Добірка наукової літератури з теми "Information system (IS) risk"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information system (IS) risk".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information system (IS) risk"
Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Повний текст джерелаNikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Information System and Risk Reassessment." Issues in Informing Science and Information Technology 7 (2010): 191–207. http://dx.doi.org/10.28945/1200.
Повний текст джерелаDurba, Mounica. "Risk Assessment of Information System." Asia-pacific Journal of Convergent Research Interchange 1, no. 3 (September 30, 2015): 31–41. http://dx.doi.org/10.21742/apjcri.2015.09.03.
Повний текст джерелаMATSUYAMA, Satoshi, Masahiro INOUE, and Tetsuo SAKAI. "Underground risk management information system." Shigen-to-Sozai 122, no. 10/11 (2006): 528–36. http://dx.doi.org/10.2473/shigentosozai.122.528.
Повний текст джерелаAcree, John A. "Important risk information system (IRIS)." Preventive Veterinary Medicine 16, no. 1 (April 1993): 41. http://dx.doi.org/10.1016/0167-5877(93)90008-h.
Повний текст джерелаZybin, Serhii, and Yana Bielozorova. "Risk-based Decision-making System for Information Processing Systems." International Journal of Information Technology and Computer Science 13, no. 5 (October 8, 2021): 1–18. http://dx.doi.org/10.5815/ijitcs.2021.05.01.
Повний текст джерелаCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Повний текст джерелаLiu, Hai Bin, Fei Li, and Wen Qiong Li. "Risk Management of Information System Project." Applied Mechanics and Materials 357-360 (August 2013): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.357-360.2826.
Повний текст джерелаPontius, Frederick W. "Tapping USEPA's Integrated Risk Information System." Journal - American Water Works Association 85, no. 6 (June 1993): 22–108. http://dx.doi.org/10.1002/j.1551-8833.1993.tb06001.x.
Повний текст джерелаВладимир Викторович, Москвичев,, Ничепорчук, Валерий Васильевич, Постникова, Ульяна Сергеевна, and Тасейко, Ольга Викторовна. "Information system of territorial risk assessment." Вычислительные технологии, no. 6 (December 23, 2022): 115–23. http://dx.doi.org/10.25743/ict.2022.27.6.010.
Повний текст джерелаДисертації з теми "Information system (IS) risk"
Goto, Masato, Akira Hattori, Takami Yasuda, and Shigeki Yokoi. "Local Risk Management Information Sharing System." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2006. http://hdl.handle.net/2237/10438.
Повний текст джерелаFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Повний текст джерелаMpanza, Brian Vusumuzi. "Evaluation of Transwerk Risk Management Information System." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50346.
Повний текст джерелаENGLISH ABSTRACT: In the last decade, the use of computers has proliferated the industrial arena in South Africa. Due to frequent changes in computer programs and developments in the computing field, users have often been adversely affected. Users experience problems with computer programs that are not user friendly. Usability is about satisfying the user needs by allowing the user to accomplish their goals quickly, efficiently and easily. Thus it is crucial that industries invest in computer programs that offer optimum usability. In this research an attempt is made to provide a framework for methodology that can be used to test and evaluate usability in the Transwerk Risk Management Information System, that is Computer Assisted Risk Management Systems (CARMS). I first consider the difference between unusable and usable programs. Usability properties are then identified including properties enhancing effectiveness, efficiency, flexibility, laemability and attitude of the computer program. The CARMS components or modules and users were identified. Usability problems were identified that cause the users to be selective and discouraged to use other components of CARMS. To further verified and address the usability problems identified, the whole program needs to be tested and evaluated. The methodology was laid for how to do usability testing and evaluation in computer program that are currently in use like CARMS. Benefits and limitations of testing and evaluating usability were detailed in this research. It is recommended that, testing and evaluating usability should be done to prevent errors, dissatisfaction and to improve usability of the CARMS program.
