Results 11 to 20 of about 2,067,027 (330)

The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

open access: yesThe TQM Journal, 2021
PurposeAfter 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification.
G. Culot   +3 more
semanticscholar   +1 more source

Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis

open access: yesIEEE transactions on engineering management, 2021
In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure.
Mona Mirtsch, Jan Kinne, K. Blind
semanticscholar   +1 more source

Formation of a knowledge base to analyze the issue of transport and the environment [PDF]

open access: yesCaspian Journal of Environmental Sciences, 2020
The environmental impact of transport is significant because transport is a significant user of energy, and burns most of the world's petroleum. This issue creates air pollution, including nitrous oxides and particulates, and is a substantial contributor
Ilyas Idrisovich Ismagilov   +4 more
doaj   +1 more source

Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1874-1883, December 2022., 2022
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć   +7 more
wiley   +1 more source

Information Security Management

open access: yesHolistica, 2020
Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities.
Sri Harsha Somepalli   +2 more
semanticscholar   +2 more sources

MM-ConvBERT-LMS: Detecting Malicious Web Pages via Multi-Modal Learning and Pre-Trained Model

open access: yesApplied Sciences, 2023
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection ...
Xin Tong   +5 more
doaj   +1 more source

Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region [PDF]

open access: yesComputers & Security 92 (2020), 2020
Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that impose risks to information security properties of these assets.
arxiv   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective

open access: yesSustainability, 2020
This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees ...
Amanda M. Y. Chu, Mike K. P. So
semanticscholar   +1 more source

Threats associated with the human factor in the aspect of information security [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2018
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj   +1 more source

Home - About - Disclaimer - Privacy