Search results
Aug 1, 2022 · Systematic literature review of security assurance of the ICT and CPSs. •. Study the challenges and gaps of existing assurance challenges and solutions. •. Discussed the limitations of the present methods and future research directions. •. Review of assurance requirements, processes, and activities. •.
- Information Assurance Metric Development Framework for Electronic Bill Presentment and Payment Systems Using Transaction and Workflow Analysis
The paper develops a framework for the measurement of...
- Security Assurance Assessment Methodology for Hybrid Clouds
The security assessment commonly requires intensive...
- A Framework for Security Assurance of Access Control Enforcement Code
The access control approach in this paper assumes that the...
- A Testing Framework for Web Application Security Assessment
Scott and Sharp [58], [59] have asserted that Web...
- A Common Criteria Based Security Requirements Engineering Process for The Development of Secure Information Systems
Information security is defined within the standard as the...
- Information Assurance Metric Development Framework for Electronic Bill Presentment and Payment Systems Using Transaction and Workflow Analysis
Oct 5, 2022 · This study identifies issues generated by IES information security tools and security measures implemented for information protection security processes. As per the systematic literature review, 47 English written scientific articles were analyzed from the following bibliographical bases: IEEE Xplore, ScienceDirect, SpringerLink, ResearchGate ...
Mar 1, 2023 · Information Security Awareness (ISA) is a significant concept that got considerable attention recently and can assist in minimizing the risks associated with information security breaches. Several measurement scales have been developed in this regard, as measuring users’ ISA is paramount.
Dec 1, 2020 · The systematic literature review presented in this paper aims to introduce information security governance as a comprehensive solution for alignment between information security policies and the organization's objectives.
- Sultan AlGhamdi, Khin Than Win, Elena Vlahu-Gjorgievska
- 2020
Feb 28, 2007 · This paper identifies four security issues (access to Information Systems, secure communication, security management, development of secure Information Systems), and examines the extent...
Mar 27, 2023 · With gaps in the security systems, attackers have attempted to intrude the network, thereby gaining access to essential and confidential information, which may cause harm to the operation of the systems, and also affect the confidentiality of the data.
People also ask
What is a systematic literature review of security assurance?
Does IDs have a systematic literature review approach?
What are the four security issues in Information Systems?
Is information security governance a comprehensive solution?
How to evaluate IT systems security assurance?
What is a systematic literature review?
Apr 29, 2023 · This study was motivated by the realization that established IT risk-management frameworks might provide an adequate defence for small- and medium-sized enterprises (SMEs), especially those actively adopting new technologies.