Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Australian Information Security Management Conference (22)
- Research Collection School Of Computing and Information Systems (8)
- All Faculty and Staff Scholarship (4)
- Australian eHealth Informatics and Security Conference (3)
- Research outputs pre 2011 (3)
-
- Articles (2)
- Australian Information Warfare and Security Conference (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty Articles (2)
- Research outputs 2012 (2)
- Research outputs 2014 to 2021 (2)
- Research outputs 2022 to 2026 (2)
- All Faculty Scholarship (1)
- All Works (1)
- Australian Digital Forensics Conference (1)
- Conference Papers in Published Proceedings (1)
- Department of Computer Science Faculty Scholarship and Creative Works (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- International Cyber Resilience conference (1)
- Publications (1)
- School of Cybersecurity Faculty Publications (1)
Articles 61 - 65 of 65
Full-Text Articles in Physical Sciences and Mathematics
Information Security: A Misnomer, William Hutchinson
Information Security: A Misnomer, William Hutchinson
Research outputs pre 2011
This paper argues that the definition of 'information' is crucial to the understanding of 'information security'. At present, information security concentrates on the technological aspects of data, computer and network security. This computer-centric approach ignores the fact that the majority of information within an organisation is derived from other sources than computer stored data. The implications for security are that much data can be leaked from an organisation even if the computer and network systems are secured.
Isram: Information Security Risk Analysis Method, Bilge Karabacak, Ibrahim Sogukpinar
Isram: Information Security Risk Analysis Method, Bilge Karabacak, Ibrahim Sogukpinar
All Faculty and Staff Scholarship
Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software package. In this study, a survey based quantitative approach is proposed to analyze security risks of information technologies by taking current necessities into consideration. The new method is named as Information Security Risk Analysis Method (ISRAM). Case study has shown that ISRAM yields …
Vertical Sensitivity For The Information Security Health Rating Of Enterprises, Arcot Desai Narasimhalu, Nagarajan Dayasindhu, Raghavan Subramanian
Vertical Sensitivity For The Information Security Health Rating Of Enterprises, Arcot Desai Narasimhalu, Nagarajan Dayasindhu, Raghavan Subramanian
Research Collection School Of Computing and Information Systems
INFOSeMM Maturity model was developed jointly by SMU and Infosys. It is recognized that different industry verticals will have different levels of recommended maturity levels. This paper articulates the need for developing the industry vertical benchmarks.
Rating Information Security Maturity, Arcot Desai Narasimhalu, Nagarajan Dayasindhu
Rating Information Security Maturity, Arcot Desai Narasimhalu, Nagarajan Dayasindhu
Research Collection School Of Computing and Information Systems
Most CEOs have difficulty relating to the information security investments in their companies. This article presents a summary of a the information security maturity model that the CEOs could use to determine the desired level of investments into information security infrastructure, tools and applications.
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Faculty Articles
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.