Matches in SemOpenAlex for { <https://semopenalex.org/work/W2813442283> ?p ?o ?g. }
Showing items 1 to 57 of
57
with 100 items per page.
- W2813442283 abstract "This thesis addresses the individuation of the appropriate scientific tools in order to create a methodology and a set of models for establishing the suitable metrics and pertinent analytical capacity in the dimension for social applications. The current state of the art of security is exemplified by some specific characteristics (IEEEOrange Book s, 1995). Firstly there is a lack of reference models and appropriate metrics for the security measures of a architecture even including the PSN (Public Services Network). Secondly, the shortage of an accounting policy generates strong limitations for an accurate mapping of security. Thirdly, the lack of a methodology for risk management does not allow going beyond the application of empirical processes and rules of thumb. Finally, the lacuna in identifying the principles for making judgments of competitive advantage does not create the conditions for ascertaining the accountability of cyber At the moment the previous characteristics are negating any possibility of a build-up policy for monitoring, managing and mapping the risks. The thesis, starting with the four mentioned characteristics, focuses on a description of the phenomenon with the methodology of inquiry based on empirical and measurable evidence subject to specific principles of reasoning (www.diffen.com) That represents a complete novelty in creating a normative theory that would be a body of knowledge for providing goals, norms and standards. The theory would be associated with particular explanatory models that represent a new scientific approach. For this purpose, the thesis sets up brand-new models called AIMS (Abbo Information Models for Security) where the point of attack is the current management based on the perception of security that is considered a function of the interaction of its components: Asset (A), Protector (P) and Threat (T) in a given Situation (Manunta G., 2000). A further element of novelty is the introduction of another model called the B.I.F. (Business Information Flow) model. The B.l.F. is a holistic unitary entity focusing on a specific aim or unitary mission. The quantity of information is normally encapsulated in business information flows that we can define as the unit of information value. The value may be expressed in accordance with the accounting rule, which means the release of the information balance sheet and the information income statement. The B.l.F. represents the unit of any question of the manageable simple parts related to the Cartesian method. This sense of unity combines the social or organizational component and the related infrastructure of architectures. The work represents a clear distinction from any existing in the literature reviews. From this perspective, the impact of the research results will be a great opportunity, based on scientific rigor, for security communities in allowing them to be able to understand, map, manage and monitor the risk. (Abbo, 2012)" @default.
- W2813442283 created "2018-07-19" @default.
- W2813442283 creator A5005300107 @default.
- W2813442283 date "2019-01-01" @default.
- W2813442283 modified "2023-09-27" @default.
- W2813442283 title "THE ANALYSIS OF CYBER SECURITY THE EXTENDED CARTESIAN METHOD APPROACH WITH INNOVATIVE STUDY MODELS" @default.
- W2813442283 hasPublicationYear "2019" @default.
- W2813442283 type Work @default.
- W2813442283 sameAs 2813442283 @default.
- W2813442283 citedByCount "0" @default.
- W2813442283 crossrefType "book" @default.
- W2813442283 hasAuthorship W2813442283A5005300107 @default.
- W2813442283 hasConcept C112930515 @default.
- W2813442283 hasConcept C127413603 @default.
- W2813442283 hasConcept C177264268 @default.
- W2813442283 hasConcept C199360897 @default.
- W2813442283 hasConcept C2522767166 @default.
- W2813442283 hasConcept C41008148 @default.
- W2813442283 hasConcept C539667460 @default.
- W2813442283 hasConcept C56739046 @default.
- W2813442283 hasConcept C71924100 @default.
- W2813442283 hasConceptScore W2813442283C112930515 @default.
- W2813442283 hasConceptScore W2813442283C127413603 @default.
- W2813442283 hasConceptScore W2813442283C177264268 @default.
- W2813442283 hasConceptScore W2813442283C199360897 @default.
- W2813442283 hasConceptScore W2813442283C2522767166 @default.
- W2813442283 hasConceptScore W2813442283C41008148 @default.
- W2813442283 hasConceptScore W2813442283C539667460 @default.
- W2813442283 hasConceptScore W2813442283C56739046 @default.
- W2813442283 hasConceptScore W2813442283C71924100 @default.
- W2813442283 hasLocation W28134422831 @default.
- W2813442283 hasOpenAccess W2813442283 @default.
- W2813442283 hasPrimaryLocation W28134422831 @default.
- W2813442283 hasRelatedWork W1514937937 @default.
- W2813442283 hasRelatedWork W1585809085 @default.
- W2813442283 hasRelatedWork W1589964355 @default.
- W2813442283 hasRelatedWork W1601203870 @default.
- W2813442283 hasRelatedWork W1766773210 @default.
- W2813442283 hasRelatedWork W1885787873 @default.
- W2813442283 hasRelatedWork W191684867 @default.
- W2813442283 hasRelatedWork W2050308324 @default.
- W2813442283 hasRelatedWork W2067992008 @default.
- W2813442283 hasRelatedWork W2120021560 @default.
- W2813442283 hasRelatedWork W2153416064 @default.
- W2813442283 hasRelatedWork W2155418675 @default.
- W2813442283 hasRelatedWork W2163022780 @default.
- W2813442283 hasRelatedWork W2246583970 @default.
- W2813442283 hasRelatedWork W2410095208 @default.
- W2813442283 hasRelatedWork W2754929622 @default.
- W2813442283 hasRelatedWork W3023046132 @default.
- W2813442283 hasRelatedWork W3030077974 @default.
- W2813442283 hasRelatedWork W36805321 @default.
- W2813442283 hasRelatedWork W2146162971 @default.
- W2813442283 isParatext "false" @default.
- W2813442283 isRetracted "false" @default.
- W2813442283 magId "2813442283" @default.
- W2813442283 workType "book" @default.