Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
This paper investigates the relationship between Information Systems (IS) integration and the use of cybersecurity countermeasures using an adapted exposure to risk perspective which considers both the probability of a risk through vulnerability points theory and the impact of the risk if it occurs....
| Main Authors: | Baskerville, Richard, Rowe, F., Wolff, F. |
|---|---|
| Format: | Journal Article |
| Published: |
2018
|
| Online Access: | http://hdl.handle.net/20.500.11937/66396 |
Similar Items
A review of cryptographic impact in cybersecurity on smart grid: threat, challenges and countermeasures
by: Hasan, Md Mehedi, et al.
Published: (2021)
by: Hasan, Md Mehedi, et al.
Published: (2021)
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012)
by: Baskerville, Richard, et al.
Published: (2012)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
Integration of circular economy into design and construction of infrastructure projects in Malaysia: Barriers and countermeasures
by: Nor Helmie Shahreen, Mohd Ali, et al.
Published: (2024)
by: Nor Helmie Shahreen, Mohd Ali, et al.
Published: (2024)
Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy
by: Henschke, A., et al.
Published: (2017)
by: Henschke, A., et al.
Published: (2017)
A critical perspective on action research as a method for information systems research
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
The study of dangers and countermeasures of fake news in social media
by: Xie, Yuting, et al.
Published: (2021)
by: Xie, Yuting, et al.
Published: (2021)
Design ethnography in information systems
by: Baskerville, Richard, et al.
Published: (2015)
by: Baskerville, Richard, et al.
Published: (2015)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Exploring the use of blockchain technology in cybersecurity and data science
by: Rahmat, Robaisya, et al.
Published: (2023)
by: Rahmat, Robaisya, et al.
Published: (2023)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)
by: Baskerville, Richard, et al.
Published: (2009)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Analyses of rain fade countermeasure technique time diversity at 26 GHz
by: Ismail, Ahmad Fadzil, et al.
Published: (2012)
by: Ismail, Ahmad Fadzil, et al.
Published: (2012)
Analyses of rain fade countermeasure technique time diversity at 38 GHz
by: M. Saad, Nor Wahida, et al.
Published: (2013)
by: M. Saad, Nor Wahida, et al.
Published: (2013)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Securing the IoT frontier: exploring the limitation and future directions in cybersecurity
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
Information systems as a reference discipline: Current debate and future directions
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015)
by: Lee, A., et al.
Published: (2015)
Similar Items
-
A review of cryptographic impact in cybersecurity on smart grid: threat, challenges and countermeasures
by: Hasan, Md Mehedi, et al.
Published: (2021) -
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012) -
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018) -
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013) -
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)