Results 11 to 20 of about 2,067,027 (330)
PurposeAfter 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification.
G. Culot+3 more
semanticscholar +1 more source
In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure.
Mona Mirtsch, Jan Kinne, K. Blind
semanticscholar +1 more source
Formation of a knowledge base to analyze the issue of transport and the environment [PDF]
The environmental impact of transport is significant because transport is a significant user of energy, and burns most of the world's petroleum. This issue creates air pollution, including nitrous oxides and particulates, and is a substantial contributor
Ilyas Idrisovich Ismagilov+4 more
doaj +1 more source
Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć+7 more
wiley +1 more source
Information Security Management
Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities.
Sri Harsha Somepalli+2 more
semanticscholar +2 more sources
MM-ConvBERT-LMS: Detecting Malicious Web Pages via Multi-Modal Learning and Pre-Trained Model
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection ...
Xin Tong+5 more
doaj +1 more source
Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region [PDF]
Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that impose risks to information security properties of these assets.
arxiv +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets+2 more
doaj +1 more source
This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees ...
Amanda M. Y. Chu, Mike K. P. So
semanticscholar +1 more source
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source