Results 1 to 10 of about 2,067,027 (330)

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +2 more sources

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

A fuzzy logic-based information security management for software-defined networks [PDF]

open access: greenInternational Conference on Advanced Communication Technology, 2014
In terms of network security, software-defined networks (SDN) offer researchers unprecedented control over network infrastructure and define a single point of control over the data flows routing of all network infrastructure.
Sergei Dotcenko   +2 more
openalex   +2 more sources

Information security management in SMEs: factors of success

open access: goldEntrepreneurship and Sustainability Issues, 2019
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
Aleksandr Ključnikov   +2 more
openalex   +3 more sources

Information security management framework suitability estimation for small and medium enterprise

open access: yesTechnological and Economic Development of Economy, 2019
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors.
Laima Kaušpadienė   +2 more
doaj   +2 more sources

Indirect effect of management support on users’ compliance behaviour towards information security policies

open access: bronzeHealth information management : journal of the Health Information Management Association of Australia, 2017
Background: Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption ...
Norshima Humaidi, Vimala Balakrishnan
openalex   +2 more sources

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

Digital information security management policy in academic libraries: A systematic review (2010–2022)

open access: yesJournal of information science, 2023
Digital information security management (DISM) is considered an important tool to ensure the privacy and protection of data and resources in an electronic environment.
Ghulam Farid, N. Warraich, S. Iftikhar
semanticscholar   +1 more source

The Information Security Management Systems in E-Business

open access: yesJournal of Global Information Management, 2023
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities.
Vladimír Bolek   +2 more
semanticscholar   +1 more source

Modelling information support for combating corruption in the economic security management system of the state

open access: yesSocial Legal Studios, 2023
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy