2015
DOI: 10.14257/ijsia.2015.9.2.08
|View full text |Cite
|
Sign up to set email alerts
|

Information Systems Security Assessment Based on System Dynamics

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 17 publications
0
3
0
1
Order By: Relevance
“…Juliadotter and Choo [119] 2015 Risk Theoretical Both Otero [120] 2015 Risk Theoretical Defender Solic et al [121] 2015 Risk Theoretical Defender Sugiura et al [122] 2015 Risk Theoretical Defender Wei et al [123] 2015 Risk Theoretical Defender You et al [75] 2015 Security Theoretical Defender Brožová et al [51] 2016 Risk Theoretical Defender Brynielsson et al [124] 2016 Awareness Theoretical Defender Granåsen and Andersson [125] 2016 Resilience Theoretical Defender Orojloo and Azgomi [126] 2016 Risk Theoretical Attacker Aiba and Hiromatsu [127] 2017 Risk Theoretical Defender Damenu and Beaumont [103] 2017 Risk Implementation Defender Ramos et al [41] 2017 Review -Defender Rass et al [52] 2017 Risk Theoretical Defender Alohali et al [128] 2018 Risk Theoretical Defender Li et al [82] 2018 Risk Theoretical Defender Morrison et al [43] 2018 Review -Both Pramod and Bharathi [129] 2018 Risk Theoretical Defender Proença and Borbinha [89] 2018 Maturity Implementation Defender Rueda and Avila [130] 2018 Risk Theoretical Defender Shokouhyar et al [104] 2018 Risk Theoretical Defender Stergiopoulos et al [131] 2018 Risk Theoretical Defender You et al [132] 2018 Maturity Theoretical Defender Akinsanya et al [133] 2019 Maturity Theoretical Defender Bharathi [134] 2019 Risk Theoretical Defender Fertig et al [135] 2019 Awareness Theoretical Defender Husák et al [31] 2019 Review -Defender Salih et al [136] 2019 Risk Theoretical Defender Cadena et al [34] 2020 Review -Defender Wirtz and Heisel [137] 2020 Risk Theoretical Defender Ganin et al [138] 2020 Risk Theoretical Defender Luh et al [90] 2020 Risk Theoretical Both Table A3. The in...…”
Section: Validation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Juliadotter and Choo [119] 2015 Risk Theoretical Both Otero [120] 2015 Risk Theoretical Defender Solic et al [121] 2015 Risk Theoretical Defender Sugiura et al [122] 2015 Risk Theoretical Defender Wei et al [123] 2015 Risk Theoretical Defender You et al [75] 2015 Security Theoretical Defender Brožová et al [51] 2016 Risk Theoretical Defender Brynielsson et al [124] 2016 Awareness Theoretical Defender Granåsen and Andersson [125] 2016 Resilience Theoretical Defender Orojloo and Azgomi [126] 2016 Risk Theoretical Attacker Aiba and Hiromatsu [127] 2017 Risk Theoretical Defender Damenu and Beaumont [103] 2017 Risk Implementation Defender Ramos et al [41] 2017 Review -Defender Rass et al [52] 2017 Risk Theoretical Defender Alohali et al [128] 2018 Risk Theoretical Defender Li et al [82] 2018 Risk Theoretical Defender Morrison et al [43] 2018 Review -Both Pramod and Bharathi [129] 2018 Risk Theoretical Defender Proença and Borbinha [89] 2018 Maturity Implementation Defender Rueda and Avila [130] 2018 Risk Theoretical Defender Shokouhyar et al [104] 2018 Risk Theoretical Defender Stergiopoulos et al [131] 2018 Risk Theoretical Defender You et al [132] 2018 Maturity Theoretical Defender Akinsanya et al [133] 2019 Maturity Theoretical Defender Bharathi [134] 2019 Risk Theoretical Defender Fertig et al [135] 2019 Awareness Theoretical Defender Husák et al [31] 2019 Review -Defender Salih et al [136] 2019 Risk Theoretical Defender Cadena et al [34] 2020 Review -Defender Wirtz and Heisel [137] 2020 Risk Theoretical Defender Ganin et al [138] 2020 Risk Theoretical Defender Luh et al [90] 2020 Risk Theoretical Both Table A3. The in...…”
Section: Validation Methodsmentioning
confidence: 99%
“…Dantu and Kolan [83] Other DE, AB BN Yes Depoy et al [105] Other DE, AB WP, WCP Yes Hasle et al [106] Enterprise (A) AW WLC No Villarrubia et al [107] Enterprise (A) RE WLC No Bhilare et al [74] Enterprise (M/L) RE None Yes Grunske and Joyce [108] Other DE, AB WP, WM Yes Sahinoglu [84] Other RE WLC, BN Yes Dantu et al [85] Other DE, AB BN Yes Chen and Wang [87] Other AW WP No Chan [88] Enterprise (M/L) RE WLC, WP No Shin et al [78] Other AW, KN WLC No Bojanc et al [109] Enterprise (A) RE WLC, WM Yes Lo and Chen [50] Enterprise (M/L) AW, RE WLC No Rantos et al [110] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Shameli-Sendi et al [80] Enterprise (A) KN, AB WC No Bojanc and Jerman-Blažič [111] Enterprise (A) AW, RE WLC Yes Marconato et al [79] Other AW, DE None No Taubenberger et al [112] Enterprise (M/L) AW, RE None No Alencar Rigon et al [102] Enterprise (M/L) RE WLC No Boggs et al [113] Other AW WLC Yes Chen et al [114] Enterprise (M/L) RE WLC No Cheng et al [115] Other AW WLC, WP, WM Yes Feng et al [86] Enterprise (M/L) AW, RE BN Yes Manifavas et al [77] Enterprise (A) AW, DE, KN, AB, RE WLC Yes Silva et al [81] Other RE WLC, WP No Suhartana et al [116] Enterprise (A) AB, RE WLC Yes Yadav and Dong [117] Other AW, KN, AB, RE None Yes Dehghanimohammadabadi and Bamakan [118] Enterprise (M/L) RE WLC, WP Yes Juliadotter and Choo [119] Other AW, DE, KN, AB, RE WLC Yes Otero [120] Enterprise (M/L) AW, AB, RE None Yes Solic et al [121] Enterprise (A) AW, KN, AB WLC No Sugiura et al [122] Enterprise (A) AW, RE None No Wei et al [123] Other AW, AB WLC No You et al [7...…”
Section: Research Application Area Adkar Elements Aggregation Strategies Real-life Threatmentioning
confidence: 99%
“…Implementing Smart city architecture in the context of IoT should allow to increase the quality of life of the citizens and providing more security [24]. The extension for this is given according to G. Fierro research [25], where presented more system includes an extensible architecture is provided.…”
Section: Smart City Architecture In the Context Of Iotmentioning
confidence: 99%
“…В части применения метода системно-динамического моделирования для исследования систем обеспечения информационной безопасности накоплен определенный опыт у разных зарубежных научных коллективов [7][8][9][10][11][12][13][14][15][16][17]. Исследование динамики ИПВ на массовое сознание, приведенное в статье, опирается на полученные зарубежными научными коллективами подходы и особенности применения метода системнодинамического моделированию к решению проблем информационной безопасности.…”
Section: Introductionunclassified