Добірка наукової літератури з теми "Information system (IS) risk"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information system (IS) risk".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Information system (IS) risk"

1

Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.

Повний текст джерела
Анотація:
Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Nikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Information System and Risk Reassessment." Issues in Informing Science and Information Technology 7 (2010): 191–207. http://dx.doi.org/10.28945/1200.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Durba, Mounica. "Risk Assessment of Information System." Asia-pacific Journal of Convergent Research Interchange 1, no. 3 (September 30, 2015): 31–41. http://dx.doi.org/10.21742/apjcri.2015.09.03.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

MATSUYAMA, Satoshi, Masahiro INOUE, and Tetsuo SAKAI. "Underground risk management information system." Shigen-to-Sozai 122, no. 10/11 (2006): 528–36. http://dx.doi.org/10.2473/shigentosozai.122.528.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Acree, John A. "Important risk information system (IRIS)." Preventive Veterinary Medicine 16, no. 1 (April 1993): 41. http://dx.doi.org/10.1016/0167-5877(93)90008-h.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zybin, Serhii, and Yana Bielozorova. "Risk-based Decision-making System for Information Processing Systems." International Journal of Information Technology and Computer Science 13, no. 5 (October 8, 2021): 1–18. http://dx.doi.org/10.5815/ijitcs.2021.05.01.

Повний текст джерела
Анотація:
The article is dedicated to using the methodology of building a decision support system under threats and risks. This method has been developed by modifying the methods of targeted evaluation of options and is used for constructing a scheme of the decision support system. Decision support systems help to make correct and effective solution to shortage of time, incompleteness, uncertainty and unreliability of information, and taking into account the risks. When we are making decisions taking into account the risks, it is necessary to solve the following tasks: determination of quantitative characteristics of risk; determination of quantitative indicators for the effectiveness of decisions in the presence of risks; distribution of resources between means of countering threats, and means that are aimed at improving information security. The known methods for solving the first problem provide for the identification of risks (qualitative analysis), as well as the assessment of the probabilities and the extent of possible damage (quantitative analysis). However, at the same time, the task of assessing the effectiveness of decisions taking into account risks is not solved and remains at the discretion of the expert. The suggesting method of decision support under threats and risks has been developed by modifying the methods of targeted evaluation of options. The relative efficiency in supporting measures to develop measures has been calculated as a function of time given on a time interval. The main idea of the proposed approach to the analysis of the impact of threats and risks in decision-making is that events that cause threats or risks are considered as a part of the decision support system. Therefore, such models of threats or risks are included in the hierarchy of goals, their links with other system's parts and goals are established. The main functional modules that ensure the continuous and efficient operation of the decision support system are the following subsystems: subsystem for analysing problems, risks and threats; subsystem for the formation of goals and criteria; decision-making subsystem; subsystem of formation of the decisive rule and analysis of alternatives. Structural schemes of functioning are constructed for each subsystem. The given block diagram provides a full-fledged decision-making process.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Cao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.

Повний текст джерела
Анотація:
With the popularity of the Internet and global information continues to advance organizational information systems have become an important strategic resource for the survival of the importance of information security to protect its widespread concern. Once the information security organization information system is destroyed, the Organization for Security attribute information would cause tremendous impact the organization's business operation, the losses include not only economic, but also likely to organize image, reputation is a strategic competitive advantage even fatal injuries. However, the existing information systems of information security risk management approach to information system risk analysis and assessment with specific organizational environment and business background with fragmentation, lack of risk analysis and description of the formation process, carried only consider "technical" factors security decisions, lack of full expression to achieve the desired goal of a number of decisions on organizational decision-making. Therefore, the information system to carry information security risk management is essential.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Liu, Hai Bin, Fei Li, and Wen Qiong Li. "Risk Management of Information System Project." Applied Mechanics and Materials 357-360 (August 2013): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.357-360.2826.

Повний текст джерела
Анотація:
Risk and its management of information system project has not been too much attention, while its play an important role in the success of information system project. Risk categories, consequences, drivers and action approaches are analyzed and risk management procedure of information system project is proposed in order to carry out effective risk management during information system project management.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Pontius, Frederick W. "Tapping USEPA's Integrated Risk Information System." Journal - American Water Works Association 85, no. 6 (June 1993): 22–108. http://dx.doi.org/10.1002/j.1551-8833.1993.tb06001.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Владимир Викторович, Москвичев,, Ничепорчук, Валерий Васильевич, Постникова, Ульяна Сергеевна, and Тасейко, Ольга Викторовна. "Information system of territorial risk assessment." Вычислительные технологии, no. 6 (December 23, 2022): 115–23. http://dx.doi.org/10.25743/ict.2022.27.6.010.

Повний текст джерела
Анотація:
В работе представлен процесс создания интеллектуальной системы, предназначенной для оценки и управления рисками. Риск может иметь антропогенный, природный или социальный характер и относиться к различным территориальным группам. Сложность структурирования и сбора информации о государственной территориальной безопасности, а также различные методы оценки рисков обусловливают необходимость разработки модульной многозадачной системы. Модель поддержки системы управления информацией формализует проблемную область для обоснования совместного использования инновационных технологий. На основе модели разработана архитектура системы. Эта архитектура определяет состав, функциональные возможности, интерфейсы взаимодействия, а также организацию информационных ресурсов, которые использовались для поддержки управления. Здесь представлен результат работы прототипа информационной системы. The paper presents the process of creating an intelligent system designed to assess and manage risks. The risk can be anthropogenic, natural, or social in nature, and relate to different territorial groups. The complexity of structuring and collecting information on the state territorial security as well as various risk assessment methods, necessitates the development of a modular multitask system. The information management system support model formalizes the problem area to justify the joint use of innovation technologies. Based on the model, system architecture has been developed. This architecture defines the composition, functionality, interaction interfaces, and organization of information resources, that were used to support management. The operation results of the system prototype is presented.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Information system (IS) risk"

1

Goto, Masato, Akira Hattori, Takami Yasuda, and Shigeki Yokoi. "Local Risk Management Information Sharing System." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2006. http://hdl.handle.net/2237/10438.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Farahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.

Повний текст джерела
Анотація:
The Internet and information systems have enabled businesses to reduce costs, attain greater market reach, and develop closer business partnerships along with improved customer relationships. However, using the Internet has led to new risks and concerns. This research provides a management perspective on the issues confronting CIOs and IT managers. It outlines the current state of the art of information security, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a model for classification of threats and control measures. It also develops a scheme for probabilistic evaluation of the impact of security threats with some illustrative examples. It involves validation of information assets and probabilities of success of attacks on those assets in organizations and evaluates the expected damages of these attacks. The research outlines some suggested control measures and presents some cost models for quantifying damages from these attacks and compares the tangible and intangible costs of these attacks. This research also develops a risk management system for information systems security incidents in five stages: 1- Resource and application value analysis, 2- Vulnerability and risk analysis, 3- Computation of losses due to threats and benefits of control measures, 4- Selection of control measures, and 5- Implementation of alternatives. The outcome of this research should help decision makers to select the appropriate control measure(s) to minimize damage or loss due to security incidents. Finally, some recommendations for future work are provided to improve the management of security in organizations.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mpanza, Brian Vusumuzi. "Evaluation of Transwerk Risk Management Information System." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50346.

