Results 1 to 10 of about 2,199,649 (286)

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2016
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

Vox2Face: Speech-Driven Face Generation via Identity-Space Alignment and Diffusion Self-Consistency

open access: yesInformation
Speech-driven face generation aims to synthesize a face image that matches a speaker’s identity from speech alone. However, existing methods typically trade identity fidelity for visual quality and rely on large end-to-end generators that are difficult ...
Qiming Ma   +7 more
doaj   +1 more source

Integralus informacijos saugumo valdymo modelis

open access: yesInformacijos Mokslai, 2012
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj   +1 more source

Developing a Taxonomic Framework of Security Methods for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2020
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed
Yejun Wu
doaj   +1 more source

A Risk Management Process for Consumers [PDF]

open access: yes, 2010
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the ...
Cleeff, André van
core   +2 more sources

Secure and Prepared Newsletter, February 11, 2010, Vol. 6, no. 4, revision 1 [PDF]

open access: yes, 2010
A bi-weekly newsletter for those involved in the fields of homeland security and/or emergency management.

core  

Information Security Intelligence as a Basis for Modern Information Security Management

open access: yesБезопасность информационных технологий, 2013
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective ...
Natalia Georgievna Miloslavskaya   +1 more
doaj  

Som Based Assurance Assessment for Information Security Management System in Organization [PDF]

open access: yes, 2010
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core  

Comparing Blockchain Standards and Recommendations

open access: yesFuture Internet, 2020
Since the introduction of Bitcoin, the term “blockchain” has attracted many start-ups and companies over the years, especially in the financial sector. However, technology is evolving faster than standardization frameworks.
Lukas König   +3 more
doaj   +1 more source

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Home - About - Disclaimer - Privacy