Wyniki wyszukiwania dla: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

Filtry

wszystkich: 6
wybranych: 3

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

  • Aiming at methods’ wider adoption: Applicability determinants and metrics

    Publikacja

    Numerous computer science methods and techniques have been proposed by the scientific community. However, depending on the domain, only their minor fraction has met wider adoption. This paper brings attention to the concept of applicability - the notion that is well acknowledged in the scientific field but have not been analysed with respect to determinants, metrics and systematisation. The primary objective of the study was to...

    Pełny tekst do pobrania w portalu

  • Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis

    Publikacja

    - Rok 2020

    Contemporary approaches to the estimation of cybersecurity costs in organisations tend to focus on the cost of incidents or technological investments. However, there are other, less transparent costs related to cybersecurity management that need to be properly recognised in order to get a complete picture. These costs are associated with everyday activities and the time spent by employees on cybersecurity-related actions. Such...

    Pełny tekst do pobrania w portalu

  • Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study

    Publikacja

    - Rok 2020

    The methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...

    Pełny tekst do pobrania w portalu