Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proposed Framework for Security Risk Assessment
(Articles)
Zakaria I. Saleh
,
Heba Refai
,
Ahmad Mashhour
Journal of Information Security
Vol.2 No.2
,April 22, 2011
DOI:
10.4236/jis.2011.22008
8,286
Downloads
20,000
Views
Citations
Securitizing Area Insurance: A Risk Management Approach
(Articles)
Pasquale Lucio Scandizzo
Journal of Financial Risk Management
Vol.2 No.3
,September 23, 2013
DOI:
10.4236/jfrm.2013.23009
5,163
Downloads
9,470
Views
Citations
Study on the Risk of Regional Energy Security Cooperation
(Articles)
Ying Shen
,
Xintong Yang
,
Xiaoli Guo
Energy and Power Engineering
Vol.5 No.4B
,November 21, 2013
DOI:
10.4236/epe.2013.54B273
4,903
Downloads
6,054
Views
Citations
Systematizing IT Risks
(Articles)
Georg Disterer
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104013
1,109
Downloads
2,639
Views
Citations
Online Accounts Management Method Using Risk-Based Approach
(Articles)
Yoshio Kakizaki
,
Takumi Akiyama
,
Kazuya Otani
,
Ryoichi Sasaki
Journal of Computer and Communications
Vol.4 No.14
,November 14, 2016
DOI:
10.4236/jcc.2016.414003
1,399
Downloads
2,353
Views
Citations
Financial Internationalization and Financial Security Issues
(Articles)
Ruyu Han
Open Access Library Journal
Vol.5 No.9
,September 13, 2018
DOI:
10.4236/oalib.1104874
772
Downloads
4,109
Views
Citations
Risk Management in Commercial Banking Institutions: An Examination of the Cybersecurity Challenges for Commercial Banks in India: Recommendations for Guyana’s Banking Sector
(Articles)
La donna Delon
Journal of Financial Risk Management
Vol.13 No.3
,September 26, 2024
DOI:
10.4236/jfrm.2024.133026
152
Downloads
958
Views
Citations
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation
(Articles)
Sasith M. Rajasooriya
,
Chris P. Tsokos
,
Pubudu Kalpani Kaluarachchi
Journal of Information Security
Vol.7 No.4
,July 21, 2016
DOI:
10.4236/jis.2016.74022
2,278
Downloads
4,173
Views
Citations
Cybersecurity Culture and Organizational Resilience: A Human-Centered Approach to Digital Risk Management
(Articles)
Shankar Subramanian Iyer
,
Brinitha Raji
American Journal of Industrial and Business Management
Vol.15 No.5
,May 30, 2025
DOI:
10.4236/ajibm.2025.155036
26
Downloads
236
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
120
Downloads
675
Views
Citations
Prediction and Diversion Mechanisms for Crowd Management Based on Risk Rating
(Articles)
Meihua Zhang
,
Yuan Yao
,
Kefan Xie
Engineering
Vol.9 No.5
,May 27, 2017
DOI:
10.4236/eng.2017.95021
1,522
Downloads
3,449
Views
Citations
Strategic Risk Factors for Indian Stock Markets
(Articles)
Aman Srivastava
,
Prashant Gupta
,
Rakesh Gupta
Theoretical Economics Letters
Vol.7 No.6
,September 30, 2017
DOI:
10.4236/tel.2017.76114
1,204
Downloads
3,420
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,167
Downloads
2,249
Views
Citations
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres
(Articles)
Emil Pop
,
Gabriel-Ioan Ilcea
,
Ionut-Alin Popa
Engineering
Vol.10 No.3
,March 16, 2018
DOI:
10.4236/eng.2018.103006
1,146
Downloads
2,209
Views
Citations
This article belongs to the Special Issue on
Safety System Engineering
Optimum Spending on Cybersecurity Measures: Part II
(Articles)
Sherita Tara Kissoon
Journal of Information Security
Vol.12 No.1
,January 21, 2021
DOI:
10.4236/jis.2021.121007
1,565
Downloads
3,273
Views
Citations
Public Service Delivery in the Context of Disaster Risk Reduction for Sustainable Human Security with Special Reference to the City of Mutare, Zimbabwe
(Articles)
David Chibhoyi
,
Tafadzwa Hatidani Machaka
,
Absai Chakaipa
,
Rumbidzai Chibhoyi
,
Nevermind Muchongwe
,
Charity Ranganayi
,
Norman Tavengwa
,
Itai Zvawanda
,
Norah Gwesu
Open Access Library Journal
Vol.11 No.3
,March 22, 2024
DOI:
10.4236/oalib.1111123
78
Downloads
459
Views
Citations
Security Policy Model in a Hybrid Zachman-TOGAF Framework for a Telework Enterprise Architecture in a Cloud Environment
(Articles)
Pacôme Brou
,
Thomas Kouassi
,
Beman Hamidja Kamagate
,
Olivier Asseu
,
Yvon Kermarrec
Open Journal of Safety Science and Technology
Vol.14 No.3
,September 24, 2024
DOI:
10.4236/ojsst.2024.143008
70
Downloads
368
Views
Citations
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability
(Articles)
Sasith M. Rajasooriya
,
Chris. P. Tsokos
,
Pubudu Kalpani Kaluarachchi
Journal of Information Security
Vol.8 No.2
,April 30, 2017
DOI:
10.4236/jis.2017.82009
1,670
Downloads
3,560
Views
Citations
Analysis of Risk Measures in Portfolio Optimization for the Uganda Securities Exchange
(Articles)
Criscent Birungi
,
Lucy Muthoni
Journal of Financial Risk Management
Vol.10 No.2
,June 7, 2021
DOI:
10.4236/jfrm.2021.102008
507
Downloads
2,386
Views
Citations
A Novel Approach to Improve the Security of P2P File-Sharing Systems
(Articles)
Cuihua ZUO
,
Ruixuan LI
,
Zhengding LU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.3
,June 21, 2009
DOI:
10.4236/ijcns.2009.23025
5,276
Downloads
9,471
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top