Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"ISO/IEC 27000, 27001 and 27002 for Information Security Management"
written by Georg Disterer,
published by Journal of Information Security, Vol.4 No.2, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] BYOD security issues: A systematic literature review
Gayar, C Noteboom… - … Security Journal: A …, 2022
[2] A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
IEEE Access, 2022
[3] Intergenerational knowledge management in a cutting-edge Israeli industry: Visions and challenges
Plos one, 2022
[4] Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova
Scientific and Practical Cyber Security Journal (SPCSJ), 2022
[5] Initial Development of a Roadmap for Digital Engineering Simulations Curriculum
2022 IEEE …, 2022
[6] The Holistic Approach to Cybersecurity in Academia
… and Eastern European eDem and eGov …, 2022
[7] Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
Sustainability, 2022
[8] Information security and privacy in hospitals: a literature mapping and review of research gaps
Informatics for Health and …, 2022
[9] Digital production and supply supported by lifecycle management in industry 4.0
2022
[10] Understanding Cybersecurity Standards
Cybersecurity in Morocco, 2022
[11] Standard Analysis of Document Control as Information According to ISO 27001 2013 in PT XYZ
… Computing and Social …, 2022
[12] Enhanced Organizational Security Awareness: A Qualitative Study
2022
[13] SUCCESS FACTORS INFLUENCING CYBER SECURITY RISK MANAGEMENT IMPLEMENTATION: THE CASES OF LARGE NIGERIAN ORGANISATIONS
2022
[14] Factors Influencing the Use of Conceptual Frameworks in The Field of IT Management
2022
[15] Design and Implementation of Smart Glasses with ISMS and Risk Management Functionalities for a Technical Operator
Journal homepage: http …, 2022
[16] Tietoturvatietoisuuden kehittäminen finanssialan organisaatiossa
2022
[17] PLAN DE CONTINGENCIA PARA ASEGURAR LA INTEGRIDAD DE LOS EQUIPOS Y SISTEMAS INFORMÁTICOS EN LA UNIVERSIDAD ESTATAL DEL SUR DE …
2022
[18] Vishing: ett ökande hot: Hur Sveriges regioner bemöter vishing inom hälso-och sjukvården
2022
[19] Model za unapređenje poslovanja i konkurentnosti preduzeća zasnovan na informacionim sistemima i donošenju odluka
Универзитет у Новом Саду, 2022
[20] Informasjonssikkerhetsarbeid gjennom ledelsessystemer for informasjonssikkerhet: En casestudie for EA Smith
2021
[21] IT-säkerhetshotet phishing: Svenska små och medelstora företags utbildningsinsatser inom problemområdet
2021
[22] ISO 27001-certifieringars påverkan på informationssäkerhets-medvetenhet i ett SMF: Förändringar till följd av en certifieringsprocess för ett företag inom IT-sektorn
2021
[23] Yhdistetty tietoturvan varmennus standardien ISO/IEC 27006 ja ISAE 3000 mukaisesti
2021
[24] Overlapping Concept to Action Between Information Assurance and Information Security
Information Technology Journal, 2021
[25] Data security requirements in third country transfers
2021
[26] Similarity and Dissimilarity between Information Security and Information Assurance
Information Technology Journal, 2021
[27] Application of Lean methodologies in Information Security processes improvement
2021
[28] Automatización de un sistema de gestión de seguridad de la información basado en la Norma ISO/IEC 27001
Revista Universidad y Sociedad, 2021
[29] Maturity of information systems security in selected private Banks in Ethiopia
2021 International Conference on …, 2021
[30] A study on the internal security of companies: Internal practices regarding risks in digitised working environments and employees relation to information security
2021
[31] INFORMATION SECURITY AWARENESS AND ITS IMPACT ON THE CISO'S RESPONSIBILITIES-A STUDY OF THE PORTUGUESE ENVIRONMENT.
Journal of Information System Security, 2021
[32] Raising Awareness on Secure Coding in the Industry through CyberSecurity Challenges.
