Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,266 papers from all fields of science
Search
Sign In
Create Free Account
Information Technology Security Assessment
Known as:
IT security assessment
, IT security risk assessment
, Information technology security risk assessment
Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
How to design a method for measuring IT security in micro enterprises for IT security level measuring? A literature analysis
M. Heidenreich
Karlsruhe Institute of Technology - Proceedings
2017
Corpus ID: 25862939
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work…
Expand
2014
2014
Risk assessment for a video surveillance system based on Fuzzy Cognitive Maps
P. Szwed
,
Pawel Skrzynski
,
W. Chmiel
Multimedia tools and applications
2014
Corpus ID: 13894180
For various IT systems security is considered a key quality factor. In particular, it might be crucial for video surveillance…
Expand
2014
2014
Ontology-Supported Design of Domain-Specific Languages: A Complex Event Processing Case Study
István Dávid
,
László Gönczy
2014
Corpus ID: 14444503
This chapter introduces a novel approach for design of Domain-Specific Languages (DSL). It is very common in practice that the…
Expand
2013
2013
Risk Assessment as an Argumentation Game
H. Prakken
,
D. Ionita
,
R. Wieringa
Computational Logic in Multi-Agent Systems
2013
Corpus ID: 16006182
This paper explores the idea that IT security risk assessment can be formalized as an argumentation game in which assessors argue…
Expand
2010
2010
A Hybrid Expert System for IT Security Risk Assessment
Andrew Gordon
,
I. Belik
,
Shahram Rahimi
International Conference on Parallel and…
2010
Corpus ID: 16373951
The uncertainty and unexpectedness of security risk makes it exceedingly challenging to assess and monitor. This paper outlines a…
Expand
2009
2009
Information Security Risk Assessment in Healthcare: The Experience of an Italian Paediatric Hospital
M. Bava
,
D. Cacciari
,
E. Sossa
,
D. Zotti
,
R. Zangrando
First International Conference on Computational…
2009
Corpus ID: 16582095
The match of research activity and paediatric healthcare services offered by the IRCCS “Burlo Garofolo”, produces a complex…
Expand
2008
2008
Information Asset Valuation Method for Information Technology Security Risk Assessment
F. Foroughi
2008
Corpus ID: 14667775
The information security strategic plan is necessarily comprehensive, including business processes, people, and physical…
Expand
2008
2008
Improvement and Scenario-Based Evaluation of the eXtended Method for Assessment of System Security
Thomas Sundmark
2008
Corpus ID: 60325580
This master’s thesis consists of a scenario-based evaluation of an IT-security assessment method known as the eXtendedMethod for…
Expand
2005
2005
A framework for system security assessment
J. Hallberg
,
A. Hunstad
,
M. Peterson
Proceedings from the Sixth Annual IEEE SMC…
2005
Corpus ID: 16888403
Security assessment is a central ability in the striving for adequate levels of IT security in information systems and networks…
Expand
Review
2002
Review
2002
Technical issues in securing e-government
N. Boudriga
IEEE International Conference on Systems, Man and…
2002
Corpus ID: 39579038
Deploying e-governments ervices and opening the private network of agencies for e-business, generates a number of new security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE