|
|
|
Bilgin Metin, Sefa Duran, Eda Telli, Meltem Mutlutürk and Martin Wynn
In today?s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment?based on information relating to business requirements, human elements, and th...
ver más
|
|
|
|
|
|
Maricruz Fun Sang Cepeda, Marcos de Souza Freitas Machado, Fabrício Hudson Sousa Barbosa, Douglas Santana Souza Moreira, Maria José Legaz Almansa, Marcelo Igor Lourenço de Souza and Jean-David Caprace
Operators of offshore production units (OPUs) employ risk-based assessment (RBA) techniques in order to minimise inspection expenses while maintaining risks at an acceptable level. However, when human divers and workers are involved in inspections conduc...
ver más
|
|
|
|
|
|
Franz W Gatzweiler, Saroj Jayasinghe, José G Siri and Jason Corburn
The intensity and range of health challenges that people in cities are facing has increased in recent years. This is due in part to a failure to adequately adapt and respond to emergent and expanding global systemic risks, but also to a still-limited und...
ver más
|
|
|
|
|
|
Pavlos Cheimonidis and Konstantinos Rantos
Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments where th...
ver más
|
|
|
|
|
|
Emily Kate Parsons, Emmanouil Panaousis, George Loukas and Georgia Sakellari
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance of s...
ver más
|
|
|