A Course Applying Network Analysis to Organizational Risk in Information Security
Network science has been applied in the hard and soft sciences for several decades. Founded in graph theory, network science is now an expansive approach to the analyses of complex networks of many types of objects (events, people, locations, etc.). Researchers are finding that techniques and tools...
| Main Authors: | Armstrong, Helen, Armstrong, Colin, McCulloh, I. |
|---|---|
| Other Authors: | Nathan Clarke |
| Format: | Conference Paper |
| Published: |
Centre for Security, Communications & Network Research
2010
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/25868 |
Similar Items
Organizational risk using network analysis
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012)
by: McCulloh, Ian, et al.
Published: (2012)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Social Network Analysis with Applications
by: McCulloh, Ian, et al.
Published: (2013)
by: McCulloh, Ian, et al.
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Towards supply chain excellence using network analysis
by: Alexander, Paul, et al.
Published: (2011)
by: Alexander, Paul, et al.
Published: (2011)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Resubmit my Information Security Thesis? - You must be joking!
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Examining the risks of social networking adoption in the Bhutanese healthcare system
by: Peldon, P., et al.
Published: (2015)
by: Peldon, P., et al.
Published: (2015)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Risk management support and organizational performance: The role of enterprise risk management as mediator / Azreen Roslan, Nur Diyana Yusoff and Hayati Mohd Dahan
by: Roslan, Azreen, et al.
Published: (2017)
by: Roslan, Azreen, et al.
Published: (2017)
A Study of Security Limitations in Virtual Local Area Network Implementation
by: Balasundaram, Arumugam
Published: (2003)
by: Balasundaram, Arumugam
Published: (2003)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
On the matter of classifying node connections
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
CNSS Mapping for IA lab exercises
by: Dodge, R., et al.
Published: (2009)
by: Dodge, R., et al.
Published: (2009)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Similar Items
-
Organizational risk using network analysis
by: Armstrong, Helen, et al.
Published: (2010) -
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009) -
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012) -
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999) -
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)