Results 191 to 200 of about 266,507 (244)
Some of the next articles are maybe not open access.
A Roadmap to ISMS ISO 27001 Implementation Process
2023 3rd International Conference on Range Technology (ICORT), 2023Due to advancement in ICT systems their usage has increased manifold now a days but at the same time these systems cyber-attacks have also increased at the same pace.
C. Rajak +5 more
semanticscholar +1 more source
Jurnal Ilmiah Media Sisfo
PT XYZ merupakan salah satu perusahaan pelayaran di Indonesia yang mengadopsi penggunaan teknologi dalam proses bisnisnya. Hasil wawancara menunjukkan bahwa perusahaan memiliki risiko gangguan pada listrik, jaringan internet, komunikasi antar user dan ...
Raizsa Noor Jevera Meimo Nakashita +6 more
semanticscholar +1 more source
PT XYZ merupakan salah satu perusahaan pelayaran di Indonesia yang mengadopsi penggunaan teknologi dalam proses bisnisnya. Hasil wawancara menunjukkan bahwa perusahaan memiliki risiko gangguan pada listrik, jaringan internet, komunikasi antar user dan ...
Raizsa Noor Jevera Meimo Nakashita +6 more
semanticscholar +1 more source
Implementing ISO 27001 Security Measures in Educational Open-Source ERP Systems
International Conference on Software Technology and EngineeringThis paper explores the applicability of security standards ISO 27001 to Open-source Enterprise Resource Plan-ning (ERP) software for educational institutes.
Saima Bibi +2 more
semanticscholar +1 more source
Jurnal Media Informasi Teknologi
This study discusses the evaluation of information security at Benyamin Guluh Kolaka Hospital Using the KAMI Index 4.2 with ISO 27001:2013. This study emphasizes two areas of the KAMI Index 4.2 assessment, namely the first area of information security ...
Karmila Sari +3 more
semanticscholar +1 more source
This study discusses the evaluation of information security at Benyamin Guluh Kolaka Hospital Using the KAMI Index 4.2 with ISO 27001:2013. This study emphasizes two areas of the KAMI Index 4.2 assessment, namely the first area of information security ...
Karmila Sari +3 more
semanticscholar +1 more source
2022 1st International Conference on Software Engineering and Information Technology (ICoSEIT), 2022
XYZ government agency utilizes information technology in its operations. The utilization of Information Technology (IT) assets cannot be separated from the risk of information security.
Alfan Cahyo Wicaksono +2 more
semanticscholar +1 more source
XYZ government agency utilizes information technology in its operations. The utilization of Information Technology (IT) assets cannot be separated from the risk of information security.
Alfan Cahyo Wicaksono +2 more
semanticscholar +1 more source
2024 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
Universities serve as hubs for knowledge acquisition, making it crucial for them to implement effective information security policies to protect their assets.
Muhamad Ronald Lullah +2 more
semanticscholar +1 more source
Universities serve as hubs for knowledge acquisition, making it crucial for them to implement effective information security policies to protect their assets.
Muhamad Ronald Lullah +2 more
semanticscholar +1 more source
Utilizing ISO 27001:2022 to Design Information Security for BPRACo SME Digital Transformation
Jurnal Teknologi Dan Sistem Informasi BisnisIn the digital age of the Industrial Revolution 4.0, organizations like BPRACo must undergo Digital Transformation (DT). A significant challenge is the lack of adequate information security controls, which can lead to DT failure.
Raihan Rakan, R. Mulyana, Muharman Lubis
semanticscholar +1 more source
Journal of Digital Business and Innovation Management
In the rapidly evolving digital era, information security has become a major concern for various organizations, including educational institutions that are facing pressures such as "publish or perish" and performance metrics like VOS viewer.
Demas Muhammad Rijal +5 more
semanticscholar +1 more source
In the rapidly evolving digital era, information security has become a major concern for various organizations, including educational institutions that are facing pressures such as "publish or perish" and performance metrics like VOS viewer.
Demas Muhammad Rijal +5 more
semanticscholar +1 more source
Maturity Level Risk Assessment in Media Companies Using the ISO 27001 Framework
Journal of Digital Business and Innovation ManagementThis study aims to assess the maturity level of information security in media companies using the ISO 27001 framework. With the rapid growth of the media industry and increasing cyber security risks, media companies must ensure that their information ...
Anne Ivena Wijaya +4 more
semanticscholar +1 more source
Review of ISO 9001:2015 and ISO 27001:2013 Implementation in Financial Institution – Case Study
International Convention on Information and Communication Technology, Electronics and MicroelectronicsIn today’s technologically-driven world, protecting ICTs (Information and Communication Technologies) is of great importance. Due to the amount of personal data and the obligations of high transaction accuracy, financial institutions such as banks and ...
Ajla Cerimagic Hasibovic, A. Tanovic
semanticscholar +1 more source

