Constraint tree analysis : anticipating risk to policy implementation
Year of publication: |
2020
|
---|---|
Authors: | Falco, Gregory |
Published in: |
International journal of technology, policy and management : IJTPM. - Geneve : Inderscience Enterprises, ISSN 1468-4322, ZDB-ID 2104993-2. - Vol. 20.2020, 2, p. 132-152
|
Subject: | cybersecurity | technology policy | security policy | policy implementation | risk management | critical infrastructure | Risikomanagement | Risk management | Technologiepolitik | Technology policy | Datensicherheit | Data security | Risiko | Risk |
-
Cybersecurity : risks and management of risks for global banks and financial institutions
Camillo, Mark, (2017)
-
Assessing cybersecurity risks and practices in the broker-dealer industry
Trottman-Adewumi, Yolanda, (2017)
-
Factors of risk analysis for IoT systems
Andrade, Roberto, (2022)
- More ...
-
Undercover infrastructure: Dual-use arctic satellite ground stations
Falco, Gregory, (2024)
-
Constraint Tree Analysis : A Method to Evaluate Threats to Technology Policy Goals
Falco, Gregory, (2020)
-
Undercover infrastructure : dual-use arctic satellite ground stations
Falco, Gregory, (2024)
- More ...