2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT) 2018
DOI: 10.1109/icaict.2018.8747045
|View full text |Cite
|
Sign up to set email alerts
|

A Software System for Risk Management of Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…It enables developers to identify, evaluate, and neutralize information and other automated systems risks. In addition, the developed system has several other advantages, such as the ability to identify risks at an early stage of development, the convenient interface, and timesaving [29]. However, the addition of tools in the software development process can increase the workload of developers, considering that agencies that are only used half-heartedly will create invalid output results.…”
Section: What Is the Results Of The Research?mentioning
confidence: 99%
See 1 more Smart Citation
“…It enables developers to identify, evaluate, and neutralize information and other automated systems risks. In addition, the developed system has several other advantages, such as the ability to identify risks at an early stage of development, the convenient interface, and timesaving [29]. However, the addition of tools in the software development process can increase the workload of developers, considering that agencies that are only used half-heartedly will create invalid output results.…”
Section: What Is the Results Of The Research?mentioning
confidence: 99%
“…A framework for risk management in Scrum development process elsevier.com 11 [21] Project planning and risk management as a success factor for IT projects in agricultural schools in Serbia elsevier.com 12 [22] A risk prediction model for software project management based on similarity analysis of context histories elsevier.com 13 [23] Expert's opinions on software project effective risk management ieeexplore.ieee.org 14 [24] Experimental evaluation of a novel ISO 14971 risk management software for medical devices ieeexplore.ieee.org 15 [25] Corporate risk estimation by combining machine learning technique and risk measure ieeexplore.ieee.org 16 [26] Quantitative planning and risk management of Agile Software Development ieeexplore.ieee.org 17 [27] Decision support system for risk assessment and management strategies in distributed software development ieeexplore.ieee.org 18 [28] A critical analysis of software risk management techniques in large scale systems ieeexplore.ieee.org 18 [29] A Software System for Risk Management of Information Systems* ieeexplore.ieee.org 20 [30] Agile Software Risk Management Architecture for IoT-Fog based systems ieeexplore.ieee.org 21 [31] Exploring Experiential Learning Model and Risk Management Process for an Undergraduate Software Architecture Course ieeexplore.ieee.org 22 [32] Modeling information security threats for smart grid applications by using software engineering and risk management ieeexplore.ieee.org 23 [33] Intelligent Software Platform and End-Point Software for Risk Management ieeexplore.ieee.org 24 [34] Risk Management in Agile Software Development: A Survey ieeexplore.ieee.org 25 [35] Agile risk management for multicloud software development ieeexplore.ieee.org 26 [36] Risk A grouping of articles by database source can be seen in Figure 1.…”
Section: Limit Search Years (2016 -2021)mentioning
confidence: 99%
“…In the article [49] algorithms were used to assess risks in a system, in the article [32] the probability of security incidents and the losses caused by security incidents allow us to find the value of the risks, in the article [39] algorithms were used to produce a risk treatment plan, selecting measures to reduce; to hold back; to avoid or transfer risks, in the article [11]. A risk management review and control model were used for information security.…”
Section: Discussionmentioning
confidence: 99%
“…They propose a risk assessment method to assess quantitative risk, using fuzzy rules to assess vulnerabilities and uncertainty [48]. They propose a software system with a web application format, to identify, evaluate and neutralize the risks of information and other systems from anywhere [49]. The CORAS method allows the evaluation of security risks for hierarchical processes that can be considered as the basis for the analysis in this investigation [50].…”
Section: Related Jobsmentioning
confidence: 99%
See 1 more Smart Citation