DOI: 10.31274/etd-180810-3475
|View full text |Cite
|
Sign up to set email alerts
|

Business impact visualization for information security and compliance events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 59 publications
(62 reference statements)
0
1
0
Order By: Relevance
“…A key problem for organizations is the increasing severity and scale of threats that take place. The constitution of a threat event, for instance a hostile cyber-attack, could be so elaborate that it would require connecting hundreds or thousands of data points in a multi-layered organization-wide incident handling effort [3,[11][12][13][14]. Such scrutiny requires conscious care behavior, in which employees deliberate the outcomes of their actions towards their organization's security posture [15,16].…”
Section: Introductionmentioning
confidence: 99%
“…A key problem for organizations is the increasing severity and scale of threats that take place. The constitution of a threat event, for instance a hostile cyber-attack, could be so elaborate that it would require connecting hundreds or thousands of data points in a multi-layered organization-wide incident handling effort [3,[11][12][13][14]. Such scrutiny requires conscious care behavior, in which employees deliberate the outcomes of their actions towards their organization's security posture [15,16].…”
Section: Introductionmentioning
confidence: 99%