2012
DOI: 10.1007/978-3-642-33448-1_30
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative System Offering Security Management Services for SMEs/mEs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…In order to meet these requirements, we modified the risk management methodology STORM-RM [22][23] [24], in order to be applicable to ports/ICT environments. We implemented it as a service in the collaborative port security management environment S-Port [ [29]). …”
Section: Overview Of the S-port System And Its Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to meet these requirements, we modified the risk management methodology STORM-RM [22][23] [24], in order to be applicable to ports/ICT environments. We implemented it as a service in the collaborative port security management environment S-Port [ [29]). …”
Section: Overview Of the S-port System And Its Servicesmentioning
confidence: 99%
“…The STORM environment utilizes web 2.0 technologies in order to provide a collaborative security management of PICT systems with a series of user friendly services [26][28] [29]. Remarkable services are (a) the STORM-RM services that implement all the phases of the risk management methodology and offer them as separated services, and (b) the Security Awareness services (e.g., wiki, forum and a digital library that help users collaborate, communicate and find solutions and training material for security management purposes).…”
Section: Overview Of the S-port System And Its Servicesmentioning
confidence: 99%
“…The second security management need is addressed in S-PORT by developing a collaborative environment [14] (a recent trend in Web services applied in various sectors e.g. e-commerce [10], [11], e-government [7] and e-migration, [17]) using innovative Web2.0 technologies. The S-PORT environment [14], [15] is a parameterisation of the STORM security management environment [12] addressing the specific needs of PIT and involving all PIT users in the security management procedures.…”
Section: S-port: a National Projectmentioning
confidence: 99%
“…Small and medium-sized businesses (SMBs) as the foundation of the EU's economy [1] are the weakest spot for cyber-attacks [2,3]. SMBs have specific characteristics, and these characteristics separate them from large companies and make them highly vulnerable to security attacks [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…The lack of financial resources, expertise, written formal security policies, and also the common wrong attitude towards security and risks are some of these characteristics. Previous studies considered these characteristics and their influences on SMBs' resilience to security threats [3,[8][9][10].…”
Section: Introductionmentioning
confidence: 99%