Results 81 to 90 of about 10,997 (203)

The Melbourne Institute Data Lab, a Secure Access Environment for Informing Future Social and Economic Policy

open access: yesAustralian Economic Review, Volume 58, Issue 3, Page 259-271, September 2025.
ABSTRACT Policy analysts and academics play a critical role in informing policy design, implementation and evaluation. They apply their understanding of current social and economic issues, test theoretical frameworks and present new ideas that are a part of the ecosystem for promoting and sustaining efficient and equitable delivery of government ...
Chaminda Rajeev Samarage   +1 more
wiley   +1 more source

The effects of overwithholding and retroactive savings options on retirement savings: An experimental analysis

open access: yesContemporary Accounting Research, Volume 42, Issue 3, Page 1899-1928, Fall 2025.
Abstract In three experiments, we examine how the widespread phenomenon of overwithholding affects retirement savings and how the additional option at tax time of saving retroactively for retirement affects total savings levels. Our results show that overwithholding significantly reduces retirement savings. We show that this outcome can be explained by
Kay Blaufus   +2 more
wiley   +1 more source

Herramienta digital para optimizar auditorías basadas en el estándar ISO/IEC 27001:2022

open access: yesREVISTA COLOMBIANA DE TECNOLOGIAS DE AVANZADA (RCTA)
Este artículo presenta una investigación aplicada orientada al diseño, desarrollo y validación de SECUREISO, una herramienta digital concebida para optimizar los procesos de auditoría en sistemas de gestión de seguridad de la información, bajo el estándar ISO/IEC 27001:2022.
Sebastian Buesaco   +4 more
openaire   +1 more source

Aayush Pandey [PDF]

open access: yes
In this thesis, a meta-analytical review of ISO/IEC 27001 and its ability to decrease the frequency of security breaches in cyberspace are this thesis provides, and the direct consideration of the results of the implementation of the control at the ...
Pandey, Aayush
core  

Analisis dan Manajemen Risiko Keamanan Informasi Menggunakan Metode Failure Mode and Effects Analysis (FMEA) dan Kontrol ISO/IEC 27001:2022 (Studi Kasus: Dinas Komunikasi, Informatika, dan Statistik Kabupaten XYZ) [PDF]

open access: yes
Teknologi informasi merupakan salah satu kebutuhan penting sebuah organisasi untuk menunjang kegiatan operasional serta membantu meningkatkan efisiensi dan efektifitas proses kegiatan organisasi. Namun, penggunaan TI melibatkan risiko keamanan informasi,
Ciptaningtyas, Henning Titi   +2 more
core   +2 more sources

ANALISIS DAN PENERAPAN MANAJEMEN RISIKO APLIKASI PEMANTAUAN SERTA SISTEM MANAJEMEN KEAMANAN INFORMASI MENGGUNAKAN [PDF]

open access: yes, 2022
In the success of the Electronic-Based Government System and Information Security Management System (SMKI), the West Java KPID must participate in it.
Hendayun, M., Nurdiansyah, Topan
core   +1 more source

Desarrollo de un aplicativo Web para la valoración del riesgo tecnológico basado en la Norma ISO 27001 para la seguridad de la información. [PDF]

open access: yes
PDFLa ejecución de un sistema ISO 27001:2022 demanda un análisis minucioso de procesos, activos y controles, adaptándose a estándares establecidos. Por eso se optó por el desarrollo de un aplicativo web basado en la norma ISO 27001:2022 para evaluar ...
Castro Panchana, Carlos David   +1 more
core   +1 more source

Teaching Case: Combining Standards to Conduct Risk Assessment at SecureEnd Solutions [PDF]

open access: yes
In today’s cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process.
Al-Abdullah, Muhammad   +2 more
core   +2 more sources

Information Security Management System Assessment Model by Integrating ISO 27002 and 27004 [PDF]

open access: yes
The rapid development of information and communication technology has also led to a significant increase in cybercrime activities. According to the Annual Cybersecurity Monitoring Report by the National Cyber and Cryptography Agency, there were 495 ...
Fajri, Khafidh Sunny Al, Harwahyu, Ruki
core   +2 more sources

Influencia de controles de seguridad ISO 27001-7002:2022 con la seguridad de la información en las notarías públicas de la provincia de Trujillo [PDF]

open access: yes
La finalidad de la presente investigación fue establecer como influye los Controles de Seguridad ISO 27001-27002:2022 con la seguridad de la información en las Notarías Públicas de la provincia de Trujillo.
Guijón Guerra, Carlos Augusto Lorenzo   +1 more
core  

Home - About - Disclaimer - Privacy