Explore chapters and articles related to this topic
Vulnerability Analysis for Cyber-Physical Systems
Published in Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq, Cybersecurity and Privacy in Cyber-Physical Systems, 2019
D. Sumathi, M. Roopa Chandrika
Risk management framework suggested by the National Institute of Standards and Technology (NIST) is to continuously monitor the components to identify possible threats and their impact. It also suggests that new information has to be gathered to gain knowledge of the attack trends. Exposure analysis (Hahn & Govindarasu, 2011) is recomputation of the risk management procedures involving security. If a security mechanism is under risk it will propagate into a privileged set, thus extracting the object under concern. The analysis will determine the increase in exposure of new units in different layers. The exposed units are reviewed for further levels of security.
Probing the Past to Guide the Future IT Regulation Research: Topic Modeling and Co-word Analysis of SOX-IS Research
Published in Information Systems Management, 2022
George Mangalaraj, Anil Singh, Aakash Taneja
Larsen and Levine (2005) used co-word analysis to find patterns in IS research. Likewise, Corrales-Garay et al. (2019) used co-word analysis to identify the conceptual structure of research in the open data domain. We follow the same approach and use keywords to analyze their co-occurrence. Keywords provide the authors’ own classification of the research and are the most meaningful indicators of an article’s content (Kevork & Vrechopoulos, 2009). As various articles frequently use variants of the same keyword, we replaced variants with standard words for consistency. For example, we replaced “risk assessment” and “risk management in business” with “risk management.” Similarly, we replaced keywords such as “information technology management,” “IT management,” “IS management,” and “information management” with “IT management.” Numeric code prefixes such as “4300: law” were replaced with “law.” We also eliminated country keywords as they were not related to our study. In line with Yu et al. (2020), we used keywords that occurred in at least five articles for performing the co-word analysis using the VOSviewer software.2
From data to big data in production research: the past and future trends
Published in International Journal of Production Research, 2019
Data envelopment analysis (DEA), aiming at the measurement of product efficiency with empirical data, appears to be one of the most widely researched topics. As observed in Table 2, 7 out of these 19 papers were relevant to DEA. The paper by Wu and Olson (2010) has been most highly cited among these 19 papers. The authors proposed the concept of value-at-risk (VaR) in vendor selection. Their approach aimed at addressing the enterprise risk management. For further discussion on the paper, the reader is referred to Wei and Wang (2011) and a response from the authors (Wu and Olson 2011). In their earlier paper, Wu and Olson (2008) had studied a vendor selection problem where the estimated measures were not precise. Sevkli et al. (2007) applied an envelopment analytic hierarchy process methodology to improve decisions in supplier selection. Wang, Chin, and Leung (2009) addressed some issues of the DEA methodology proposed by Sevkli et al. (2007). Wu and Blackhurst (2009) proposed an augmented DEA for evaluating and ranking suppliers. Kuo and Lin (2012) developed an analysis network process and an envelopment analysis approach to select suppliers, with the consideration of environmental factors. Other papers that adopt DEA for vendor or supplier selection include Talluri, Narasimhan, and Viswanathan (2007), Dotoli and Falagario (2012), Zhang, Lee, and Chen (2012) and Parthiban, Zubar, and Katakar (2013). The number of the papers published and the citations of the papers on vendor or supplier selection using DEA suggest that the data use in this type of research was rather wide.
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
Information Security Management and Culture: Companies should follow different Enterprise Risks Management framework such as control objectives for information and related technology (COBIT) for guiding on controlling information technology. In 2004, COSO issued the enterprise risk management integrated framework to expand on internal control and provide a perspective on enterprise-wide risk management (Enterprise Risk Management – Integrated Framework Executive Summary 2004).