Zobrazeno 1 - 3
of 3
pro vyhledávání: '"John F. Clem"'
Publikováno v:
Computers & Security. 28:509-520
The purpose of this study was to identify and describe how human and organizational factors may be related to technical computer and information security (CIS) vulnerabilities. A qualitative study of CIS experts was performed, which consisted of 2, 5
Autor:
John F. Clem, Gregory Dane Wyss, Katherine Dunphy-Guzman, John P. Hinton, Consuelo Juanita Silva, John L. Darby, Kim W. Mitchiner
Publikováno v:
Vulnerability, Uncertainty, and Risk.
Decision-makers want to perform risk-based cost-benefit prioritization of security investments. However, strong nonlinearities in the most common physical security performance metric make it difficult to use for cost-benefit analysis. This paper exte
Autor:
John F. Clem, Gregory Dane Wyss, John L. Darby, Katherine Dunphy-Guzman, Kim W. Mitchiner, John P. Hinton
Publikováno v:
44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
Decision-makers want to perform risk-based cost-benefit prioritization of security investments. However, strong nonlinearities in the most common physical security performance metric make it difficult to use for cost-benefit analysis. This paper exte