Results 261 to 270 of about 3,727,125 (329)
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Information Security Management
Security Management for Healthcare, 2019Курс посвящен современным передовым методам организации работы служб информационной безопасности Организаций на основе библиотеки передового опыта ITIL (IT Infrastructure Library) и международного стандарта ISO/IEC 17799 (Информационные технологии ...
Harold F. Tipton
semanticscholar +4 more sources
Continuous improvement of information security management: an organisational learning perspective
European Journal of Information Systems, 2022This study explores ways to empower organisations to continuously improve their information security management (ISM). Drawing upon the dynamic capabilities approach, we investigated the mechanism wherein absorptive capacity has an effect.
F. Ghahramani +3 more
semanticscholar +1 more source
The impact of information security management practices on organisational agility
Information and Computer Security, 2020This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts.,A quantitative method research design has been used in this study ...
M. Zaini, M. N. Masrek, M. K. J. A. Sani
semanticscholar +1 more source
International Conferences on Information Technologies and Electrical Engineering, 2020
The country's vital objects that provide data and information are vulnerable to threats. Information in the form of valuable assets needs to be protected from threats and vulnerabilities. Data and information must be guaranteed confidentiality, integrity,
Muhammad Fahrurozi +3 more
semanticscholar +1 more source
The country's vital objects that provide data and information are vulnerable to threats. Information in the form of valuable assets needs to be protected from threats and vulnerabilities. Data and information must be guaranteed confidentiality, integrity,
Muhammad Fahrurozi +3 more
semanticscholar +1 more source
Information security management
2009 Information Security Curriculum Development Conference, 2009Information security management is an important part of any given organization and it mainly involves ensuring that the data and company information is secure [5]. This paper starts by defining firewall architectures and then progresses in to the factors surrounding the selection and implementation of a firewall system in organizations.
openaire +2 more sources
From theory to practice: guidelines for enhancing information security management
Information and Computer Security, 2019Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely ...
Ioanna-Aikaterini Topa, Maria Karyda
semanticscholar +1 more source
International Journal of Communication Systems, 2020
With the continuous development of communication technology and computer network technology and the continuous progress of social economy, information technology has penetrated into all aspects of people's lives.
M. Du
semanticscholar +1 more source
With the continuous development of communication technology and computer network technology and the continuous progress of social economy, information technology has penetrated into all aspects of people's lives.
M. Du
semanticscholar +1 more source
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security, 2018Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu +3 more
semanticscholar +1 more source

