Search
Search Results
-
Risk
Unwanted events, such as attempts to breach the security policy of an IT system, may appear with very different frequencies and have very different... -
Managing Risk
The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more... -
Maturing Ethical Risk
The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects... -
Financial Risk Management
Similar to non-financial risk, financial risk is higher for cryptoassets than traditional investments. For example, as introduced in Chapter... -
Risk and Compliance in Cybersecurity
In the dynamic and ever-evolving landscape of digital technology, the importance of risk management in cybersecurity cannot be overstated. It acts as... -
Network Risk Assessment Method Based on Residual Risk Analysis
The existing network security theory usually believes that “residual risks” are acceptable to a certain degree. However, the reality is that most... -
Empirical Risk Minimization
This video segment explains empirical risk minimization as a main paradigm for the design of ML methods. -
Pattern-Based Risk Identification for Model-Based Risk Management
In a previous publication, we have introduced Risk Issue Questionnaires (RIQs) that serve to support risk identification for critical systems. The... -
Understanding Risk and Return
Any financial asset is characterized by its risk and return. Return means the financial reward it brings, such as the percentage increase in the... -
Risk Management
AICA represent a unique opportunity to mitigate cybersecurity risks. This is because autonomous intelligent agents can defend a system against... -
Non-Financial Risk Management
To make effective decisions, responsible investors should thoroughly understand financial and non-financial risks related to their investments. These... -
Security and Risk Management
In the ever-evolving landscape of information security, a solid grasp of Security and Risk Management principles is crucial for professionals in the... -
An Opportunity-Based Approach to Information Security Risk
The traditional approach to Information Security Risk Management (ISRM) is to assume that risk can only affect businesses negatively. However, it is... -
Fair Empirical Risk Minimization Revised
Artificial Intelligence is nowadays ubiquitous, thanks to a continuous process of commodification, revolutionizing but also impacting society at... -
Information Technology in Disaster Risk Reduction 7th IFIP WG 5.15 International Conference, ITDRR 2022, Kristiansand, Norway, October 12–14, 2022, Revised Selected Papers
This volume constitutes the refereed and revised post-conference proceedings of the 7th IFIP WG 5.15 International Conference on Information... -
Disease Risk Predictions with Differentiable Mendelian Randomization
Predicting future disease onset is crucial in preventive healthcare, yet longitudinal datasets linking early risk factors to subsequent health... -
On the Semantics of Risk Propagation
Risk propagation encompasses a plethora of techniques for analyzing how risk “spreads” in a given system. Albeit commonly used in technical... -
Geolocation Risk Scores for Credit Scoring Models
Customer location is considered as one of the most informative demographic data for predictive modeling. It has been widely used in various sectors... -
Overstatement-Net-Equivalent Risk-Limiting Audit: ONEAudit
A procedure is a risk-limiting audit (RLA) with risk limit \(\alpha \)... -
Information Technology in Disaster Risk Reduction 8th IFIP WG 5.15 International Conference, ITDRR 2023, Tokyo, Japan, December 4–6, 2023, Revised Selected Papers
This volume constitutes the refereed and revised post-conference proceedings of the 8th IFIP WG 5.15 International Conference on Information...