Results 11 to 20 of about 3,727,125 (329)
Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to maintain trusted business relationships. Information security management
F. Kitsios +2 more
semanticscholar +1 more source
Corporate information security management [PDF]
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security ...
Mitchell, Ruth C. +2 more
openaire +2 more sources
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar +1 more source
The Impact of Organizational Practices on the Information Security Management Performance
Information explosion and pressures are leading organizations to invest heavily in information security to ensure that information technology decisions align with business goals and manage risks.
Latifa Alzahrani, Kavita Panwar Seth
semanticscholar +1 more source
Formation of a knowledge base to analyze the issue of transport and the environment [PDF]
The environmental impact of transport is significant because transport is a significant user of energy, and burns most of the world's petroleum. This issue creates air pollution, including nitrous oxides and particulates, and is a substantial contributor
Ilyas Idrisovich Ismagilov +4 more
doaj +1 more source
Security information management systems [PDF]
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire +1 more source
Information Security Risk Management [PDF]
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent security attacks, overlooking social and organizational threats and the risks faced because of them.
Dashti, Salimeh +2 more
openaire +1 more source
Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj +1 more source
MM-ConvBERT-LMS: Detecting Malicious Web Pages via Multi-Modal Learning and Pre-Trained Model
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection ...
Xin Tong +5 more
doaj +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets +2 more
doaj +1 more source

