dc.contributor.author |
Papadaki, K |
en |
dc.contributor.author |
Polemi, D |
en |
dc.date.accessioned |
2014-03-01T01:57:05Z |
|
dc.date.available |
2014-03-01T01:57:05Z |
|
dc.date.issued |
2008 |
en |
dc.identifier.issn |
1751911X |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/28337 |
|
dc.subject |
Information security |
en |
dc.subject |
Knowledge management |
en |
dc.subject |
Risk management |
en |
dc.subject.other |
Administrative data processing |
en |
dc.subject.other |
Information retrieval systems |
en |
dc.subject.other |
Knowledge management |
en |
dc.subject.other |
Management information systems |
en |
dc.subject.other |
Risk analysis |
en |
dc.subject.other |
Risk management |
en |
dc.subject.other |
Societies and institutions |
en |
dc.subject.other |
Complex informations |
en |
dc.subject.other |
Information securities |
en |
dc.subject.other |
Information security |
en |
dc.subject.other |
Sharing platforms |
en |
dc.subject.other |
Systematic approaches |
en |
dc.subject.other |
Decision making |
en |
dc.title |
A meta-process for information security risk management |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1504/IJESDF.2008.021451 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1504/IJESDF.2008.021451 |
en |
heal.publicationDate |
2008 |
en |
heal.abstract |
Information security risk management (ISRM) is a major concern of organisations worldwide. Although the number of existing ISRM methodologies is enormous, in practice several resources are invested by organisations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organisations, but in most cases it is addressed in an ad hoc manner. The existence of a systematic approach for the development of new or improved ISRM methodologies would enhance the effectiveness of the process. In this paper, we propose a systematic meta-process for developing new, or improved ISRM methods. We also present the specifications for a collaboration and knowledge-sharing platform supporting a virtual intra-organisational cross-disciplinary team, which aims at improving its ISRM methodologies by adopting the proposed meta-process. © 2008, Inderscience Publishers. |
en |
heal.journalName |
International Journal of Electronic Security and Digital Forensics |
en |
dc.identifier.doi |
10.1504/IJESDF.2008.021451 |
en |
dc.identifier.volume |
1 |
en |
dc.identifier.issue |
4 |
en |
dc.identifier.spage |
336 |
en |
dc.identifier.epage |
343 |
en |