Results 71 to 80 of about 10,997 (203)

Models, Guidelines and Frameworks for Sustainable Management: A Bibliometric Analysis From the Perspective of Interdisciplinarity

open access: yesBusiness Strategy and the Environment, Volume 34, Issue 6, Page 6735-6753, September 2025.
ABSTRACT The ongoing challenges of climate change, ecosystem degradation and demand for natural resources make sustainability a global priority. Models, guidelines and frameworks are particularly valuable in the field of management as they help to solve problems. This study aims to explore them from an interdisciplinary perspective, including a concern
Arnaldo Pinheiro Costa Gaio   +5 more
wiley   +1 more source

Strategi Optimalisasi Manajemen Konfigurasi untuk Keamanan Informasi Berdasarkan ISO/IEC 27001:2022

open access: yesJournal of Emerging Information Systems and Business Intelligence (JEISBI)
Keamanan informasi merupakan salah satu aspek yang krusial bagi organisasi. Upaya peningkatan keamanan informasi juga harus menjadi fokus utama untuk meminimalisir segala risiko yang bisa saja terjadi pada organisasi. Kerentanan keamanan ini juga berkaitan dengan manajemen konfigurasi.
Febri Pujiani, Rahadian Bisma
openaire   +1 more source

Implementing ISO/IEC 27001:2022 in a SME : a case study using Cyberday [PDF]

open access: yes
The digital age poses growing threats like data breaches and ransomware, challenging consulting enterprises managing client data. The ISO/IEC 27001:2022 standard offers a globally recognized framework for building an Information Security Management ...
Nygård, Magdalena
core  

Stereo‐cell: Advancing spatial single‐cell biology towards clinical translation

open access: yesClinical and Translational Medicine, Volume 15, Issue 9, September 2025.
Abstract Stereo‐cell is a newly developed platform for spatial single‐cell sequencing that integrates morphology, transcriptomics, and proteomics in high resolution. By preserving spatial context while enabling multimodal profiling, it bridges the gap between advanced omics and traditional pathology, supporting the detection of rare cells and ...
Christian Baumgartner
wiley   +1 more source

Utilizing ISO 27001:2022 to Design Information Security for BPRACo SME Digital Transformation

open access: yesJurnal Teknologi Dan Sistem Informasi Bisnis
In the digital age of the Industrial Revolution 4.0, organizations like BPRACo must undergo Digital Transformation (DT). A significant challenge is the lack of adequate information security controls, which can lead to DT failure. Smaller banks, such as BPR, face difficulties in adopting effective information security management strategies that are ...
Muharman Lubis   +2 more
openaire   +1 more source

EL IMPACTO DE LA INTELIGENCIA ARTIFICIAL EN LA AUTOMATIZACIÓN DE AUDITORÍAS EN CUMPLIMIENTO DE LAS LEYES DE PROTECCIÓN DE DATOS [PDF]

open access: yes
Este artigo apresenta uma revisão sistemática da literatura sobre o uso da Inteligência Artificial (IA) na automação de auditorias em conformidade com as leis de proteção de dados, como a Lei Geral de Proteção de Dados Pessoais (LGPD) no Brasil, o ...
Magera Conceição, Márcio   +1 more
core   +2 more sources

CyberESP: An Integrated Cybersecurity Framework for SMEs

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 9, September 2025.
ABSTRACT Cybersecurity is a critical global concern, particularly for small‐ and medium‐sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi‐automated tool to ensure Spanish SMEs' cybersecurity management.
Jose A. Calvo‐Manzano   +5 more
wiley   +1 more source

Utilizing ISO 27001:2022 In Information Security Design For BPRCCo SME Digital Transformation

open access: yesRanah Research : Journal of Multidisciplinary Research and Development
In the industrial revolution 4.0 era, organizations like BPRCCo need to carry out Digital Transformation (TD) to remain competitive. However, the main challenge in this process is information security which is often result of TD failure. Previous research highlights the importance of ambidextrous information security management (traditional and agile ...
Fandi Ahmad Atqan Setyoso   +2 more
openaire   +1 more source

Evaluasi Keamanan Teknologi Informasi Menggunakan Indeks Keamanan Informasi 5.0 dan ISO/EIC 27001:2022

open access: yesJurnal SAINTEKOM
In the era of digital transformation, data has become something valuable but vulnerable to leaks. According to Lanskap Keamanan SIber Indonesia 2022, there were 311 data leakage incidents that occurred in Indonesia. Many tools can be used to evaluate information security, one of which is the Information Security Index (ISI).
Lucia Devlina Adventia Jelita   +2 more
openaire   +2 more sources

ISO/IEC 27001: An empirical multi-method research [PDF]

open access: yes, 2023
The adoption of digital technologies, the emergence of platform-based business models, and the switch to smart working practices are increasing the number of potential entry points in firms’ networks and therefore their potential vulnerabilities. However,
PODRECCA, MATTEO
core  

Home - About - Disclaimer - Privacy