[1]
|
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review
|
|
Mashhadi - Iraqi Journal of Science,
2024 |
|
|
[2]
|
Fortifying the global data fortress: a multidimensional examination of cyber security indexes and data protection measures across 193 nations
|
|
… Journal of Frontiers in Engineering Technology,
2024 |
|
|
[3]
|
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours
|
|
Information & Computer …,
2024 |
|
|
[4]
|
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
|
|
IEEE Access,
2024 |
|
|
[5]
|
A Review of Cybersecurity Incidents in the Food and Agriculture Sector
|
|
arXiv preprint arXiv …,
2024 |
|
|
[6]
|
Using Situational Crime Prevention (SCP) to Prevent Cybercrimes
|
|
2024 |
|
|
[7]
|
Cybersecurity Standards for AIoT Networks
|
|
Artificial Intelligence of Things …,
2024 |
|
|
[8]
|
Défis de sécurité et confidentialité dans la détection participative des catastrophes
|
|
2024 |
|
|
[9]
|
Analisis Resiko Keamanan Informasi Website Repository Digital Library Menggunakan Framework ISO/IEC 27001 & 27002: Studi Kasus Perguruan tinggi X
|
|
… Riset Multidisiplin dan …,
2024 |
|
|
[10]
|
ANALISIS MANAJEMEN RISIKO INFORMASI MENGGUNAKAN ISO/IEC 27005: 2018 (STUDI KASUS: PT. XYZ)
|
|
JIPI (Jurnal …,
2024 |
|
|
[11]
|
A vállalati biztonsági háló meghatározó tényezői
|
|
Scientia et Securitas,
2024 |
|
|
[12]
|
Mecanismos de segurança Blockchain integrados aos ecossistemas de IoT
|
|
2024 |
|
|
[13]
|
Políticas de seguridad en la infraestructura tecnológica de instituciones de salud mediante un appliance fortinet 80e: Estudio de caso Hospital Básico Jipijapa
|
|
Revista Científica de …,
2024 |
|
|
[14]
|
Communication and cybersecurity for autonomous passenger ferry
|
|
2023 |
|
|
[15]
|
IMPLEMENTASI MANAJEMEN KEAMANAN INFORMASI BERBASIS ISO 27001 PADA SISTEM INFORMASI AKADEMIK
|
|
Journal of Digital …,
2023 |
|
|
[16]
|
Cadrul sistemic de securitate a comunicațiilor electronice pentru instituțiile de învățământ superior din Republica Moldova
|
|
2023 |
|
|
[17]
|
Diseño e implementación de un sistema de gestión de seguridad de la información basado en la norma ISO/IEC 27002 para mejorar el nivel de seguridad informática …
|
|
2023 |
|
|
[18]
|
Formación de gestores de paz para el manejo de conflictos en la asignatura Cátedra de la Paz mediante secuencias didácticas diseñadas con la herramienta …
|
|
2023 |
|
|
[19]
|
Plataforma KnowBe4 para segurança da informação em uma instituição financeira: um estudo de caso
|
|
…,
2023 |
|
|
[20]
|
Obvladovanje kibernetskih tveganj zaposlenih v jugovzhodni Sloveniji: magistrska naloga
|
|
2023 |
|
|
[21]
|
Implementación de la norma ISO 27032 para mejorar la gestión de ciberseguridad en RMO Contratistas Generales SAC
|
|
2023 |
|
|
[22]
|
Implementación de un plan de acción para las buenas prácticas en la gestión de la seguridad de la información del departamento de TIC´ S de la UPSE
|
|
2023 |
|
|
[23]
|
Implementación de una data center del Centro de Monitoreo y Video Vigilancia de una Municipalidad
|
|
2023 |
|
|
[24]
|
EVALUASI PENGELOLAAN RISIKO KEAMANAN INFORMASI DENGAN METODE INDEKS KEAMANAN INFORMASI (INDEKS KAMI) VERSI 4.1 DI DISKOMINFO …
|
|
2023 |
|
|
[25]
|
Universitatea Tehnică a Moldovei
|
|
2023 |
|
|
[26]
|
GRAF VE KAREKOD YÖNTEMLERİYLE DÖNÜŞTÜRÜLMÜŞ LOG KAYITLARI ÜZERİNDE DERİN ÖĞRENME TABANLI SİBER SALDIRI TESPİTİ
|
|
2023 |
|
|
[27]
|
Análise do uso da plataforma KnowBe4 para conscientização da segurança da informação em uma instituição financeira: um estudo de caso
|
|
2023 - Araranguá,
2023 |
|
|
[28]
|
IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD EN LA INFRAESTRUCTURA TECNOLÓGICA DEL HOSPITAL BÁSICO JIPIJAPA MEDIANTE UN APPLIANCE …
|
|
2023 |
|
|
[29]
|
Hur ISO 27001 certifierade företag utvecklar sina anställdas Kunskap, Attityd och Beteende mot Informationssäkerhetsmedvetenhet
|
|
2023 |
|
|
[30]
|
Cyber Security and Security Frameworks for Cloud and IoT Architectures
|
|
2023 |
|
|
[31]
|
An exploratory study of different IT Security Auditing methods
|
|
2023 |
|
|
[32]
|
CyberTest4You: A three-way Model for Evaluating Compliance and General Maturity in IT Security
|
|
2023 |
|
|
[33]
|
Establish personal information risk management in university
|
|
System Innovation for a World in …,
2023 |
|
|
[34]
|
Information Security Governance in Distributed Systems Architecture
|
|
AIM 2023 Doctoral Consortium,
2023 |
|
|
[35]
|
THE EBL-5D MODEL: A NEW MODEL TO EXPLORE THE ETHICS OF BLENDED LEARNING
|
|
ICERI2023 Proceedings,
2023 |
|
|
[36]
|
Assessing Information Security Management Using ISO 27001: 2013
|
|
Jurnal Indonesia Sosial Teknologi,
2023 |
|
|
[37]
|
Human-AI: Using Threat Intelligence to Expose Deepfakes and the Exploitation of Psychology
|
|
2023 |
|
|
[38]
|
Classification of Vocal Intensity Category from Multi-sensor Recordings of Speech
|
|
2023 |
|
|
[39]
|
Enhancing Cyber Security in Organisations by Establishing Attributes Towards Achieving Cyber Resilience
|
|
2023 |
|
|
[40]
|
Influence of the legislation on the cybersecurity posture–The case of the NIS Directive
|
|
2023 |
|
|
[41]
|
Cyber vulnerabilities and IT risk management in the Dutch housing association sector.
|
|
2023 |
|
|
[42]
|
Perspective Trends of Standardization in the Field of Quality and Information Security of Contemporary Organizations
|
|
Anti-Crisis Approach to the …,
2023 |
|
|
[43]
|
Cybersecurity Compliance in the Public Sector: Are the Best Security Practices Properly Addressed?
|
|
International Conference on Human …,
2023 |
|
|
[44]
|
Enhancing the SETA program with Mindfulness and Self-Efficacy
|
|
CEUR Workshop Proceedings,
2023 |
|
|
[45]
|
The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability 2023, 15, 5828
|
|
2023 |
|
|
[46]
|
Auditing Customer Identity and Access Management
|
|
Modernizing Enterprise IT …,
2023 |
|
|
[47]
|
The Institutionalisation of Information Security Management Practices in selected Organisations in Uganda
|
|
International Journal of …,
2023 |
|
|
[48]
|
Augmenting Vehicular Ad Hoc Network Security and Efficiency with Blockchain: A Probabilistic Identification and Malicious Node Mitigation Strategy
|
|
Electronics,
2023 |
|
|
[49]
|
Enhancing financial system resilience against cyber threats via SWIFT customer security framework
|
|
Fayoumi… - … Conference on Information …,
2023 |
|
|
[50]
|
MASISCo—Methodological Approach for the Selection of Information Security Controls
|
|
Applied Sciences,
2023 |
|
|
[51]
|
Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security
|
|
Journal of Informatics and Web …,
2023 |
|
|
[52]
|
Security and Privacy Challenges of Participatory Sensing in Natural Disaster Management
|
|
2023 20th ACS/IEEE International Conference on …,
2023 |
|
|
[53]
|
Exploratory analysis of a measurement scale of an information security management system
|
|
arXiv preprint arXiv …,
2023 |
|
|
[54]
|
Data Driven Approaches to Cybersecurity Governance for Board Decision-Making--A Systematic Review
|
|
arXiv preprint arXiv:2311.17578,
2023 |
|
|
[55]
|
Cybersecurity at the Core: A Study on IT Experts' Policy Adherence
|
|
International Conference on Global …,
2023 |
|
|
[56]
|
A Brief Prelude to Accreditation and Conformity Assessment
|
|
Handbook of Quality …,
2023 |
|
|
[57]
|
Correspondence measure: a review for the digital twin standardization
|
|
The International Journal of Advanced …,
2023 |
|
|
[58]
|
Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
|
|
Sensors,
2023 |
|
|
[59]
|
Digital information security management policy in academic libraries: A systematic review (2010–2022)
|
|
Journal of Information …,
2023 |
|
|
[60]
|
The ISO/IEC 27001 Information security management standard: how to extract value from data in the IT sector
|
|
Sustainability,
2023 |
|
|
[61]
|
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
|
|
Information & Computer Security,
2023 |
|
|
[62]
|
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction
|
|
International Journal of Critical …,
2023 |
|
|
[63]
|
Getting smarter about smart cities: Improving data security and privacy through compliance
|
|
Sensors,
2022 |
|
|
[64]
|
ANALISIS DAN MANAJEMEN RISIKO KEAMANAN INFORMASI MENGGUNAKAN METODE FAILURE MODE AND EFFECTS ANALYSIS (FMEA) DAN KONTROL ISO/IEC 27001: 2013 (Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten Sambas)
|
|
Coding Jurnal Komputer dan Aplikasi,
2022 |
|
|
[65]
|
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
|
|
… on Research in …,
2022 |
|
|
[66]
|
Cybersecurity: Ethics, legal, risks, and policies
|
|
2022 |
|
|
[67]
|
A Conceptual Model to Assess the Maturity Of Information Security Audit Process
|
|
Practice of Enterprise Modelling …,
2022 |
|
|
[68]
|
Framework for Evaluation of Blockchain-AI Technology and Governance to Secure Interoperable US Healthcare Data
|
|
2022 |
|
|
[69]
|
An NLP approach to assess information security policies
|
|
2022 |
|
|
[70]
|
DESIGN OF A SECURITY TOOLBOX
|
|
2022 |
|
|
[71]
|
An analysis of information technology risks and governance disclosure: evidence from the top 40 JSE listed companies.
|
|
2022 |
|
|
[72]
|
Tribunal de graduación
|
|
2022 |
|
|
[73]
|
BYOD security issues: A systematic literature review
|
|
Gayar, C Noteboom… - … Security Journal: A …,
2022 |
|
|
[74]
|
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
|
|
IEEE Access,
2022 |
|
|
[75]
|
Intergenerational knowledge management in a cutting-edge Israeli industry: Visions and challenges
|
|
Plos one,
2022 |
|
|
[76]
|
Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova
|
|
Scientific and Practical Cyber Security Journal (SPCSJ),
2022 |
|
|
[77]
|
Initial Development of a Roadmap for Digital Engineering Simulations Curriculum
|
|
2022 IEEE …,
2022 |
|
|
[78]
|
The Holistic Approach to Cybersecurity in Academia
|
|
… and Eastern European eDem and eGov …,
2022 |
|
|
[79]
|
Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
|
|
Sustainability,
2022 |
|
|
[80]
|
Information security and privacy in hospitals: a literature mapping and review of research gaps
|
|
Informatics for Health and …,
2022 |
|
|
[81]
|
Digital production and supply supported by lifecycle management in industry 4.0
|
|
2022 |
|
|
[82]
|
Understanding Cybersecurity Standards
|
|
Cybersecurity in Morocco,
2022 |
|
|
[83]
|
Standard Analysis of Document Control as Information According to ISO 27001 2013 in PT XYZ
|
|
… Computing and Social …,
2022 |
|
|
[84]
|
Enhanced Organizational Security Awareness: A Qualitative Study
|
|
2022 |
|
|
[85]
|
SUCCESS FACTORS INFLUENCING CYBER SECURITY RISK MANAGEMENT IMPLEMENTATION: THE CASES OF LARGE NIGERIAN ORGANISATIONS
|
|
2022 |
|
|
[86]
|
Factors Influencing the Use of Conceptual Frameworks in The Field of IT Management
|
|
2022 |
|
|
[87]
|
Trustworthiness Models to Categorize and Prioritize Code for Security Improvement
|
|
SSRN Electronic Journal,
2022 |
|
|
[88]
|
Design and Implementation of Smart Glasses with ISMS and Risk Management Functionalities for a Technical Operator
|
|
Journal homepage: http …,
2022 |
|
|
[89]
|
Tietoturvatietoisuuden kehittäminen finanssialan organisaatiossa
|
|
2022 |
|
|
[90]
|
Model za unapređenje poslovanja i konkurentnosti preduzeća zasnovan na informacionim sistemima i donošenju odluka
|
|
Универзитет у Новом Саду,
2022 |
|
|
[91]
|
Towards standardization of audit procedures for the new version of ISO/IEC 27002
|
|
THESIS,
2022 |
|
|
[92]
|
PLAN DE CONTINGENCIA PARA ASEGURAR LA INTEGRIDAD DE LOS EQUIPOS Y SISTEMAS INFORMÁTICOS EN LA UNIVERSIDAD ESTATAL DEL SUR DE …
|
|
2022 |
|
|
[93]
|
Vishing: ett ökande hot: Hur Sveriges regioner bemöter vishing inom hälso-och sjukvården
|
|
2022 |
|
|
[94]
|
Characterization of Selected Security-related Standards in the Field of Security Requirements Engineering
|
|
Elektrotehniski Vestnik,
2022 |
|
|
[95]
|
Using Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
|
|
The 12th International Conference on Electronics, Communications and Computing,
2021 |
|
|
[96]
|
IT-säkerhetshotet phishing: Svenska små och medelstora företags utbildningsinsatser inom problemområdet
|
|
2021 |
|
|
[97]
|
Similarity and Dissimilarity between Information Security and Information Assurance
|
|
Information Technology Journal,
2021 |
|
|
[98]
|
ISO 27001-certifieringars påverkan på informationssäkerhets-medvetenhet i ett SMF: Förändringar till följd av en certifieringsprocess för ett företag inom IT-sektorn
|
|
2021 |
|
|
[99]
|
Yhdistetty tietoturvan varmennus standardien ISO/IEC 27006 ja ISAE 3000 mukaisesti
|
|
2021 |
|
|
[100]
|
Overlapping Concept to Action Between Information Assurance and Information Security
|
|
Information Technology Journal,
2021 |
|
|
[101]
|
Automatización de un sistema de gestión de seguridad de la información basado en la Norma ISO/IEC 27001
|
|
Revista Universidad y Sociedad,
2021 |
|
|
[102]
|
Application of Lean methodologies in Information Security processes improvement
|
|
2021 |
|
|
[103]
|
Data security requirements in third country transfers
|
|
2021 |
|
|
[104]
|
Maturity of information systems security in selected private Banks in Ethiopia
|
|
2021 International Conference on …,
2021 |
|
|
[105]
|
A study on the internal security of companies: Internal practices regarding risks in digitised working environments and employees relation to information security
|
|
2021 |
|
|
[106]
|
INFORMATION SECURITY AWARENESS AND ITS IMPACT ON THE CISO'S RESPONSIBILITIES-A STUDY OF THE PORTUGUESE ENVIRONMENT.
|
|
Journal of Information System Security,
2021 |
|
|
[107]
|
Raising Awareness on Secure Coding in the Industry through CyberSecurity Challenges.
|
|
2021 |
|
|
[108]
|
Implementing Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
|
|
Electronics, Communications and Computing,
2021 |
|
|
[109]
|
Integrated information risk management framework
|
|
2021 |
|
|
[110]
|
Maintaining Security in the Era of Microarchitectural Attacks
|
|
2021 |
|
|
[111]
|
(CSM2-RA-R2-TI): Cyber Security Maturity Model for Risk Assessment Using Risk Register for Threat Intelligence
|
|
Journal of Physics: Conference …,
2021 |
|
|
[112]
|
Cyber security strategies for higher education institutions
|
|
2021 |
|
|
[113]
|
A mobile serious game to promote digital wellness among pre-school children
|
|
2021 |
|
|
[114]
|
Distributed ledger for cybersecurity: issues and challenges in railways
|
|
Sustainability,
2021 |
|
|
[115]
|
System of Systems Lifecycle Management: A New Concept Based on Process Engineering Methodologies
|
|
2021 |
|
|
[116]
|
Combating the Exploitation of Children in Cyberspace: Technical Mechanisms to Protect Children From Sexual Content
|
|
2021 |
|
|
[117]
|
The impact of CIO characteristics on data breaches
|
|
International Journal of Accounting …,
2021 |
|
|
[118]
|
Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications
|
|
IEEE Transactions on …,
2021 |
|
|
[119]
|
Proposal for an implementation guide for a computer security incident response team on a university campus
|
|
Ch, I Ortiz-Garces, S Sánchez-Viteri - Computers,
2021 |
|
|
[120]
|
Automated Enterprise Architecture Model Mining
|
|
2021 |
|
|
[121]
|
MARISMA-BiDa pattern: Integrated risk analysis for big data
|
|
2021 |
|
|
[122]
|
Information Security Management in ICT and Non-ICT Sector Companies: A Preventive Innovation Perspective
|
|
2021 |
|
|
[123]
|
ANALYSIS OF SECURITY FRAMEWORKS IMPLEMENTED IN HEI's
|
|
2021 |
|
|
[124]
|
Analysis of System Security Levels of Tax Payment and Regional Retribution Based on ISO/IEC27002: 2013 Standard Using SSE-CCM
|
|
2021 |
|
|
[125]
|
A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
|
|
IAENG International Journal of Computer Science,
2021 |
|
|
[126]
|
Doxing: Painting a Target on Someone's back: Characterization and Mitigation Practices
|
|
2021 |
|
|
[127]
|
Control Design of Information Security Related to Privacy in The Smart SIM Business Process
|
|
2021 |
|
|
[128]
|
Analysis of ISO/IEC 27001 to Encourage its Adoption in Nigerian Businesses
|
|
World Journal of Innovative Research,
2021 |
|
|
[129]
|
Requisitos e recomendações para o desenvolvimento e operação de um SGSI–Abordagem com ISO 27001/27002
|
|
2021 |
|
|
[130]
|
A Conceptual Hybrid Approach for Information Security Governance
|
|
2021 |
|
|
[131]
|
Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard
|
|
2021 |
|
|
[132]
|
System of Systems Lifecycle Management—A New Concept Based on Process Engineering Methodologies
|
|
2021 |
|
|
[133]
|
53AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM
|
|
CONSEJO EDITORIAL,
2021 |
|
|
[134]
|
Herausforderungen bei der Transformation von Unternehmensprozessen in die Cloud
|
|
2021 |
|
|
[135]
|
A Conceptual Hybrid Approach for Information Security Governance.
|
|
International Journal of Mathematics & …,
2021 |
|
|
[136]
|
Raising awareness on secure coding in the industry through CyberSecurity challenges
|
|
2021 - Dissertation, Neubiberg,
2021 |
|
|
[137]
|
Informasjonssikkerhetsarbeid gjennom ledelsessystemer for informasjonssikkerhet: En casestudie for EA Smith
|
|
2021 |
|
|
[138]
|
Analysis of Information Technology Security Management UKSW SIASAT Using ISO/IEC 27001: 2013
|
|
IJITEE (International Journal of Information Technology and Electrical Engineering),
2021 |
|
|
[139]
|
Modelo de seguridad de la información para el control de acceso a la red a nivel de la capa de enlace de datos aplicando el estándar IEEE 802.1 X para evitar el acceso indebido a personal externo a la red de datos del banco nacional de Bolivia
|
|
Doctoral dissertation,
2021 |
|
|
[140]
|
Compliance-Portfolio-Management
|
|
Benutzerzentrierte Unternehmensarchitekturen,
2020 |
|
|
[141]
|
Análisis de vulnerabilidades y guía para la implementación de la ISO/IEC 27001. Caso de estudio: Nilotex
|
|
2020 |
|
|
[142]
|
DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE …
|
|
2020 |
|
|
[143]
|
ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de …
|
|
2020 |
|
|
[144]
|
Adoption of the information security management system standard ISO/IEC 27001-A study among German organizations
|
|
2020 |
|
|
[145]
|
Consultoria em Gestão da Informação e Proteção de Dados: Estudo de caso da empresa Interaction Layer
|
|
2020 |
|
|
[146]
|
Comparing Blockchain Standards and Recommendations
|
|
2020 |
|
|
[147]
|
International diffusion of the information security management system standard ISO/IEC 27001: exploring the role of culture
|
|
2020 |
|
|
[148]
|
Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal
|
|
2020 |
|
|
[149]
|
Analysis of cybersecurity standard and framework components
|
|
2020 |
|
|
[150]
|
The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)
|
|
2020 |
|
|
[151]
|
Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education …
|
|
2020 |
|
|
[152]
|
Vulnerable Code Detection Using Software Metrics and Machine Learning
|
|
2020 |
|
|
[153]
|
Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era
|
|
2020 |
|
|
[154]
|
ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de dados …
|
|
2020 |
|
|
[155]
|
Un Nouveau Modèle de Gestion Dynamique de la Confiance pour la Fédération des Identités Dans le Cloud Computing
|
|
2020 |
|
|
[156]
|
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
|
|
2020 |
|
|
[157]
|
Manual de buenas prácticas en seguridad de la información para entornos hospitalarios
|
|
2020 |
|
|
[158]
|
Skladnost zaščite in varovanja v podjetju s standardom ISO/IEC 27001: 2013: Magistrska naloga
|
|
2020 |
|
|
[159]
|
LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO.
|
|
2020 |
|
|
[160]
|
DESARROLLO DE UN SISTEMA DE CONTROL DE ACCESO INFORMÁTICO BASADO EN LLAVES ANÁLOGAS DE SEGURIDAD APLICADAS A SISTEMAS LINUX …
|
|
2020 |
|
|
[161]
|
Information security management frameworks and strategies in higher education institutions: a systematic review
|
|
2020 |
|
|
[162]
|
ANALISIS SECURITY ASSESSMENT MENGGUNAKAN METODE PENETRATION TESTING DALAM MENJAGA KAPABILITAS KEAMANAN TEKNOLOGI INFORMASI …
|
|
2020 |
|
|
[163]
|
A novel approach for information security risk assessment maturity framework based on ISO 27001
|
|
2020 |
|
|
[164]
|
Påverkande faktorer att beakta vid införandet av ett LIS
|
|
2020 |
|
|
[165]
|
Effekterna av en ISO/IEC 27001-certifiering: Upplevda förändringar bland små svenska organisationer
|
|
2020 |
|
|
[166]
|
Diseño de una política de seguridad de la información para los hoteles miembros de la asociación hotelera de Imbabura, basado en la norma ISO/IEC 27002: 2013
|
|
2020 |
|
|
[167]
|
A novel approach for information security risk assessment maturity framework based on ISO 27001 [védés előtt]
|
|
2020 |
|
|
[168]
|
DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE GUAYAQUIL EN …
|
|
2020 |
|
|
[169]
|
Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis
|
|
2020 |
|
|
[170]
|
Performance evaluation of real-time stream processing systems for Internet of Things applications
|
|
2020 |
|
|
[171]
|
Security Requirements Engineering Framework with BPMN 2.0. 2 Extension Model for Development of Information Systems
|
|
2020 |
|
|
[172]
|
Isolation Design Flow Effectiveness Evaluation Methodology for Zynq SoCs
|
|
2020 |
|
|
[173]
|
Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region
|
|
2020 |
|
|
[174]
|
Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag
|
|
2020 |
|
|
[175]
|
Assessment of Malaysian E-Passport PKI based on ISO 27000 Series International Standards
|
|
2020 |
|
|
[176]
|
Smart City Development in Taiwan: From the Perspective of the Information Security Policy
|
|
2020 |
|
|
[177]
|
Integration of Software Security Design Analysis to the Agile Development Process
|
|
2020 |
|
|
[178]
|
Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations
|
|
2020 |
|
|
[179]
|
Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC …
|
|
2020 |
|
|
[180]
|
A Study on Organizational IT Security in Mobile Software Ecosystems Literature
|
|
2020 |
|
|
[181]
|
Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
|
|
2020 |
|
|
[182]
|
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
|
|
2020 |
|
|
[183]
|
Standardisation, Data Interoperability, and GDPR
|
|
2020 |
|
|
[184]
|
BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study
|
|
2020 |
|
|
[185]
|
ISO/IEC 27001 and IT baseline protection (IT-Grundschutz)
|
|
2020 |
|
|
[186]
|
Implementing Security and Trust in IoT/M2M using Middleware
|
|
2020 |
|
|
[187]
|
A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard
|
|
2020 |
|
|
[188]
|
Data Management: a gentle introduction: Balancing theory and practice
|
|
2020 |
|
|
[189]
|
Beadle Schola r
|
|
2020 |
|
|
[190]
|
A Study on Enterprises Based on Information Security Education and Training to Improve Continuous Information Security Governance
|
|
2020 |
|
|
[191]
|
An Integrative Model of Information Security and Trust in Socio-technical Environments
|
|
2020 |
|
|
[192]
|
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
|
|
2020 |
|
|
[193]
|
Critical Success Factors for Managing Information Systems Security in Smart City Enabled by Internet of Things
|
|
Int. J. Adv. Res. Eng. Technol,
2020 |
|
|
[194]
|
Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN
|
|
2020 |
|
|
[195]
|
Cybersecurity Incident Response Capabilities in the Ecuadorian Small Business Sector: A Qualitative Study
|
|
2020 |
|
|
[196]
|
Applying Data Security in a Cloud Service Consumer Business an Exploratory Qualitative Inquiry
|
|
2020 |
|
|
[197]
|
Analysis of ISO 27001 Compliance in Tonga Organisations Information Security
|
|
2020 |
|
|
[198]
|
Enhancing and integration of security testing in the development of a microservices environment
|
|
2020 |
|
|
[199]
|
Analisis Security Assessment Menggunakan Metode Penetration Testing dalam Menjaga Kapabilitas Keamanan Teknologi Informasi Pertahanan Negara
|
|
Teknologi …,
2020 |
|
|
[200]
|
Towards an information classification model for Swedish municipalities:: A Case study
|
|
2020 |
|
|
[201]
|
Designing an Interest-to-Function Career Alignment Model for Cybersecurity Professionals
|
|
2020 |
|
|
[202]
|
Siber Güvenlik ve Savunma: Biyometrik ve Kriptografik Uygulamalar
|
|
2020 |
|
|
[203]
|
Security in Telehealth Systems from a Software Engineering Viewpoint: A Systematic Mapping Study
|
|
2020 |
|
|
[204]
|
The Implementation of an Integrated Management System at Qatar Biobank
|
|
2019 |
|
|
[205]
|
AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG MENGGUNAKAN …
|
|
2019 |
|
|
[206]
|
IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE GUAYAQUIL …
|
|
2019 |
|
|
[207]
|
Actividad física y salud ósea en escolares entre 8 y 16 años de la ciudad de Cartago-Valle
|
|
2019 |
|
|
[208]
|
Facultad de Ingeniería en Electricidad y Computación
|
|
2019 |
|
|
[209]
|
Managing security and compliance risks of outsourced IT projects
|
|
2019 |
|
|
[210]
|
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
|
|
2019 |
|
|
[211]
|
Taloushallinnon yrityksen valmistautuminen EU: n uuteen tietosuoja-asetukseen
|
|
2019 |
|
|
[212]
|
DISEÑO DE UN SITIO WEB PUBLICITARIO PARA LA VETERINARIA “GARRAS Y PATAS” DE LA CIUDAD DE GUAYAQUIL EN EL PERÍODO 2017”.