2021
[33] Implementing Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
Electronics, Communications and Computing, 2021
[34] Integrated information risk management framework
2021
[35] Maintaining Security in the Era of Microarchitectural Attacks
2021
[36] (CSM2-RA-R2-TI): Cyber Security Maturity Model for Risk Assessment Using Risk Register for Threat Intelligence
Journal of Physics: Conference …, 2021
[37] Cyber security strategies for higher education institutions
2021
[38] A mobile serious game to promote digital wellness among pre-school children
2021
[39] Distributed ledger for cybersecurity: issues and challenges in railways
Sustainability, 2021
[40] System of Systems Lifecycle Management: A New Concept Based on Process Engineering Methodologies
2021
[41] Combating the Exploitation of Children in Cyberspace: Technical Mechanisms to Protect Children From Sexual Content
2021
[42] The impact of CIO characteristics on data breaches
International Journal of Accounting …, 2021
[43] Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications
IEEE Transactions on …, 2021
[44] Proposal for an implementation guide for a computer security incident response team on a university campus
Ch, I Ortiz-Garces, S Sánchez-Viteri - Computers, 2021
[45] Automated Enterprise Architecture Model Mining
2021
[46] MARISMA-BiDa pattern: Integrated risk analysis for big data
2021
[47] Information Security Management in ICT and Non-ICT Sector Companies: A Preventive Innovation Perspective
2021
[48] ANALYSIS OF SECURITY FRAMEWORKS IMPLEMENTED IN HEI's
2021
[49] Analysis of System Security Levels of Tax Payment and Regional Retribution Based on ISO/IEC27002: 2013 Standard Using SSE-CCM
2021
[50] A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
IAENG International Journal of Computer Science, 2021
[51] Doxing: Painting a Target on Someone's back: Characterization and Mitigation Practices
2021
[52] Control Design of Information Security Related to Privacy in The Smart SIM Business Process
2021
[53] Analysis of ISO/IEC 27001 to Encourage its Adoption in Nigerian Businesses
World Journal of Innovative Research, 2021
[54] Requisitos e recomendações para o desenvolvimento e operação de um SGSI–Abordagem com ISO 27001/27002
2021
[55] A Conceptual Hybrid Approach for Information Security Governance
2021
[56] Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard
2021
[57] System of Systems Lifecycle Management—A New Concept Based on Process Engineering Methodologies
2021
[58] Comparing Blockchain Standards and Recommendations
2020
[59] International diffusion of the information security management system standard ISO/IEC 27001: exploring the role of culture
2020
[60] Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal
2020
[61] Analysis of cybersecurity standard and framework components
2020
[62] The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)
2020
[63] Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education …
2020
[64] Vulnerable Code Detection Using Software Metrics and Machine Learning
2020
[65] Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era
2020
[66] ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de dados …
2020
[67] Un Nouveau Modèle de Gestion Dynamique de la Confiance pour la Fédération des Identités Dans le Cloud Computing
2020
[68] Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
2020
[69] Manual de buenas prácticas en seguridad de la información para entornos hospitalarios
2020
[70] Skladnost zaščite in varovanja v podjetju s standardom ISO/IEC 27001: 2013: Magistrska naloga
2020
[71] LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO.
2020
[72] DESARROLLO DE UN SISTEMA DE CONTROL DE ACCESO INFORMÁTICO BASADO EN LLAVES ANÁLOGAS DE SEGURIDAD APLICADAS A SISTEMAS LINUX …
2020
[73] Information security management frameworks and strategies in higher education institutions: a systematic review
2020
[74] ANALISIS SECURITY ASSESSMENT MENGGUNAKAN METODE PENETRATION TESTING DALAM MENJAGA KAPABILITAS KEAMANAN TEKNOLOGI INFORMASI …
2020
[75] A novel approach for information security risk assessment maturity framework based on ISO 27001
2020
[76] Påverkande faktorer att beakta vid införandet av ett LIS
2020
[77] Effekterna av en ISO/IEC 27001-certifiering: Upplevda förändringar bland små svenska organisationer
2020
[78] Diseño de una política de seguridad de la información para los hoteles miembros de la asociación hotelera de Imbabura, basado en la norma ISO/IEC 27002: 2013
2020
[79] A novel approach for information security risk assessment maturity framework based on ISO 27001 [védés előtt]
2020
[80] DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE GUAYAQUIL EN …
2020
[81] Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis
2020
[82] Performance evaluation of real-time stream processing systems for Internet of Things applications
2020
[83] Security Requirements Engineering Framework with BPMN 2.0. 2 Extension Model for Development of Information Systems
2020
[84] Isolation Design Flow Effectiveness Evaluation Methodology for Zynq SoCs
2020
[85] Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region
2020
[86] Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag
2020
[87] Assessment of Malaysian E-Passport PKI based on ISO 27000 Series International Standards
2020
[88] Smart City Development in Taiwan: From the Perspective of the Information Security Policy
2020
[89] Integration of Software Security Design Analysis to the Agile Development Process
2020
[90] Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations
2020
[91] Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC …
2020
[92] A Study on Organizational IT Security in Mobile Software Ecosystems Literature
2020
[93] Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
2020
[94] An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
2020
[95] Standardisation, Data Interoperability, and GDPR
2020
[96] BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study
2020
[97] ISO/IEC 27001 and IT baseline protection (IT-Grundschutz)
2020
[98] Implementing Security and Trust in IoT/M2M using Middleware
2020
[99] A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard
2020
[100] Data Management: a gentle introduction: Balancing theory and practice
2020
[101] Beadle Schola r
2020
[102] A Study on Enterprises Based on Information Security Education and Training to Improve Continuous Information Security Governance
2020
[103] An Integrative Model of Information Security and Trust in Socio-technical Environments
2020
[104] A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
2020
[105] Critical Success Factors for Managing Information Systems Security in Smart City Enabled by Internet of Things
Int. J. Adv. Res. Eng. Technol, 2020
[106] Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN
2020
[107] Cybersecurity Incident Response Capabilities in the Ecuadorian Small Business Sector: A Qualitative Study
2020
[108] Applying Data Security in a Cloud Service Consumer Business an Exploratory Qualitative Inquiry
2020
[109] Analysis of ISO 27001 Compliance in Tonga Organisations Information Security
2020
[110] Enhancing and integration of security testing in the development of a microservices environment
2020
[111] Analisis Security Assessment Menggunakan Metode Penetration Testing dalam Menjaga Kapabilitas Keamanan Teknologi Informasi Pertahanan Negara
Teknologi …, 2020
[112] Towards an information classification model for Swedish municipalities:: A Case study
2020
[113] Designing an Interest-to-Function Career Alignment Model for Cybersecurity Professionals
2020
[114] Security in Telehealth Systems from a Software Engineering Viewpoint: A Systematic Mapping Study
2020
[115] ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de …
2020
[116] DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE …
2020
[117] Compliance-Portfolio-Management
Benutzerzentrierte Unternehmensarchitekturen, 2020
[118] Análisis de vulnerabilidades y guía para la implementación de la ISO/IEC 27001. Caso de estudio: Nilotex
2020
[119] Siber Güvenlik ve Savunma: Biyometrik ve Kriptografik Uygulamalar
2020
[120] IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE …
2019
[121] The Implementation of an Integrated Management System at Qatar Biobank
2019
[122] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG MENGGUNAKAN …
2019
[123] IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE GUAYAQUIL …
2019
[124] Actividad física y salud ósea en escolares entre 8 y 16 años de la ciudad de Cartago-Valle
2019
[125] Facultad de Ingeniería en Electricidad y Computación
2019
[126] Managing security and compliance risks of outsourced IT projects
2019
[127] Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
2019
[128] Taloushallinnon yrityksen valmistautuminen EU: n uuteen tietosuoja-asetukseen
2019
[129] DISEÑO DE UN SITIO WEB PUBLICITARIO PARA LA VETERINARIA “GARRAS Y PATAS” DE LA CIUDAD DE GUAYAQUIL EN EL PERÍODO 2017”.
2019
[130] ISO/IEC 27001-sertifioinnin hankintaperusteet ja sertifiointielimen valintaperusteet
2019
[131] The cyber-resilience of financial institutions: significance and applicability
2019
[132] Developing Dynamic Digital Information Security Management Model for Indian University Libraries
2019
[133] Cybersecurity for railways–A maturity model
2019
[134] YMPÄRISTÖTEKIJÖIDEN VAIKUTUS TIETOJÄRJESTELMIEN HANKINTAAN, KÄYTTÖÖNOTTOON JA KÄYTTÖÖN KOULUTUS-JA TUTKIMUS …
2019
[135] Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
2019 IEEE International Conference on Industrial Technology (ICIT), 2019
[136] Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
2019
[137] PROPUESTA DE SISTEMA DE GESTIÓN DE SEGURIDAD DE LA INFORMACIÓN UTILIZANDO LA NORMA ISO 27001 PARA LA UNIDAD EDUCATIVA NUESTRA …
2019
[138] A new comprehensive solution to handle information security Governance in organizations
2019
[139] Is human the weakest link in information security?: systematic literature review
2019
[140] Diseño de un modelo de seguridad de la información, basado en OSSTMMV3, NIST SP 800-30 E ISO 27001, para centros de educación: caso de estudio …
2019
[141] SGSI project at CNAF
2019
[142] A Quantitative Predictive Assessment of Burnout and the Personal Profile of Information Technology Staff in Medium-sized Organizations
2019
[143] Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …
2019
[144] Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
2019
[145] Moving Target Defense to Improve Industrial Control System Resiliency
2019
[146] Communication and Cybersecurity of Autonomous Passenger Ferry
2019
[147] Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems
2019
[148] Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
2019
[149] A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
2019
[150] Encouraging Employees on Compliant Behaviours about Information Security Measures in Workplaces
2019
[151] SECURITY DATA GOVERNANCE SYSTEM
2019
[152] MEDICAL DEVICE QUALITY: MANAGING CYBERSECURITY DESIGN REQUIREMENTS THROUGH THE APPLICATION OF PDSA AND QFD _ A Thesis
2019
[153] Principles, Domains and Processes of HIT Governance Frameworks: A Systematic Review
Gazi Medical …, 2019
[154] Factors Effecting Information Security Management and their impacts on Organization performance in the work environment: Case study; Hatif Libya Company …
2019
[155] MCP: The risk modelling framework for the banking sector
2019
[156] The implementation of information security policy using iso 27001: a case study in a software company
2019
[157] Byod-insure: A security assessment model for enterprise byod
2019
[158] Information Security Management Frameworks in Higher Education Institutions: An Overview
2019
[159] Security Safety and OrganizationalStandard Compliance in Cyber PhysicalSystems
2019
[160] Implementation of security system on humanitarian organization: case study of dompet dhuafa foundation
2019
[161] An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …
2019
[162] A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency
2019
[163] Security Safety and Organizational Standard Compliance in Cyber Physical Systems
INFOCOMMUNICATIONS JOURNAL, 2019
[164] Information System Risk Assessment And Management (Study Case at XYZ University)
2019
[165] SECURITY VISUALIZATION INFRASTRUCTURES, TECHNIQUES, AND METHODOLOGIES FOR IMPROVED ENTERPRISE SECURITY
2019
[166] Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
2019
[167] Risk Management: Typologies, Principles And Approaches
2019
[168] Diseño de un plan de gestión de la seguridad y de la información para el sistema de intranet de la Prefectura de Esmeraldas, Basado en Estándares Internacionales
2019
[169] Analisis sistem manajemen keamanan informasi menggunakan standar iso/Iec 27001 dan iso/lec 27002 pada kantor pusat pt jasa mar
Thesis, 2019
[170] Transferring Risk through Contractual Deterrents to Cloud Service Providers: A Phenomenological Study with Information Assurance Practitioners
2019
[171] Evolution of Access Network Sharing and Its Role in 5G Networks
2019
[172] FANE: A Firewall Appliance for the Smart Home
2019
[173] Экспертное оценивание мероприятий по обеспечению информационной безопасности
2019
[174] Entendiendo las decisiones del consumidor de servicios de salud: principales hallazgos sobre hábitos, riesgos percibidos y factores que impactan el uso de servicios
2019
[175] Política pública de juventud en el distrito de Buenaventura y la problemática de reclutamiento ilegal a jóvenes durante el período 2005-2015
2019
[176] ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA SEGURIDAD DE LA …
2019
[177] MARISMA-BiDa: Gestión y Control del riesgo en Big Data. Caso de Estudio
2019
[178] Integration der Legal Compliance Vorgaben der DSGVO in ein ISO/IEC zertifiziertes Information Security Management System: am Fallbeispiel der Energie AG …
2019
[179] Perencanaan Pengelolaan Keamanan Informasi Berbasis ISO 27001 Menggunakan Indeks Kami Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten …
2019
[180] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG …
2019
[181] The effect of information quality integrity on information security risk management
2019
[182] Usulan Evaluasi Sistem Keamanan Informasi Berdasarkan Standar ISO/IEC 27002: 2013 pada Pondok Pesantren Kafila International Islamic School Jakarta
2018
[183] Information technology control and audit
2018
[184] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA?UPT. PPTI UNIVERSITAS NEGERI SURABAYA
LPPM - UNIVERSITAS NEGERI SURABAYA, 2018
[185] CESIMAS: a continual evaluative self-aware immune-inspired multi agent critical information infrastructure protection system
2018
[186] A multi-domain approach for security compliance, insider threat modelling and risk management.
