These are the sources and citations used to research Risk Management. This bibliography was generated on Cite This For Me on

  • Website

    What is HIPAA Compliance?

    2018

    In-text: (Onlinetech.com, 2018)

    Your Bibliography: Onlinetech.com. (2018). What is HIPAA Compliance?. [online] Available at: http://www.onlinetech.com/resources/references/what-is-hipaa-compliance [Accessed 5 Feb. 2018].

  • Journal

    Blakely, B., McDermont, E. and Geer, D.

    “Information security is information risk management”

    2001 - ACM Digital Library, 2001

    In-text: (Blakely, McDermont and Geer, 2001)

    Your Bibliography: Blakely, B., McDermont, E. and Geer, D. (2001). “Information security is information risk management”. ACM Digital Library, 2001, p.97.

  • Journal

    Solic, K., Ocevcic, H. and Golub, M.

    The information systems' security level assessment model based on an ontology and evidential reasoning approach

    2015 - Computers & Security

    In-text: (Solic, Ocevcic and Golub, 2015)

    Your Bibliography: Solic, K., Ocevcic, H. and Golub, M. (2015). The information systems' security level assessment model based on an ontology and evidential reasoning approach. Computers & Security, 55, pp.100-112.

  • Website

    IBM

    Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview

    2017 - IBM Security

    In-text: (IBM, 2017)

    Your Bibliography: IBM (2017). Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. [online] Www-01.ibm.com. Available at: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN& [Accessed 7 Feb. 2018].

  • Journal

    Wilcox, S. and Brown, B.

    2004 - J Health Care Compliance,

    In-text: (Wilcox and Brown, 2004)

    Your Bibliography: Wilcox, S. and Brown, B. (2004). J Health Care Compliance,, 6(4), pp.43-46.

  • Journal

    Iijima, T. and Curtis, J.

    Need to justify IT security? Measure your risk!

    2004 - Journal of Corporate Accounting & Finance

    In-text: (Iijima and Curtis, 2004)

    Your Bibliography: Iijima, T. and Curtis, J. (2004). Need to justify IT security? Measure your risk!. Journal of Corporate Accounting & Finance, 15(5), pp.47-51.

  • Journal

    Ross, R.

    Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs

    2007 - EDPACS

    In-text: (Ross, 2007)

    Your Bibliography: Ross, R. (2007). Managing Enterprise Risk in Today's World of Sophisticated Threats: A Framework for Developing Broad-Based, Cost-Effective Information Security Programs. EDPACS, 35(2), pp.1-10.

  • Journal

    Ionita, D.

    Current established Risk Assessment methodologies and tools

    2013 - MSc Thesis

    In-text: (Ionita, 2013)

    Your Bibliography: Ionita, D. (2013). Current established Risk Assessment methodologies and tools. MSc Thesis.

  • Journal

    Apgar, D.

    Measure your risk IQ: What you don't know can hurt you. Risk intelligence helps prioritize information-security projects

    2006

    In-text: (Apgar, 2006)

    Your Bibliography: Apgar, D. (2006). Measure your risk IQ: What you don't know can hurt you. Risk intelligence helps prioritize information-security projects. 5(10), pp.32-38.

  • Website

    Performing a Security Risk Assessment

    2010 - ISACA

    In-text: (Isaca.org, 2010)

    Your Bibliography: Isaca.org. (2010). Performing a Security Risk Assessment. [online] Available at: https://www.isaca.org/Journal/archives/2010/Volume-1/Pages/Performing-a-Security-Risk-Assessment1.aspx [Accessed 9 Feb. 2018].

  • Journal

    Munteanu, A.

    Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma

    2006 - ResearchGate

    In-text: (Munteanu, 2006)

    Your Bibliography: Munteanu, A. (2006). Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma. ResearchGate.

  • Journal

    Schimittling, R.

    Performing a Security Risk Assessment

    2010 - ISACA Journal

    In-text: (Schimittling, 2010)

    Your Bibliography: Schimittling, R. (2010). Performing a Security Risk Assessment. ISACA Journal, 1.

  • Journal

    Rot, A.

