These are the sources and citations used to research Risk Management. This bibliography was generated on Cite This For Me on

  • Website

    What is HIPAA Compliance?

    2018

    In-text: (Onlinetech.com, 2018)

    Your Bibliography: Onlinetech.com. (2018). What is HIPAA Compliance?. [online] Available at: http://www.onlinetech.com/resources/references/what-is-hipaa-compliance [Accessed 5 Feb. 2018].

  • Website

    What is HIPAA

    2018

    In-text: (Dhcs.ca.gov, 2018)

    Your Bibliography: Dhcs.ca.gov. (2018). What is HIPAA. [online] Available at: http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00WhatisHIPAA.aspx [Accessed 5 Feb. 2018].

  • Journal

    Blakely, B., McDermont, E. and Geer, D.

    “Information security is information risk management”

    2001 - ACM Digital Library, 2001

    In-text: (Blakely, McDermont and Geer, 2001)

    Your Bibliography: Blakely, B., McDermont, E. and Geer, D. (2001). “Information security is information risk management”. ACM Digital Library, 2001, p.97.

  • Journal

    Solic, K., Ocevcic, H. and Golub, M.

    The information systems' security level assessment model based on an ontology and evidential reasoning approach

    2015 - Computers & Security

    In-text: (Solic, Ocevcic and Golub, 2015)

    Your Bibliography: Solic, K., Ocevcic, H. and Golub, M. (2015). The information systems' security level assessment model based on an ontology and evidential reasoning approach. Computers & Security, 55, pp.100-112.

  • Website

    IBM

    Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview

    2017 - IBM Security

    In-text: (IBM, 2017)

    Your Bibliography: IBM (2017). Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. [online] Www-01.ibm.com. Available at: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN& [Accessed 7 Feb. 2018].

  • Journal

    Wilcox, S. and Brown, B.

    2004 - J Health Care Compliance,

    In-text: (Wilcox and Brown, 2004)

    Your Bibliography: Wilcox, S. and Brown, B. (2004). J Health Care Compliance,, 6(4), pp.43-46.

  • Journal

    Iijima, T. and Curtis, J.

    Need to justify IT security? Measure your risk!

    2004 - Journal of Corporate Accounting & Finance

    In-text: (Iijima and Curtis, 2004)

    Your Bibliography: Iijima, T. and Curtis, J. (2004). Need to justify IT security? Measure your risk!. Journal of Corporate Accounting & Finance, 15(5), pp.47-51.

  • Journal

    Ross, R.

    Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs

    2007 - EDPACS

    In-text: (Ross, 2007)

    Your Bibliography: Ross, R. (2007). Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs. EDPACS, 35(2), pp.1-10.

  • Journal

    Ionita, D.

    Current established Risk Assessment methodologies and tools

    2013 - MSc Thesis

    In-text: (Ionita, 2013)

    Your Bibliography: Ionita, D. (2013). Current established Risk Assessment methodologies and tools. MSc Thesis.

  • Journal

    Apgar, D.

    Measure your risk IQ: What you don't know can hurt you. Risk intelligence helps prioritize information-security projects

    2006

    In-text: (Apgar, 2006)

    Your Bibliography: Apgar, D. (2006). Measure your risk IQ: What you don't know can hurt you. Risk intelligence helps prioritize information-security projects. 5(10), pp.32-38.

  • Website

    Performing a Security Risk Assessment

    2010 - ISACA

    In-text: (Isaca.org, 2010)

    Your Bibliography: Isaca.org. (2010). Performing a Security Risk Assessment. [online] Available at: https://www.isaca.org/Journal/archives/2010/Volume-1/Pages/Performing-a-Security-Risk-Assessment1.aspx [Accessed 9 Feb. 2018].

  • Journal

    Munteanu, A.

    Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma

    2006 - ResearchGate

    In-text: (Munteanu, 2006)

    Your Bibliography: Munteanu, A. (2006). Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma. ResearchGate.

  • Journal

    Munteanu, A.

    Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma

    2006 - ResearchGate

    In-text: (Munteanu, 2006)

    Your Bibliography: Munteanu, A. (2006). Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma. ResearchGate.

  • Journal

    Schimittling, R.

    Performing a Security Risk Assessment

    2010 - ISACA Journal

    In-text: (Schimittling, 2010)

    Your Bibliography: Schimittling, R. (2010). Performing a Security Risk Assessment. ISACA Journal, 1.

  • Journal

    Rot, A.

    IT Risk Assessment: Quantitative and Qualitative Approach

    2008 - WCECS

    In-text: (Rot, 2008)

    Your Bibliography: Rot, A. (2008). IT Risk Assessment: Quantitative and Qualitative Approach. WCECS.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join