+

Yeboah-Boateng, 2012 - Google Patents

Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policies

Yeboah-Boateng, 2012

View PDF
Document ID
12990773806805938261
Author
Yeboah-Boateng E
Publication year
Publication venue
International Journal of Electrical & Computer Sciences

External Links

Snippet

This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kalhoro et al. Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
Silic et al. Information security: Critical review and future directions for research
Madhavram et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Fakeh et al. Information security awareness amongst academic librarians
Galla et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Waelchli et al. Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
Swire et al. Risks to cybersecurity from data localization, organized by techniques, tactics and procedures
Yeboah-Boateng Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policies
Gardenia et al. Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model.
Islam et al. Human factors in software security risk management
Thuraisingham Cyber security and data governance roles and responsibilities at the C-level and the board
Al-Harthy et al. Dimensions of protection behaviors: a systematic literature review
Beeskow Reducing security risk using data loss prevention technology
Rajadorai et al. Data Protection and Data Privacy Act for BIG DATA Governance
Waghmare Security and ethical considerations when using ChatGPT
Kabeireho Impact of deterrence and user awareness on insider threat vulnerability: A correlational study
Warmayana et al. Predicting Cyber Attack Types Using XGBoost: A Data Mining Approach to Enhance Legal Frameworks for Cybersecurity
Obeidat et al. Implementing Factors of Information Security in Governmental Organizations of Jordan
Situmorang et al. THE ROLE OF IT AUDITING IN DATA SECURITY FOCUSING ON RISK IDENTIFICATION, STRENGTHENING INTERNAL CONTROLS, AND COMPLIANCE WITH SECURITY POLICIES
Pseftelis et al. Understanding cyber incident dynamics in the european union: a study of actor types and sector vulnerabilities
Mallick et al. Handling and Protecting Medical Organizations and Patients' Data in the Age of Technology
Gopireddy Consumer Data Privacy: Protecting Personal Information in the Digital Age
Smith et al. A Doubled-Edged Sword Called Cyberspace: Introducing the Concept of Cybercrime
Ewan The Impact of Budgeting on the Risk of Cybersecurity Insider Threat Actions: From the Perspective of IT Engineers
Rupinder et al. Evaluation of Cyber Security Risks Disclosures in the Financial Sector
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载