Results 11 to 20 of about 1,697,459 (345)

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +2 more sources

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire   +5 more sources

Information security management framework suitability estimation for small and medium enterprise

open access: yesTechnological and Economic Development of Economy, 2019
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors.
Laima Kaušpadienė   +2 more
doaj   +2 more sources

Digital information security management policy in academic libraries: A systematic review (2010–2022)

open access: yesJournal of information science, 2023
Digital information security management (DISM) is considered an important tool to ensure the privacy and protection of data and resources in an electronic environment.
Ghulam Farid, N. Warraich, S. Iftikhar
semanticscholar   +1 more source

The Information Security Management Systems in E-Business

open access: yesJournal of Global Information Management, 2023
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities.
Vladimír Bolek   +2 more
semanticscholar   +1 more source

Modelling information support for combating corruption in the economic security management system of the state

open access: yesSocial Legal Studios, 2023
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar   +1 more source

The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

open access: yesThe TQM Journal, 2021
PurposeAfter 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification.
G. Culot   +3 more
semanticscholar   +1 more source

Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis

open access: yesIEEE transactions on engineering management, 2021
In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure.
Mona Mirtsch, Jan Kinne, K. Blind
semanticscholar   +1 more source

A fuzzy logic-based information security management for software-defined networks [PDF]

open access: greenInternational Conference on Advanced Communication Technology, 2014
Sergei Dotcenko   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy