Showing 1 - 3 of 3
Research to date shows significant variability in the success of applying the common technique of use case diagramming for identifying information system scope in terms of use cases performed by actors interacting with an information system or performed automatically by the information system....
Persistent link: https://www.econbiz.de/10012046051
This article presents six ways to use work system concepts for describing, analyzing, or evaluating IS security at the system rather than enterprise level. As a whole, this theory-based view delves into topics that typical technology or process-focused cybersecurity approaches may overlook. This...
Persistent link: https://www.econbiz.de/10012048015
Persistent link: https://www.econbiz.de/10001828240