Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM - Bridge of Knowledge

Search

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

Filters

total: 6
filtered: 3

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

  • Aiming at methods’ wider adoption: Applicability determinants and metrics

    Publication

    Numerous computer science methods and techniques have been proposed by the scientific community. However, depending on the domain, only their minor fraction has met wider adoption. This paper brings attention to the concept of applicability - the notion that is well acknowledged in the scientific field but have not been analysed with respect to determinants, metrics and systematisation. The primary objective of the study was to...

    Full text available to download

  • Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis

    Publication

    - Year 2020

    Contemporary approaches to the estimation of cybersecurity costs in organisations tend to focus on the cost of incidents or technological investments. However, there are other, less transparent costs related to cybersecurity management that need to be properly recognised in order to get a complete picture. These costs are associated with everyday activities and the time spent by employees on cybersecurity-related actions. Such...

    Full text available to download

  • Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study

    Publication

    - Year 2020

    The methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...

    Full text available to download