Results 261 to 270 of about 2,693,777 (322)
Some of the next articles are maybe not open access.
Managing Information System Security
1997Preface - Nature and Scope of IS Security - Review of Research and Practice - Interpreting the Management of IS Security in the Health Care Sector - Interpreting the Management of IS Security in Local Government - Synthesis of Key Themes ...
openaire +1 more source
Security in the Management of Information Systems
The Health Care Manager, 1998Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems.
T L, Huston, J L, Huston
openaire +2 more sources
Information Security Management in Industrial Automation Systems
2006 IEEE International Conference on Industrial Technology, 2006Information security management in industrial automation systems differs in many ways from typical office environment. Safety, reliability, availability and usability play the key roles. Infrastructures and devices with standardized implementations are increasingly being used in the industrial environment where traditionally isolated solutions have ...
openaire +1 more source
Security management for radiological information systems
1997The purpose of information security management is to guarantee continuity and minimise damage by preventing (or minimising) thè impact of security incidents, in other words to provide a reliable mechanism for information sharing, at thè same time ensuring its confidentiality, integrity and availability.
CARAMELLA, DAVIDE +4 more
openaire +3 more sources
2002
Abstract : To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD.
Walter S. Bohinski +4 more
openaire +1 more source
Abstract : To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD.
Walter S. Bohinski +4 more
openaire +1 more source
International Workshop on Big Data and Information Security, 2018
Dedy Achmadi, Y. Suryanto, K. Ramli
semanticscholar +1 more source
Dedy Achmadi, Y. Suryanto, K. Ramli
semanticscholar +1 more source
Information Security Management Systems Cybernetics
2012With the widespread dissemination of Information Technology in enterprises and households in the mid-90s, discussions began on how to manage it. Meanwhile, in the area of enterprise security management systems worldwide, enforced use of the Deming cycle initially worked against the implementation of policies.
openaire +1 more source
Building a Viable Information Security Management System
2017 3rd IEEE International Conference on Cybernetics (CYBCON), 2017Sabine Goldes +3 more
semanticscholar +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly

