Open Access
MATEC Web Conf.
Volume 76, 2016
20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016)
Article Number 04010
Number of page(s) 6
Section Computers
Published online 21 October 2016
  1. M. Bielski, Podstawy teorii organizacji i zarządzania (C.H. Beck, 2002) [Google Scholar]
  2. A. Białas, Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie (WNT, 2007) [Google Scholar]
  3. K. Jajuga, Zarządzanie ryzykiem (PWN, 2009) [Google Scholar]
  4. A. Korczowski, Zarządzanie ryzykiem w projektach informatycznych. Teoria i praktyka (Helion, 2013) [Google Scholar]
  5. P. Matkowski, Zarządzanie ryzykiem operacyjnym (Wolters Kluwer Polska, 2006) [Google Scholar]
  6. J. Monkiewicz, L. Gąsiorkiewicz, Zarządzanie ryzykiem działalności organizacji (Uczelnie Techniczne, 2010) [Google Scholar]
  7. O. Patrick, ISO 31000:2009 Risk managementPrinciples and guidelines [Google Scholar]
  8. J. Stanik, M. Kiedrowicz, Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity, Information Management in Practice, 231–251 (2015) [Google Scholar]
  9. PN ISO/IEC 27001 Information security management. Requirements [Google Scholar]
  10. PN ISO/IEC 27005 Information technology. Security techniques. Information security risk management [Google Scholar]
  11. PN-ISO 31000 Zarządzanie ryzykiemPrinciples and guidelines [Google Scholar]
  12. PKN–ISO GUIDE 73 Risk management – Vocabulary [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.