society and business world, there are different levels of needs for information secur...