Results 61 to 70 of about 290,825 (260)
Tietoturvakartoitus ISO/IEC 27001-standardin mukaan [PDF]
Opinnäytetyössä perehdytään ISO/IEC 27001-standardin tietoturvavaatimuksiin. Haetaan vastausta kysymykseen, mikä on esimerkkiyrityksen henkilöstön tietoturva-osaamisen taso tällä hetkellä.
Saari, Hannele
core +1 more source
The Role of B Corp Certification in Uncertain Times: An Empirical Investigation
ABSTRACT This paper aims to examine whether B Corp certification enhances firms' ability to navigate uncertain times and how contingent factors affect its effectiveness. Building on Stakeholder Theory and the Resource‐Based View, we formulated a set of research hypotheses and tested them with a long‐term event study and an ordinary least squares ...
Matteo Podrecca +2 more
wiley +1 more source
Information security, is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access to data, unlawful use, disclosure, disruption. This
Amar Y. El-Bably
doaj +1 more source
ANALISIS SISTEM KEAMANAN INFORMASI BERDASARKAN PENDEKATAN ISO/IEC 27001:2013 (Studi Kasus : Laboratorium Teknik Informatika Universitas Pasundan Bandung) [PDF]
Informasi merupakan hal yang sangat penting bagi organisasi. Pengelolaan yang baik diperlukan karena informasi merupakan aset yang sangat bernilai. Jika hal tersebut diakses oleh pihak yang tidak berhak maka dapat berpengaruh terhadap keberlangsungan ...
Rizka Tri Anugrah, 13.304.0219
core
Run-time risk management in adaptive ICT systems [PDF]
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay +4 more
core +1 more source
Certification of Open Source Software Compliance: Insights From a Conjoint Experiment
ABSTRACT Open source software (OSS) is becoming increasingly crucial for companies as they use OSS components in a wide range of products, including cars, smart‐home equipment, and many more, as well as in their internal processes. However, OSS comes with regulations and licensing conditions with which companies need to comply.
Michael A. Zaggl +2 more
wiley +1 more source
A segurança da informação destaca-se como uma das principais preocupações em diversas organizações. Para garantir que as informações e os sistemas de informações estejam protegidos contra ameaças de todos os tipos é necessário definir processos ...
Ricardo Ribeiro Mendes +3 more
doaj +1 more source
The Italian Tier1 center is mainly focused on LHC and physics experiments in general. Recently we tried to widen our area of activity and established a collaboration with the University of Bologna to set-up an area inside our computing center for hosting
Chierici Andrea +9 more
doaj +1 more source
KAMI index as an evaluation of academic information system security at XYZ university
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community.
Andi Sofyan Anas +3 more
doaj +1 more source
Information technology that is growing rapidly becomes a very high threat to information systems. PT. YoY Management Internasional which will manage the location-based smart tourism application so that it is necessary to protect company information, in ...
M. Nawir, I. Ap, Farid Wajidi
semanticscholar +1 more source

