Results 1 to 10 of about 3,727,125 (329)
Information Security Management [PDF]
Abstract Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach.
Sri Harsha Somepalli +2 more
semanticscholar +4 more sources
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe +4 more
doaj +2 more sources
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj +2 more sources
Practical Methods for Information Security Risk Management [PDF]
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj +4 more sources
Information security management [PDF]
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur?
José Martins +3 more
+7 more sources
Digital information security management (DISM) is considered an important tool to ensure the privacy and protection of data and resources in an electronic environment.
Ghulam Farid +2 more
semanticscholar +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
The Information Security Management Systems in E-Business
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities.
Vladimír Bolek +2 more
semanticscholar +1 more source
PurposeAfter 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification.
G. Culot +3 more
semanticscholar +1 more source
In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure.
Mona Mirtsch, Jan Kinne, K. Blind
semanticscholar +1 more source