Повний текст джерела
Анотація:
Thesis (MPhil)--Stellenbosch University, 2005.
ENGLISH ABSTRACT: In the last decade, the use of computers has proliferated the industrial arena in South Africa. Due to frequent changes in computer programs and developments in the computing field, users have often been adversely affected. Users experience problems with computer programs that are not user friendly. Usability is about satisfying the user needs by allowing the user to accomplish their goals quickly, efficiently and easily. Thus it is crucial that industries invest in computer programs that offer optimum usability. In this research an attempt is made to provide a framework for methodology that can be used to test and evaluate usability in the Transwerk Risk Management Information System, that is Computer Assisted Risk Management Systems (CARMS). I first consider the difference between unusable and usable programs. Usability properties are then identified including properties enhancing effectiveness, efficiency, flexibility, laemability and attitude of the computer program. The CARMS components or modules and users were identified. Usability problems were identified that cause the users to be selective and discouraged to use other components of CARMS. To further verified and address the usability problems identified, the whole program needs to be tested and evaluated. The methodology was laid for how to do usability testing and evaluation in computer program that are currently in use like CARMS. Benefits and limitations of testing and evaluating usability were detailed in this research. It is recommended that, testing and evaluating usability should be done to prevent errors, dissatisfaction and to improve usability of the CARMS program.
AFRIKAANSE OPSOMMING: In die laaste dekade het die gebruik van rekenaars uitgebrei in die industriele arena in Suid-Afrika. Weens gereelde veranderings in rekenaar programme en ontwikkellings in die informatika veld is gebruikers gereeld nadelig geraak. Gebruikers ervaar probleme met rekenaar programme wat nie gebruikersvriendelik is nie. Bruikbaarheid het te make met bevrediging van gebruikersbehoeftes deur hulle in staat te stel om hulle doelwitte vinnig, doelmatig en maklik te bereik. Dit is dus van kritiese belang dat industriee investeer in rekenaar programme wat optimale bruikbaarheid bied. In hierdie navorsing word gepoog om 'n raamwerk vir metodologie wat gebruik kan word om die bruikbaarheid van die "Transwerk Risk Management Information System" (dit is "Computer Assisted Risk Management Systems" of CARMS) te toets en te evalueer. Ek bespreek eerstens die verskil tussen onbruikbare en bruikbare programme. Bruikbaarheidseienskappe word dan geidentifiseer, insluitend eienskappe wat doeltreffendheid, doelmatigheid, buigsaamheid, aanleerbaarheid en houding van die rekenaar program verbeter. Die CARMS komponente of modules en gebruikers is geidentifiseer. Bruikbaarheidsprobleme is geidentifiseer wat veroorsaak dat gebruikers selektief raak en ontmoedig raak om ander komponente van CARMS te gebruik. Om verder die geidentifiseerde bruikbaarheidsprobleme te verifieer en adreseer moet die hele program getoets en evalueer word. Die metodologie is vasgele waarvolgens bruikbaarheidstoetsing en evaluasie van rekenaar programme wat tans in gebruik is (soos CARMS) gedoen kan word. Voordele en beperkings van bruikbaarheidstoetsing en -evaluasie is in hierdie navorsing vervat. Dit word aanbeveel dat bruikbaarheidstoetsing en -evaluasie gedoen moet word om foute en ontevredenheid te voorkom en om die bruikbaarheid van die CARMS program te verbeter.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Svinčiaková, Ľudmila. "Posouzení informačního systému podniku služeb a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232610.

Повний текст джерела
Анотація:
The paper focuses on a company which is currently in a difficult situation because of the escalation of problems with established information system. The company must also confront the problems with the introduction of a new program supporting core business processes. The only IT company employee often gets in the situations he is unable to solve practically or because of little time time. The aim of this work was to analyse established information system, identify its weaknesses, where there are risks and propose measures to improve and eliminate the identified risks. Own analysis of the information system through interviews with selected staff is followed up with questionnaire methods of ZEFIS portal. After finding the gaps and analysis of the identified risks the measures to eliminate the risks, recommendations for improvement and correcting the shortcomings of the system have been proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Oren, Gadi. "A probabilistic approach to risk management in mission-critical information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43115.

Повний текст джерела
Анотація:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008.
Includes bibliographical references (p. 111-112) and index.
In the nuclear, aerospace and chemical industries, the need for risk management is straightforward. When a system failure mode may cause a very high cost in lives or economic value, risk management becomes a necessity. In its short history, Information Technology (IT) came to be a crucial part and sometimes the platform of business activities for many large companies such as telecommunication or financial services organizations. However, due to scale and complexity, risk management methods used by other industries are not widely applied in IT.In this thesis, we investigate how probabilistic risk assessments methods used in other industries can be applied to IT network environments. A comparison is done using a number of possible approaches, improvements to these approaches are suggested, and different tradeoffs are discussed. The thesis examines ways to apply probabilistic risk assessment to a Service Oriented Architecture environment (where each service is an application or a business process that depends on other services, local and networked resources) to estimate the service reliability, availability, expected costs over time and the importance measures of elements and configurations. Finally, a method of performing cost benefit analysis is presented to estimate the implication of changing the services-supporting infrastructure, while taking into consideration the varying impact of different services to the business.A case study is used to demonstrate the methods suggested in the thesis. The case study compares four different configurations, showing how equipment failure and human error can be placed into a single framework and addressed as a single system. The implications and application of the results are discussed and recommendations for further research are provided.
by Gadi Oren.
S.M.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Radtke, Stephen W. "An analysis of the XYZ/ABC Company's risk control management information system." Online version, 1999. http://www.uwstout.edu/lib/thesis/1999/1999radtkes.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Conforti, Raffaele. "Managing risk in process-aware information systems." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/77828/1/Raffaele_Conforti_Thesis.pdf.

Повний текст джерела
Анотація:
This research contributes a fully-operational approach for managing business process risk in near real-time. The approach consists of a language for defining risks on top of process models, a technique to detect such risks as they eventuate during the execution of business processes, a recommender system for making risk-informed decisions, and a technique to automatically mitigate the detected risks when they are no longer tolerable. Through the incorporation of risk management elements in all stages of the lifecycle of business processes, this work contributes to the effective integration of the fields of Business Process Management and Risk Management.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Alem, Mohammad. "Event-based risk management of large scale information technology projects." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/11392.

Повний текст джерела
Анотація:
Globalisation has come as a double-edged blade for information technology (IT) companies; providing growth opportunities and yet posing many challenges. Software development is moving from a monolithic model to a distributed approach, where many entities and organisations are involved in the development process. Risk management an important area to deal with all the kinds of technical and social issues within companies planning and programming schedules, and this new way of working requires more attention to be paid to the temporal, socio-cultural and control aspects than before. Multinational companies like IBM have begun to consider how to address the distributed nature of its projects across the globe. With outlets across the globe, the company finds various people of different cultures, languages and ethics working on a single and bigger IT projects from different locations. Other IT companies are facing the same problems, despite there being many kinds of approaches available to handle risk management in large scale IT companies. IBM commissioned the Distributed Risk Management Process (DRiMaP) model as a suitable solution. This model focused on the collaborative and on-going control aspects, and paid attention to the need for risk managers, project managers and management to include risk management into all phases of projects and the business cycle. The authors of the DRiMaP model did not subject it to extensive testing. This research sets out to evaluate, improve and extend the model process and thereby develop a new and dynamic approach to distributed information systems development. To do this, this research compares and contrasts the model with other risk management approaches. An Evolutionary Model is developed, and this is subjected to empirical testing through a hybrid constructive research approach. A survey is used to draw out the observations of project participants, a structured interview gathered the opinions of project experts, a software tool was developed to implement the model, and SysML and Monte Carlo methods were applied to this to simulate the functioning of the model. The Evolutionary Model was found to partially address the shortcomings of the DRiMaP model, and to provide a valuable platform for the development of an enterprise risk management solution.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Повний текст джерела
Анотація:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic Security Template (GST), aiming to feed back the lessons learned from real world security incidents to the ISMS. It adapts graphical Goal Structuring Notations (GSN), to present the lessons learned in a structured manner through mapping them to the security requirements of the ISMS. The suitability of the GST has been confirmed by demonstrating that instances of the GST can be produced from real world security incidents of different countries based on in-depth analysis of case studies. The usability of the GST has been evaluated using a series of empirical studies. The GST is empirically evaluated in terms of its given effectiveness in assisting the communication of the lessons learned from security incidents as compared to the traditional text based approach alone. The results show that the GST can help to improve the accuracy and reduce the mental efforts in assisting the identification of the lessons learned from security incidents and the results are statistically significant. The GST is further evaluated to determine whether users can apply the GST to structure insights derived from a specific security incident. The results show that students with a computer science background can create an instance of the GST. The acceptability of the GST is assessed in a healthcare organisation. Strengths and weaknesses are identified and the GST has been adjusted to fit into organisational needs. The GST is then further tested to examine its capability to feed back the security lessons to the ISMS. The results show that, by using the GST, lessons identified from security incidents from one healthcare organisation in a specific country can be transferred to another and can indeed inform the improvements of the ISMS. In summary, the GST provides a unified way to feed back the lessons learned to the ISMS. It fosters an environment where different stakeholders can speak the same language while exchanging the lessons learned from the security incidents around the world.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Information system (IS) risk"

