Results 51 to 60 of about 1,942,206 (195)

The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia [PDF]

open access: yes, 2019
Based on the Minister of Health Regulation No.82 of 2013 related to HIS, all hospitals are required to have HIS for healthcare. Even though HIS has a lot of benefits, but on the other hand, it also has several issues of the system such as misuses of data
Nistrina, Khilda
core   +1 more source

Information security of Web-based systems in Iran Institution of public libraries

open access: yesتحقیقات اطلاع‌رسانی و کتابخانه‌های عمومی, 2015
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation.
morteza kokabi, mansor kohi rostami
doaj  

The Role of Information Security Management Systems in Supply Chain Performance Improvement

open access: yesIranian Journal of Information Processing & Management, 2012
In recent years, the researchers have emphasized on positive effect of information system on supply chain performance such as organizational processes integration, information sharing, information technology, etc.
Mohammad Reza Taghva   +2 more
doaj  

NECESSITY OR CHALLENGE - INFORMATION SECURITY FOR SMALL AND MEDIUM ENTERPRISES [PDF]

open access: yesAnnals of the University of Petrosani: Economics, 2010
Due to the inadequate mamagement of information securityexpectations and various unexpected information technology incidents, small and mediumenterprises that lose data or have to cope with a lack of data over a certain period of time maylose business ...
CSABA LÁBODI, PÁL MICHELBERGER
doaj  

Security risk analysis and management

open access: yesMATEC Web of Conferences, 2018
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to ...
Anton Nicolae, Nedelcu Anişor
doaj   +1 more source

Risk management system as the basic paradigm of the information security management system in an organization

open access: yesMATEC Web of Conferences, 2016
Risk is an inherent part of the functioning of every organization therefore the risk management should be a natural activity at each level of management.
Hoffmann Romuald   +2 more
doaj   +1 more source

Implementation of information security management system in the small healthcare organization

open access: yesJournal of Telecommunications and Information Technology, 2006
The contribution describes the scope and main subject designed within DIGI-Q project. The paper contains results from subprojects of information security management system (ISMS) implementation, managed by students of DIGI-Q course.
Jirí Tupa, Frantisek Steiner
doaj   +1 more source

Technical Solution to Information Security of Intelligent Operation and Maintenance System for Urban Rail Transit Vehicles

open access: yesChengshi guidao jiaotong yanjiu
Objective With the rapid growth of urban rail transit scale, the application of information-based intelligent vehicle operation and maintenance system becomes increasingly extensive, and the information security problem of the intelligent vehicle ...
PI Wei
doaj   +1 more source

Implementing Information Security Management Systems [PDF]

open access: yes, 2001
This paper presents the findings of an empirical study of certification auditors’ and information security consultants’ experiences and insights concerning the implementation and certification of information security management systems. Using an action research strategy and a grounded theory research method, the study describes these particular ...
openaire   +1 more source

Information control and security policy in health care information systems [PDF]

open access: yes, 1994
The reliance on information systems forces the health care organizations to consider two security management issues: information control and security policy.
Clark, Lawrence, Lin, Binshan
core  

Home - About - Disclaimer - Privacy