Journal of Information Security

Volume 4, Issue 2 (April 2013)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

ISO/IEC 27000, 27001 and 27002 for Information Security Management

HTML  XML Download Download as PDF (Size: 258KB)  PP. 92-100  
DOI: 10.4236/jis.2013.42011    24,480 Downloads   44,254 Views  Citations
Author(s)

ABSTRACT

With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security [1]. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.

Share and Cite:

G. Disterer, "ISO/IEC 27000, 27001 and 27002 for Information Security Management," Journal of Information Security, Vol. 4 No. 2, 2013, pp. 92-100. doi: 10.4236/jis.2013.42011.

Cited by

[1] Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review
Mashhadi - Iraqi Journal of Science, 2024
[2] Fortifying the global data fortress: a multidimensional examination of cyber security indexes and data protection measures across 193 nations
… Journal of Frontiers in Engineering Technology, 2024
[3] Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours
Information & Computer …, 2024
[4] A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
IEEE Access, 2024
[5] A Review of Cybersecurity Incidents in the Food and Agriculture Sector
arXiv preprint arXiv …, 2024
[6] Using Situational Crime Prevention (SCP) to Prevent Cybercrimes
2024
[7] Cybersecurity Standards for AIoT Networks
Artificial Intelligence of Things …, 2024
[8] Défis de sécurité et confidentialité dans la détection participative des catastrophes
2024
[9] Analisis Resiko Keamanan Informasi Website Repository Digital Library Menggunakan Framework ISO/IEC 27001 & 27002: Studi Kasus Perguruan tinggi X
… Riset Multidisiplin dan …, 2024
[10] ANALISIS MANAJEMEN RISIKO INFORMASI MENGGUNAKAN ISO/IEC 27005: 2018 (STUDI KASUS: PT. XYZ)
JIPI (Jurnal …, 2024
[11] A vállalati biztonsági háló meghatározó tényezői
Scientia et Securitas, 2024
[12] Mecanismos de segurança Blockchain integrados aos ecossistemas de IoT
2024
[13] Políticas de seguridad en la infraestructura tecnológica de instituciones de salud mediante un appliance fortinet 80e: Estudio de caso Hospital Básico Jipijapa
Revista Científica de …, 2024
[14] Communication and cybersecurity for autonomous passenger ferry
2023
[15] IMPLEMENTASI MANAJEMEN KEAMANAN INFORMASI BERBASIS ISO 27001 PADA SISTEM INFORMASI AKADEMIK
Journal of Digital …, 2023
[16] Cadrul sistemic de securitate a comunicațiilor electronice pentru instituțiile de învățământ superior din Republica Moldova
2023
[17] Diseño e implementación de un sistema de gestión de seguridad de la información basado en la norma ISO/IEC 27002 para mejorar el nivel de seguridad informática …
2023
[18] Formación de gestores de paz para el manejo de conflictos en la asignatura Cátedra de la Paz mediante secuencias didácticas diseñadas con la herramienta …
2023
[19] Plataforma KnowBe4 para segurança da informação em uma instituição financeira: um estudo de caso
, 2023
[20] Obvladovanje kibernetskih tveganj zaposlenih v jugovzhodni Sloveniji: magistrska naloga
2023
[21] Implementación de la norma ISO 27032 para mejorar la gestión de ciberseguridad en RMO Contratistas Generales SAC
2023
[22] Implementación de un plan de acción para las buenas prácticas en la gestión de la seguridad de la información del departamento de TIC´ S de la UPSE
2023
[23] Implementación de una data center del Centro de Monitoreo y Video Vigilancia de una Municipalidad
2023
[24] EVALUASI PENGELOLAAN RISIKO KEAMANAN INFORMASI DENGAN METODE INDEKS KEAMANAN INFORMASI (INDEKS KAMI) VERSI 4.1 DI DISKOMINFO …
2023
[25] Universitatea Tehnică a Moldovei
2023
[26] GRAF VE KAREKOD YÖNTEMLERİYLE DÖNÜŞTÜRÜLMÜŞ LOG KAYITLARI ÜZERİNDE DERİN ÖĞRENME TABANLI SİBER SALDIRI TESPİTİ
2023
[27] Análise do uso da plataforma KnowBe4 para conscientização da segurança da informação em uma instituição financeira: um estudo de caso
2023 - Araranguá, 2023
[28] IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD EN LA INFRAESTRUCTURA TECNOLÓGICA DEL HOSPITAL BÁSICO JIPIJAPA MEDIANTE UN APPLIANCE …
2023
[29] Hur ISO 27001 certifierade företag utvecklar sina anställdas Kunskap, Attityd och Beteende mot Informationssäkerhetsmedvetenhet
2023
[30] Cyber Security and Security Frameworks for Cloud and IoT Architectures
2023
[31] An exploratory study of different IT Security Auditing methods
2023
[32] CyberTest4You: A three-way Model for Evaluating Compliance and General Maturity in IT Security
2023
[33] Establish personal information risk management in university
System Innovation for a World in …, 2023
[34] Information Security Governance in Distributed Systems Architecture
AIM 2023 Doctoral Consortium, 2023
[35] THE EBL-5D MODEL: A NEW MODEL TO EXPLORE THE ETHICS OF BLENDED LEARNING
ICERI2023 Proceedings, 2023
[36] Assessing Information Security Management Using ISO 27001: 2013
Jurnal Indonesia Sosial Teknologi, 2023
[37] Human-AI: Using Threat Intelligence to Expose Deepfakes and the Exploitation of Psychology
2023
[38] Classification of Vocal Intensity Category from Multi-sensor Recordings of Speech
2023
[39] Enhancing Cyber Security in Organisations by Establishing Attributes Towards Achieving Cyber Resilience
2023
[40] Influence of the legislation on the cybersecurity posture–The case of the NIS Directive
2023
[41] Cyber vulnerabilities and IT risk management in the Dutch housing association sector.
