2011
DOI: 10.1108/09685221111143033
|View full text |Cite
|
Sign up to set email alerts
|

Security mistakes in information system deployment projects

Abstract: Purpose -This paper aims to assess the influence of a set of human and organizational factors in information system deployments on the probability that a number of security-related mistakes are in the deployment. Design/methodology/approach -A Bayesian network (BN) is created and analyzed over the relationship between mistakes and causes. The BN is created by eliciting qualitative and quantitative data from experts of industrial control system deployments in the critical infrastructure domain. Findings -The da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…An overview is given in Table I. Data described in [52] and [53] combined with four domain experts' judgment [51].…”
Section: Discussionmentioning
confidence: 99%
“…An overview is given in Table I. Data described in [52] and [53] combined with four domain experts' judgment [51].…”
Section: Discussionmentioning
confidence: 99%
“…In this scenario, MCDM techniques provide the ranking of different alternatives and the best alternatives be always recommended as the best solution to the decision makers (Wang et al, 2009). As many problems involves the uncertainties so we find the probabilities value/weightage of all the different alternatives of the element (Sommestad et al, 2011;Zhu et al, 2016). Prioritization of risk involves the multiple conflicting criteria with finite set of alternatives (Wang et al, 2009).…”
Section: Methodsmentioning
confidence: 99%
“…It helps in protecting information and communications through the use of codes and technical coding. The crypt is confidential information where the message can only be decrypted and read by the person for whom the message is strictly intended without falling into other people's hands (Sommestad et al, 2010). Even if the above knowledge reaches the hands of others, they will never be able to perceive and comprehend it in context.…”
Section: Practical Application Of Security Sciencementioning
confidence: 99%