|
|
2019 |
|
|
[213]
|
ISO/IEC 27001-sertifioinnin hankintaperusteet ja sertifiointielimen valintaperusteet
|
|
2019 |
|
|
[214]
|
The cyber-resilience of financial institutions: significance and applicability
|
|
2019 |
|
|
[215]
|
Developing Dynamic Digital Information Security Management Model for Indian University Libraries
|
|
2019 |
|
|
[216]
|
Cybersecurity for railways–A maturity model
|
|
2019 |
|
|
[217]
|
YMPÄRISTÖTEKIJÖIDEN VAIKUTUS TIETOJÄRJESTELMIEN HANKINTAAN, KÄYTTÖÖNOTTOON JA KÄYTTÖÖN KOULUTUS-JA TUTKIMUS …
|
|
2019 |
|
|
[218]
|
Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
|
|
2019 IEEE International Conference on Industrial Technology (ICIT),
2019 |
|
|
[219]
|
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
|
|
2019 |
|
|
[220]
|
PROPUESTA DE SISTEMA DE GESTIÓN DE SEGURIDAD DE LA INFORMACIÓN UTILIZANDO LA NORMA ISO 27001 PARA LA UNIDAD EDUCATIVA NUESTRA …
|
|
2019 |
|
|
[221]
|
A new comprehensive solution to handle information security Governance in organizations
|
|
2019 |
|
|
[222]
|
Is human the weakest link in information security?: systematic literature review
|
|
2019 |
|
|
[223]
|
Diseño de un modelo de seguridad de la información, basado en OSSTMMV3, NIST SP 800-30 E ISO 27001, para centros de educación: caso de estudio …
|
|
2019 |
|
|
[224]
|
SGSI project at CNAF
|
|
2019 |
|
|
[225]
|
A Quantitative Predictive Assessment of Burnout and the Personal Profile of Information Technology Staff in Medium-sized Organizations
|
|
2019 |
|
|
[226]
|
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …
|
|
2019 |
|
|
[227]
|
Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
|
|
2019 |
|
|
[228]
|
Moving Target Defense to Improve Industrial Control System Resiliency
|
|
2019 |
|
|
[229]
|
Communication and Cybersecurity of Autonomous Passenger Ferry
|
|
2019 |
|
|
[230]
|
Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems
|
|
2019 |
|
|
[231]
|
Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
|
|
2019 |
|
|
[232]
|
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
|
|
2019 |
|
|
[233]
|
Encouraging Employees on Compliant Behaviours about Information Security Measures in Workplaces
|
|
2019 |
|
|
[234]
|
SECURITY DATA GOVERNANCE SYSTEM
|
|
2019 |
|
|
[235]
|
MEDICAL DEVICE QUALITY: MANAGING CYBERSECURITY DESIGN REQUIREMENTS THROUGH THE APPLICATION OF PDSA AND QFD _ A Thesis
|
|
2019 |
|
|
[236]
|
Principles, Domains and Processes of HIT Governance Frameworks: A Systematic Review
|
|
Gazi Medical …,
2019 |
|
|
[237]
|
Factors Effecting Information Security Management and their impacts on Organization performance in the work environment: Case study; Hatif Libya Company …
|
|
2019 |
|
|
[238]
|
MCP: The risk modelling framework for the banking sector
|
|
2019 |
|
|
[239]
|
The implementation of information security policy using iso 27001: a case study in a software company
|
|
2019 |
|
|
[240]
|
Byod-insure: A security assessment model for enterprise byod
|
|
2019 |
|
|
[241]
|
Information Security Management Frameworks in Higher Education Institutions: An Overview
|
|
2019 |
|
|
[242]
|
Security Safety and OrganizationalStandard Compliance in Cyber PhysicalSystems
|
|
2019 |
|
|
[243]
|
Implementation of security system on humanitarian organization: case study of dompet dhuafa foundation
|
|
2019 |
|
|
[244]
|
An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …
|
|
2019 |
|
|
[245]
|
A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency
|
|
2019 |
|
|
[246]
|
Security Safety and Organizational Standard Compliance in Cyber Physical Systems
|
|
INFOCOMMUNICATIONS JOURNAL,
2019 |
|
|
[247]
|
Information System Risk Assessment And Management (Study Case at XYZ University)
|
|
2019 |
|
|
[248]
|
SECURITY VISUALIZATION INFRASTRUCTURES, TECHNIQUES, AND METHODOLOGIES FOR IMPROVED ENTERPRISE SECURITY
|
|
2019 |
|
|
[249]
|
Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
|
|
2019 |
|
|
[250]
|
Risk Management: Typologies, Principles And Approaches
|
|
2019 |
|
|
[251]
|
Diseño de un plan de gestión de la seguridad y de la información para el sistema de intranet de la Prefectura de Esmeraldas, Basado en Estándares Internacionales
|
|
2019 |
|
|
[252]
|
Analisis sistem manajemen keamanan informasi menggunakan standar iso/Iec 27001 dan iso/lec 27002 pada kantor pusat pt jasa mar
|
|
Thesis,
2019 |
|
|
[253]
|
Transferring Risk through Contractual Deterrents to Cloud Service Providers: A Phenomenological Study with Information Assurance Practitioners
|
|
2019 |
|
|
[254]
|
Evolution of Access Network Sharing and Its Role in 5G Networks
|
|
2019 |
|
|
[255]
|
FANE: A Firewall Appliance for the Smart Home
|
|
2019 |
|
|
[256]
|
Экспертное оценивание мероприятий по обеспечению информационной безопасности
|
|
2019 |
|
|
[257]
|
Entendiendo las decisiones del consumidor de servicios de salud: principales hallazgos sobre hábitos, riesgos percibidos y factores que impactan el uso de servicios
|
|
2019 |
|
|
[258]
|
Política pública de juventud en el distrito de Buenaventura y la problemática de reclutamiento ilegal a jóvenes durante el período 2005-2015
|
|
2019 |
|
|
[259]
|
ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA SEGURIDAD DE LA …
|
|
2019 |
|
|
[260]
|
MARISMA-BiDa: Gestión y Control del riesgo en Big Data. Caso de Estudio
|
|
2019 |
|
|
[261]
|
Integration der Legal Compliance Vorgaben der DSGVO in ein ISO/IEC zertifiziertes Information Security Management System: am Fallbeispiel der Energie AG …
|
|
2019 |
|
|
[262]
|
Perencanaan Pengelolaan Keamanan Informasi Berbasis ISO 27001 Menggunakan Indeks Kami Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten …
|
|
2019 |
|
|
[263]
|
AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG …
|
|
2019 |
|
|
[264]
|
The effect of information quality integrity on information security risk management
|
|
2019 |
|
|
[265]
|
Ympäristötekijöiden vaikutus tietojärjestelmien hankintaan, käyttöönottoon ja käyttöön koulutus-ja tutkimusorganisaatiossa
|
|
2019 |
|
|
[266]
|
ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA …
|
|
2019 |
|
|
[267]
|
LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO
|
|
2019 |
|
|
[268]
|
A New Approach and Framework for Risk Assessment Maturity
|
|
Business Processes and Knowledge Management A …,
2019 |
|
|
[269]
|
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
|
|
2019 |
|
|
[270]
|
IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE …
|
|
2019 |
|
|
[271]
|
Web and mobile based examination results dissemination and verification system using authenticated encryption: a case of technical education vocational and …
|
|
2019 |
|
|
[272]
|
The Cyber-Resilience of Financial Institutions: A preliminary working paper on significance and applicability of digital resilience
|
|
Global Risk Institute,
2019 |
|
|
[273]
|
Principles, Domains and Processes of HIT Governance Frameworks: A Systematic Review.
|
|
Gazi Medical …,
2019 |
|
|
[274]
|
Evaluating the risk management plan and addressing factors for successes in government agencies
|
|
… On Trust, Security And Privacy In …,
2018 |
|
|
[275]
|
Melhoria de Processos de Software em Pequenas Empresas com base no Modelo ITmark
|
|
2018 |
|
|
[276]
|
Operations security evaluation of IaaS-cloud backend for industry 4.0
|
|
… Conference on Cloud …,
2018 |
|
|
[277]
|
Implementar una infraestructura para la gestión, seguridad e integración de equipos Apple en una institución financiera sin fines de lucro
|
|
2018 |
|
|
[278]
|
Usulan Evaluasi Sistem Keamanan Informasi Berdasarkan Standar ISO/IEC 27002: 2013 pada Pondok Pesantren Kafila International Islamic School Jakarta
|
|
2018 |
|
|
[279]
|
Information technology control and audit
|
|
2018 |
|
|
[280]
|
ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA?UPT. PPTI UNIVERSITAS NEGERI SURABAYA
|
|
LPPM - UNIVERSITAS NEGERI SURABAYA,
2018 |
|
|
[281]
|
CESIMAS: a continual evaluative self-aware immune-inspired multi agent critical information infrastructure protection system
|
|
2018 |
|
|
[282]
|
A multi-domain approach for security compliance, insider threat modelling and risk management.
|
|
2018 |
|
|
[283]
|
Blockchain Governance: An Evaluation from COBIT 5 Perspective
|
|
2018 |
|
|
[284]
|
Evaluasi Tata Kelola Sistem Keamanan Teknologi Informasi Menggunakan Indeks KAMI dan ISO 27001 (Studi Kasus KOMINFO Provinsi Jawa Timur)
|
|
2018 |
|
|
[285]
|
Hastanelerde bilgi güvenliği yönetimi: Nitel bir araştirma
|
|
Süleyman Demirel Üniversitesi Vizyoner …,
2018 |
|
|
[286]
|
Managing data security risk in model software as a service (SAAS)
|
|
Asia-Pacific Journal of Information Technology …,
2018 |
|
|
[287]
|
Research Progress of Security Protection for Dispatching Automation System
|
|
2018 |
|
|
[288]
|
Reframing Security in Contemporary Software Development Life Cycle
|
|
2018 |
|
|
[289]
|
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa
|
|
2018 |
|
|
[290]
|
CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
|
|
2018 |
|
|
[291]
|
Desarrollo de un Sistema de Gestión de Seguridad de la Información para bibliotecas basado en una metodología mejorada para análisis de riesgos compatible con …
|
|
2018 |
|
|
[292]
|
VALIDEZ DE UNA RÚBRICA PARA LA AUDITORÍA DE REDES EN EL CONTEXTO DE UNA INSTITUCIÓN PÚBLICA DE GUAYAQUIL
|
|
2018 |
|
|
[293]
|
ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA UPT. PPTI …
|
|
2018 |
|
|
[294]
|
The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
|
|
2018 |
|
|
[295]
|
ISMSs In outsourcing Context
|
|
2018 |
|
|
[296]
|
A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)
|
|
2018 |
|
|
[297]
|
SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions
|
|
2018 |
|
|
[298]
|
Specialized CSIRT for Incident Response Management in Smart Grids
|
|
Journal of Network and Systems Management,
2018 |
|
|
[299]
|
ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
|
|
2018 |
|
|
[300]
|
Monitoring Industry 4.0 applications for security and safety standard compliance
|
|
2018 |
|
|
[301]
|
Ki-Ngā-Kōpuku: a Decentralised, Distributed Security Model for Cloud Computing
|
|
2018 |
|
|
[302]
|
Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework
|
|
2018 |
|
|
[303]
|
Cybersecurity challenges and practices: A case study of Bhutan
|
|
2018 |
|
|
[304]
|
Information Security of Russia in the Digital Economy: The Economic and Legal Aspects
|
|
2018 |
|
|
[305]
|
Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001
|
|
2018 |
|
|
[306]
|
Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
|
|
2018 |
|
|
[307]
|
Acceptance of IT governance framework in Ecuadorian Public Institutions
|
|
2018 |
|
|
[308]
|
Factors that Influence Selection of Frameworks for Information Security Program Management: A Correlational Study
|
|
2018 |
|
|
[309]
|
The Effects of Information Technology Leadership and Information Security Governance on Information Security Risk Management in Usa Organizations
|
|
2018 |
|
|
[310]
|
An Approach for Trustworthiness Benchmarking Using Software Metrics
|
|
2018 |
|
|
[311]
|
ANALISIS KINERJA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
|
|
2018 |
|
|
[312]
|
Personvern, europeisering og norske kommuner
|
|
2018 |
|
|
[313]
|
Amenazas a la seguridad de la información y sus implicancias en la gestión de la seguridad de la información en las universidades privadas de la región …
|
|
2018 |
|
|
[314]
|
Diseño de una política de seguridad para el control de la información del área de tics de la empresa Flower Village Ecuador basada en la Norma ISO 27002
|
|
2018 |
|
|
[315]
|
RÉPLICA DE UN MODELO DE CUMPLIMIENTO DE LA POLÍTICA DE SEGURIDAD DE LA INFORMACIÓN EN LAS ORGANIZACIONES
|
|
2018 |
|
|
[316]
|
Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire
|
|
2018 |
|
|
[317]
|
INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODS
|
|
2018 |
|
|
[318]
|
Blockchain in Supply Chain: Case Study of Lottemart Ciputat
|
|
2018 |
|
|
[319]
|
A função do Chief Information Security Officer nas organizações
|
|
2018 |
|
|
[320]
|
Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0.
|
|
2018 |
|
|
[321]
|
Assessment of Information Security Maturity Level on Ethiopian Public Universities
|
|
2018 |
|
|
[322]
|
Communications Architecture: Distributed Systems
|
|
2018 |
|
|
[323]
|
Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy
|
|
2018 |
|
|
[324]
|
Security Evaluation Framework for Military IoT devices
|
|
Security and Communication Networks,
2018 |
|
|
[325]
|
ANALIZA IN ZASNOVA PROGRAMSKE REŠITVE VODENJA EVIDENC NA URADU VLADE REPUBLIKE SLOVENIJE ZA
|
|
2018 |
|
|
[326]
|
KONSEP DAN STRATEGI EVALUASI MANAJEMEN KEAMANAN INFORMASI MENGGUNAKAN INDEKS KEAMANAN INFORMASI (KAMI) DAN EVALUASI …
|
|
2018 |
|
|
[327]
|
Propuesta de normativa basada en COBIT, para el control interno de tecnologías de la información del sector público ecuatoriano
|
|
2018 |
|
|
[328]
|
EVALUASI TINGKAT KEMATANGAN KEAMANAN INFORMASI PADA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
|
|
2018 |
|
|
[329]
|
Responsabilidad penal corporativa y cibercriminalidad. El compliance penal relativo al Derecho de las TIC
|
|
2017 |
|
|
[330]
|
Metodología Ágil para la Gestión de Riesgos Informáticos
|
|
2017 |
|
|
[331]
|
Examining the Potential Benefits of Micro Entrepreneurs' Use of Information Security Measures against the Effect of Disasters
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[332]
|
A Proposal of an Information Security Framework for Geospatial Data and Systems Case Study: Abu Dhabi Government
|
|
2017 |
|
|
[333]
|
Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems
|
|
2017 |
|
|
[334]
|
Threat Intelligence in Support of Cyber Situation Awareness
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[335]
|
Elaboración y plan de implementación de políticas de seguridad de la información aplicadas a una empresa industrial de alimentos
|
|
2017 |
|
|
[336]
|
A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls
|
|
Thesis,
2017 |
|
|
[337]
|
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …
|
|
Computers & Security,
2017 |
|
|
[338]
|
A view of trust and information system security under the perspective of critical infrastructure protection
|
|
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information,
2017 |
|
|
[339]
|
Informationssäkerhet i små och stora vårdorganisationer: en jämförelsestudie mellan två organisationer
|
|
2017 |
|
|
[340]
|
Компаративна анализа и детален приказ на процесот на сертификација на информациски системи во државните институции на Република Македонија
|
|
2017 |
|
|
[341]
|
Strategies to Minimize the Effects of Information Security Threats on Business Performance
|
|
Walden Dissertations and Doctoral Studies,
2017 |
|
|
[342]
|
Dead reckoning: where we stand on privacy and security controls for the Internet of Things
|
|
2017 |
|
|
[343]
|
Seguridad en Entornos BPM: Firma Digital y Gestión de Clave
|
|
2017 |
|
|
[344]
|
A Model for Monitoring End-User Security Policy Compliance
|
|
2017 |
|
|
[345]
|
How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention
|
|
Walden Dissertations and Doctoral Studies,
2017 |
|
|
[346]
|
Maturity Model of Information Security for Software Developers
|
|
2017 |
|
|
[347]
|
Challenges with Funding of Information Security Projects per Threat Perceptions: A Qualitative Case Study
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[348]
|
Pattern Based Security Testing
|
|
Dissertation, Open Repository of the University of Porto,
2017 |
|
|
[349]
|
Metodología Ágil para la Gestión de Riesgos Informáticos Agile Methodology for Computer Risk Management
|
|
2017 |
|
|
[350]
|
Fatores críticos de sucesso para o aprimoramento da maturidade da gestão da segurança da informação das instituições federais de ensino superior
|
|
2017 |
|
|
[351]
|
Sistema inteligente para validar una lista de control de acceso (ACL) en una red de comunicaciones
|
|
2017 |
|
|
[352]
|
SECURITY POLICY: WHAT IT IS, WHY and challenges”
|
|
Adcances in Management and Informatics,
2017 |
|
|
[353]
|
Le problème de Sécurité par le Data mining
|
|
2017 |
|
|
[354]
|
STANDARDS, BEST PRACTICES AND CODES OF ETHICS IMPACT ON IT SERVICE QUALITY-THE CASE OF SLOVENIAN IT DEPARTMENTS.
|
|
Economic & Business Review,
2017 |
|
|
[355]
|
Government and private sector cooperation on security of critical information infrastructures
|
|
2017 |
|
|
[356]
|
Standards, best practices and codes of ethics impact on it service quality–the case of Slovenian IT departments
|
|
2017 |
|
|
[357]
|
Política pública de Salud Mental del departamento de Caldas: Un aporte al bienestar ya la inclusión
|
|
2017 |
|
|
[358]
|
ELABORACIÓN Y PLAN DE IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD DE LA INFORMACIÓN APLICADAS A UNA EMPRESA INDUSTRIAL DE …
|
|
2017 |
|
|
[359]
|
Walden University
|
|
2017 |
|
|
[360]
|
Examining the relationship of business operations and the information security culture in the United States
|
|
2017 |
|
|
[361]
|
Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools
|
|
2017 |
|
|
[362]
|
Caraterização da Integração de Sistemas de Gestão Certificados: Estudo de Caso–Organizações Localizadas no Distrito de Braga
|
|
2017 |
|
|
[363]
|
UNIVERSIDAD DE LAMBAYEQUE
|
|
2017 |
|
|
[364]
|
Informationssäkerhet i små och stora vårdorganisationer
|
|
Thesis,
2017 |
|
|
[365]
|
Exploring information technology: Why the use of information technology governance negatively influences revenue performance
|
|
2016 |
|
|
[366]
|
STANDARD OPERATING PROCEDURES (SOPS) FOR HEALTH AND DEMOGRAPHIC RESEARCH DATA QUALITY ASSURANCE: THE CASE OF VADU …
|
|
2016 |
|
|
[367]
|
Definição de política de segurança informática no IPCB
|
|
2016 |
|
|
[368]
|
37. Estrategia de validación para aplicaciones móviles de salud
|
|
2016 |
|
|
[369]
|
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
|
|
Future Internet,
2016 |
|
|
[370]
|
Nástroj pro bezpečnostní audit OS Linux/Unix/AIX
|
|
2016 |
|
|
[371]
|
Contribuição para a estruturação do sistema integrado de gestão do grupo Cooprofar-Medlog com integração da gestão de segurança da informação
|
|
2016 |
|
|
[372]
|
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets†
|
|
Future Internet,
2016 |
|
|
[373]
|
CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
|
|
2016 |
|
|
[374]
|
Die tägliche Arbeit des IT-Betriebs: Was muss gemacht werden, selbst wenn es keine Änderungen an den Services gibt?
|
|
IT-Betrieb,
2016 |
|
|
[375]
|
Sistema de gestión de seguridad de la información para los tres procesos misionales de la corporación autónoma regional de Risaralda (CARDER)
|
|
2016 |
|
|
[376]
|
Avaliação de Segurança da Informação Usando o Modelo ITMark
|
|
2016 |
|
|
[377]
|
Implementation of information security and data processing center protection standards
|
|
2016 |
|
|
[378]
|
Big Data Security Management
|
|
2016 |
|
|
[379]
|
An expert system for risk assessment of information system security based on ISO 27002
|
|
2016 |
|
|
[380]
|
Information technology security professionals' knowledge and use intention based on UTAUT model
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[381]
|
Validation strategy to mobile health applications Estrategia de validación para aplicaciones móviles de salud
|
|
2016 |
|
|
[382]
|
Standard operating procedures (SOPS) for health and demographic research data quality assurance: the case of VADU HDSS site
|
|
2016 |
|
|
[383]
|
The importance of the security culture in SMEs as regards the correct management of the security of their assets
|
|
Future Internet,
2016 |
|
|
[384]
|
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
|
|
2016 |
|
|
[385]
|
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
|
|
2015 |
|
|
[386]
|
QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals.
|
|
2015 |
|
|
[387]
|
Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov
|
|
2015 |
|
|
[388]
|
Dealing with Information Security and Privacy
|
|
Encyclopedia of Information Science and Technology,
2015 |
|
|
[389]
|
Understanding information technology security standards diffusion: An institutional perspective
|
|
2015 |
|
|
[390]
|
The Incident Prevention Team: A proactive approach to Information Security
|
|
2015 |
|
|
[391]
|
The effects of organizational culture traits on information security principles for organizations located in the United States: An exploratory quantitative study
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[392]
|
A model for the design of next generation e-supply chain digital forensic readiness tools
|
|
2015 |
|
|
[393]
|
QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals
|
|
New Contributions in Information Systems and Technologies,
2015 |
|
|
[394]
|
Análise ao processo de gest?o de palavras-chave num sistema informático e riscos inerentes
|
|
2015 |
|
|
[395]
|
Factors Affecting Individual Information Security Practices
|
|
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research,
2015 |
|
|
[396]
|
An information security control assessment methodology for organizations' financial information
|
|
International Journal of Accounting Information Systems,
2015 |
|
|
[397]
|
Information Architecture for Quality Management Support in Hospitals
|
|
Journal of medical systems,
2015 |
|
|
[398]
|
Security Operations Centers: A Business Perspective
|
|
2015 |
|
|
[399]
|
Proposta de um Modelo de Governança de TI Enxuta
|
|
Revista Eletrônica Produção em Foco,
2015 |
|
|
[400]
|
The cloud computing standard ISO/IEC 27018 through the lens of the EU legislation on data protection
|
|
Computer Law & Security Review,
2015 |
|
|
[401]
|
A Framework to Extend COBIT Security Framework to Overcome Confidentiality Threats in Electronic Commerce
|
|
2015 |
|
|
[402]
|
Tendências de implementação e segurança nas redes wireless organizacionais
|
|
2015 |
|
|
[403]
|
The comparison of information security standards by using analytic hierarchy process
|
|
2015 |
|
|
[404]
|
THE INCIDENT PREVENTION TEAM
|
|
2015 |
|
|
[405]
|
An Adaptive Security Framework for Evaluating and Assessing Security Implementations in PaaS Cloud Models
|
|
2015 |
|
|
[406]
|
THESIS/THÈSE
|
|
2015 |
|
|
[407]
|
FACTORS AFFECTING THE INFORMATION SECURITY AWARENESS IN MALDIVES CUSTOMS SERVICE
|
|
2015 |
|
|
[408]
|
Identifying factors that influence individual information security practices at work
|
|
2015 |
|
|
[409]
|
FACULTAD DE INGENIERIA
|
|
2015 |
|
|
[410]
|
ANÁLISE AO PROCESSO DE GESTÃO DE PALAVRAS-CHAVE NUM SISTEMA INFORMÁTICO E RISCOS INERENTES: ESTUDO DE UM SISTEMA NUMA …
|
|
2014 |
|
|
[411]
|
IMPLEMENTATION OF INTEGRATED MANAGEMENT SYSTEM: A COSTS MODEL
|
|
2014 |
|
|
[412]
|
Standards ISO 27001 for Internet Services
|
|
2014 |
|
|
[413]
|
TISA: a layered Trust Information Security Architecture
|
|
R de Oliveira Albuquerque, F Buiati, LJ Garc?a - downloads.hindawi.com ,
2014 |
|
|
[414]
|
A Layered Trust Information Security Architecture
|
|
Sensors,
2014 |
|
|
[415]
|
Comparison of File Integrity Monitoring (FIM) techniques for small business networks
|
|
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE,
2014 |
|
|
[416]
|
Model upravljanja informacijskom sigurnošću u tijelima državne uprave u Republici Hrvatskoj
|
|
9th International Scientific and Professional Conference Management And Safety M&S 2014: CONTROLLING AND SAFETY,
2014 |
|
|
[417]
|
A Methodology to Develop the Integration of the Environmental Management System with Other Standardized Management Systems
|
|
Computational Water, Energy, and Environmental Engineering,
2014 |
|
|
[418]
|
Implementation Analysis Of Information Security Through Quality Standards ISO 27001 for Internet Services
|
|
2014 |
|
|
[419]
|
Analysis and Implementation Of Information Security Through Quality Standards ISO 27001 for Internet Services): 2nd International Seminar & Conference in …
|
|
2014 |
|
|
[420]
|
The spy within: Corporate security compromised by business software
|
|
ProQuest Dissertations Publishing,
2013 |
|
|
[421]
|
Pendahuluan
|
|
2011 |
|
|
[422]
|
Information Security and Privacy in Hospitals: A Literature Map and Review of Research Gaps
|
|
|
|
|
[423]
|
Securing Sweden's Digital Assets
|
|
|
|
|
[424]
|
Cybersecurity Management for Critical Infrastructures
|
|
|
|
|
[425]
|
Digital Information Privacy in the Age of Big Data: Challenges and Solutions
|
|
|
|
|
[426]
|
A view of trust and information system security under the perspective of critical infrastructure protection A view of trust and information system security …
|
|
|
|
|
[427]
|
組織資訊安全管理機制對員工濫用電腦行為影響之研究: 以一般威嚇理論和理性選擇理論來探討
|
|
|
|
|
[428]
|
Análise da conformidade com a norma ABNT 27002: 2022 por parte de uma instituiçao do governo brasileiro Analysis of compliance with the ABNT …
|
|
GB Calvano
|
|
|
[429]
|
Deliverable 5.4 MHMD Security Infrastructure
|
|
|
|
|
[430]
|
TÜRKİYE CUMHURİYETİ ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ İŞLETME ANABİLİMDALI
|
|
|
|
|
[431]
|
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management …
|
|
Medina
|
|
|