1

Managing Risk in Information Systems. Sudbury: Jones & Bartlett Publishers, Incorporated, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

nigs, Hans-Peter Ko. IT-risiko-management mit system: Von den grundlagen bis zur realisierung: ein praxisorientierter leitfaden. 2nd ed. Wiesbaden: Friedr. Vieweg & Sohn Verlag/GWV Fachverlage, Wiesbaden, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Information security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Beroggi, Giampiero E. G. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. Boston, MA: Springer US, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Margetts, Helen. Information systems and risk: Public sector studies. London: City University Business School, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Gelinas, Ulric J. Accounting information systems. 8th ed. Mason, Ohio: South-Western/ Cengage Learning, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gelinas, Ulric J. Accounting information systems. 7th ed. Mason, Ohio: Thomson/South-Western, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

G, Sutton Steve, ed. Accounting information systems. 5th ed. Cincinnati, Ohio: South-Western/Thomson Learning, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Gelinas, Ulric J. Accounting information systems. 2nd ed. Cincinnati, Ohio: South-Western Pub. Co., 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Gelinas, Ulric J. Accounting information systems. Boston: PWS-Kent Pub. Co., 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Information system (IS) risk"

1

Stavert-Dobson, Adrian. "Risk and Risk Management." In Health Information Systems, 23–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26612-1_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Amedzro St-Hilaire, Walter. "Strengths and Weaknesses of the Enterprise’s Information System." In Digital Risk Governance, 73–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Amedzro St-Hilaire, Walter. "Securing the Information System of Enterprises and Institutions." In Digital Risk Governance, 85–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61386-0_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chopra, Abhishek, and Mukund Chaudhary. "Initial Risk Assessment." In Implementing an Information Security Management System, 59–76. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System, 77–102. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cai, Huali, Wanjin Tang, Yuexiang Yang, Lizhi Wang, and Xia Liu. "Product Quality Risk Information Collecting System." In Lecture Notes in Electrical Engineering, 763–68. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4844-9_101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

O’Carroll, Patrick W., Eve Powell-Griner, Deborah Holtzman, and G. David Williamson. "Risk Factor Information Systems." In Health Informatics, 316–34. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/0-387-22745-8_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Olson, David L., and Desheng Dash Wu. "Information Systems Security Risk." In Springer Texts in Business and Economics, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53785-5_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tomines, Alan. "Risk Factor Information Systems." In Health Informatics, 329–53. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4237-9_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Olson, David L., and Desheng Wu. "Information Systems Security Risk." In Enterprise Risk Management Models, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11474-8_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Information system (IS) risk"

