2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) 2020
DOI: 10.1109/roedunet51892.2020.9324879
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Risk Evaluation Frameworks and Risk Assessment Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…Third parties constitute potential weaknesses that must be managed by the e-business, especially if the functionality of the e-business relies tremendously on the third-party. Third-party management includes monitoring, understanding, and remediating risks which could be challenging, especially if hundreds of providers, partners, and suppliers are involved (Radu et al, 2020).…”
Section: Third-party Risk Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Third parties constitute potential weaknesses that must be managed by the e-business, especially if the functionality of the e-business relies tremendously on the third-party. Third-party management includes monitoring, understanding, and remediating risks which could be challenging, especially if hundreds of providers, partners, and suppliers are involved (Radu et al, 2020).…”
Section: Third-party Risk Managementmentioning
confidence: 99%
“…Finally, third-party risk management protects the entire supply chain which includes the external contributors who are essential for the functionality of the e-business, e.g., partners, suppliers, and distributors. Third-party risk management ensures continuous flow of operations, allows maintenance of a healthy inventory, and eliminates the cost of disruption (Radu et al, 2020). Yet, although solutions such as Up Guard Vendor Risk exist, third-party risk management is challenging especially if hundreds of partners, suppliers, and distributors are involved (West & Zentner, 2019).…”
Section: Impact Of Information Security On E-businessmentioning
confidence: 99%
“…Vulnerability assessment is performing a technique to find the security defects and it can be done by manual or automatic search techniques. Vulnerability assessments can target multiple technology layers such as internet layers [5]. The problem started since the emergence of the way of communication though the web application.…”
Section: Introductionmentioning
confidence: 99%