Asset Valuation Method for Dependent Entities
Asset analysis and valuation are important parts of the information security risk management. Outputs they produce are used in the process of risk analysis that plays a key role in securing organi-zation's business processes. A correct analysis and valuation of assets should reveal not only the...
Saved in:
Main Author: | Breier, Jakub |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/83343 http://hdl.handle.net/10220/42540 http://isyou.info/jisis/vol4/no3/5.htm |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records
by: Breier, Jakub, et al.
Published: (2016) -
Portfolio value-at-risk optimization for asymmetrically distributed asset returns
by: Goh, J.W., et al.
Published: (2013) -
Portfolio value-at-risk optimization for asymmetrically distributed asset returns
by: GOH, Joel Weiqiang, et al.
Published: (2012) -
Valuation of Benchmark Provisions on IT Services Contracts
by: KAUFFMAN, Robert J., et al.
Published: (2012) -
Profit-Maximizing Firm Investments in Customer Information Security
by: LEE, Yong Yick, et al.
Published: (2011)