Ontology in Information Security
Journal Title: Journal of Information and Organizational Sciences - Year 2015, Vol 39, Issue 2
Abstract
The past several years we have witnessed that information has become the most precious asset, while protection and security of information is becoming an ever greater challenge due to the large amount of knowledge necessary for organizations to successfully withstand external threats and attacks. This knowledge collected from the domain of information security can be formally described by security ontologies. A large number of researchers during the last decade have dealt with this issue, and in this paper we have tried to identify, analyze and systematize the relevant papers published in scientific journals indexed in selected scientific databases, in period from 2004 to 2014. This paper gives a review of literature in the field of information security ontology and identifies a total of 52 papers systematized in three groups: general security ontologies (12 papers), specific security ontologies (32 papers) and theoretical works (8 papers). The papers were of different quality and level of detail and varied from presentations of simple conceptual ideas to sophisticated frameworks based on ontology.
Authors and Affiliations
Krunoslav Arbanas, Mirko Čubrilo
An Overview of Graph-Based Keyword Extraction Methods and Approaches
The paper surveys methods and approaches for the task of keyword extraction. The systematic review of methods was gathered which resulted in a comprehensive review of existing approaches. Work related to keyword extracti...
The Use of Support Vector Machines When Designing a User-Defined Niche Search Engine
This study presents the construction of a niche search engine, whose search topic domain is to be user-defined. The specific focus of this study is the investigation of the role that a Support Vector Machine plays when c...
Technology Acceptance Model Based Study of Students’ Attitudes Toward Use of Enterprise Resource Planning Solutions
Enterprise Resource Planning (ERP) solutions are the most frequently used software tool in companies in all industries. Therefore, the labour market requires the knowledge and skills for usage of ERP solutions from gradu...
The Investigation of TLC Model Checker Properties
This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition...
Beyond Knowledge Integration Barriers in ERP Implementations: An Institutional Approach
The objective of the article is to go beyond the knowledge integration barriers in ERP implementations by analyzing structural, technological, intellectual and socioemotional barriers that appear during an ERP implementa...