2023
[42] Perspective Trends of Standardization in the Field of Quality and Information Security of Contemporary Organizations
Anti-Crisis Approach to the …, 2023
[43] Cybersecurity Compliance in the Public Sector: Are the Best Security Practices Properly Addressed?
International Conference on Human …, 2023
[44] Enhancing the SETA program with Mindfulness and Self-Efficacy
CEUR Workshop Proceedings, 2023
[45] The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability 2023, 15, 5828
2023
[46] Auditing Customer Identity and Access Management
Modernizing Enterprise IT …, 2023
[47] The Institutionalisation of Information Security Management Practices in selected Organisations in Uganda
International Journal of …, 2023
[48] Augmenting Vehicular Ad Hoc Network Security and Efficiency with Blockchain: A Probabilistic Identification and Malicious Node Mitigation Strategy
Electronics, 2023
[49] Enhancing financial system resilience against cyber threats via SWIFT customer security framework
Fayoumi… - … Conference on Information …, 2023
[50] MASISCo—Methodological Approach for the Selection of Information Security Controls
Applied Sciences, 2023
[51] Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security
Journal of Informatics and Web …, 2023
[52] Security and Privacy Challenges of Participatory Sensing in Natural Disaster Management
2023 20th ACS/IEEE International Conference on …, 2023
[53] Exploratory analysis of a measurement scale of an information security management system
arXiv preprint arXiv …, 2023
[54] Data Driven Approaches to Cybersecurity Governance for Board Decision-Making--A Systematic Review
arXiv preprint arXiv:2311.17578, 2023
[55] Cybersecurity at the Core: A Study on IT Experts' Policy Adherence
International Conference on Global …, 2023
[56] A Brief Prelude to Accreditation and Conformity Assessment
Handbook of Quality …, 2023
[57] Correspondence measure: a review for the digital twin standardization
The International Journal of Advanced …, 2023
[58] Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
Sensors, 2023
[59] Digital information security management policy in academic libraries: A systematic review (2010–2022)
Journal of Information …, 2023
[60] The ISO/IEC 27001 Information security management standard: how to extract value from data in the IT sector
Sustainability, 2023
[61] The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
Information & Computer Security, 2023
[62] A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction
International Journal of Critical …, 2023
[63] Getting smarter about smart cities: Improving data security and privacy through compliance
Sensors, 2022
[64] ANALISIS DAN MANAJEMEN RISIKO KEAMANAN INFORMASI MENGGUNAKAN METODE FAILURE MODE AND EFFECTS ANALYSIS (FMEA) DAN KONTROL ISO/IEC 27001: 2013 (Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten Sambas)
Coding Jurnal Komputer dan Aplikasi, 2022
[65] A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
… on Research in …, 2022
[66] Cybersecurity: Ethics, legal, risks, and policies
2022
[67] A Conceptual Model to Assess the Maturity Of Information Security Audit Process
Practice of Enterprise Modelling …, 2022
[68] Framework for Evaluation of Blockchain-AI Technology and Governance to Secure Interoperable US Healthcare Data
2022
[69] An NLP approach to assess information security policies
2022
[70] DESIGN OF A SECURITY TOOLBOX
2022
[71] An analysis of information technology risks and governance disclosure: evidence from the top 40 JSE listed companies.
2022
[72] Tribunal de graduación
2022
[73] BYOD security issues: A systematic literature review
Gayar, C Noteboom… - … Security Journal: A …, 2022
[74] A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
IEEE Access, 2022
[75] Intergenerational knowledge management in a cutting-edge Israeli industry: Visions and challenges
Plos one, 2022
[76] Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova
Scientific and Practical Cyber Security Journal (SPCSJ), 2022
[77] Initial Development of a Roadmap for Digital Engineering Simulations Curriculum
2022 IEEE …, 2022
[78] The Holistic Approach to Cybersecurity in Academia
… and Eastern European eDem and eGov …, 2022
[79] Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
Sustainability, 2022
[80] Information security and privacy in hospitals: a literature mapping and review of research gaps
Informatics for Health and …, 2022
[81] Digital production and supply supported by lifecycle management in industry 4.0
2022
[82] Understanding Cybersecurity Standards
Cybersecurity in Morocco, 2022
[83] Standard Analysis of Document Control as Information According to ISO 27001 2013 in PT XYZ
… Computing and Social …, 2022
[84] Enhanced Organizational Security Awareness: A Qualitative Study
2022
[85] SUCCESS FACTORS INFLUENCING CYBER SECURITY RISK MANAGEMENT IMPLEMENTATION: THE CASES OF LARGE NIGERIAN ORGANISATIONS
2022
[86] Factors Influencing the Use of Conceptual Frameworks in The Field of IT Management
2022
[87] Trustworthiness Models to Categorize and Prioritize Code for Security Improvement
SSRN Electronic Journal, 2022
[88] Design and Implementation of Smart Glasses with ISMS and Risk Management Functionalities for a Technical Operator
Journal homepage: http …, 2022
[89] Tietoturvatietoisuuden kehittäminen finanssialan organisaatiossa
2022
[90] Model za unapređenje poslovanja i konkurentnosti preduzeća zasnovan na informacionim sistemima i donošenju odluka
Универзитет у Новом Саду, 2022
[91] Towards standardization of audit procedures for the new version of ISO/IEC 27002
THESIS, 2022
[92] PLAN DE CONTINGENCIA PARA ASEGURAR LA INTEGRIDAD DE LOS EQUIPOS Y SISTEMAS INFORMÁTICOS EN LA UNIVERSIDAD ESTATAL DEL SUR DE …
2022
[93] Vishing: ett ökande hot: Hur Sveriges regioner bemöter vishing inom hälso-och sjukvården
2022
[94] Characterization of Selected Security-related Standards in the Field of Security Requirements Engineering
Elektrotehniski Vestnik, 2022
[95] Using Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
The 12th International Conference on Electronics, Communications and Computing, 2021
[96] IT-säkerhetshotet phishing: Svenska små och medelstora företags utbildningsinsatser inom problemområdet
2021
[97] Similarity and Dissimilarity between Information Security and Information Assurance
Information Technology Journal, 2021
[98] ISO 27001-certifieringars påverkan på informationssäkerhets-medvetenhet i ett SMF: Förändringar till följd av en certifieringsprocess för ett företag inom IT-sektorn
2021
[99] Yhdistetty tietoturvan varmennus standardien ISO/IEC 27006 ja ISAE 3000 mukaisesti
2021
[100] Overlapping Concept to Action Between Information Assurance and Information Security
Information Technology Journal, 2021
[101] Automatización de un sistema de gestión de seguridad de la información basado en la Norma ISO/IEC 27001
Revista Universidad y Sociedad, 2021
[102] Application of Lean methodologies in Information Security processes improvement
2021
[103] Data security requirements in third country transfers
2021
[104] Maturity of information systems security in selected private Banks in Ethiopia
2021 International Conference on …, 2021
[105] A study on the internal security of companies: Internal practices regarding risks in digitised working environments and employees relation to information security
2021
[106] INFORMATION SECURITY AWARENESS AND ITS IMPACT ON THE CISO'S RESPONSIBILITIES-A STUDY OF THE PORTUGUESE ENVIRONMENT.
Journal of Information System Security, 2021
[107] Raising Awareness on Secure Coding in the Industry through CyberSecurity Challenges.
2021
[108] Implementing Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
Electronics, Communications and Computing, 2021
[109] Integrated information risk management framework
2021
[110] Maintaining Security in the Era of Microarchitectural Attacks
2021
[111] (CSM2-RA-R2-TI): Cyber Security Maturity Model for Risk Assessment Using Risk Register for Threat Intelligence
Journal of Physics: Conference …, 2021
[112] Cyber security strategies for higher education institutions
2021
[113] A mobile serious game to promote digital wellness among pre-school children
2021
[114] Distributed ledger for cybersecurity: issues and challenges in railways
Sustainability, 2021
[115] System of Systems Lifecycle Management: A New Concept Based on Process Engineering Methodologies
2021
[116] Combating the Exploitation of Children in Cyberspace: Technical Mechanisms to Protect Children From Sexual Content
2021
[117] The impact of CIO characteristics on data breaches
International Journal of Accounting …, 2021
[118] Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications
IEEE Transactions on …, 2021
[119] Proposal for an implementation guide for a computer security incident response team on a university campus
Ch, I Ortiz-Garces, S Sánchez-Viteri - Computers, 2021
[120] Automated Enterprise Architecture Model Mining
2021
[121] MARISMA-BiDa pattern: Integrated risk analysis for big data
2021
[122] Information Security Management in ICT and Non-ICT Sector Companies: A Preventive Innovation Perspective
2021
[123] ANALYSIS OF SECURITY FRAMEWORKS IMPLEMENTED IN HEI's
2021
[124] Analysis of System Security Levels of Tax Payment and Regional Retribution Based on ISO/IEC27002: 2013 Standard Using SSE-CCM
2021
[125] A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
IAENG International Journal of Computer Science, 2021
[126] Doxing: Painting a Target on Someone's back: Characterization and Mitigation Practices
2021
[127] Control Design of Information Security Related to Privacy in The Smart SIM Business Process
2021
[128] Analysis of ISO/IEC 27001 to Encourage its Adoption in Nigerian Businesses
World Journal of Innovative Research, 2021
[129] Requisitos e recomendações para o desenvolvimento e operação de um SGSI–Abordagem com ISO 27001/27002
2021
[130] A Conceptual Hybrid Approach for Information Security Governance
2021
[131] Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard
2021
[132] System of Systems Lifecycle Management—A New Concept Based on Process Engineering Methodologies
2021
[133] 53AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM
CONSEJO EDITORIAL, 2021
[134] Herausforderungen bei der Transformation von Unternehmensprozessen in die Cloud
2021
[135] A Conceptual Hybrid Approach for Information Security Governance.
International Journal of Mathematics & …, 2021
[136] Raising awareness on secure coding in the industry through CyberSecurity challenges
2021 - Dissertation, Neubiberg, 2021
[137] Informasjonssikkerhetsarbeid gjennom ledelsessystemer for informasjonssikkerhet: En casestudie for EA Smith
2021
[138] Analysis of Information Technology Security Management UKSW SIASAT Using ISO/IEC 27001: 2013
IJITEE (International Journal of Information Technology and Electrical Engineering), 2021
[139] Modelo de seguridad de la información para el control de acceso a la red a nivel de la capa de enlace de datos aplicando el estándar IEEE 802.1 X para evitar el acceso indebido a personal externo a la red de datos del banco nacional de Bolivia
Doctoral dissertation, 2021
[140] Compliance-Portfolio-Management
Benutzerzentrierte Unternehmensarchitekturen, 2020
[141] Análisis de vulnerabilidades y guía para la implementación de la ISO/IEC 27001. Caso de estudio: Nilotex
2020
[142] DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE …
2020
[143] ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de …
2020
[144] Adoption of the information security management system standard ISO/IEC 27001-A study among German organizations
2020
[145] Consultoria em Gestão da Informação e Proteção de Dados: Estudo de caso da empresa Interaction Layer
2020
[146] Comparing Blockchain Standards and Recommendations
2020
[147] International diffusion of the information security management system standard ISO/IEC 27001: exploring the role of culture
2020
[148] Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal
2020
[149] Analysis of cybersecurity standard and framework components
2020
[150] The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)
2020
[151] Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education …
2020
[152] Vulnerable Code Detection Using Software Metrics and Machine Learning
2020
[153] Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era
2020
[154] ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de dados …
2020
[155] Un Nouveau Modèle de Gestion Dynamique de la Confiance pour la Fédération des Identités Dans le Cloud Computing
2020
[156] Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
2020
[157] Manual de buenas prácticas en seguridad de la información para entornos hospitalarios
2020
[158] Skladnost zaščite in varovanja v podjetju s standardom ISO/IEC 27001: 2013: Magistrska naloga
2020
[159] LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO.
2020
[160] DESARROLLO DE UN SISTEMA DE CONTROL DE ACCESO INFORMÁTICO BASADO EN LLAVES ANÁLOGAS DE SEGURIDAD APLICADAS A SISTEMAS LINUX …
2020
[161] Information security management frameworks and strategies in higher education institutions: a systematic review
2020
[162] ANALISIS SECURITY ASSESSMENT MENGGUNAKAN METODE PENETRATION TESTING DALAM MENJAGA KAPABILITAS KEAMANAN TEKNOLOGI INFORMASI …
2020
[163] A novel approach for information security risk assessment maturity framework based on ISO 27001
2020
[164] Påverkande faktorer att beakta vid införandet av ett LIS
2020
[165] Effekterna av en ISO/IEC 27001-certifiering: Upplevda förändringar bland små svenska organisationer
2020
[166] Diseño de una política de seguridad de la información para los hoteles miembros de la asociación hotelera de Imbabura, basado en la norma ISO/IEC 27002: 2013
2020
[167] A novel approach for information security risk assessment maturity framework based on ISO 27001 [védés előtt]
2020
[168] DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE GUAYAQUIL EN …
2020
[169] Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis
2020
[170] Performance evaluation of real-time stream processing systems for Internet of Things applications
2020
[171] Security Requirements Engineering Framework with BPMN 2.0. 2 Extension Model for Development of Information Systems
2020
[172] Isolation Design Flow Effectiveness Evaluation Methodology for Zynq SoCs
2020
[173] Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region
2020
[174] Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag
2020
[175] Assessment of Malaysian E-Passport PKI based on ISO 27000 Series International Standards
2020
[176] Smart City Development in Taiwan: From the Perspective of the Information Security Policy
2020
[177] Integration of Software Security Design Analysis to the Agile Development Process
2020
[178] Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations
2020
[179] Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC …
2020
[180] A Study on Organizational IT Security in Mobile Software Ecosystems Literature
2020
[181] Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
2020
[182] An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
2020
[183] Standardisation, Data Interoperability, and GDPR
2020
[184] BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study
2020
[185] ISO/IEC 27001 and IT baseline protection (IT-Grundschutz)
2020
[186] Implementing Security and Trust in IoT/M2M using Middleware
2020
[187] A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard
2020
[188] Data Management: a gentle introduction: Balancing theory and practice
2020
[189] Beadle Schola r
2020
[190] A Study on Enterprises Based on Information Security Education and Training to Improve Continuous Information Security Governance
2020
[191] An Integrative Model of Information Security and Trust in Socio-technical Environments
2020
[192] A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
2020
[193] Critical Success Factors for Managing Information Systems Security in Smart City Enabled by Internet of Things
Int. J. Adv. Res. Eng. Technol, 2020
[194] Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN
2020
[195] Cybersecurity Incident Response Capabilities in the Ecuadorian Small Business Sector: A Qualitative Study
2020
[196] Applying Data Security in a Cloud Service Consumer Business an Exploratory Qualitative Inquiry
2020
[197] Analysis of ISO 27001 Compliance in Tonga Organisations Information Security
2020
[198] Enhancing and integration of security testing in the development of a microservices environment
2020
[199] Analisis Security Assessment Menggunakan Metode Penetration Testing dalam Menjaga Kapabilitas Keamanan Teknologi Informasi Pertahanan Negara
Teknologi …, 2020
[200] Towards an information classification model for Swedish municipalities:: A Case study
2020
[201] Designing an Interest-to-Function Career Alignment Model for Cybersecurity Professionals
2020
[202] Siber Güvenlik ve Savunma: Biyometrik ve Kriptografik Uygulamalar
2020
[203] Security in Telehealth Systems from a Software Engineering Viewpoint: A Systematic Mapping Study
2020
[204] The Implementation of an Integrated Management System at Qatar Biobank
2019
[205] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG MENGGUNAKAN …
2019
[206] IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE GUAYAQUIL …
2019
[207] Actividad física y salud ósea en escolares entre 8 y 16 años de la ciudad de Cartago-Valle
2019
[208] Facultad de Ingeniería en Electricidad y Computación
2019
[209] Managing security and compliance risks of outsourced IT projects
2019
[210] Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
2019
[211] Taloushallinnon yrityksen valmistautuminen EU: n uuteen tietosuoja-asetukseen
2019
[212] DISEÑO DE UN SITIO WEB PUBLICITARIO PARA LA VETERINARIA “GARRAS Y PATAS” DE LA CIUDAD DE GUAYAQUIL EN EL PERÍODO 2017”.
2019
[213] ISO/IEC 27001-sertifioinnin hankintaperusteet ja sertifiointielimen valintaperusteet
2019
[214] The cyber-resilience of financial institutions: significance and applicability
2019
[215] Developing Dynamic Digital Information Security Management Model for Indian University Libraries
2019
[216] Cybersecurity for railways–A maturity model
2019
[217] YMPÄRISTÖTEKIJÖIDEN VAIKUTUS TIETOJÄRJESTELMIEN HANKINTAAN, KÄYTTÖÖNOTTOON JA KÄYTTÖÖN KOULUTUS-JA TUTKIMUS …
2019
[218] Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
2019 IEEE International Conference on Industrial Technology (ICIT), 2019
[219] Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
2019
[220] PROPUESTA DE SISTEMA DE GESTIÓN DE SEGURIDAD DE LA INFORMACIÓN UTILIZANDO LA NORMA ISO 27001 PARA LA UNIDAD EDUCATIVA NUESTRA …
2019
[221] A new comprehensive solution to handle information security Governance in organizations
2019
[222] Is human the weakest link in information security?: systematic literature review
2019
[223] Diseño de un modelo de seguridad de la información, basado en OSSTMMV3, NIST SP 800-30 E ISO 27001, para centros de educación: caso de estudio …
2019
[224] SGSI project at CNAF
2019
[225] A Quantitative Predictive Assessment of Burnout and the Personal Profile of Information Technology Staff in Medium-sized Organizations
2019
[226] Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …
2019
[227] Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
2019
[228] Moving Target Defense to Improve Industrial Control System Resiliency
2019
[229] Communication and Cybersecurity of Autonomous Passenger Ferry
2019
[230] Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems
2019
[231] Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
2019
[232] A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
2019
[233] Encouraging Employees on Compliant Behaviours about Information Security Measures in Workplaces
2019
[234] SECURITY DATA GOVERNANCE SYSTEM
2019
[235] MEDICAL DEVICE QUALITY: MANAGING CYBERSECURITY DESIGN REQUIREMENTS THROUGH THE APPLICATION OF PDSA AND QFD _ A Thesis
2019
[236] Principles, Domains and Processes of HIT Governance Frameworks: A Systematic Review
Gazi Medical …, 2019
[237] Factors Effecting Information Security Management and their impacts on Organization performance in the work environment: Case study; Hatif Libya Company …
2019
[238] MCP: The risk modelling framework for the banking sector
2019
[239] The implementation of information security policy using iso 27001: a case study in a software company
2019
[240] Byod-insure: A security assessment model for enterprise byod
2019
[241] Information Security Management Frameworks in Higher Education Institutions: An Overview
2019
[242] Security Safety and OrganizationalStandard Compliance in Cyber PhysicalSystems
2019
[243] Implementation of security system on humanitarian organization: case study of dompet dhuafa foundation
2019
[244] An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …
2019
[245] A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency
2019
[246] Security Safety and Organizational Standard Compliance in Cyber Physical Systems
INFOCOMMUNICATIONS JOURNAL, 2019
[247] Information System Risk Assessment And Management (Study Case at XYZ University)
2019
[248] SECURITY VISUALIZATION INFRASTRUCTURES, TECHNIQUES, AND METHODOLOGIES FOR IMPROVED ENTERPRISE SECURITY
2019
[249] Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
2019
[250] Risk Management: Typologies, Principles And Approaches
2019
[251] Diseño de un plan de gestión de la seguridad y de la información para el sistema de intranet de la Prefectura de Esmeraldas, Basado en Estándares Internacionales
2019
[252] Analisis sistem manajemen keamanan informasi menggunakan standar iso/Iec 27001 dan iso/lec 27002 pada kantor pusat pt jasa mar
Thesis, 2019
[253] Transferring Risk through Contractual Deterrents to Cloud Service Providers: A Phenomenological Study with Information Assurance Practitioners
2019
[254] Evolution of Access Network Sharing and Its Role in 5G Networks
2019
[255] FANE: A Firewall Appliance for the Smart Home
2019
[256] Экспертное оценивание мероприятий по обеспечению информационной безопасности
2019
[257] Entendiendo las decisiones del consumidor de servicios de salud: principales hallazgos sobre hábitos, riesgos percibidos y factores que impactan el uso de servicios
2019
[258] Política pública de juventud en el distrito de Buenaventura y la problemática de reclutamiento ilegal a jóvenes durante el período 2005-2015
2019
[259] ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA SEGURIDAD DE LA …
2019
[260] MARISMA-BiDa: Gestión y Control del riesgo en Big Data. Caso de Estudio
2019
[261] Integration der Legal Compliance Vorgaben der DSGVO in ein ISO/IEC zertifiziertes Information Security Management System: am Fallbeispiel der Energie AG …
2019
[262] Perencanaan Pengelolaan Keamanan Informasi Berbasis ISO 27001 Menggunakan Indeks Kami Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten …
2019
[263] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG …
2019
[264] The effect of information quality integrity on information security risk management
2019
[265] Ympäristötekijöiden vaikutus tietojärjestelmien hankintaan, käyttöönottoon ja käyttöön koulutus-ja tutkimusorganisaatiossa
2019
[266] ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA …
2019
[267] LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO
2019
[268] A New Approach and Framework for Risk Assessment Maturity
Business Processes and Knowledge Management A …, 2019
[269] The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
2019
[270] IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE …
2019
[271] Web and mobile based examination results dissemination and verification system using authenticated encryption: a case of technical education vocational and …
2019
[272] The Cyber-Resilience of Financial Institutions: A preliminary working paper on significance and applicability of digital resilience
Global Risk Institute, 2019
[273] Principles, Domains and Processes of HIT Governance Frameworks: A Systematic Review.
Gazi Medical …, 2019
[274] Evaluating the risk management plan and addressing factors for successes in government agencies
… On Trust, Security And Privacy In …, 2018
[275] Melhoria de Processos de Software em Pequenas Empresas com base no Modelo ITmark
2018
[276] Operations security evaluation of IaaS-cloud backend for industry 4.0
… Conference on Cloud …, 2018
[277] Implementar una infraestructura para la gestión, seguridad e integración de equipos Apple en una institución financiera sin fines de lucro
2018
[278] Usulan Evaluasi Sistem Keamanan Informasi Berdasarkan Standar ISO/IEC 27002: 2013 pada Pondok Pesantren Kafila International Islamic School Jakarta
2018
[279] Information technology control and audit
2018
[280] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA?UPT. PPTI UNIVERSITAS NEGERI SURABAYA
LPPM - UNIVERSITAS NEGERI SURABAYA, 2018
[281] CESIMAS: a continual evaluative self-aware immune-inspired multi agent critical information infrastructure protection system
2018
[282] A multi-domain approach for security compliance, insider threat modelling and risk management.
2018
[283] Blockchain Governance: An Evaluation from COBIT 5 Perspective
2018
[284] Evaluasi Tata Kelola Sistem Keamanan Teknologi Informasi Menggunakan Indeks KAMI dan ISO 27001 (Studi Kasus KOMINFO Provinsi Jawa Timur)
2018
[285] Hastanelerde bilgi güvenliği yönetimi: Nitel bir araştirma
Süleyman Demirel Üniversitesi Vizyoner …, 2018
[286] Managing data security risk in model software as a service (SAAS)
Asia-Pacific Journal of Information Technology …, 2018
[287] Research Progress of Security Protection for Dispatching Automation System
2018
[288] Reframing Security in Contemporary Software Development Life Cycle
2018
[289] Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa
2018
[290] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2018
[291] Desarrollo de un Sistema de Gestión de Seguridad de la Información para bibliotecas basado en una metodología mejorada para análisis de riesgos compatible con …
2018
[292] VALIDEZ DE UNA RÚBRICA PARA LA AUDITORÍA DE REDES EN EL CONTEXTO DE UNA INSTITUCIÓN PÚBLICA DE GUAYAQUIL
2018
[293] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA UPT. PPTI …
2018
[294] The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
2018
[295] ISMSs In outsourcing Context
2018
[296] A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)
2018
[297] SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions
2018
[298] Specialized CSIRT for Incident Response Management in Smart Grids
Journal of Network and Systems Management, 2018
[299] ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018
[300] Monitoring Industry 4.0 applications for security and safety standard compliance
2018
[301] Ki-Ngā-Kōpuku: a Decentralised, Distributed Security Model for Cloud Computing
2018
[302] Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework
2018
[303] Cybersecurity challenges and practices: A case study of Bhutan
2018
[304] Information Security of Russia in the Digital Economy: The Economic and Legal Aspects
2018
[305] Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001
2018
[306] Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
2018
[307] Acceptance of IT governance framework in Ecuadorian Public Institutions
2018
[308] Factors that Influence Selection of Frameworks for Information Security Program Management: A Correlational Study
2018
[309] The Effects of Information Technology Leadership and Information Security Governance on Information Security Risk Management in Usa Organizations
2018
[310] An Approach for Trustworthiness Benchmarking Using Software Metrics
2018
[311] ANALISIS KINERJA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[312] Personvern, europeisering og norske kommuner
2018
[313] Amenazas a la seguridad de la información y sus implicancias en la gestión de la seguridad de la información en las universidades privadas de la región …
2018
[314] Diseño de una política de seguridad para el control de la información del área de tics de la empresa Flower Village Ecuador basada en la Norma ISO 27002
2018
[315] RÉPLICA DE UN MODELO DE CUMPLIMIENTO DE LA POLÍTICA DE SEGURIDAD DE LA INFORMACIÓN EN LAS ORGANIZACIONES
2018
[316] Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire
2018
[317] INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODS
2018
[318] Blockchain in Supply Chain: Case Study of Lottemart Ciputat
2018
[319] A função do Chief Information Security Officer nas organizações
2018
[320] Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0.