AFRIKAANSE OPSOMMING: In die laaste dekade het die gebruik van rekenaars uitgebrei in die industriele arena in Suid-Afrika. Weens gereelde veranderings in rekenaar programme en ontwikkellings in die informatika veld is gebruikers gereeld nadelig geraak. Gebruikers ervaar probleme met rekenaar programme wat nie gebruikersvriendelik is nie. Bruikbaarheid het te make met bevrediging van gebruikersbehoeftes deur hulle in staat te stel om hulle doelwitte vinnig, doelmatig en maklik te bereik. Dit is dus van kritiese belang dat industriee investeer in rekenaar programme wat optimale bruikbaarheid bied. In hierdie navorsing word gepoog om 'n raamwerk vir metodologie wat gebruik kan word om die bruikbaarheid van die "Transwerk Risk Management Information System" (dit is "Computer Assisted Risk Management Systems" of CARMS) te toets en te evalueer. Ek bespreek eerstens die verskil tussen onbruikbare en bruikbare programme. Bruikbaarheidseienskappe word dan geidentifiseer, insluitend eienskappe wat doeltreffendheid, doelmatigheid, buigsaamheid, aanleerbaarheid en houding van die rekenaar program verbeter. Die CARMS komponente of modules en gebruikers is geidentifiseer. Bruikbaarheidsprobleme is geidentifiseer wat veroorsaak dat gebruikers selektief raak en ontmoedig raak om ander komponente van CARMS te gebruik. Om verder die geidentifiseerde bruikbaarheidsprobleme te verifieer en adreseer moet die hele program getoets en evalueer word. Die metodologie is vasgele waarvolgens bruikbaarheidstoetsing en evaluasie van rekenaar programme wat tans in gebruik is (soos CARMS) gedoen kan word. Voordele en beperkings van bruikbaarheidstoetsing en -evaluasie is in hierdie navorsing vervat. Dit word aanbeveel dat bruikbaarheidstoetsing en -evaluasie gedoen moet word om foute en ontevredenheid te voorkom en om die bruikbaarheid van die CARMS program te verbeter.
Svinčiaková, Ľudmila. "Posouzení informačního systému podniku služeb a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232610.
Повний текст джерелаOren, Gadi. "A probabilistic approach to risk management in mission-critical information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43115.
Повний текст джерелаIncludes bibliographical references (p. 111-112) and index.
In the nuclear, aerospace and chemical industries, the need for risk management is straightforward. When a system failure mode may cause a very high cost in lives or economic value, risk management becomes a necessity. In its short history, Information Technology (IT) came to be a crucial part and sometimes the platform of business activities for many large companies such as telecommunication or financial services organizations. However, due to scale and complexity, risk management methods used by other industries are not widely applied in IT.In this thesis, we investigate how probabilistic risk assessments methods used in other industries can be applied to IT network environments. A comparison is done using a number of possible approaches, improvements to these approaches are suggested, and different tradeoffs are discussed. The thesis examines ways to apply probabilistic risk assessment to a Service Oriented Architecture environment (where each service is an application or a business process that depends on other services, local and networked resources) to estimate the service reliability, availability, expected costs over time and the importance measures of elements and configurations. Finally, a method of performing cost benefit analysis is presented to estimate the implication of changing the services-supporting infrastructure, while taking into consideration the varying impact of different services to the business.A case study is used to demonstrate the methods suggested in the thesis. The case study compares four different configurations, showing how equipment failure and human error can be placed into a single framework and addressed as a single system. The implications and application of the results are discussed and recommendations for further research are provided.
by Gadi Oren.
S.M.
Radtke, Stephen W. "An analysis of the XYZ/ABC Company's risk control management information system." Online version, 1999. http://www.uwstout.edu/lib/thesis/1999/1999radtkes.pdf.
Повний текст джерелаLurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Повний текст джерелаConforti, Raffaele. "Managing risk in process-aware information systems." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/77828/1/Raffaele_Conforti_Thesis.pdf.
Повний текст джерелаAlem, Mohammad. "Event-based risk management of large scale information technology projects." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/11392.
Повний текст джерелаHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Повний текст джерелаКниги з теми "Information system (IS) risk"
Managing Risk in Information Systems. Sudbury: Jones & Bartlett Publishers, Incorporated, 2010.
Знайти повний текст джерелаnigs, Hans-Peter Ko. IT-risiko-management mit system: Von den grundlagen bis zur realisierung: ein praxisorientierter leitfaden. 2nd ed. Wiesbaden: Friedr. Vieweg & Sohn Verlag/GWV Fachverlage, Wiesbaden, 2006.
Знайти повний текст джерелаInformation security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.
Знайти повний текст джерелаBeroggi, Giampiero E. G. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. Boston, MA: Springer US, 1998.
Знайти повний текст джерелаMargetts, Helen. Information systems and risk: Public sector studies. London: City University Business School, 1992.
Знайти повний текст джерелаGelinas, Ulric J. Accounting information systems. 8th ed. Mason, Ohio: South-Western/ Cengage Learning, 2010.
Знайти повний текст джерелаGelinas, Ulric J. Accounting information systems. 7th ed. Mason, Ohio: Thomson/South-Western, 2008.
Знайти повний текст джерелаG, Sutton Steve, ed. Accounting information systems. 5th ed. Cincinnati, Ohio: South-Western/Thomson Learning, 2002.
Знайти повний текст джерелаGelinas, Ulric J. Accounting information systems. 2nd ed. Cincinnati, Ohio: South-Western Pub. Co., 1993.
Знайти повний текст джерелаGelinas, Ulric J. Accounting information systems. Boston: PWS-Kent Pub. Co., 1990.
Знайти повний текст джерелаЧастини книг з теми "Information system (IS) risk"
Stavert-Dobson, Adrian. "Risk and Risk Management." In Health Information Systems, 23–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26612-1_2.
Повний текст джерелаAmedzro St-Hilaire, Walter. "Strengths and Weaknesses of the Enterprise’s Information System." In Digital Risk Governance, 73–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_8.
Повний текст джерелаAmedzro St-Hilaire, Walter. "Securing the Information System of Enterprises and Institutions." In Digital Risk Governance, 85–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_9.
Повний текст джерелаChopra, Abhishek, and Mukund Chaudhary. "Initial Risk Assessment." In Implementing an Information Security Management System, 59–76. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_4.
Повний текст джерелаChopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System, 77–102. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.
Повний текст джерелаCai, Huali, Wanjin Tang, Yuexiang Yang, Lizhi Wang, and Xia Liu. "Product Quality Risk Information Collecting System." In Lecture Notes in Electrical Engineering, 763–68. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4844-9_101.
Повний текст джерелаO’Carroll, Patrick W., Eve Powell-Griner, Deborah Holtzman, and G. David Williamson. "Risk Factor Information Systems." In Health Informatics, 316–34. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/0-387-22745-8_16.
Повний текст джерелаOlson, David L., and Desheng Dash Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53785-5_11.
Повний текст джерелаTomines, Alan. "Risk Factor Information Systems." In Health Informatics, 329–53. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4237-9_18.
Повний текст джерелаOlson, David L., and Desheng Wu. "Information Systems Security Risk." In Enterprise Risk Management Models, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11474-8_3.
Повний текст джерелаТези доповідей конференцій з теми "Information system (IS) risk"
"Research of Information System Security Risk." In 2018 2nd International Conference on Systems, Computing, and Applications. Francis Academic Press, 2018. http://dx.doi.org/10.25236/systca.18.024.
Повний текст джерелаZaiqiang, Huo. "Engineering Project Risk Appraisal Information System." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.681.
