Som Based Assurance Assessment for Information Security Management System in Organization [PDF]
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core
Aiming at the university management information system security threats and challenges,a security architecture named 1C4GS was proposed.First connotation and function of five important components of 1C4GS was expounded,which named security management ...
Xin-zheng LONG +5 more
doaj +2 more sources
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario +4 more
core +1 more source
Are Existing Security Models Suitable for Teleworking? [PDF]
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice.
James, Peter
core +2 more sources
Method for assessing efficiency of the information security management system
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization).
Kiedrowicz Maciej, Stanik Jerzy
doaj +1 more source
ISO 27001 Information Security Survey of Medical Service Organizations
The differences between medical institutions in the security management of information systems were investigated by comparing the differences and the means used by personnel in different units in public and private hospitals.
Hung-Hsiou Hsu, Jyun-Rong Shih
doaj +1 more source
Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza +4 more
core
Theoretical and methodological approaches to assessing the safety and reliability of accounting and analytical information in the system of economic security of enterprises [PDF]
Subject of research is theoretical and practical aspects of accounting and analytical information in the system of economic security. Subject area is focused on ensuring reliability and accuracy of accounting and analytical information in management ...
Bondar, Mykola, Iershova, Natalia
core
MODEL FOR FORMING AN INFORMATION SYSTEM OF PROJECT TEAMS IN A SECURITY-ORIENTED SYSTEM
The subject of the study is the personnel management information system. Infrastructure design processes of the framework model of complex socio-technical systems for project management and human resource management programs, formation of a database of ...
Oleh Zachko +3 more
doaj +1 more source
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources

