Results 11 to 20 of about 1,942,206 (195)
Information security management system: Electronic apostille system security to ensure legal certainty across national borders [PDF]
Public document legalization services in Indonesia are currently not carried out electronically, with the exception of electronic application registration (e-form) and electronic validation of apostille certificates (e-register).
Dimas Sulistio Solekan +2 more
doaj +1 more source
This study examines the implementation of information system at RSUD Palembang BARI with the aim of enhancing information system security. In this context, a security audit is conducted using the COBIT 2019 framework.
Arief Algiffary +2 more
doaj +1 more source
Model-based Information Security Management Systems Architecture
The representation of the architecture of an information security management system has been investigated. The peculiarities of how the organization, as an environment, influences its key concepts and properties have been demonstrated. This influence is reflected in the elements of connections, principles, and the evolution of the information security ...
Tsurkan, Vasyl +3 more
openaire +2 more sources
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
Analysis of Causal Relationship between Supply Chain Security and Its Performance Using Balanced Scorecard Model [PDF]
Though logistics security only took care of trading phase in the past, many countries in the world have begun to introduce logistics security system as its coverage has been extended from production stage to delivery at the final destination.
Ji-Young Park +2 more
doaj +1 more source
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
EFFECTIVENESS ASSESSMENT METHODOLOGY OF INFORMATION SECURITY MANAGEMENT SYSTEM THROUGH THE SYSTEM RESPONSE TIME TO INFORMATION SECURITY INCIDENTS [PDF]
Quality assessment of information security management system is an important step for obtaining baseline data for analysis of the security system control effectiveness, and evaluating implementation of the specified information security requirements of
F. N. Shago
doaj
Measuring the performance of information security is an essential part of the information security management system within organisations. Studies in the past mainly focused on establishing qualitative measurement approaches.
Kaja Prislan +2 more
doaj +2 more sources
Scientific Views on the Structure of the Elements in the Financial Security Management System in Economic Sectors [PDF]
It has been clarified that the process of ensuring the financial security of the economy is closely correlated with the establishment of an appropriate management system in this area.
Kunytska-Iliash Marta V.
doaj +1 more source

