2014
DOI: 10.1016/j.ins.2013.02.036
|View full text |Cite
|
Sign up to set email alerts
|

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 148 publications
(88 citation statements)
references
References 41 publications
(66 reference statements)
0
88
0
Order By: Relevance
“…Bayesian networks permit supporting measurement models, but they also help to identify the most likely causal structure in a structural model. Consequently, the Bayesian network approach has been applied in various IS studies to gain enhanced insights into novel research fields, e.g., concerning success factors in IT projects (Gingnell et al 2014) and IS security factors (Feng et al 2014). …”
Section: The Bayesian Networkmentioning
confidence: 99%
“…Bayesian networks permit supporting measurement models, but they also help to identify the most likely causal structure in a structural model. Consequently, the Bayesian network approach has been applied in various IS studies to gain enhanced insights into novel research fields, e.g., concerning success factors in IT projects (Gingnell et al 2014) and IS security factors (Feng et al 2014). …”
Section: The Bayesian Networkmentioning
confidence: 99%
“…They found that analyses using their model can be as accurate as assessments performed by security professionals. In a similar vein, Feng et al [15] recently proposed a method to consider the relationship between risks. Their approach uses Bayesian networks to consider not just the vulnerability, but its context within an infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…In [2], they proposed a security risk analysis model (SRAM) to identify the relationship among uncertainty of vulnerability propagation, analyze the complexity and risk factors. In [3], they proposed an Islanding Security Region (ISR) concept to provide security assessment of island operation.…”
Section: Iiliterature Surveymentioning
confidence: 99%