Повний текст джерелаHuo Cuifeng and Teng Yanyan. "Risks and risk management in the development of information system." In 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA). IEEE, 2010. http://dx.doi.org/10.1109/iccsna.2010.5588835.
Повний текст джерелаBellagamba, S., F. Paglietti, and B. C. D. Staffa. "The advantages of using a Geographic Information System to evaluate risk in highly contaminated sites." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120151.
Повний текст джерелаBoranbayev, Askar, Seilkhan Boranbayev, Assel Nurusheva, Kuanysh Yersakhanov, and Yerzhan Seitkulov. "A Software System for Risk Management of Information Systems*." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747045.
Повний текст джерелаTrcek, Denis. "System Dynamics Based Risk Management for Distributed Information Systems." In 2009 Fourth International Conference on Systems. IEEE, 2009. http://dx.doi.org/10.1109/icons.2009.40.
Повний текст джерелаTsumoto, Shusaku, Shigeki Yokoyama, and Kimiko Matsuoka. "Mining Risk Information in Hospital Information Systems as Risk Mining." In 2007 IEEE/ICME International Conference on Complex Medical Engineering. IEEE, 2007. http://dx.doi.org/10.1109/iccme.2007.4382082.
Повний текст джерелаSharma, Ashok. "Risk related Interdependencies in Information System Projects." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809076.
Повний текст джерелаAbbass, Wissam, Amine Baina, and Mostafa Bellafkih. "Improvement of information system security risk management." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7805039.
Повний текст джерелаXU, PENG, MEIRONG CHEN, LIFANG FENG, YANG XU, DANCHEN WANG, and XIAOMEI ZHONG. "A RISK ASSESSMENT METHOD IN INFORMATION SYSTEM." In Conference on Uncertainty Modelling in Knowledge Engineering and Decision Making (FLINS 2016). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813146976_0167.
Повний текст джерелаЗвіти організацій з теми "Information system (IS) risk"
Kerr, S. B., R. R. Bonczek, C. W. McGinn, M. L. Land, L. D. Bloom, B. E. Sample, and F. G. Dolislager. The risk assessment information system. Office of Scientific and Technical Information (OSTI), June 1998. http://dx.doi.org/10.2172/663527.
Повний текст джерелаStoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.
Повний текст джерелаSmith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.
Повний текст джерелаJansma, R. M., S. K. Fletcher, M. D. Murphy, J. J. Lim, and G. D. Wyss. Risk-based assessment of the surety of information systems. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/285501.
Повний текст джерелаLippiatt, Barbara C., and Sieglinde K. Fuller. An analytical approach to cost-effective, risk-based budgeting for federal information system security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7385.
Повний текст джерелаDroppo, J. G. Jr, J. W. Buck, D. L. Strenge, and M. R. Siegel. Analysis of health impact inputs to the US Department of Energy's risk information system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/6517304.
Повний текст джерелаBoyens, Jon, Celia Paulsen, Nadya Bartol, Stephany A. Shankles, and Rama Moorthy. Notional Supply Chain Risk Management Practices for Federal Information Systems. Gaithersburg, MD: National Institute of Standards and Technology, October 2012. http://dx.doi.org/10.6028/nist.ir.7622.
Повний текст джерелаBernknopf, R. L. A geographic information system (GIS) based risk assessment model for the identification of environmental hazards. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1994. http://dx.doi.org/10.4095/193879.
Повний текст джерелаBoyens, Jon M., Celia Paulsen, Rama Moorthy, and Nadya Bartol. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. National Institute of Standards and Technology, April 2015. http://dx.doi.org/10.6028/nist.sp.800-161.
Повний текст джерелаKennedy, Alan, Jonathon Brame, Taylor Rycroft, Matthew Wood, Valerie Zemba, Charles Weiss, Matthew Hull, Cary Hill, Charles Geraci, and Igor Linkov. A definition and categorization system for advanced materials : the foundation for risk-informed environmental health and safety testing. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41803.
Повний текст джерела