1

"Research of Information System Security Risk." In 2018 2nd International Conference on Systems, Computing, and Applications. Francis Academic Press, 2018. http://dx.doi.org/10.25236/systca.18.024.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zaiqiang, Huo. "Engineering Project Risk Appraisal Information System." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.681.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Huo Cuifeng and Teng Yanyan. "Risks and risk management in the development of information system." In 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA). IEEE, 2010. http://dx.doi.org/10.1109/iccsna.2010.5588835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bellagamba, S., F. Paglietti, and B. C. D. Staffa. "The advantages of using a Geographic Information System to evaluate risk in highly contaminated sites." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120151.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Boranbayev, Askar, Seilkhan Boranbayev, Assel Nurusheva, Kuanysh Yersakhanov, and Yerzhan Seitkulov. "A Software System for Risk Management of Information Systems*." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Trcek, Denis. "System Dynamics Based Risk Management for Distributed Information Systems." In 2009 Fourth International Conference on Systems. IEEE, 2009. http://dx.doi.org/10.1109/icons.2009.40.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tsumoto, Shusaku, Shigeki Yokoyama, and Kimiko Matsuoka. "Mining Risk Information in Hospital Information Systems as Risk Mining." In 2007 IEEE/ICME International Conference on Complex Medical Engineering. IEEE, 2007. http://dx.doi.org/10.1109/iccme.2007.4382082.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sharma, Ashok. "Risk related Interdependencies in Information System Projects." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809076.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Abbass, Wissam, Amine Baina, and Mostafa Bellafkih. "Improvement of information system security risk management." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7805039.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

XU, PENG, MEIRONG CHEN, LIFANG FENG, YANG XU, DANCHEN WANG, and XIAOMEI ZHONG. "A RISK ASSESSMENT METHOD IN INFORMATION SYSTEM." In Conference on Uncertainty Modelling in Knowledge Engineering and Decision Making (FLINS 2016). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813146976_0167.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Information system (IS) risk"

1

Kerr, S. B., R. R. Bonczek, C. W. McGinn, M. L. Land, L. D. Bloom, B. E. Sample, and F. G. Dolislager. The risk assessment information system. Office of Scientific and Technical Information (OSTI), June 1998. http://dx.doi.org/10.2172/663527.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Stoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Smith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jansma, R. M., S. K. Fletcher, M. D. Murphy, J. J. Lim, and G. D. Wyss. Risk-based assessment of the surety of information systems. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/285501.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lippiatt, Barbara C., and Sieglinde K. Fuller. An analytical approach to cost-effective, risk-based budgeting for federal information system security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7385.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Droppo, J. G. Jr, J. W. Buck, D. L. Strenge, and M. R. Siegel. Analysis of health impact inputs to the US Department of Energy's risk information system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/6517304.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Boyens, Jon, Celia Paulsen, Nadya Bartol, Stephany A. Shankles, and Rama Moorthy. Notional Supply Chain Risk Management Practices for Federal Information Systems. Gaithersburg, MD: National Institute of Standards and Technology, October 2012. http://dx.doi.org/10.6028/nist.ir.7622.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bernknopf, R. L. A geographic information system (GIS) based risk assessment model for the identification of environmental hazards. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1994. http://dx.doi.org/10.4095/193879.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Boyens, Jon M., Celia Paulsen, Rama Moorthy, and Nadya Bartol. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. National Institute of Standards and Technology, April 2015. http://dx.doi.org/10.6028/nist.sp.800-161.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kennedy, Alan, Jonathon Brame, Taylor Rycroft, Matthew Wood, Valerie Zemba, Charles Weiss, Matthew Hull, Cary Hill, Charles Geraci, and Igor Linkov. A definition and categorization system for advanced materials : the foundation for risk-informed environmental health and safety testing. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41803.

Повний текст джерела
Анотація:
Novel materials with unique or enhanced properties relative to conventional materials are being developed at an increasing rate. These materials are often referred to as advanced materials (AdMs) and they enable technological innovations that can benefit society. Despite their benefits, however, the unique characteristics of many AdMs, including many nanomaterials, are poorly understood and may pose environmental safety and occupational health (ESOH) risks that are not readily determined by traditional risk assessment methods. To assess these risks while keeping up with the pace of development, technology developers and risk assessors frequently employ risk-screening methods that depend on a clear definition for the materials that are to be assessed (e.g., engineered nanomaterial) as well as a method for binning materials into categories for ESOH risk prioritization. In this study, we aim to establish a practitioner-driven definition for AdMs and a practitioner-validated framework for categorizing AdMs into conceptual groupings based on material characteristics. The definition and categorization framework established here serve as a first step in determining if and when there is a need for specific ESOH and regulatory screening for an AdM as well as the type and extent of risk-related information that should be collected or generated for AdMs and AdM-enabled technologies.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії