Results 61 to 70 of about 290,825 (260)

Tietoturvakartoitus ISO/IEC 27001-standardin mukaan [PDF]

open access: yes, 1995
Opinnäytetyössä perehdytään ISO/IEC 27001-standardin tietoturvavaatimuksiin. Haetaan vastausta kysymykseen, mikä on esimerkkiyrityksen henkilöstön tietoturva-osaamisen taso tällä hetkellä.
Saari, Hannele
core   +1 more source

The Role of B Corp Certification in Uncertain Times: An Empirical Investigation

open access: yesBusiness Ethics, the Environment &Responsibility, EarlyView.
ABSTRACT This paper aims to examine whether B Corp certification enhances firms' ability to navigate uncertain times and how contingent factors affect its effectiveness. Building on Stakeholder Theory and the Resource‐Based View, we formulated a set of research hypotheses and tested them with a long‐term event study and an ordinary least squares ...
Matteo Podrecca   +2 more
wiley   +1 more source

Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Information security, is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access to data, unlawful use, disclosure, disruption. This
Amar Y. El-Bably
doaj   +1 more source

ANALISIS SISTEM KEAMANAN INFORMASI BERDASARKAN PENDEKATAN ISO/IEC 27001:2013 (Studi Kasus : Laboratorium Teknik Informatika Universitas Pasundan Bandung) [PDF]

open access: yes, 2018
Informasi merupakan hal yang sangat penting bagi organisasi. Pengelolaan yang baik diperlukan karena informasi merupakan aset yang sangat bernilai. Jika hal tersebut diakses oleh pihak yang tidak berhak maka dapat berpengaruh terhadap keberlangsungan ...
Rizka Tri Anugrah, 13.304.0219
core  

Run-time risk management in adaptive ICT systems [PDF]

open access: yes, 2013
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay   +4 more
core   +1 more source

Certification of Open Source Software Compliance: Insights From a Conjoint Experiment

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Open source software (OSS) is becoming increasingly crucial for companies as they use OSS components in a wide range of products, including cars, smart‐home equipment, and many more, as well as in their internal processes. However, OSS comes with regulations and licensing conditions with which companies need to comply.
Michael A. Zaggl   +2 more
wiley   +1 more source

Uma metodologia para implantação de um Sistema de Gestão de Segurança da Informação (SGSI) baseado nas normas ABNT NBR ISO/IEC 27001 e 27002

open access: yesRevista Principia, 2013
A segurança da informação destaca-se como uma das principais preocupações em diversas organizações. Para garantir que as informações e os sistemas de informações estejam protegidos contra ameaças de todos os tipos é necessário definir processos ...
Ricardo Ribeiro Mendes   +3 more
doaj   +1 more source

SGSI project at CNAF [PDF]

open access: yesEPJ Web of Conferences, 2019
The Italian Tier1 center is mainly focused on LHC and physics experiments in general. Recently we tried to widen our area of activity and established a collaboration with the University of Bologna to set-up an area inside our computing center for hosting
Chierici Andrea   +9 more
doaj   +1 more source

KAMI index as an evaluation of academic information system security at XYZ university

open access: yesMatrix: Jurnal Manajemen Teknologi dan Informatika, 2021
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community.
Andi Sofyan Anas   +3 more
doaj   +1 more source

INTEGRATION OF FRAMEWORK ISO 27001 AND COBIT 2019 IN SMART TOURISM INFORMATION SECURITY PT. YoY INTERNATIONAL MANAGEMENT

open access: yesJurnal Komputer dan Informatika, 2022
Information technology that is growing rapidly becomes a very high threat to information systems. PT. YoY Management Internasional which will manage the location-based smart tourism application so that it is necessary to protect company information, in ...
M. Nawir, I. Ap, Farid Wajidi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy