Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy"
written by Joseph Elias Mbowe, Irina Zlotnikova, Simon S. Msanjila, George S. Oreku,
published by Journal of Information Security, Vol.5 No.4, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Factors Affecting Cyber Security Awareness in Combating Cyber Crime in Kenyan Public Universities
… Research Journal of …, 2022
[2] Model za procjenu kritičnih informacijskih sustava primjenom višekriterijskoga odlučivanja s elementima za analizu i procjenu rizika u financijskim institucijama
2021
[3] Security Determinants in the Adoption of Big Data Solutions
2021
[4] A Study of the Effect of Middle Management Participation and Organizational Culture on Employee Security Policy Compliance Intentions
2021
[5] Information Security Mechanisms and ICT Policy in Practice: A Case of the University of Namibia
International Journal of …, 2021
[6] Heuristic for license-aware, performant and energy efficient deployment of multiple software in Cloud architecture
2021
[7] A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment
2021
[8] A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case
2020
[9] Towards a Hybrid Model for the Evaluation of Critical IT Systems
2020
[10] Impact of Deterrence and User Awareness on Insider Threat Vulnerability: A Correlational Study
2020
[11] The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth
2020
[12] Managing Security Objectives for Effective Organizational Performance Information Security Management
2019
[13] Software Asset Management (SAM) and IT risks
2019
[14] Threat and Coping Appraisals on Information Security Awareness Training Effectiveness: A Quasi-experimental Study
2019
[15] Managing security and compliance risks of outsourced IT projects
2019
[16] Policy Awareness, Enforcement, and Maintenance: A Comparative Quantitative Approach to Information Security Effectiveness in a Bring Your Own Device (BYOD) …
2019
[17] Factors Influencing Undergraduate Students' Intention to Adopt Information Security Policies: a Correlational Study
2018
[18] A comprehensive people, process and technology (PPT) application model for Information Systems (IS) risk management in small/medium enterprises (SME)
2017
[19] College of Management and Technology
2017
[20] Integrating relational data frameworks into risk assessment of networked medical devices
ProQuest Dissertations Publishing, 2017
[21] Qualitative Case Study Exploring Operational Barriers Impeding Small and Private, Nonprofit Higher Education Institutions from Implementing Information Security …
ProQuest Dissertations Publishing, 2017
[22] Critical Electronic Data Loss Perceptions of United States Military Contractors
ProQuest Dissertations Publishing, 2017
[23] Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry
ProQuest Dissertations Publishing, 2017
[24] A generic framework for information security policy development
2017
[25] The State of e-Government Security in South Africa: Analysing the National Information Security Policy
e-Infrastructure and e-Services for Developing Countries, 2017
[26] Qualitative Case Study Exploring Operational Barriers Impeding Small and Private, Nonprofit Higher Education Institutions from Implementing Information Security …
2017
[27] Risk assessment in single domain multi site information systems
2016
[28] Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system
2016
[29] Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review
Procedia Computer Science, 2016
[30] A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness
ProQuest Dissertations Publishing, 2016
[31] On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
2016
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top