Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
| Main Author: | Baskerville, Richard |
|---|---|
| Other Authors: | Anthony Vance |
| Format: | Conference Paper |
| Published: |
IFIP
2011
|
| Online Access: | http://hdl.handle.net/20.500.11937/22334 |
Similar Items
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Development of wireless power transfer system using resonance principle with security features
by: Nataraj, Chandrasekharan, et al.
Published: (2017)
by: Nataraj, Chandrasekharan, et al.
Published: (2017)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Protecting youth from social media risks through information security practices and Islamic principles
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Manipulating national identity: the strategic use of rhetoric by supporters and opponents of the 'Cronulla riots' in Australia
by: Bliuc, Ana-Maria, et al.
Published: (2012)
by: Bliuc, Ana-Maria, et al.
Published: (2012)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
The Risk Game: a critical discourse perspective on the construction and transference of pensions risk
by: Read Shepley, Linda M.
Published: (2017)
by: Read Shepley, Linda M.
Published: (2017)
Risks and Mitigation Measures in Build-
Operate-Transfer Projects
by: Syed Ahmad Bokharey, Syed Kamarul Bakri, et al.
Published: (2010)
by: Syed Ahmad Bokharey, Syed Kamarul Bakri, et al.
Published: (2010)
Risks and Mitigation Measures in Build-
Operate-Transfer Projects
by: Syed Ahmad Bokharey, Syed Kamarul Bakri, et al.
Published: (2010)
by: Syed Ahmad Bokharey, Syed Kamarul Bakri, et al.
Published: (2010)
Principles for re-designing information systems for environmental sustainability
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Risk Governance in Non-financial Companies
by: Mombeshora, Martin
Published: (2013)
by: Mombeshora, Martin
Published: (2013)
Geotechnical risks analysis in water transfer tunnel of the Kerman – Iran
by: Arabnejad, H., et al.
Published: (2010)
by: Arabnejad, H., et al.
Published: (2010)
Information security in the Islamic perspective: the principles and practices
by: Zulhuda, Sonny
Published: (2010)
by: Zulhuda, Sonny
Published: (2010)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Transfer pricing risk management of intangible assets for multinational enterprises (MNEs)
by: Shao, Cong
Published: (2024)
by: Shao, Cong
Published: (2024)
Resident Attitudes towards gaming and Tourism Development in Macao: Growth Machine Theory as a Context for Indentifying Supporters and opponents
by: Harrill, R., et al.
Published: (2011)
by: Harrill, R., et al.
Published: (2011)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Knowledge transfer: An information theory perspective
by: Sudhindra, S., et al.
Published: (2017)
by: Sudhindra, S., et al.
Published: (2017)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
A Comparative Analysis of Risk Culture in Financial and Non-Financial Firms
by: Albinali, Noora
Published: (2017)
by: Albinali, Noora
Published: (2017)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
An evaluation of America's security transfers during the Cold War
by: Cooley, Jason
Published: (2024)
by: Cooley, Jason
Published: (2024)
The Impact of Currency Risk on Non-financial Companies in the UK
by: Atanassov, Alexandre
Published: (2008)
by: Atanassov, Alexandre
Published: (2008)
Institutional investors, risk management and audit committees influence on non-financial risk disclosure
by: Adibah Jamil,, et al.
Published: (2022)
by: Adibah Jamil,, et al.
Published: (2022)
The Role and Design of a Transfer Pricing Risk Assessment Framework for Tax Administrators
by: Thi, T., et al.
Published: (2014)
by: Thi, T., et al.
Published: (2014)
Predicting the Risk from Cadmium Transfer to Crops from Soils Amended with Biosolids
by: McLaughlin, M., et al.
Published: (2007)
by: McLaughlin, M., et al.
Published: (2007)
Psychological risk, security risk and perceived risk of the cryptocurrency usage
by: Mirza, Agus Muhammad, et al.
Published: (2023)
by: Mirza, Agus Muhammad, et al.
Published: (2023)
To what extent is risk transfer a Governmental tactic to disguise the true cost of the PFI in the Health Sector? A comparison of rates of risk transfer and the breakdowns of those risks in hospital PFI projects using 6% and the 3.5% discount rates.
by: Pearson, Claire
Published: (2007)
by: Pearson, Claire
Published: (2007)
Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations
by: Alshareef, Naser Mansour N
Published: (2022)
by: Alshareef, Naser Mansour N
Published: (2022)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012)
by: Fakhrul Hakimi, Saidi
Published: (2012)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Predicting Malaysian corporate spin-offs using wealth transfer and debt risk reallocation
by: Yoon, Teik Wei
Published: (2020)
by: Yoon, Teik Wei
Published: (2020)
The effects of derivative usage on non-financial firms’ risk management
by: Ting, He
Published: (2019)
by: Ting, He
Published: (2019)
Similar Items
-
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013) -
Development of wireless power transfer system using resonance principle with security features
by: Nataraj, Chandrasekharan, et al.
Published: (2017) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019) -
Protecting youth from social media risks through information security practices and Islamic principles
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)