Results 1 to 10 of about 2,067,027 (330)
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj +2 more sources
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe+4 more
doaj +2 more sources
A fuzzy logic-based information security management for software-defined networks [PDF]
In terms of network security, software-defined networks (SDN) offer researchers unprecedented control over network infrastructure and define a single point of control over the data flows routing of all network infrastructure.
Sergei Dotcenko+2 more
openalex +2 more sources
Information security management in SMEs: factors of success
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
Aleksandr Ključnikov+2 more
openalex +3 more sources
Information security management framework suitability estimation for small and medium enterprise
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors.
Laima Kaušpadienė+2 more
doaj +2 more sources
Background: Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption ...
Norshima Humaidi, Vimala Balakrishnan
openalex +2 more sources
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel+9 more
doaj +1 more source
Digital information security management (DISM) is considered an important tool to ensure the privacy and protection of data and resources in an electronic environment.
Ghulam Farid, N. Warraich, S. Iftikhar
semanticscholar +1 more source
The Information Security Management Systems in E-Business
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities.
Vladimír Bolek+2 more
semanticscholar +1 more source
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar +1 more source