2018
[321] Assessment of Information Security Maturity Level on Ethiopian Public Universities
2018
[322] Communications Architecture: Distributed Systems
2018
[323] Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy
2018
[324] Security Evaluation Framework for Military IoT devices
Security and Communication Networks, 2018
[325] ANALIZA IN ZASNOVA PROGRAMSKE REŠITVE VODENJA EVIDENC NA URADU VLADE REPUBLIKE SLOVENIJE ZA
2018
[326] KONSEP DAN STRATEGI EVALUASI MANAJEMEN KEAMANAN INFORMASI MENGGUNAKAN INDEKS KEAMANAN INFORMASI (KAMI) DAN EVALUASI …
2018
[327] Propuesta de normativa basada en COBIT, para el control interno de tecnologías de la información del sector público ecuatoriano
2018
[328] EVALUASI TINGKAT KEMATANGAN KEAMANAN INFORMASI PADA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[329] Responsabilidad penal corporativa y cibercriminalidad. El compliance penal relativo al Derecho de las TIC
2017
[330] Metodología Ágil para la Gestión de Riesgos Informáticos
2017
[331] Examining the Potential Benefits of Micro Entrepreneurs' Use of Information Security Measures against the Effect of Disasters
ProQuest Dissertations Publishing, 2017
[332] A Proposal of an Information Security Framework for Geospatial Data and Systems Case Study: Abu Dhabi Government
2017
[333] Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems
2017
[334] Threat Intelligence in Support of Cyber Situation Awareness
ProQuest Dissertations Publishing, 2017
[335] Elaboración y plan de implementación de políticas de seguridad de la información aplicadas a una empresa industrial de alimentos
2017
[336] A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls
Thesis, 2017
[337] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …
Computers & Security, 2017
[338] A view of trust and information system security under the perspective of critical infrastructure protection
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, 2017
[339] Informationssäkerhet i små och stora vårdorganisationer: en jämförelsestudie mellan två organisationer
2017
[340] Компаративна анализа и детален приказ на процесот на сертификација на информациски системи во државните институции на Република Македонија
2017
[341] Strategies to Minimize the Effects of Information Security Threats on Business Performance
Walden Dissertations and Doctoral Studies, 2017
[342] Dead reckoning: where we stand on privacy and security controls for the Internet of Things
2017
[343] Seguridad en Entornos BPM: Firma Digital y Gestión de Clave
2017
[344] A Model for Monitoring End-User Security Policy Compliance
2017
[345] How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention
Walden Dissertations and Doctoral Studies, 2017
[346] Maturity Model of Information Security for Software Developers
2017
[347] Challenges with Funding of Information Security Projects per Threat Perceptions: A Qualitative Case Study
ProQuest Dissertations Publishing, 2017
[348] Pattern Based Security Testing
Dissertation, Open Repository of the University of Porto, 2017
[349] Metodología Ágil para la Gestión de Riesgos Informáticos Agile Methodology for Computer Risk Management
2017
[350] Fatores críticos de sucesso para o aprimoramento da maturidade da gestão da segurança da informação das instituições federais de ensino superior
2017
[351] Sistema inteligente para validar una lista de control de acceso (ACL) en una red de comunicaciones
2017
[352] SECURITY POLICY: WHAT IT IS, WHY and challenges”
Adcances in Management and Informatics, 2017
[353] Le problème de Sécurité par le Data mining
2017
[354] STANDARDS, BEST PRACTICES AND CODES OF ETHICS IMPACT ON IT SERVICE QUALITY-THE CASE OF SLOVENIAN IT DEPARTMENTS.
Economic & Business Review, 2017
[355] Government and private sector cooperation on security of critical information infrastructures
2017
[356] Standards, best practices and codes of ethics impact on it service quality–the case of Slovenian IT departments
2017
[357] Política pública de Salud Mental del departamento de Caldas: Un aporte al bienestar ya la inclusión
2017
[358] ELABORACIÓN Y PLAN DE IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD DE LA INFORMACIÓN APLICADAS A UNA EMPRESA INDUSTRIAL DE …
2017
[359] Walden University
2017
[360] Examining the relationship of business operations and the information security culture in the United States
2017
[361] Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools
2017
[362] Caraterização da Integração de Sistemas de Gestão Certificados: Estudo de Caso–Organizações Localizadas no Distrito de Braga
2017
[363] UNIVERSIDAD DE LAMBAYEQUE
2017
[364] Informationssäkerhet i små och stora vårdorganisationer
Thesis, 2017
[365] Exploring information technology: Why the use of information technology governance negatively influences revenue performance
2016
[366] STANDARD OPERATING PROCEDURES (SOPS) FOR HEALTH AND DEMOGRAPHIC RESEARCH DATA QUALITY ASSURANCE: THE CASE OF VADU …
2016
[367] Definição de política de segurança informática no IPCB
2016
[368] 37. Estrategia de validación para aplicaciones móviles de salud
2016
[369] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
Future Internet, 2016
[370] Nástroj pro bezpečnostní audit OS Linux/Unix/AIX
2016
[371] Contribuição para a estruturação do sistema integrado de gestão do grupo Cooprofar-Medlog com integração da gestão de segurança da informação
2016
[372] The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets†
Future Internet, 2016
[373] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2016
[374] Die tägliche Arbeit des IT-Betriebs: Was muss gemacht werden, selbst wenn es keine Änderungen an den Services gibt?
IT-Betrieb, 2016
[375] Sistema de gestión de seguridad de la información para los tres procesos misionales de la corporación autónoma regional de Risaralda (CARDER)
2016
[376] Avaliação de Segurança da Informação Usando o Modelo ITMark
2016
[377] Implementation of information security and data processing center protection standards
2016
[378] Big Data Security Management
2016
[379] An expert system for risk assessment of information system security based on ISO 27002
2016
[380] Information technology security professionals' knowledge and use intention based on UTAUT model
ProQuest Dissertations Publishing, 2016
[381] Validation strategy to mobile health applications Estrategia de validación para aplicaciones móviles de salud
2016
[382] Standard operating procedures (SOPS) for health and demographic research data quality assurance: the case of VADU HDSS site
2016
[383] The importance of the security culture in SMEs as regards the correct management of the security of their assets
Future Internet, 2016
[384] Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
2016
[385] Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
2015
[386] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals.
2015
[387] Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov
2015
[388] Dealing with Information Security and Privacy
Encyclopedia of Information Science and Technology, 2015
[389] Understanding information technology security standards diffusion: An institutional perspective
2015
[390] The Incident Prevention Team: A proactive approach to Information Security
2015
[391] The effects of organizational culture traits on information security principles for organizations located in the United States: An exploratory quantitative study
ProQuest Dissertations Publishing, 2015
[392] A model for the design of next generation e-supply chain digital forensic readiness tools
2015
[393] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals
New Contributions in Information Systems and Technologies, 2015
[394] Análise ao processo de gest?o de palavras-chave num sistema informático e riscos inerentes
2015
[395] Factors Affecting Individual Information Security Practices
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
[396] An information security control assessment methodology for organizations' financial information
International Journal of Accounting Information Systems, 2015
[397] Information Architecture for Quality Management Support in Hospitals
Journal of medical systems, 2015
[398] Security Operations Centers: A Business Perspective
2015
[399] Proposta de um Modelo de Governança de TI Enxuta
Revista Eletrônica Produção em Foco, 2015
[400] The cloud computing standard ISO/IEC 27018 through the lens of the EU legislation on data protection
Computer Law & Security Review, 2015
[401] A Framework to Extend COBIT Security Framework to Overcome Confidentiality Threats in Electronic Commerce
2015
[402] Tendências de implementação e segurança nas redes wireless organizacionais
2015
[403] The comparison of information security standards by using analytic hierarchy process
2015
[404] THE INCIDENT PREVENTION TEAM
2015
[405] An Adaptive Security Framework for Evaluating and Assessing Security Implementations in PaaS Cloud Models
2015
[406] THESIS/THÈSE
2015
[407] FACTORS AFFECTING THE INFORMATION SECURITY AWARENESS IN MALDIVES CUSTOMS SERVICE
2015
[408] Identifying factors that influence individual information security practices at work
2015
[409] FACULTAD DE INGENIERIA
2015
[410] ANÁLISE AO PROCESSO DE GESTÃO DE PALAVRAS-CHAVE NUM SISTEMA INFORMÁTICO E RISCOS INERENTES: ESTUDO DE UM SISTEMA NUMA …
2014
[411] IMPLEMENTATION OF INTEGRATED MANAGEMENT SYSTEM: A COSTS MODEL
2014
[412] Standards ISO 27001 for Internet Services
2014
[413] TISA: a layered Trust Information Security Architecture
R de Oliveira Albuquerque, F Buiati, LJ Garc?a - downloads.hindawi.com, 2014
[414] A Layered Trust Information Security Architecture
Sensors, 2014
[415] Comparison of File Integrity Monitoring (FIM) techniques for small business networks
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 2014
[416] Model upravljanja informacijskom sigurnošću u tijelima državne uprave u Republici Hrvatskoj
9th International Scientific and Professional Conference Management And Safety M&S 2014: CONTROLLING AND SAFETY, 2014
[417] A Methodology to Develop the Integration of the Environmental Management System with Other Standardized Management Systems
Computational Water, Energy, and Environmental Engineering, 2014
[418] Implementation Analysis Of Information Security Through Quality Standards ISO 27001 for Internet Services
2014
[419] Analysis and Implementation Of Information Security Through Quality Standards ISO 27001 for Internet Services): 2nd International Seminar & Conference in …
2014
[420] The spy within: Corporate security compromised by business software
ProQuest Dissertations Publishing, 2013
[421] Pendahuluan
2011
[422] Information Security and Privacy in Hospitals: A Literature Map and Review of Research Gaps
[423] Securing Sweden's Digital Assets
[424] Cybersecurity Management for Critical Infrastructures
[425] Digital Information Privacy in the Age of Big Data: Challenges and Solutions
[426] A view of trust and information system security under the perspective of critical infrastructure protection A view of trust and information system security …
[427] 組織資訊安全管理機制對員工濫用電腦行為影響之研究: 以一般威嚇理論和理性選擇理論來探討
[428] Análise da conformidade com a norma ABNT 27002: 2022 por parte de uma instituiçao do governo brasileiro Analysis of compliance with the ABNT …
GB Calvano
[429] Deliverable 5.4 MHMD Security Infrastructure
[430] TÜRKİYE CUMHURİYETİ ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ İŞLETME ANABİLİMDALI
[431] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management …
Medina

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.