Sciweavers

DSS
2006
91views more  DSS 2006»
13 years 4 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
SEC
1997
13 years 6 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
ISSA
2004
13 years 6 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
ISSA
2004
13 years 6 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
IADIS
2004
13 years 6 months ago
Hacker Activity on the Irish Honeynet
The Irish HoneyNet Project is an all volunteer, non-profit organisation committed to sharing and learning the motives, tools, and tactics of the blackhat community comprised of a ...
Kevin Curran, Colman Morrissey, Colm Fagan, Colm M...
ECIS
2004
13 years 6 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
CSREASAM
2006
13 years 6 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
AISM
2004
13 years 6 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria