Results 261 to 270 of about 2,693,777 (322)
Some of the next articles are maybe not open access.

Managing Information System Security

1997
Preface - Nature and Scope of IS Security - Review of Research and Practice - Interpreting the Management of IS Security in the Health Care Sector - Interpreting the Management of IS Security in Local Government - Synthesis of Key Themes ...
openaire   +1 more source

Security in the Management of Information Systems

The Health Care Manager, 1998
Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems.
T L, Huston, J L, Huston
openaire   +2 more sources

Information Security Management in Industrial Automation Systems

2006 IEEE International Conference on Industrial Technology, 2006
Information security management in industrial automation systems differs in many ways from typical office environment. Safety, reliability, availability and usability play the key roles. Infrastructures and devices with standardized implementations are increasingly being used in the industrial environment where traditionally isolated solutions have ...
openaire   +1 more source

Security management for radiological information systems

1997
The purpose of information security management is to guarantee continuity and minimise damage by preventing (or minimising) thè impact of security incidents, in other words to provide a reliable mechanism for information sharing, at thè same time ensuring its confidentiality, integrity and availability.
CARAMELLA, DAVIDE   +4 more
openaire   +3 more sources

Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System

2002
Abstract : To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD.
Walter S. Bohinski   +4 more
openaire   +1 more source

On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center

International Workshop on Big Data and Information Security, 2018
Dedy Achmadi, Y. Suryanto, K. Ramli
semanticscholar   +1 more source

Information Security Management Systems Cybernetics

2012
With the widespread dissemination of Information Technology in enterprises and households in the mid-90s, discussions began on how to manage it. Meanwhile, in the area of enterprise security management systems worldwide, enforced use of the Deming cycle initially worked against the implementation of policies.
openaire   +1 more source

Building a Viable Information Security Management System

2017 3rd IEEE International Conference on Cybernetics (CYBCON), 2017
Sabine Goldes   +3 more
semanticscholar   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Home - About - Disclaimer - Privacy