Results 101 to 110 of about 290,825 (260)

A Risk Management Process for Consumers [PDF]

open access: yes, 2010
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the ...
Cleeff, André van
core   +2 more sources

A Cross-Country Empirical Study Towards the Impact of Following ISO Management System Standards on Euro-Area Economic Confidence [PDF]

open access: yesAmfiteatru Economic, 2017
This study aims to examine the impact of following ISO management system standards on economic sentiment indicator (ESI) as proxy of economic agents’ general view concerning economic activity, for 21 European Union member states over 2005-2014.
Ştefan Daniel Armeanu   +2 more
doaj  

Manual safety information to state colombian agency [PDF]

open access: yes, 2000
El manual de seguridad de la información permite determinar las fortalezas y debilidades que tiene la organización frente a los activos de información, conocer el estado actual ante seguridad de información y sus controles, con el fin de crear ...
Santamaría Ramírez, Juliana Andrea
core   +1 more source

Audit for Information Systems Security [PDF]

open access: yes
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC   +2 more
core  

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Information Security Evaluation at Hospital Using Index KAMI 5.0 and Recommendations Based on ISO/IEC 27001:2022

open access: yesJournal of Information Systems and Informatics
Bali Mandara Regional Hospital integrates information technology into its healthcare services, but ransomware attacks pose significant risks to data security.
I Nyoman Adi Artha Wibawa   +2 more
doaj   +1 more source

Information Security Risk Management Web-Based Final Semester Summative Assessment Application Using ISO 27001:2013

open access: yesJournal of Information Systems and Informatics
Education is often understood as more than just teaching, but as the transfer of knowledge, transformation of values, and development of character with all related aspects.
Ananda Cipta Pamungkas   +2 more
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

Risk management model in projects. Conceptual approach for IT projects

open access: yesRevista Ingenio, 2016
This research describes the design of a Risk Management Model for IT Projects, the proposal is presented to be contemplated in the strategic planning as an alternative for its implementation.
Torcoroma Velasquez Pérez   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy