The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses...
In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs)....
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards...
In our modern societies, technological systems are taking on a large part in numerous domains such as automatic control, calculation, communication, information technologies, etc. They are put in place in more and more fields e.g. production, defense, national security, space, etc. These very important developments are offering new possibilities such as distributed cooperative and concurrent decision...
The infrastructures and services related to information and telecommunications are crucial constitutive elements of our society. These elements require not only ICT security but also confidence in that security. This paper explores at a macroscopic and integrated level the main challenges, obstacles and constitutive elements that contribute to building confidence in information security. The aims...
Innovation Relay Centre(IRC) is a successful technology transfer network for small and medium-sized enterprises (SMEs). IRC shows many brand-new characteristics of intermediary transfer organizations, and simultaneously increases many new risks. From the view of risk management, the paper comprehensively analyzed the risk factors which affected the IRC operation through factor analysis technology,...
Supply chain, as an effective mode participating in the intense business competition, has been accepted by scores of enterprises, but there still exists great risks in supply chain, because of the characteristics of its special chain structure. This paper investigates the sources of supply chain risk, and the factors of supply chain risk assessment. Based on this, a fuzzy assessment model used to...
Entrepreneurial learning has been an emerging study filed between learning and the entrepreneurial context. The present article seeks to advance the theoretical knowledge of entrepreneurial learning by reviewing and synthesizing available research into a conceptual framework. On the basis of literature review, semi-structure interview and survey, this paper divided five dimensions of entrepreneurial...
Empowerment is an effective management tool and has made tremendous benefits for employees and organizations, which has been approved by many studies and practices. However in China, it is so common that managers don't want to empower. So the main aim of this research is to analyze that phenomenon from the perspective of empowerment risk perception. From the data of 209 managers and 618 subordinates...
Strategic and tactical risk management (STRM) is a risk management tool providing users with a framework to assess, monitor and manage the safety of their systems in the short and long term basis. It consists of 2 levels of analyses: the tactical safety assessment (TSA) and the strategic safety assessment (SSA). The tactical level analysis serves to provide a quantitative assessment of the safety...
In the digital economy, IS projects play an increasingly important role for creating value and organizations have grown more heavily dependant on IS to help them solve problems and overcome challenges. However, lots of IS projects end in failure. The failed projects waste businesses millions of dollars every year and often prevent key business objectives from being met. Failing to identify and manage...
Classical methods of accepting or rejecting products, which are not generally known by the software reliability community, are used as a baseline for developing test criteria. Testing criteria are designed to estimate the number of tests, and associated fault removal, that would result in reduced risk and increased reliability to the point where the software can be deployed. For the purpose of experimenting...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.