Results 141 to 150 of about 1,942,206 (195)
Designing a Smart Product-Service System to support digital crowdfunding platforms. [PDF]
Salwin M, Waszkiewicz AE.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Information Security Management System in Distributed Information Systems
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019This research is aimed at the implementation issue of an information security management system in distributed information systems as an important requirement for increasing the level of information and cyber security. Based on the best international experience, the authors attempt to determine the features and importance of implementing an information
Valentyna Pleskach +2 more
openaire +1 more source
Information Security Management System
2020Security of information is always a challenging domain for any computer network organization. An organization always sets different types of policies with the course of time so that no information can be leaked. Some external or some internal factors of an organization play important roles in revealing the information. An organization mainly depends on
openaire +1 more source
Information Systems Security Management
2020Information Systems Security (ISS) is a broad term that covers all security aspects in enterprises, including system analysis and design method, manual information systems, managerial issues, and both societal and ethical problems. Information systems security management (ISSM) evolved recently to be a discipline by itself.
openaire +1 more source
Managing Information System Security
1997Preface - Nature and Scope of IS Security - Review of Research and Practice - Interpreting the Management of IS Security in the Health Care Sector - Interpreting the Management of IS Security in Local Government - Synthesis of Key Themes ...
openaire +1 more source
Security in the Management of Information Systems
The Health Care Manager, 1998Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems.
T L, Huston, J L, Huston
openaire +2 more sources
Information security management system standards
Datenschutz und Datensicherheit - DuD, 2011This article presents ISO’s most successful information security standard ISO/IEC 27001 together with the other standards in the family of information security standards — the socalled ISO/IEC 2700x family of information security management system (ISMS) standards and guidelines. We shall take a brief look at the history and progress of these standards,
openaire +1 more source
Information Security Management in Industrial Automation Systems
2006 IEEE International Conference on Industrial Technology, 2006Information security management in industrial automation systems differs in many ways from typical office environment. Safety, reliability, availability and usability play the key roles. Infrastructures and devices with standardized implementations are increasingly being used in the industrial environment where traditionally isolated solutions have ...
openaire +1 more source
Security management for radiological information systems
1997The purpose of information security management is to guarantee continuity and minimise damage by preventing (or minimising) thè impact of security incidents, in other words to provide a reliable mechanism for information sharing, at thè same time ensuring its confidentiality, integrity and availability.
CARAMELLA, DAVIDE +4 more
openaire +3 more sources

