Results 1 to 10 of about 3,727,125 (329)

Information Security Management [PDF]

open access: yesHOLISTICA – Journal of Business and Public Administration, 2020
Abstract Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach.
Sri Harsha Somepalli   +2 more
semanticscholar   +4 more sources

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +2 more sources

Practical Methods for Information Security Risk Management [PDF]

open access: yesInformatică economică, 2011
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj   +4 more sources

Information security management [PDF]

open access: yesInternational Journal of Cyber Warfare and Terrorism, 2013
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur?
José Martins   +3 more
  +7 more sources

Digital information security management policy in academic libraries: A systematic review (2010–2022)

open access: yesJournal of information science, 2023
Digital information security management (DISM) is considered an important tool to ensure the privacy and protection of data and resources in an electronic environment.
Ghulam Farid   +2 more
semanticscholar   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

The Information Security Management Systems in E-Business

open access: yesJournal of Global Information Management, 2023
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities.
Vladimír Bolek   +2 more
semanticscholar   +1 more source

The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

open access: yesThe TQM Journal, 2021
PurposeAfter 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification.
G. Culot   +3 more
semanticscholar   +1 more source

Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis

open access: yesIEEE transactions on engineering management, 2021
In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure.
Mona Mirtsch, Jan Kinne, K. Blind
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy