Results 101 to 110 of about 3,446,680 (277)

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development [PDF]

open access: bronze, 2008
Raimundas Matulevičius   +5 more
openalex   +1 more source

Theoretical and methodological approaches to assessing the safety and reliability of accounting and analytical information in the system of economic security of enterprises [PDF]

open access: yes, 2015
Subject of research is theoretical and practical aspects of accounting and analytical information in the system of economic security. Subject area is focused on ensuring reliability and accuracy of accounting and analytical information in management ...
Bondar, Mykola, Iershova, Natalia
core  

Considerations regarding the Performance Improvement of the Hospital Healthcare Services from Romania by the Implementation of an Integrated Management System [PDF]

open access: yes
The continuous quality improvement is an obligatory condition for the achievement and maintaining of the performance in healthcare services. Introducing the concepts of quality improvement in medical practice represents a distinctive component of the ...
Lelia Voinea, Rodica Pamfilie
core  

The role of information security management in decreasing the orderliness of orders in the supply chains [PDF]

open access: yesچشم‌انداز مدیریت صنعتی, 2011
Given the increasing use of information, financial and physical exchanges in supply chains as well as the role of order reinforcement in supply chain performance, it is necessary to examine the role of information security management in order ...
Laya Olfat   +2 more
doaj  

Managing Cybersecurity: Digital Footprint Threats

open access: yesCybernetics and Information Technologies
Managing cybersecurity and protecting data assets remain top priorities for businesses. Despite this, numerous data breaches persist due to malicious human actions, resulting in significant financial setbacks.
Ketipov Rumen   +3 more
doaj   +1 more source

ENTERPRISE RISK MANAGEMENT AND THE INFORMATION SECURITY [PDF]

open access: hybrid, 2012
Zoran ČEKEREVAC, Dubravko ŽIVKOVIĆ
openalex   +1 more source

Home - About - Disclaimer - Privacy