Results 11 to 20 of about 3,727,125 (329)

Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry

open access: yesSustainability, 2022
Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to maintain trusted business relationships. Information security management
F. Kitsios   +2 more
semanticscholar   +1 more source

Corporate information security management [PDF]

open access: yesNew Library World, 1999
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security ...
Mitchell, Ruth C.   +2 more
openaire   +2 more sources

Modelling information support for combating corruption in the economic security management system of the state

open access: yesSocial Legal Studios, 2023
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar   +1 more source

The Impact of Organizational Practices on the Information Security Management Performance

open access: yesInf., 2021
Information explosion and pressures are leading organizations to invest heavily in information security to ensure that information technology decisions align with business goals and manage risks.
Latifa Alzahrani, Kavita Panwar Seth
semanticscholar   +1 more source

Formation of a knowledge base to analyze the issue of transport and the environment [PDF]

open access: yesCaspian Journal of Environmental Sciences, 2020
The environmental impact of transport is significant because transport is a significant user of energy, and burns most of the world's petroleum. This issue creates air pollution, including nitrous oxides and particulates, and is a substantial contributor
Ilyas Idrisovich Ismagilov   +4 more
doaj   +1 more source

Security information management systems [PDF]

open access: yesManagement Sciences, 2020
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire   +1 more source

Information Security Risk Management [PDF]

open access: yes, 2017
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent security attacks, overlooking social and organizational threats and the risks faced because of them.
Dashti, Salimeh   +2 more
openaire   +1 more source

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

MM-ConvBERT-LMS: Detecting Malicious Web Pages via Multi-Modal Learning and Pre-Trained Model

open access: yesApplied Sciences, 2023
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection ...
Xin Tong   +5 more
doaj   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy