Advanced Approach to Information Security Management System Model for Industrial Control System [PDF]
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the ...
Sanghyun Park, Kyungho Lee
doaj +2 more sources
The Information Security Management System, Development and Audit [PDF]
Information security management system (ISMS) is that part of the overall management system, based on a business risk approach, that it is developed in order to establish, implement, operate, monitor, review, maintain and improve information ...
Cristian AMANCEI, Traian SURCEL
doaj +2 more sources
Development of multi-agent information security management system
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina +2 more
doaj +1 more source
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source
Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals [PDF]
ObjectivesInformation technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet.
Yong-Woon Kim, Namin Cho, Hye-Jung Jang
doaj +1 more source
Methodology and software development for auditing information security management systems
Objectives. Classification of information systems (IS) security indicators and the creation of the method of improved software tool based on its results (in comparison with similar software tool developed earlier by the authors) for auditing information ...
V. A. Boiprav, L. L. Utin
doaj +1 more source
Security information management systems [PDF]
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire +1 more source
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds [PDF]
ObjectivesThe information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on ...
Woo-Sung Park +8 more
doaj +1 more source
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
The Security of Student Information Management System Based upon Blockchain
In recent years, with the development of science and technology, as an emerging data security technology, blockchain has been widely used in all walks of life by virtue of its immutability, uniqueness, smart contract, and decentralized organization ...
Mingfeng Yang, Jianying Wang
doaj +1 more source

