The Validity of Information Security Risk Assessment Methods for Organizations

被引:0
作者
L. V. Astakhova
机构
[1] Department of Information Security,
[2] South Ural State University (National Research University),undefined
来源
Scientific and Technical Information Processing | 2020年 / 47卷
关键词
risk; information security; methodology; validity; cognitive biases; cognitive errors; internal violator; human risks; involvement; situational awareness;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:241 / 247
页数:6
相关论文
共 35 条
[1]  
Pereira T.(2015)Insider threats: The major challenge to security risk management, Lect. Notes Comput. Sci. 9190 654-663
[2]  
Santos H.(2013)Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors MIS Q. 37 1189-1210
[3]  
Posey C.(2014)Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders Inf. Manage. 51 551-567
[4]  
Roberts T.L.(2002)A framework for understanding and predicting insider attacks Comput. Secur. 21 526-531
[5]  
Lowry P.B.(2009)Detecting insider theft of trade secrets IEEE Secur. Priv. 7 14-21
[6]  
Bennett R.J.(2005)The insider threat to information systems and the effectiveness of ISO17799 Comput. Secur. 24 472-484
[7]  
Courtney J.(2009)Building a system for insider security IEEE Secur. Priv. 7 30-38
[8]  
Posey C.(2017)Translating employee engagement research into practice Organ. Dyn. 46 76-86
[9]  
Roberts T.L.(2016)The ontological status of trust in information security Sci. Tech. Inf. Process. 43 58-65
[10]  
Lowry P.B.(2017)Raising awareness: People are your last line of defence Comput. Fraud Secur. 2017 10-14