Results 101 to 110 of about 266,507 (244)
A Cross-Country Empirical Study Towards the Impact of Following ISO Management System Standards on Euro-Area Economic Confidence [PDF]
This study aims to examine the impact of following ISO management system standards on economic sentiment indicator (ESI) as proxy of economic agents’ general view concerning economic activity, for 21 European Union member states over 2005-2014.
Ştefan Daniel Armeanu +2 more
doaj
Audit for Information Systems Security [PDF]
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC +2 more
core
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
Propuesta para el cumplimiento de los controles técnicos de la circular 14 basado en el modelo planteado por la Norma ISO 27001, bajo plataforma Oracle [PDF]
Ingeniero (a) de ...
Losada Rivera, Javier Alejandro +1 more
core
Bali Mandara Regional Hospital integrates information technology into its healthcare services, but ransomware attacks pose significant risks to data security.
I Nyoman Adi Artha Wibawa +2 more
doaj +1 more source
Education is often understood as more than just teaching, but as the transfer of knowledge, transformation of values, and development of character with all related aspects.
Ananda Cipta Pamungkas +2 more
doaj +1 more source
Penyusunan Tata Kelola Keamanan Informasi pada Produksi Film Animasi (Kasus di PT. XX) [PDF]
Berjalannya perkembangan teknolgi informasi yang semakin maju dan pesat di era global ini, hal ini berpengaruh terhadap penggunaan teknologi informasi di kalangan Perusahaan swasta. PT.
Dewi, A. C. (Ayu) +2 more
core +1 more source
Risk management model in projects. Conceptual approach for IT projects
This research describes the design of a Risk Management Model for IT Projects, the proposal is presented to be contemplated in the strategic planning as an alternative for its implementation.
Torcoroma Velasquez Pérez +2 more
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
On relations between cyber security index and iso 27001 standard index in western balkan countries
My aim in this article was to illustrate the relationships between the Western Balkan nations’ ISO 27001 index and the cyber security index, given the growing global interest in cyber security.
Enriko Ceko
semanticscholar +1 more source

