Results 181 to 190 of about 10,997 (203)
Some of the next articles are maybe not open access.
2022 9th International Conference on Electrical and Electronics Engineering (ICEEE), 2022
Malaysian organizations are following different methods for cybersecurity risk assessment such as Control Objectives for Information and Related Technologies (COBIT) and International Organization for Standardization (ISO) 27001.
Abdulaziz Aborujilah +5 more
semanticscholar +1 more source
Malaysian organizations are following different methods for cybersecurity risk assessment such as Control Objectives for Information and Related Technologies (COBIT) and International Organization for Standardization (ISO) 27001.
Abdulaziz Aborujilah +5 more
semanticscholar +1 more source
Cybersecurity Auditing in the Digital Age: A Review of Methodologies and Regulatory Implications
Journal of Frontiers in Multidisciplinary Research, 2022In an increasingly digitized and interconnected global environment, cybersecurity auditing has become a critical pillar in safeguarding organizational assets and ensuring regulatory compliance.
Oluwatosin Ilori +4 more
semanticscholar +1 more source
A Methodology to Support Automatic Cyber Risk Assessment Review
arXiv.org, 2022Cyber risk assessment is a fundamental activity for enhancing the protection of an organization, identifying and evaluating the exposure to cyber threats.
M. Angelini, Silvia Bonomi, A. Palma
semanticscholar +1 more source
Evaluation of Information Security Management Using the KAMI Index Framework
2022 International Conference of Science and Information Technology in Smart Administration (ICSINTESA), 2022The KAMI index is an instrument to analyze the quality of the completeness and maturity of the implementation of information security for an organization based on the criteria of SNI ISO/IEC 27001.
Tina Tri Wulansari, Dody Novandi
semanticscholar +1 more source
The Holistic Approach to Cybersecurity in Academia
CEEeGov, 2022Academic institutions are increasingly implementing digital services and new technologies, for a modern and accessible educational environment. But the virtual environment creates unknown vulnerabilities that need to be addressed properly.
A. Alexei, P. Nistiriuc, A. Alexei
semanticscholar +1 more source
ISO27001 as a Tool for Availability Management
2022 International Conference on Advanced Enterprise Information System (AEIS), 2022Many companies seek to gain reputation by going through a certification process, and the standard of choice for many companies will be the ISO 27001:2013 standard [1], A thorough literature review on ISO27001 research [8] found that only 26% of the ...
Jan Marius Evang
semanticscholar +1 more source
Implementation of ESG Sustainable Development Concept Criteria Using the Robust Design Methods
2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), 2022The article describes an attempt to solve the problem of sustainable development. The strategy for achieving sustainable development goals is based on the implementation of criteria of the ESG concept.
P. A. Lontsikh +4 more
semanticscholar +1 more source
Methodology for Ensuring EDI Security
2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), 2022This publication covers the actual issues of developing up-to-date methodological basis for providing security of electronic document management systems.The brief analysis of challenges in ensuring security is given.
I. Livshitz +3 more
semanticscholar +1 more source
A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022In the last years, the increasing number of cyber-attacks on vehicles has shown the importance to implement security solutions within the automotive domain.
Gianpiero Costantino +2 more
semanticscholar +1 more source
Accounting in Europe, 2022
This study explores the impact of the implementation of Directive 2014/95/EU on the comparability of non-financial information across listed European firms, focusing on the usage of non-financial reporting (NFR) frameworks – those developed by the SASB ...
R. Breijer, René P. Orij
semanticscholar +1 more source
This study explores the impact of the implementation of Directive 2014/95/EU on the comparability of non-financial information across listed European firms, focusing on the usage of non-financial reporting (NFR) frameworks – those developed by the SASB ...
R. Breijer, René P. Orij
semanticscholar +1 more source

