Results 91 to 100 of about 290,825 (260)
Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza +4 more
wiley +1 more source
Ontology-Based Evaluation of ISO 27001 [PDF]
Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to ...
Milicevic, Danijel, Goeken, Matthias
openaire +2 more sources
Информационная безопасность в машиностроении - проблемы реализации требований международного стандарта ISO 27001 [PDF]
Для предприятий машиностроительной отрасли является актуальным решение научно-практической проблемы по разработке и внедрению систем управления информационной безопасностью, соответствующих требованиям МС ISO 27001.
Ivchenko, Oleksandr Volodymyrovych +3 more
core
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam +5 more
wiley +1 more source
The adoption of Industry 4.0 (I4.0) in service engineering has impacted traditional sectors, including construction. In large‐scale public building construction projects (PBCPs), Service Engineering 4.0 (SE4.0) incorporates robotic process automation, predictive maintenance, the Internet of Things, sensors, cloud computing, digital twins, building ...
Mussa A. Mange +2 more
wiley +1 more source
This study aimed to develop the KAMI 4.1 Index system application based on web application technology to provide a platform for controlled audit implementation and improve data management.
Wahyu Adi Prabowo
doaj +1 more source
ABSTRACT Private tutoring, also called private supplementary education or shadow education, has experienced rapid growth in the past two decades. As the phenomenon has expanded globally, so too has the academic literature calling for understanding and effective governance of the sector.
Mohan Dhall
wiley +1 more source
ANALISIS PENANGGULANGAN KEAMANAN NILAI PRAKTIKUM DI LABORATORIUM TEKNIK INFORMATIKA UNIVERSITAS PASUNDAN DENGAN ISO27001 (Bagian : Manajemen Kejadian Keamanan Informasi) [PDF]
Keamanan Teknologi Informasi saat merupakan hal yang sangat penting untuk melindungi data dan informasi dari gangguan dan ancaman. Keamanan secara umum dapat diartikan sebagai kondisi terbebas dari ancaman atau bahaya. Laboratorium teknik informatika
DERI TRI YUSTIRA, 103040045 +2 more
core
This article presents a practical guide for developing a cybersecurity strategy that integrates COBIT 2019 with the ISO/IEC 27000 series of standards. Although COBIT 2019 provides strong frameworks for IT strategy and governance, it does not specifically
Bilgin Metin +2 more
doaj +1 more source
Risk management model in projects. Conceptual approach for IT projects
This research describes the design of a Risk Management Model for IT Projects, the proposal is presented to be contemplated in the strategic planning as an alternative for its implementation.
Torcoroma Velásquez Pérez +2 more
doaj +1 more source

