Results 61 to 70 of about 266,507 (244)

Som Based Assurance Assessment for Information Security Management System in Organization [PDF]

open access: yes, 2010
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core  

INTEGRATION OF FRAMEWORK ISO 27001 AND COBIT 2019 IN SMART TOURISM INFORMATION SECURITY PT. YoY INTERNATIONAL MANAGEMENT

open access: yesJurnal Komputer dan Informatika, 2022
Information technology that is growing rapidly becomes a very high threat to information systems. PT. YoY Management Internasional which will manage the location-based smart tourism application so that it is necessary to protect company information, in ...
Muhammad Nawir, I. Ap, Farid Wajidi
semanticscholar   +1 more source

The Role of Technology Standards in Strategic Hedging

open access: yesAsian Politics &Policy, Volume 18, Issue 2, April 2026.
ABSTRACT This article argues that technology standards provide Southeast Asian states with a distinct mechanism for hedging amid intensifying US–China technological rivalry. Traditional hedging strategies emphasizing economic engagement without political alignment are increasingly constrained by the weaponization of technological interdependence ...
Darren J. Lim, Anthea Roberts
wiley   +1 more source

СИСТЕМА УПРАВЛІННЯ ІНФОРМАЦІЙНОЮ БЕЗПЕКОЮ [PDF]

open access: yes, 2013
У даній статті розглядається система управління інформаційною безпекою за стандартом ISO 27001. Стандарт містить вимоги в галузі інформаційної безпеки для створення, розвитку і підтримки системи менеджменту інформаційної ...
Горяна, Ольга Гарривна
core  

Seguridad de la información en el comercio electrónico basado en ISO 27001 : Una revisión sistemática

open access: yesInnovación y Software, 2023
En los últimos años, con la popularización tan acelerada del eCommerce (comercio electrónico), que facilita mucho la vida de las personas que, solo dando un clic, tiene la posibilidad de adquirir innumerables productos prescindiendo de la infraestructura
Gerson Roberth De La Cruz Rodríguez   +2 more
semanticscholar   +1 more source

Evaluation of Off‐Label Postoperative Inhaled Steroid Use in Tracheal and Cricotracheal Resection

open access: yesOtolaryngology–Head and Neck Surgery, Volume 174, Issue 2, Page 473-478, February 2026.
Abstract Objective Tracheal resection (TR) and cricotracheal resection (CTR) are associated with anastomotic complications. Off‐label use of inhaled corticosteroids has gained popularity for reducing tracheal granulation tissue, though adoption remains limited due to unclear safety and efficacy.
Jason Shin Chwa   +3 more
wiley   +1 more source

Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution

open access: yesTrikonomika, 2018
The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certification and determine the maturity level of the information system owned by X Government Institution.
Akmal Zaifullah Maingak   +2 more
doaj   +1 more source

Social Sustainability in Startups: Implementation Pathways and Their Effects on Performance

open access: yesCorporate Social Responsibility and Environmental Management, Volume 33, Issue 1, Page 1528-1544, January 2026.
ABSTRACT Social sustainability remains underexplored in the context of startups. While much attention is given to economic and environmental performance, the social dimensions are frequently overlooked. This gap is particularly significant for startups, as their early‐stage decisions can shape long‐term cultural and social impacts both within their ...
Gabriele Zangara   +2 more
wiley   +1 more source

Integrating COBIT and ISO Frameworks in IT Audits: A Literature Review

open access: yesInternational Journal of Emerging Research in Engineering, Science, and Management
The accelerated evolution of information technology (IT) has compelled organizations to adopt structured governance frameworks to enhance audit efficacy and ensure robust information security.
Muhammad Fauzan Hanif   +4 more
doaj   +1 more source

Implementation Octave-S and Iso 27001controls in Risk Management Information Systems

open access: yesComTech, 2014
Extensive use of information technology in companies put IT into a position which is of considerable concern, especially in large companies that put IT becomes a strategic part of the company. The importance of IT division, make the companies willing to
Stephanus Stephanus
doaj   +1 more source

Home - About - Disclaimer - Privacy