Yeboah-Boateng, 2012 - Google Patents
Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policiesYeboah-Boateng, 2012
View PDF- Document ID
- 12990773806805938261
- Author
- Yeboah-Boateng E
- Publication year
- Publication venue
- International Journal of Electrical & Computer Sciences
External Links
Snippet
This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of …
- 230000001149 cognitive 0 title description 13
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kalhoro et al. | Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review | |
| Silic et al. | Information security: Critical review and future directions for research | |
| Madhavram et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
| Fakeh et al. | Information security awareness amongst academic librarians | |
| Galla et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| Waelchli et al. | Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study | |
| Swire et al. | Risks to cybersecurity from data localization, organized by techniques, tactics and procedures | |
| Yeboah-Boateng | Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policies | |
| Gardenia et al. | Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model. | |
| Islam et al. | Human factors in software security risk management | |
| Thuraisingham | Cyber security and data governance roles and responsibilities at the C-level and the board | |
| Al-Harthy et al. | Dimensions of protection behaviors: a systematic literature review | |
| Beeskow | Reducing security risk using data loss prevention technology | |
| Rajadorai et al. | Data Protection and Data Privacy Act for BIG DATA Governance | |
| Waghmare | Security and ethical considerations when using ChatGPT | |
| Kabeireho | Impact of deterrence and user awareness on insider threat vulnerability: A correlational study | |
| Warmayana et al. | Predicting Cyber Attack Types Using XGBoost: A Data Mining Approach to Enhance Legal Frameworks for Cybersecurity | |
| Obeidat et al. | Implementing Factors of Information Security in Governmental Organizations of Jordan | |
| Situmorang et al. | THE ROLE OF IT AUDITING IN DATA SECURITY FOCUSING ON RISK IDENTIFICATION, STRENGTHENING INTERNAL CONTROLS, AND COMPLIANCE WITH SECURITY POLICIES | |
| Pseftelis et al. | Understanding cyber incident dynamics in the european union: a study of actor types and sector vulnerabilities | |
| Mallick et al. | Handling and Protecting Medical Organizations and Patients' Data in the Age of Technology | |
| Gopireddy | Consumer Data Privacy: Protecting Personal Information in the Digital Age | |
| Smith et al. | A Doubled-Edged Sword Called Cyberspace: Introducing the Concept of Cybercrime | |
| Ewan | The Impact of Budgeting on the Risk of Cybersecurity Insider Threat Actions: From the Perspective of IT Engineers | |
| Rupinder et al. | Evaluation of Cyber Security Risks Disclosures in the Financial Sector |