    IT Risk Assessment: Quantitative and Qualitative Approach

    2008 - WCECS

    In-text: (Rot, 2008)

    Your Bibliography: Rot, A. (2008). IT Risk Assessment: Quantitative and Qualitative Approach. WCECS.

  • Journal

    Ramona, S. E.

    Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

    2011 - Chinese Business Review

    In-text: (Ramona, 2011)

    Your Bibliography: Ramona, S. (2011). Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches. Chinese Business Review, 10(12).

  • Journal

    Rainer, Jr, R. K., Snyder, C. A. and Carr, H. H.

    Risk Analysis for Information Technology.

    2001

    In-text: (Rainer, Jr, Snyder and Carr, 2001)

    Your Bibliography: Rainer, Jr, R., Snyder, C. and Carr, H. (2001). Risk Analysis for Information Technology.

  • Journal

    NIST

    Managing Information Security Risk Organization, Mission, and Information System View

    2011 - I N F O R M A T I O N S E C U R I T Y

    In-text: (NIST, 2011)

    Your Bibliography: NIST (2011). Managing Information Security Risk Organization, Mission, and Information System View. I N F O R M A T I O N S E C U R I T Y, 800(39).

  • Journal

    Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M.

    Taxonomy of information security risk assessment (ISRA)

    2016 - Computers & Security

    In-text: (Shameli-Sendi, Aghababaei-Barzegar and Cheriet, 2016)

    Your Bibliography: Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, pp.14-30.

  • Journal

    Calder, A. and Watkins, S.

    IT governance: a manager's guide to data security and Iso 27001/ISO 27002

    2008

    In-text: (Calder and Watkins, 2008)

    Your Bibliography: Calder, A. and Watkins, S. (2008). IT governance: a manager's guide to data security and Iso 27001/ISO 27002. 4th Edition.

  • Book

    Landoll, D. J.

    The Security Risk Assessment Handbook

    2011 - CRC Press - Boca Raton

    In-text: (Landoll, 2011)

    Your Bibliography: Landoll, D. (2011). The Security Risk Assessment Handbook. Boca Raton: CRC Press.

  • Book

    Miller, L. C. and Gregory, P. H.

    CISSP For Dummies, 5th Edition

    2016 - John Wiley & Sons

    In-text: (Miller and Gregory, 2016)

    Your Bibliography: Miller, L. and Gregory, P. (2016). CISSP For Dummies, 5th Edition. 5th ed. John Wiley & Sons.

  • Journal

    Saleh, Z. I., Refai, H. and Mashhour, A.

    Proposed Framework for Security Risk Assessment

    2011 - Journal of Information Security

    In-text: (Saleh, Refai and Mashhour, 2011)

    Your Bibliography: Saleh, Z., Refai, H. and Mashhour, A. (2011). Proposed Framework for Security Risk Assessment. Journal of Information Security, 02(02), pp.85-90.

  • Journal

    Jones, A.

    A framework for the management of information security risks

    2007 - BT Technology Journal

    In-text: (Jones, 2007)

    Your Bibliography: Jones, A. (2007). A framework for the management of information security risks. BT Technology Journal, 25(1), pp.30-36.

  • Journal

    Huang, D., Rau, P. P. and Salvendy, G.

    Perception of information security

    2010 - Behaviour & Information Technology

    In-text: (Huang, Rau and Salvendy, 2010)

    Your Bibliography: Huang, D., Rau, P. and Salvendy, G. (2010). Perception of information security. Behaviour & Information Technology, 29(3), pp.221-232.

  • Book

    Harris, S.

    CISSP boxed set

    2010 - McGraw-Hill Osborne Media - New York

    In-text: (Harris, 2010)

    Your Bibliography: Harris, S. (2010). CISSP boxed set. 5th ed. New York: McGraw-Hill Osborne Media.

  • Journal

    Elkatawneh, H. H.

    Comparing Qualitative and Quantitative Approaches

    2016 - SSRN Electronic Journal

    In-text: (Elkatawneh, 2016)

    Your Bibliography: Elkatawneh, H. (2016). Comparing Qualitative and Quantitative Approaches. SSRN Electronic Journal.

