Show simple item record

dc.contributor.authorWangen, Gaute
dc.date.accessioned2017-11-06T14:54:34Z
dc.date.available2017-11-06T14:54:34Z
dc.date.created2017-04-27T13:53:33Z
dc.date.issued2017
dc.identifier.citationComputer. 2017, 4 (50), 52-61.nb_NO
dc.identifier.issn0018-9162
dc.identifier.urihttp://hdl.handle.net/11250/2464335
dc.description.abstractNumerous methods for information security risk assessment (ISRA) are available, yet there is little guidance on how to choose one. Through a comprehensive risk identification, estimation, and evaluation framework, the author evaluates the practical application of three ISRA methods in terms of tasks required, user experience, and results.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.titleInformation Security Risk Assessment: A Method Comparisonnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber52-61nb_NO
dc.source.volume4nb_NO
dc.source.journalComputernb_NO
dc.source.issue50nb_NO
dc.identifier.doi10.1109/MC.2017.107
dc.identifier.cristin1466948
dc.description.localcode© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,18,21,80
cristin.unitnameNorwegian Information Security Lab
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record