Author of the publication

A Gap Analysis Tool for SMEs Targeting ISO/IEC 27001 Compliance.

, and . ICEIS (3), page 413-416. SciTePress, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Risk-Based Security Analysis with /*., , and . Social Modeling for Requirements Engineering, MIT Press, (2011)Towards a Process Assessment Model for Management System Standards., , , and . SPICE, volume 477 of Communications in Computer and Information Science, page 36-47. Springer, (2014)The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector., , , , and . ERCIM News, (2016)Requirements Engineering for Improving Business/IT Alignment in Security Risk Management Methods., , and . IESA, page 15-26. Springer, (2007)An integrated conceptual model for information system security risk management supported by enterprise architecture management., , , , , and . Softw. Syst. Model., 18 (3): 2285-2312 (2019)Evaluation of the Cognitive Effectiveness of the CORAS Modelling Language., , and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 149-162. Springer, (2018)Model-based Management of Information System Security Risk.. Université de Namur, Belgium, (2009)An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)., , , and . EuroSPI, volume 543 of Communications in Computer and Information Science, page 87-99. Springer, (2015)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)Systemic Security Risks in the Telecommunications Sector: An Approach for Security and Integrity of Networks and Services., and . COMPLEXIS, page 72-79. SCITEPRESS, (2020)