  • Journal

    Southern, S.

    Creating risk management strategies for IT security

    2009 - Network Security

    In-text: (Southern, 2009)

    Your Bibliography: Southern, S. (2009). Creating risk management strategies for IT security. Network Security, 2009(3), pp.13-16.

  • Journal

    Stoneburner, G., Goguen, A. and Feringa, A.

    Risk Management Guide for Information Technology Systems

    2002 - Recommendations of the National Institute of Standards and Technology

    In-text: (Stoneburner, Goguen and Feringa, 2002)

    Your Bibliography: Stoneburner, G., Goguen, A. and Feringa, A. (2002). Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology, 800(30).

  • Journal

    Michael, K.

    Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

    2012 - Computers & Security

    In-text: (Michael, 2012)

    Your Bibliography: Michael, K. (2012). Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Computers & Security, 31(2), pp.249-250.

  • Journal

    Shameli-Sendi, A. and Dagenais, M.

    ARITO: Cyber-attack response system using accurate risk impact tolerance

    2013 - International Journal of Information Security

    In-text: (Shameli-Sendi and Dagenais, 2013)

    Your Bibliography: Shameli-Sendi, A. and Dagenais, M. (2013). ARITO: Cyber-attack response system using accurate risk impact tolerance. International Journal of Information Security, 13(4), pp.367-390.

  • Journal

    Sawilla, R. E. and Ou, X.

    Identifying Critical attack assets in dependency attack graphs

    2008 - 13th european symposium on research in computer security (ESORICS).

    In-text: (Sawilla and Ou, 2008)

    Your Bibliography: Sawilla, R. and Ou, X. (2008). Identifying Critical attack assets in dependency attack graphs. 13th european symposium on research in computer security (ESORICS)., pp.18-34.

  • Journal

    Hulitt, E. and Vaughn, R. B.

    Information system security compliance to FISMA standard: a quantitative measure

    2009 - Telecommunication Systems

    In-text: (Hulitt and Vaughn, 2009)

    Your Bibliography: Hulitt, E. and Vaughn, R. (2009). Information system security compliance to FISMA standard: a quantitative measure. Telecommunication Systems, 45(2-3), pp.139-152.

  • Journal

    Lo, C. and Chen, W.

    A hybrid information security risk assessment procedure considering interdependences between controls

    2012 - Expert Systems with Applications

    In-text: (Lo and Chen, 2012)

    Your Bibliography: Lo, C. and Chen, W. (2012). A hybrid information security risk assessment procedure considering interdependences between controls. Expert Systems with Applications, 39(1), pp.247-257.

  • Journal

    Farahmand, F., Navathe, S. B., Sharp, G. P. and Enslow, P. H.

    A Management Perspective on Risk of Security Threats to Information Systems

    2005 - Information Technology and Management

    In-text: (Farahmand et al., 2005)

    Your Bibliography: Farahmand, F., Navathe, S., Sharp, G. and Enslow, P. (2005). A Management Perspective on Risk of Security Threats to Information Systems. Information Technology and Management, 6(2-3), pp.203-225.

  • Journal

    Asosheh, A., Dehmoubed, B. and Khani, A.

    A new quantitative approach for information security risk assessment

    2009 - Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on

    In-text: (Asosheh, Dehmoubed and Khani, 2009)

    Your Bibliography: Asosheh, A., Dehmoubed, B. and Khani, A. (2009). A new quantitative approach for information security risk assessment. Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on.

  • Journal

    Reilly, R. F. and SCHWEIHS, R. P.

    Valuing Intangible Assets

    1999 - McGraw-Hill

    In-text: (Reilly and SCHWEIHS, 1999)

    Your Bibliography: Reilly, R. and SCHWEIHS, R. (1999). Valuing Intangible Assets. McGraw-Hill.

  • Journal

    Orchiston, N.

    Qualitative vs Quantitative information security risk assessment methodologies

    2011 - ITgovernance

    In-text: (Orchiston, 2011)

    Your Bibliography: Orchiston, N. (2011). Qualitative vs Quantitative information security risk assessment methodologies. ITgovernance.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join