2,145,301 Hits in 9.3 sec

Analysis of IS Security Analysis Approaches [chapter]

Ali Sunyaev
2011 Health-Care Telematics in Germany  
Integrating the economic, organizational, and technical aspects of information systems security analysis and assessment requires a bridging of these different research streams.  ...  The role of security management in the development and operation of information systems has a long tradition of research in computer science, information systems and management science.  ...  Causal methods focus on the modeling of the cause-effect-correlations of IT risks.  ... 
doi:10.1007/978-3-8349-6519-6_4 fatcat:hcp4zxyvznfczba453wlcka7um

A systematic review of information security risk assessment

L. Pan, A. Tomlinson
2016 International Journal of Safety and Security Engineering  
The result is a systematic review of risk assessment in the field of information security. We present a systematic review of over 80 research papers published between 2004 and 2014.  ...  A common approach to achieve this goal is to carry out a literature review. This paper takes a formal approach to the literature review based on the ideas of the Cochrane group.  ...  We suggest that risk evaluation, and the risk criteria selection, may be a new research area and it is possible for this to become a new and valued research area in the field of ISRA.  ... 
doi:10.2495/safe-v6-n2-270-281 fatcat:ucesdnowfnclrddtv3hslxkxji

What Factors Influence Companies' Successful Implementations of Technology Risk Management Systems?

James E Fulford
2017 Muma Business Review  
During the initial literature review on this research question, areas of focus included the following: • Current qualitative and quantitative methodologies for technology risk analysis. • Business applications  ...  Information Technology (IT) risk analysis has become be an integral part of the enterprise risk management systems in many organizations.  ...  A comparative framework for risk analysis methods.  ... 
doi:10.28945/3857 fatcat:umnzxr7mrzbuhkwlah4lssz7gy

A Systematic Literature Review on the Application of Multicriteria Decision Making Methods for Information Security Risk Assessment

Davor Maček, Ivan Magdalenić, Nina Ređep
2020 International Journal of Safety and Security Engineering  
The main purpose of the paper is to discover complementary ISRA and MCDM methods that could be used as a basis to create a new hybrid model for more efficient evaluation of critical IT solutions.  ...  So, one of the means is usage of multicriteria decision-making techniques for such purposes. The vast majority of research begins with some form of literature review.  ...  An overview on the application of the most important MCDM methods and techniques 3. The literature review on the application of MCDM methods in the area of IT security risks.  ... 
doi:10.18280/ijsse.100202 fatcat:swefntmiurbndiazv4y5mne67a

Journal Vol – 15 No -7, July 2020 Journal > Journal > Journal Vol – 15 No -7, July 2020 > Page 6 PERFORMANCE AND EMISSION CHARACTERISTICS OF GASOLINE-ETHANOL BLENDS ON PFI-SI ENGINE Authors: D.Vinay Kumar ,G.Samhita Priyadarsini,V.Jagadeesh Babu,Y.Sai Varun Teja, DOI NO: admin July 26, 2020 Abstract: Alcohol based fuels can be produced from renewable energy sources and has the potential to reduce pollutant emissions due to their oxygenated nature. Lighter alcohol ...

Farooq Sk
But extensive usage of ethanol is restricted because of its biomass limit. On the other hand methanol can be obtained from different bio-resources and has the potential to be used in engines.  ...  To limit the usage of ethanol, a model of ternary blends of Gasoline, Ethanol and Methanol (GEM) has been formulated equivalent to binary blend of Gasoline and Ethanol.  ...  [VI] conducted experiments on a multi cylinder four-stroke SI engine for fuel blends of E0, E5, E10, E15 respectively and reported an increase in engine performance parameters such as torque , bake thermal  ... 
doi:10.26782/jmcms.2020.07.00056 fatcat:g7apozj6dfg2li45br43ekcsp4

Research on the Influence of Risk on Construction Project Performance: A Systematic Review

Guiliang Su, Rana Khallaf
2022 Sustainability  
However, four gaps were identified from these researches, namely: a need for improving the accuracy in quantitative research of the influence of risk on project performance; a need for novel research methodologies  ...  as a whole system.  ...  Acknowledgments: The authors acknowledge the contributions of Hastak M., from Purdue University, for the paper 'Risk Sharing Strategies for IPD Projects: Interactional Analysis of Participants' Decision-Making  ... 
doi:10.3390/su14116412 fatcat:jyupjci5dvhn5grzk6bing2kqu

Breast Cancer Risk Analysis Using Fuzzy Inference System with the Mamdani Model: Literature Review

Siti utami Dewi, Rr. Tutik Sri Haryati
2022 Jurnal Ilmiah Keperawatan Orthopedi  
Results: Based on a review of 10 journals using the Fuzzy Inference System (FIS) Mamdani model can provide effective results to identify risks for people who have the possibility of developing breast cancer  ...  For this reason, a device that can identify the risk of breast cancer is needed.  ...  Acknowledgement The authors express their infinite gratitude to the Faculty of Nursing, University of Indonesia for the opportunity to facilitate the authors to complete this literature review.  ... 
doi:10.46749/jiko.v5i2.70 fatcat:bamvjaqk6vakbivvy257q2ec74

Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey

Georgios Kavallieratos, Sokratis Katsikas, Vasileios Gkioulos
2020 Future Internet  
This paper provides a comprehensive survey of safety and cybersecurity co-engineering methods, and discusses relevant open issues and research challenges.  ...  As a result, various approaches have been proposed to address safety and cybersecurity co-engineering in cyber physical systems.  ...  Although it is a security risk assessment method, it enables the analysis of safety issues inflicted by security threats.  ... 
doi:10.3390/fi12040065 fatcat:nvlmwxe75veszdkbguujuzbhhy

The Applied Aproach Impact Information Security For Government and Company (A Review)

Henny Febriana, Dewi Sartika Br Ginting, Fuzy Yustika Manik, Mahyuddin
2022 Data Science: Journal of Computing and Applied Informatics  
The results of this review analysis, it known threat has several solutions, each depending on the type of threat for both the Government and the Company.  ...  So, in this paper, we will explain the review of the impact of Information Security For Government and companies in terms of threats and types of information security.  ...  Literature Review The Information Security Risk Analysis Method (ISRAM) are new technologies in information security.  ... 
doi:10.32734/jocai.v6.i1-7935 fatcat:3kim2fgtrjhmvjssfd5qwd6kce

Fuzzy cognitive maps in systems risk analysis: a comprehensive review

Ezzeddin Bakhtavar, Mahsa Valipour, Samuel Yousefi, Rehan Sadiq, Kasun Hewage
2020 Complex & Intelligent Systems  
This study reviews the applications and trends of FCMs in the field of systems risk analysis to the end of August 2020.  ...  After reviewing risk-based articles, a bibliographic study of the reviewed articles was carried out.  ...  This review not only studies the applications of this method in systems risk analysis, but it also provides recent trends and future research paths for researchers in the field of FCMs-based risk analysis  ... 
doi:10.1007/s40747-020-00228-2 fatcat:mwhtolog7bgpdkn2ffo7isstim

Risk Management in Executive Levels of Healthcare Organizations: Insights from a Scoping Review (2018)

Masoud Ferdosi, Reza Rezayatmand, Yasamin Molavi Taleghani
2020 Risk Management and Healthcare Policy  
Based on the findings and considering the ISO31000 model, a comprehensive yet simple framework of risk management is developed for the executive levels of HCOs.  ...  Managers of healthcare organizations who seek to ensure high quality should use a range of risk management methods and tools in their organizations, based on their need, and not assume that each tool is  ...  Acknowledgments We would like to thank all the staff members who assisted with our research. Disclosure The authors report no conflicts of interest in this work.  ... 
doi:10.2147/rmhp.s231712 pmid:32256134 pmcid:PMC7090183 fatcat:wz4zsz4icrbenpd235amx4qnte

Preventing shipping accidents: Past, present, and future of waterway risk management with Baltic Sea focus

Ketki Kulkarni, Floris Goerlandt, Jie Li, Osiris Valdez Banda, Pentti Kujala
2020 Safety Science  
The contributions by the second author are supported by the Natural Sciences and Engineering Research Council of Canada (NSERC), through the Canada Research Chairs programme.  ...  This project has received funding from BONUS (Art 185), funded jointly by the European Union and the Academy of Finland.  ...  Review methods Bibliometric methods for global analysis For obtaining insights in the global work on prevention-related maritime waterway risk management, a bibliometric approach is applied.  ... 
doi:10.1016/j.ssci.2020.104798 fatcat:radopxufcvburauygvhf7jr2py

A Comprehensive Review on Power System Risk-Based Transient Stability [article]

Umair Shahzad
2022 arXiv   pre-print
It is believed that this review can be an inception for researchers in the domain of power system planning and security.  ...  Thus, this paper aims to provide a comprehensive review of risk-based transient stability in power networks and the accompanying research.  ...  It is believed that this review would provide a good offset for any future research in the domain of power system planning, particularly, power system security and stability.  ... 
arXiv:2206.05113v1 fatcat:7nwlfdycrfhndap2rtooc2xvjy

Adopted Method Of Information System Strategy For Knowledge Management System: A Literature Review

Elin Cahyaningsih, Dana Indra Sensuse, Wahyu Catur Wibowo, Sofiyanti Indriasari
2014 Zenodo  
Result of this research are determine and compare six strategic information system methods, Balanced Scorecard and Risk Analysis believe as common strategic method that usually used and have the highest  ...  This research conducted to define type of strategic method of information system, stage of activity each method, strength and weakness.  ...  ACKNOWLEDGMENT We thank the Ministry of Education of Republic of Indonesia for supporting this research within the scheme of BOPTN 2014.  ... 
doi:10.5281/zenodo.1096236 fatcat:63it4ktfdnaqxkzkas3shzoxyu

A Review on Risk Mitigation of IT Governance

Noraini ChePa, Bokolo Anthony Jn, Rozi Nor Haizan, Masrah Azrifah Az
2015 Information Technology Journal  
A B S T R A C T Risk Mitigation (RM) is one of the important activities in risk management of IT governance.  ...  This study presents the results of the systematic literature reviews on an evident of the RM in IT governance and it issues that need to be catered in the future.  ...  It is a method of investigating the effect on a strategy of the main risks as simultaneous and non-linear interaction Program Evaluation and Program Evaluation and Review Technique is a useful tool for  ... 
doi:10.3923/itj.2015.1.9 fatcat:6qnktdqht5az5dr5f4llurjksm
« Previous Showing results 1 — 15 out of 2,145,301 results