We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Security and Risk Management

    In the ever-evolving landscape of information security, a solid grasp of Security and Risk Management principles is crucial for professionals in the...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  2. Financial Risk Management

    Similar to non-financial risk, financial risk is higher for cryptoassets than traditional investments. For example, as introduced in Chapter...
    Chapter 2023
  3. Non-Financial Risk Management

    To make effective decisions, responsible investors should thoroughly understand financial and non-financial risks related to their investments. These...
    Chapter 2023
  4. Risk Management

    AICA represent a unique opportunity to mitigate cybersecurity risks. This is because autonomous intelligent agents can defend a system against...
    Alexandre K. Ligo, Alexander Kott, ... Igor Linkov in Autonomous Intelligent Cyber Defense Agent (AICA)
    Chapter 2023
  5. Blockchain-based multi-organizational cyber risk management framework for collaborative environments

    Along with the increasing damage of cyberattacks, cyber risk management remains one of the most crucial proactive measures. Risk management aims to...

    Habib El Amin, Lina Oueidat, ... Antoine Feghali in International Journal of Information Security
    Article 13 December 2023
  6. Information Analysis in Risk Management of BP (Using the Example of Metallurgical Enterprises)

    Abstract

    To unify the understanding of and improvements to management efficiency, the conceptual apparatus of information support for risk management...

    V. S. Vasiltsov, N. P. Krylova, ... M. S. Krasovsky in Automatic Documentation and Mathematical Linguistics
    Article 01 April 2024
  7. The outcome efficacy of the entity risk management requirements of the NIS 2 Directive

    The NIS 2 Directive (2022/2555) of the European Union (EU) identifies the cybersecurity risk management requirements for essential and important...

    Donald David Stewart Ferguson in International Cybersecurity Law Review
    Article Open access 17 August 2023
  8. Pattern-Based Risk Identification for Model-Based Risk Management

    In a previous publication, we have introduced Risk Issue Questionnaires (RIQs) that serve to support risk identification for critical systems. The...
    Chapter 2023
  9. Risk Management in the Design of Computer Network Topology

    The problems of risk management are considered from different points of view. Most often, they are investigated as part of organizational management....
    Conference paper 2024
  10. The using effect of fuzzy analytic hierarchy process in project engineering risk management

    This work aims to explore the effectiveness of the fuzzy analytic hierarchy process (FAHP) in project engineering risk management and comprehensively...

    Tao Dong, Haiyan Li, Ziqiong Zhang in Neural Computing and Applications
    Article 20 November 2023
  11. RAFA Model. Rethinking Cyber Risk Management in Organizations

    In a highly volatile scenario such as the current one, current cyber risk management practices, based on standards and best practices, begin to lose...
    Conference paper 2024
  12. Risk

    Unwanted events, such as attempts to breach the security policy of an IT system, may appear with very different frequencies and have very different...
    Chapter 2024
  13. Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

    Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or...

    Ahmed Amro, Vasileios Gkioulos in International Journal of Information Security
    Article Open access 23 November 2022
  14. TAI-PRM: trustworthy AI—project risk management framework towards Industry 5.0

    Artificial Intelligence (AI) is increasingly being used in manufacturing to automate tasks and process data, leading to what has been termed...

    Eduardo Vyhmeister, Gabriel G. Castane in AI and Ethics
    Article Open access 14 February 2024
  15. IoMT Applications Perspectives: From Opportunities and Security Challenges to Cyber-Risk Management

    The Internet of Things (IoT) paradigm is gaining popularity since it promotes the development of several smart and innovative applications....
    Sondes Ksibi, Faouzi Jaidi, Adel Bouhoula in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  16. Enterprise Cyber Risk Management as a Value Creator

    Over the last 40 years, I’ve enjoyed hel** organizations comply with various privacy, security, and breach notification regulations and standards...
    Chapter 2024
  17. Enterprise Cyber Risk Management as a Value Creator Leverage Cybersecurity for Competitive Advantage

    This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business...

    Bob Chaput
    Book 2024
  18. The Role and Impact of Big Data in Organizational Risk Management

    Technological advancement has exposed companies to various risks. With the adoption of technological infrastructures in many companies, various...
    Mounir El Khatib, Ahmad Ankit, ... Muhammad Alshurideh in The Effect of Information Technology on Business and Marketing Intelligence Systems
    Chapter 2023
  19. Structuring Research Related to Dynamic Risk Management for Autonomous Systems

    Conventional safety engineering is not sufficient to deal with Artificial Intelligence (AI) and Autonomous Systems (AS). Some authors propose dynamic...
    Rasmus Adler, Jan Reich, Richard Hawkins in Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops
    Conference paper 2023
  20. The Strategic Management of Disaster Risk Mitigation

    Systemic risks are embedded in the complex networks of an increasingly interconnected world. Achieving the Sendai Framework for Disaster Risk...
    Colin Eden, Jose J. Gonzalez in Information Technology in Disaster Risk Reduction
    Conference paper 2023
Did you find what you were looking for? Share feedback.