Results 1 to 10 of about 1,942,206 (195)

Advanced Approach to Information Security Management System Model for Industrial Control System [PDF]

open access: yesThe Scientific World Journal, 2014
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the ...
Sanghyun Park, Kyungho Lee
doaj   +2 more sources

The Information Security Management System, Development and Audit [PDF]

open access: yesInformatică economică, 2007
Information security management system (ISMS) is that part of the overall management system, based on a business risk approach, that it is developed in order to establish, implement, operate, monitor, review, maintain and improve information ...
Cristian AMANCEI, Traian SURCEL
doaj   +2 more sources

Development of multi-agent information security management system

open access: yesLaw and Safety, 2022
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina   +2 more
doaj   +1 more source

Threats associated with the human factor in the aspect of information security [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2018
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj   +1 more source

Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals [PDF]

open access: yesHealthcare Informatics Research, 2018
ObjectivesInformation technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet.
Yong-Woon Kim, Namin Cho, Hye-Jung Jang
doaj   +1 more source

Methodology and software development for auditing information security management systems

open access: yesInformatika, 2022
Objectives. Classification of information systems (IS) security indicators and the creation of the method of improved software tool based on its results (in comparison with similar software tool developed earlier by the authors) for auditing information ...
V. A. Boiprav, L. L. Utin
doaj   +1 more source

Security information management systems [PDF]

open access: yesManagement Sciences, 2020
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire   +1 more source

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds [PDF]

open access: yesHealthcare Informatics Research, 2010
ObjectivesThe information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on ...
Woo-Sung Park   +8 more
doaj   +1 more source

Shinren : Non-monotonic trust management for distributed systems [PDF]

open access: yes, 2010
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core   +4 more sources

The Security of Student Information Management System Based upon Blockchain

open access: yesJournal of Electrical and Computer Engineering, 2022
In recent years, with the development of science and technology, as an emerging data security technology, blockchain has been widely used in all walks of life by virtue of its immutability, uniqueness, smart contract, and decentralized organization ...
Mingfeng Yang, Jianying Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy