Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Security Policy Management Process within Six Sigma Framework"
written by Vijay Anand, Jafar Saniie, Erdal Oruklu,
published by Journal of Information Security, Vol.3 No.1, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA
2019
[2] Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education
2018
[3] 'Review of information security policy based on content coverage and online presentation in higher education
2018
[4] Examining the relationship of business operations and the information security culture in the United States
2017
[5] Application of Six Sigma Tools for Improvement of Information Security Management System
2017
[6] ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA PADA …
2017
[7] ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA PADA PT …
2017
[8] Melhores práticas do COBIT, ITlL e ISO/IEC 27002 para implantação de política de segurança da informação em Instituições Federais do Ensino Superior
2017
[9] A generic framework for information security policy development
2017
[10] On the Cost of Cyber Security in Smart Business
2017
[11] Information security policy development and implementation: The what, how and who
Computers & Security, 2016
[12] TRAINING USERS TO BE AWARE OF COMPUTER AND INFORMATION SECURITY ON COLLEGE AND UNIVERSITY CAMPUSES.
Journal of Information Systems Technology & Planning, 2016
[13] SELinux Integrity Instrumentation (SII): Instrumenting SELinux for configuration auditing and integrity monitoring
ProQuest Dissertations Publishing, 2016
[14] Melhores práticas para implantar política de segurança da informação e comunicação em instituições federais de ensino superior
2016
[15] Cyber security management: a governance, risk and compliance framework
2016
[16] Antecedents of employee participation in internal control design and intent to comply with information system security policies
2015
[17] SELINUX INTEGRITY INSTRUMENTATION (SII): INSTRUMENTING SELINUX FOR CONFIGURATION AUDITING AND INTEGRITY MONITORING.
2015
[18] E–business, recent threats and security countermeasures
International Journal of Electronic Security and Digital Forensics, 2014
[19] E-business, recent threats and security countermeasures
International Journal of Electronic Security and Digital Forensics, 2014
[20] Operational Risk Management for Derivatives Using Wonhyo's Elliptical Orbit Model: Consilience for Lean Six Sigma, Data Security, ISO, Accounting …
2014
[21] Operational Risk Management for Derivatives Using Wonhyo's Elliptical Orbit Model: Consilience for Lean Six Sigma, Data Security, ISO, Accounting …
2014
[22] Information Security Policy Development: A Literature
2014
[23] Exploring information technology security requirements for academic institutions to reduce information security attacks, breaches, and threats
2014
[24] SCHOOL OF COMPUTING AND INFORMATICS
Thesis, 2012
[25] Optimizing Rational Decision Making When Reasoning About Enhancing Pki Security for Government: a Quantitative Decision Support Approach
Thesis, 2012
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top