dc.contributor.author | Wangen, Gaute | |
dc.date.accessioned | 2017-11-06T14:54:34Z | |
dc.date.available | 2017-11-06T14:54:34Z | |
dc.date.created | 2017-04-27T13:53:33Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Computer. 2017, 4 (50), 52-61. | nb_NO |
dc.identifier.issn | 0018-9162 | |
dc.identifier.uri | http://hdl.handle.net/11250/2464335 | |
dc.description.abstract | Numerous methods for information security risk assessment (ISRA) are available, yet there is little guidance on how to choose one. Through a comprehensive risk identification, estimation, and evaluation framework, the author evaluates the practical application of three ISRA methods in terms of tasks required, user experience, and results. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.title | Information Security Risk Assessment: A Method Comparison | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 52-61 | nb_NO |
dc.source.volume | 4 | nb_NO |
dc.source.journal | Computer | nb_NO |
dc.source.issue | 50 | nb_NO |
dc.identifier.doi | 10.1109/MC.2017.107 | |
dc.identifier.cristin | 1466948 | |
dc.description.localcode | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,18,21,80 | |
cristin.unitname | Norwegian Information Security Lab | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 2 | |