Results 91 to 100 of about 290,825 (260)

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Ontology-Based Evaluation of ISO 27001 [PDF]

open access: yes, 2010
Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to ...
Milicevic, Danijel, Goeken, Matthias
openaire   +2 more sources

Информационная безопасность в машиностроении - проблемы реализации требований международного стандарта ISO 27001 [PDF]

open access: yes, 2014
Для предприятий машиностроительной отрасли является актуальным решение научно-практической проблемы по разработке и внедрению систем управления информационной безопасностью, соответствующих требованиям МС ISO 27001.
Ivchenko, Oleksandr Volodymyrovych   +3 more
core  

Unlocking the Mediating and Moderating Role of Information Security in Information Systems: A Combined TAM, ISM, and HBM Model

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam   +5 more
wiley   +1 more source

Service Engineering 4.0 Applicability: Results From Stakeholders′ Engagement Assessment in the Public Building Construction Projects

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The adoption of Industry 4.0 (I4.0) in service engineering has impacted traditional sectors, including construction. In large‐scale public building construction projects (PBCPs), Service Engineering 4.0 (SE4.0) incorporates robotic process automation, predictive maintenance, the Internet of Things, sensors, cloud computing, digital twins, building ...
Mussa A. Mange   +2 more
wiley   +1 more source

Developing Compliant Audit Information System for Information Security Index: A Study on Enhancing Institutional and Organizational Audits using Web-based Technology and ISO 25010:2011 Total Quality of Use Evaluation

open access: yesJOIV: International Journal on Informatics Visualization
This study aimed to develop the KAMI 4.1 Index system application based on web application technology to provide a platform for controlled audit implementation and improve data management.
Wahyu Adi Prabowo
doaj   +1 more source

Voluntary Restriction or Freedom to Flourish? Self‐Regulation of Commercial Tutoring Providers for Managing Shadow Education

open access: yesEuropean Journal of Education, Volume 60, Issue 4, December 2025.
ABSTRACT Private tutoring, also called private supplementary education or shadow education, has experienced rapid growth in the past two decades. As the phenomenon has expanded globally, so too has the academic literature calling for understanding and effective governance of the sector.
Mohan Dhall
wiley   +1 more source

ANALISIS PENANGGULANGAN KEAMANAN NILAI PRAKTIKUM DI LABORATORIUM TEKNIK INFORMATIKA UNIVERSITAS PASUNDAN DENGAN ISO27001 (Bagian : Manajemen Kejadian Keamanan Informasi) [PDF]

open access: yes, 2016
Keamanan Teknologi Informasi saat merupakan hal yang sangat penting untuk melindungi data dan informasi dari gangguan dan ancaman. Keamanan secara umum dapat diartikan sebagai kondisi terbebas dari ancaman atau bahaya. Laboratorium teknik informatika
DERI TRI YUSTIRA, 103040045   +2 more
core  

Cybersecurity Strategy Development: Towards an Integrated Approach Based on COBIT and ISO 27000 Series Standards

open access: yesStandards
This article presents a practical guide for developing a cybersecurity strategy that integrates COBIT 2019 with the ISO/IEC 27000 series of standards. Although COBIT 2019 provides strong frameworks for IT strategy and governance, it does not specifically
Bilgin Metin   +2 more
doaj   +1 more source

Risk management model in projects. Conceptual approach for IT projects

open access: yesRevista Ingenio, 2017
This research describes the design of a Risk Management Model for IT Projects, the proposal is presented to be contemplated in the strategic planning as an alternative for its implementation.
Torcoroma Velásquez Pérez   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy