Author of the publication

Towards a Systemic Approach for Information Security Risk Management.

, , and . ARES, page 177-186. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Process Assessment Model for Management System Standards., , , and . SPICE, volume 477 of Communications in Computer and Information Science, page 36-47. Springer, (2014)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)Model-based Management of Information System Security Risk.. Université de Namur, Belgium, (2009)An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)., , , and . EuroSPI, volume 543 of Communications in Computer and Information Science, page 87-99. Springer, (2015)Systemic Security Risks in the Telecommunications Sector: An Approach for Security and Integrity of Networks and Services., and . COMPLEXIS, page 72-79. SCITEPRESS, (2020)Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation., , , and . EuroSPI, volume 364 of Communications in Computer and Information Science, page 13-24. Springer, (2013)Evaluation of the risk and security overlay of archimate to model information system security risks., and . EDOC Workshops, page 106-116. IEEE Computer Society, (2017)Requirements Engineering for Improving Business/IT Alignment in Security Risk Management Methods., , and . IESA, page 15-26. Springer, (2007)Evaluation of the Cognitive Effectiveness of the CORAS Modelling Language., , and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 149-162. Springer, (2018)A Gap Analysis Tool for SMEs Targeting ISO/IEC 27001 Compliance., and . ICEIS (3), page 413-416. SciTePress, (2010)