International Journal of Computer Applications
In this paper, the authors equate a choice of methods that allow an organization to weigh their information security risk. The initial models went through two selection iterations before they end up with the final three Risks assessment models. This paper is to compare and clarify the different activities, inputs and outputs required by each information security risk assessment models and also analyze which ones address information security risk effectively. The resulting information helps evaluating the models' applicability to an organization and their specific needs.