An Information Security Ontology Incorporating Human-Behavioral Implications (2009)

by S. E. Parkin , A. van Moorsel
Citations:5 - 4 self

Documents Related by Co-Citation

26 The Compliance Budget: Managing Security Behaviour in Organisations – Adam Beautement, M. Angela Sasse, Mike Wonham - 2006
5 Factors Working Group, “Human Vulnerabilities in Security Systems: White Paper”, Cyber Security Knowledge Transfer Network (KTN – KTN Human - 2007
5 Introduction to the Business Model for Information Security – “An ISACA - 2009
7 Moorsel, “Trust Economics Feasibility Study – R Coles, J Griffin, H Johnson, B Monahan, S E Parkin, D Pym, M A Sasse, A van
7 A Knowledge Base for Justified Information Security Decision-Making – D. Stepanova, S. E. Parkin, A. van Moorsel - 2009
16 Semantics for Structured Systems Modelling and Simulation – Matthew Collinson, Brian Monahan, David Pym
6 Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard – Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl
4 Even Experts Deserve Usable Security: Design guidelines for security management systems – Sonia Chiasson
2 Moorsel, “Ontology Editing Tool for Information Security and Human Factors Experts – J Mace, S Parkin, A van
2 A Comprehensive Simulation Tool for the Analysis – R Shay, E Bertino
2 Vetting Wolf, “Seeing is believing: Designing visualizations for managing risk and compliance – R K E Bellamy, T Erickson, B Fuller, W A Kellogg, R Rosenbaum, J C Thomas, T
2 Development Company, L.P., “A brief introduction to structured modelling with Core Gnosis”, http://www.hpl.hp.com/research/systems_security/gnosis.ht ml, 2010, last viewed 13/02/10 – Hewlett Packard
2 v Oorschot, A. Somayaji, “Pass-thoughts: Authneticating with our Minds – J Thorpe, P C
2 Musipass: Authenticating me Softly with “My” Song – Marcia Gibson, Karen Renaud, Carsten Maple, Marc Conrad
2 Got what it takes to be a – R Condon - 2007
12 An Introduction to the Human Applications Standard Computer Interface, Part 1: Theory and Principles – Chris Rutkowski - 1982
7 A scalable signature scheme for video authentication – P ATREY, W YAN, M KANKANHALLI - 2007
7 Usability design and evaluation for privacy and security solutions – C KARAT, C BRODIE, J KARAT
4 Decision support for systems security investment. To appear – Y Beres, D Pym, S Shiu - 2010