The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
Risk analysis methods help evaluate the costs of information security controls in relation to their benefits. Despite dramatic changes in the constellation of information security risks, the basic approach to these risk calculation methods remains unchanged. The fundamental mathematics underlying th...
| Main Authors: | Baskerville, Richard, Kim, J., Stucke, C., Sainsbury, R. |
|---|---|
| Other Authors: | H. Raghav Rao |
| Format: | Conference Paper |
| Published: |
IFIP
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/3995 |
Similar Items
Possibility-based ERM
by: Kim, J., et al.
Published: (2012)
by: Kim, J., et al.
Published: (2012)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Estimating software cost with security risk potential
by: Abdullah, Nur Atiqah Sia, et al.
Published: (2009)
by: Abdullah, Nur Atiqah Sia, et al.
Published: (2009)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
The Management Standards Indicator Tool and the estimation of risk
by: Bevan, Adrian, et al.
Published: (2010)
by: Bevan, Adrian, et al.
Published: (2010)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Assessment of possible human risk of probiotic application in shrimp farming
by: Shakibazadeh, Shahram, et al.
Published: (2011)
by: Shakibazadeh, Shahram, et al.
Published: (2011)
A conceptual framework of info structure for
information security risk assessment (ISRA)
by: Shamala, Palaniappan, et al.
Published: (2013)
by: Shamala, Palaniappan, et al.
Published: (2013)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Possible Health Risk of Cellulose-Based Materials
by: Haziqatulhanis, Ibrahim, et al.
Published: (2022)
by: Haziqatulhanis, Ibrahim, et al.
Published: (2022)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Application of geographical information system-based analytical hierarchy process as a tool for dengue
risk assessment
by: Che Dom, Nazri, et al.
Published: (2016)
by: Che Dom, Nazri, et al.
Published: (2016)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Psychological risk, security risk and perceived risk of the cryptocurrency usage
by: Mirza, Agus Muhammad, et al.
Published: (2023)
by: Mirza, Agus Muhammad, et al.
Published: (2023)
A review on tools of risk mitigation for information technology management
by: Anthony Jnr, Bokolo, et al.
Published: (2015)
by: Anthony Jnr, Bokolo, et al.
Published: (2015)
Ergonomics risk assessment tools: A systematic review
by: Zayyinul Hayati, Zen, et al.
Published: (2024)
by: Zayyinul Hayati, Zen, et al.
Published: (2024)
Development of an ergonomic risk assessment tool for work postures
by: Abdol Rahman, Mohd Nasrull
Published: (2014)
by: Abdol Rahman, Mohd Nasrull
Published: (2014)
Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations
by: Alshareef, Naser Mansour N
Published: (2022)
by: Alshareef, Naser Mansour N
Published: (2022)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Is psychosocial risk prevention possible? Deconstructing common presumptions
by: Leka, Stavroula, et al.
Published: (2015)
by: Leka, Stavroula, et al.
Published: (2015)
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
A computing task ergonomic risk assessment tool for assessing risk factors of work related musculoskeletal disorders
by: Mohamad, Siti Shafika
Published: (2018)
by: Mohamad, Siti Shafika
Published: (2018)
A risk management framework for design science research
by: Baskerville, Richard, et al.
Published: (2011)
by: Baskerville, Richard, et al.
Published: (2011)
Hydrogeochemical reconnaissance of arsenic cycling and possible environmental risk in hydrothermal systems of Taiwan
by: Maity, J., et al.
Published: (2017)
by: Maity, J., et al.
Published: (2017)
Risk and risk assessment
by: Middle, Gary
Published: (2017)
by: Middle, Gary
Published: (2017)
The development and testing of a skin tear risk assessment tool
by: Newall, N., et al.
Published: (2015)
by: Newall, N., et al.
Published: (2015)
Risk Assessment and Control Tool for P-hailing Industry in Malaysia
by: Chia, Jia Mei
Published: (2025)
by: Chia, Jia Mei
Published: (2025)
Risk assessment tool for software project in Malaysian public sector
by: Omar, Razita, et al.
Published: (2017)
by: Omar, Razita, et al.
Published: (2017)
A socio-technical security risk mitigation methodology for information systems access
by: Peiris, Wedige
Published: (2014)
by: Peiris, Wedige
Published: (2014)
Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
Multi-objectives model to process security risk assessment based on AHP-PSO
by: Awad, Gamal, et al.
Published: (2011)
by: Awad, Gamal, et al.
Published: (2011)
Malaysia's food security at risk
by: Dzulkifli, Shyafiq
Published: (2025)
by: Dzulkifli, Shyafiq
Published: (2025)
Similar Items
-
Possibility-based ERM
by: Kim, J., et al.
Published: (2012) -
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011) -
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)