The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU+2 more
core
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development [PDF]
Raimundas Matulevičius+5 more
openalex +1 more source
A Framework for Information Security Management Based on Guiding Standards: A United States Perspective [PDF]
Janice C. Sipior, Burke T. Ward
openalex +1 more source
Theoretical and methodological approaches to assessing the safety and reliability of accounting and analytical information in the system of economic security of enterprises [PDF]
Subject of research is theoretical and practical aspects of accounting and analytical information in the system of economic security. Subject area is focused on ensuring reliability and accuracy of accounting and analytical information in management ...
Bondar, Mykola, Iershova, Natalia
core
Considerations regarding the Performance Improvement of the Hospital Healthcare Services from Romania by the Implementation of an Integrated Management System [PDF]
The continuous quality improvement is an obligatory condition for the achievement and maintaining of the performance in healthcare services. Introducing the concepts of quality improvement in medical practice represents a distinctive component of the ...
Lelia Voinea, Rodica Pamfilie
core
The role of information security management in decreasing the orderliness of orders in the supply chains [PDF]
Given the increasing use of information, financial and physical exchanges in supply chains as well as the role of order reinforcement in supply chain performance, it is necessary to examine the role of information security management in order ...
Laya Olfat+2 more
doaj
Managing Cybersecurity: Digital Footprint Threats
Managing cybersecurity and protecting data assets remain top priorities for businesses. Despite this, numerous data breaches persist due to malicious human actions, resulting in significant financial setbacks.
Ketipov Rumen+3 more
doaj +1 more source
ENTERPRISE RISK MANAGEMENT AND THE INFORMATION SECURITY [PDF]
Zoran ČEKEREVAC, Dubravko ŽIVKOVIĆ
openalex +1 more source
Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in <i>United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science</i> [PDF]
Jean W. Parcher, William R. Page
openalex +1 more source