This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Management of hidden risks
Jan. 2013 (vol. 46 no. 1)
pp. 65-70
K.J. Hole, Dept. of Inf., Univ. of Bergen, Bergen, Norway
The ability to recover quickly from large-impact, hard-to-predict, and rare incidents without incurring sizable permanent damage is vital to major stakeholders in ICT infrastructures of national importance.
Index Terms:
Mobile handsets,Adaptive systems,Base stations,Electronic voting,Information systems,Security,Privacy,Risk management,ICT infrastructures,security and privacy,adaptive systems,risk management
Citation:
K.J. Hole, "Management of hidden risks," Computer, vol. 46, no. 1, pp. 65-70, Jan. 2013, doi:10.1109/MC.2012.397
Usage of this product signifies your acceptance of the Terms of Use.