Shedden, Piya; Smith, Wally; Scheepers, Rens; Ahmad, Atif - 2009
Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information for a given organisation. We argue that the traditional orientation of these methodologies, towards the identification and assessment of technical information...