Results 41 to 50 of about 1,942,206 (195)

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +1 more source

Analisis Tingkat Kesiapan Pengamanan Sistem Informasi [PDF]

open access: yes, 2019
The University has a number of data relating to Academic and Higher Education Governance. The large amount of data that requires security, especially in terms of readiness to secure information systems.
Hananto, B. (Bayu)   +2 more
core  

TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2014
Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing.
F. N. Shago, I. A. Zikratov
doaj  

Possibilistic Information Flow Control for Workflow Management Systems

open access: yes, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Bauereiss, Thomas, Hutter, Dieter
core   +2 more sources

Information Security Risk Management in the Automated System

open access: yesБезопасность информационных технологий, 2011
The urgency of researches in the field of working out of new techniques of risk management of information security in the automated systems is described.
I. I. Zenzin
doaj  

Principles of information security management system

open access: yesJournal of Physics: Conference Series, 2022
Abstract The main element of a complex system that determines its performance and efficiency is its management system. Modern management systems are widely used, including in the management of teams of people united by common goals (organizations, departments, groups of developers, etc.).
V Y Dronov, G A Dronova
openaire   +1 more source

InSPeCT: Integrated Surveillance for Port Container Traffic [PDF]

open access: yes, 2011
This paper describes a fully-operational content-indexing and management system, designed for monitoring and profiling freight-based vehicular traffic in a seaport environment.
Ferguson, Paul   +4 more
core  

IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION [PDF]

open access: yesKvalita Inovácia Prosperita, 2009
Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS) the organization can identify and reduce risks in this area.
MATÚŠ HORVÁTH, MARTIN JAKUB
doaj  

Understanding the Workforce Needs of New Jersey's Public Health and Other Disaster Management Employers [PDF]

open access: yes, 2008
This report explores the priority workforce needs of New Jersey's public disaster management system. An advisory group of disaster management-related employers from law enforcement and state and local public health systems and educational institutions ...
Aaron Fichtner   +2 more
core  

Design of management system for ventilation security instrument

open access: yesGong-kuang zidonghua, 2014
In view of problem of incomplete instrument record and lack of maintenance system, a management system for ventilation security instrument was designed.
HAN Shu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy