Journal articles on the topic 'Information system (IS) risk'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information system (IS) risk.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Full textNikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Information System and Risk Reassessment." Issues in Informing Science and Information Technology 7 (2010): 191–207. http://dx.doi.org/10.28945/1200.
Full textDurba, Mounica. "Risk Assessment of Information System." Asia-pacific Journal of Convergent Research Interchange 1, no. 3 (September 30, 2015): 31–41. http://dx.doi.org/10.21742/apjcri.2015.09.03.
Full textMATSUYAMA, Satoshi, Masahiro INOUE, and Tetsuo SAKAI. "Underground risk management information system." Shigen-to-Sozai 122, no. 10/11 (2006): 528–36. http://dx.doi.org/10.2473/shigentosozai.122.528.
Full textAcree, John A. "Important risk information system (IRIS)." Preventive Veterinary Medicine 16, no. 1 (April 1993): 41. http://dx.doi.org/10.1016/0167-5877(93)90008-h.
Full textZybin, Serhii, and Yana Bielozorova. "Risk-based Decision-making System for Information Processing Systems." International Journal of Information Technology and Computer Science 13, no. 5 (October 8, 2021): 1–18. http://dx.doi.org/10.5815/ijitcs.2021.05.01.
Full textCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Full textLiu, Hai Bin, Fei Li, and Wen Qiong Li. "Risk Management of Information System Project." Applied Mechanics and Materials 357-360 (August 2013): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.357-360.2826.
Full textPontius, Frederick W. "Tapping USEPA's Integrated Risk Information System." Journal - American Water Works Association 85, no. 6 (June 1993): 22–108. http://dx.doi.org/10.1002/j.1551-8833.1993.tb06001.x.
Full textВладимир Викторович, Москвичев,, Ничепорчук, Валерий Васильевич, Постникова, Ульяна Сергеевна, and Тасейко, Ольга Викторовна. "Information system of territorial risk assessment." Вычислительные технологии, no. 6 (December 23, 2022): 115–23. http://dx.doi.org/10.25743/ict.2022.27.6.010.
Full textKi-Aries, Duncan, Shamal Faily, Huseyin Dogan, and Christopher Williams. "Assessing system of systems information security risk with OASoSIS." Computers & Security 117 (June 2022): 102690. http://dx.doi.org/10.1016/j.cose.2022.102690.
Full textKuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (July 24, 2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.
Full textLe, Kien. "ICT Effects and Enhancing Risk Management Information System (RMIS) in Medical Sector in Vietnam." Webology 19, no. 1 (January 20, 2022): 4942–51. http://dx.doi.org/10.14704/web/v19i1/web19331.
Full textLiu, Haiyan. "Study and Application of Urban Flood Risk Map Information Management System Based on SOA." Journal of Software 10, no. 2 (February 2015): 180–89. http://dx.doi.org/10.17706/jsw.10.2.180-189.
Full textPangsuban, Preecha, Prachyanun Nilsook, and Panita Wannapiroon. "A Real-time Risk Assessment for Information System with CICIDS2017 Dataset Using Machine Learning." International Journal of Machine Learning and Computing 10, no. 3 (May 2020): 465–70. http://dx.doi.org/10.18178/ijmlc.2020.10.3.958.
Full textZubovа, Lyudmila V., Eduard Viktorovich Korovin, Alexey Sergeevich Smirnov, Vladimir N. Kuzmin, and Andrey Valerievich Kurakov. "Development of Problem-Oriented Management and Decision-Making System and Optimization of Economic and Social Systems." Webology 18, SI05 (October 30, 2021): 436–51. http://dx.doi.org/10.14704/web/v18si05/web18239.
Full textSafariants, D. S., and A. E. Sofiev. "Information system for calculating medical risk factors." Izvestiya MGTU MAMI 8, no. 3-3 (June 10, 2014): 94–99. http://dx.doi.org/10.17816/2074-0530-67586.
Full textXie Xinyong, and XU Xibing. "Establishing an Overall Risk Management Information System." International Journal of Digital Content Technology and its Applications 7, no. 8 (April 30, 2013): 730–35. http://dx.doi.org/10.4156/jdcta.vol7.issue8.82.
Full textChernysheva, T. Yu, E. V. Gnedash, T. Yu Zorina, and N. V. Lenskaya. "Information Systems Project Risk Assessment: Expert Approach." Applied Mechanics and Materials 682 (October 2014): 539–43. http://dx.doi.org/10.4028/www.scientific.net/amm.682.539.
Full textPöyhönen, Jouni. "Cybersecurity risk assessment subjects in information flows." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 222–30. http://dx.doi.org/10.34190/eccws.21.1.263.
Full textMOROZOVA, OLGA, ARTEM TETSKYI, ANDRII NICHEPORUK, DENUS KRUVAK, and VITALII TKACHOV. "SMART HOME SYSTEM SECURITY RISK ASSESSMENT." Computer systems and information technologies, no. 3 (April 14, 2022): 81–88. http://dx.doi.org/10.31891/csit-2021-5-11.
Full textNikiforov, O. V., O. G. Dodonov, and V. G. Putyatin. "The use of information technologies in risk management for the flight safety of aviation." Mathematical machines and systems 1 (2021): 32–41. http://dx.doi.org/10.34121/1028-9763-2021-1-32-41.
Full textIsaev, Eugeni, Dmitry Pervukhin, Georgy Rytikov, Ekaterina Filyugina, and Diana Hayrapetyan. "Risk-based efficiency assessment of information systems." Business Informatics 15, no. 1 (March 31, 2021): 19–29. http://dx.doi.org/10.17323/2587-814x.2021.1.19.29.
Full textBoubacar, Ibrahim, Marina Borisovna Budko, Mikhail Yurievich Budko, and Alexei Valerievich Guirik. "Ontological support of information security risk management." Proceedings of the Institute for System Programming of the RAS 33, no. 5 (2021): 41–64. http://dx.doi.org/10.15514/ispras-2021-33(5)-3.
Full textPowell, Philip L., and Jonathan H. Klein. "Risk Management for Information Systems Development." Journal of Information Technology 11, no. 4 (December 1996): 309–19. http://dx.doi.org/10.1177/026839629601100405.
Full textHaeruddin. "Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 3, no. 1 (July 25, 2019): 67. http://dx.doi.org/10.31289/jite.v3i1.2601.
Full textAmraoui, Soumaya, Mina Elmaallam, Hicham Bensaid, and Abdelaziz Kriouile. "Information Systems Risk Management: Litterature Review." Computer and Information Science 12, no. 3 (June 17, 2019): 1. http://dx.doi.org/10.5539/cis.v12n3p1.
Full textШинаков, Кирилл, Kirill Shinakov, Михаил Рытов, Mikhail Rytov, Оксана Голембиовская, Oksana Golembiovskaya, Ксения Чиркова, and Kseniya Chirkova. "SAFETY RISK ASSESSMENT OF INFORMATION SYSTEMS PROCESSING CONFIDENTIAL INFORMATION." Bulletin of Bryansk state technical university 2016, no. 2 (June 30, 2016): 193–200. http://dx.doi.org/10.12737/20289.
Full textWright, Sally, and Arnold M. Wright. "Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations." Journal of Information Systems 16, s-1 (January 1, 2002): 99–113. http://dx.doi.org/10.2308/jis.2002.16.s-1.99.
Full textErokhin, V. V. "MANAGEMENT OF INTERNAL RISKS OF A COMMERCIAL BANK USING INFORMATION SYSTEMS." Juvenis scientia, no. 10 (2018): 28–31. http://dx.doi.org/10.32415/jscientia.2018.10.05.
Full textZhang, Zhi Guo. "Research on Construction of Risk Information Mining System in Programme." Advanced Materials Research 255-260 (May 2011): 3928–32. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.3928.
Full textF. Onaolapo, Oladipo,. "IMPACT AND RISK ANALYSIS OF AEROSPACE INFORMATION SYSTEM." IOSR Journal of Engineering 2, no. 1 (January 2012): 38–41. http://dx.doi.org/10.9790/3021-0213841.
Full textWilda, Anisa Nurul, Yasmini Fitriyati, and Izzati Muhimmah. "Information System for Monitoring High-Risk Pregnant Women." IJID (International Journal on Informatics for Development) 10, no. 1 (June 23, 2021): 31–37. http://dx.doi.org/10.14421/ijid.2021.2269.
Full textXU Shaobing, and XU Xibing. "Overall Risk Management Information System of Steel Group." International Journal of Digital Content Technology and its Applications 7, no. 8 (April 30, 2013): 736–40. http://dx.doi.org/10.4156/jdcta.vol7.issue8.83.
Full textPhusavat, Kongkiti, Pornthep Anussornnitisarn, Rosemarin Sukhasem, Bordin Rassameethes, and Binshan Lin. "ICT risk for government financial management information system." Electronic Government, an International Journal 7, no. 2 (2010): 101. http://dx.doi.org/10.1504/eg.2010.030922.
Full textSubrahmanyam, Dr Kodukula, M. Haritha, V. Tejaswini, Ch Balaram, and C. Dheeraj. "Information Security and Risk Management for Banking System." International Journal of Computer Trends and Technology 10, no. 3 (April 25, 2014): 171–76. http://dx.doi.org/10.14445/22312803/ijctt-v10p129.
Full textSeptian, R. F., and G. C. Pamuji. "Risk Analysis of Dutch Healthcare Company Information System." IOP Conference Series: Materials Science and Engineering 662 (November 20, 2019): 022041. http://dx.doi.org/10.1088/1757-899x/662/2/022041.
Full textHung, Yu Wen, Shih-Chieh Hsu, Zhi-Yuan Su, and Hsieh-Hong Huang. "Countering user risk in information system development projects." International Journal of Information Management 34, no. 4 (August 2014): 533–45. http://dx.doi.org/10.1016/j.ijinfomgt.2014.02.003.
Full textChu, Xiaodong, Weihao Wang, Maosen Tang, Haoyi Huang, and Lei Zhang. "Information system risk assessment for global energy interconnection." IOP Conference Series: Earth and Environmental Science 227 (March 2, 2019): 032044. http://dx.doi.org/10.1088/1755-1315/227/3/032044.
Full textTaherdoost, Hamed. "A Review on Risk Management in Information Systems: Risk Policy, Control and Fraud Detection." Electronics 10, no. 24 (December 9, 2021): 3065. http://dx.doi.org/10.3390/electronics10243065.
Full textTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Full textOLSON, DAVID L., and DESHENG DASH WU. "MULTIPLE CRITERIA ANALYSIS FOR EVALUATION OF INFORMATION SYSTEM RISK." Asia-Pacific Journal of Operational Research 28, no. 01 (February 2011): 25–39. http://dx.doi.org/10.1142/s021759591100303x.
Full textRaz, Tzvi, and Matthew F. Baretich. "ARMIS: A microcomputer-based hospital risk management information system." Journal of Medical Systems 9, no. 5-6 (December 1985): 315–24. http://dx.doi.org/10.1007/bf00992570.
Full textAnton, Nicolae, and Anișor Nedelcu. "The Systemic Approach to Information Protection in Relation to Risk in an Integrated Information Security System." Applied Mechanics and Materials 760 (May 2015): 689–94. http://dx.doi.org/10.4028/www.scientific.net/amm.760.689.
Full textCosta, Fábio, Patrícia Santos, João Varajão, Luís Torres Pereira, and Vitor Costa. "Risk Management Information System Architecture for a Hospital Center." International Journal of Healthcare Information Systems and Informatics 8, no. 4 (October 2013): 58–72. http://dx.doi.org/10.4018/ijhisi.2013100105.
Full textKalashnikov, Andrey, and Evgenia Anikina. "Management of Information Risks for Complex System Using the «Cognitive Game» Mechanism." Voprosy kiberbezopasnosti, no. 4(38) (2020): 2–10. http://dx.doi.org/10.21681/2311-3456-2020-04-2-10.
Full textKVASNYTSKA, Raisa, Iryna FORKUN, and Tetyana GORDEEVA. "MODERN APPROACHES TO PROVIDING INFORMATION SECURITY OF PAYMENT SYSTEMS AND THEIR CYBER PROTECTION." Herald of Khmelnytskyi National University. Economic sciences 310, no. 5(1) (September 29, 2022): 47–52. http://dx.doi.org/10.31891/2307-5740-2022-310-5(1)-8.
Full textQi, Xian Jun, Xiang Tian Peng, and Xiang Yu Huang. "Imprecise Risk Assessment of Power System." Applied Mechanics and Materials 492 (January 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.492.526.
Full textXie, Yi, Jia Liu, Shufan Zhu, Dazhi Chong, Hui Shi, and Yong Chen. "An IoT-based risk warning system for smart libraries." Library Hi Tech 37, no. 4 (November 18, 2019): 918–32. http://dx.doi.org/10.1108/lht-11-2017-0254.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full text