2018
[187] Blockchain Governance: An Evaluation from COBIT 5 Perspective
2018
[188] Evaluasi Tata Kelola Sistem Keamanan Teknologi Informasi Menggunakan Indeks KAMI dan ISO 27001 (Studi Kasus KOMINFO Provinsi Jawa Timur)
2018
[189] Hastanelerde bilgi güvenliği yönetimi: Nitel bir araştirma
Süleyman Demirel Üniversitesi Vizyoner …, 2018
[190] Managing data security risk in model software as a service (SAAS)
Asia-Pacific Journal of Information Technology …, 2018
[191] Research Progress of Security Protection for Dispatching Automation System
2018
[192] Reframing Security in Contemporary Software Development Life Cycle
2018
[193] Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa
2018
[194] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2018
[195] Desarrollo de un Sistema de Gestión de Seguridad de la Información para bibliotecas basado en una metodología mejorada para análisis de riesgos compatible con …
2018
[196] VALIDEZ DE UNA RÚBRICA PARA LA AUDITORÍA DE REDES EN EL CONTEXTO DE UNA INSTITUCIÓN PÚBLICA DE GUAYAQUIL
2018
[197] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA UPT. PPTI …
2018
[198] The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
2018
[199] ISMSs In outsourcing Context
2018
[200] A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)
2018
[201] SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions
2018
[202] Specialized CSIRT for Incident Response Management in Smart Grids
Journal of Network and Systems Management, 2018
[203] ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018
[204] Monitoring Industry 4.0 applications for security and safety standard compliance
2018
[205] Ki-Ngā-Kōpuku: a Decentralised, Distributed Security Model for Cloud Computing
2018
[206] Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework
2018
[207] Cybersecurity challenges and practices: A case study of Bhutan
2018
[208] Information Security of Russia in the Digital Economy: The Economic and Legal Aspects
2018
[209] Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001
2018
[210] Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
2018
[211] Acceptance of IT governance framework in Ecuadorian Public Institutions
2018
[212] Factors that Influence Selection of Frameworks for Information Security Program Management: A Correlational Study
2018
[213] The Effects of Information Technology Leadership and Information Security Governance on Information Security Risk Management in Usa Organizations
2018
[214] An Approach for Trustworthiness Benchmarking Using Software Metrics
2018
[215] ANALISIS KINERJA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[216] Personvern, europeisering og norske kommuner
2018
[217] Amenazas a la seguridad de la información y sus implicancias en la gestión de la seguridad de la información en las universidades privadas de la región …
2018
[218] Diseño de una política de seguridad para el control de la información del área de tics de la empresa Flower Village Ecuador basada en la Norma ISO 27002
2018
[219] RÉPLICA DE UN MODELO DE CUMPLIMIENTO DE LA POLÍTICA DE SEGURIDAD DE LA INFORMACIÓN EN LAS ORGANIZACIONES
2018
[220] Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire
2018
[221] INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODS
2018
[222] Blockchain in Supply Chain: Case Study of Lottemart Ciputat
2018
[223] A função do Chief Information Security Officer nas organizações
2018
[224] Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0.
2018
[225] Assessment of Information Security Maturity Level on Ethiopian Public Universities
2018
[226] Communications Architecture: Distributed Systems
2018
[227] Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy
2018
[228] Security Evaluation Framework for Military IoT devices
Security and Communication Networks, 2018
[229] ANALIZA IN ZASNOVA PROGRAMSKE REŠITVE VODENJA EVIDENC NA URADU VLADE REPUBLIKE SLOVENIJE ZA
2018
[230] KONSEP DAN STRATEGI EVALUASI MANAJEMEN KEAMANAN INFORMASI MENGGUNAKAN INDEKS KEAMANAN INFORMASI (KAMI) DAN EVALUASI …
2018
[231] Propuesta de normativa basada en COBIT, para el control interno de tecnologías de la información del sector público ecuatoriano
2018
[232] EVALUASI TINGKAT KEMATANGAN KEAMANAN INFORMASI PADA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[233] Melhoria de Processos de Software em Pequenas Empresas com base no Modelo ITmark
2018
[234] Responsabilidad penal corporativa y cibercriminalidad. El compliance penal relativo al Derecho de las TIC
2017
[235] Metodología Ágil para la Gestión de Riesgos Informáticos
2017
[236] Examining the Potential Benefits of Micro Entrepreneurs' Use of Information Security Measures against the Effect of Disasters
ProQuest Dissertations Publishing, 2017
[237] A Proposal of an Information Security Framework for Geospatial Data and Systems Case Study: Abu Dhabi Government
2017
[238] Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems
2017
[239] Threat Intelligence in Support of Cyber Situation Awareness
ProQuest Dissertations Publishing, 2017
[240] Elaboración y plan de implementación de políticas de seguridad de la información aplicadas a una empresa industrial de alimentos
2017
[241] A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls
Thesis, 2017
[242] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …
Computers & Security, 2017
[243] A view of trust and information system security under the perspective of critical infrastructure protection
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, 2017
[244] Informationssäkerhet i små och stora vårdorganisationer: en jämförelsestudie mellan två organisationer
2017
[245] Компаративна анализа и детален приказ на процесот на сертификација на информациски системи во државните институции на Република Македонија
2017
[246] Strategies to Minimize the Effects of Information Security Threats on Business Performance
Walden Dissertations and Doctoral Studies, 2017
[247] Dead reckoning: where we stand on privacy and security controls for the Internet of Things
2017
[248] Seguridad en Entornos BPM: Firma Digital y Gestión de Clave
2017
[249] A Model for Monitoring End-User Security Policy Compliance
2017
[250] How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention
Walden Dissertations and Doctoral Studies, 2017
[251] Maturity Model of Information Security for Software Developers
2017
[252] Challenges with Funding of Information Security Projects per Threat Perceptions: A Qualitative Case Study
ProQuest Dissertations Publishing, 2017
[253] Pattern Based Security Testing
Dissertation, Open Repository of the University of Porto, 2017
[254] Metodología Ágil para la Gestión de Riesgos Informáticos Agile Methodology for Computer Risk Management
2017
[255] Fatores críticos de sucesso para o aprimoramento da maturidade da gestão da segurança da informação das instituições federais de ensino superior
2017
[256] Sistema inteligente para validar una lista de control de acceso (ACL) en una red de comunicaciones
2017
[257] SECURITY POLICY: WHAT IT IS, WHY and challenges”
Adcances in Management and Informatics, 2017
[258] Le problème de Sécurité par le Data mining
2017
[259] STANDARDS, BEST PRACTICES AND CODES OF ETHICS IMPACT ON IT SERVICE QUALITY-THE CASE OF SLOVENIAN IT DEPARTMENTS.
Economic & Business Review, 2017
[260] Government and private sector cooperation on security of critical information infrastructures
2017
[261] Standards, best practices and codes of ethics impact on it service quality–the case of Slovenian IT departments
2017
[262] Política pública de Salud Mental del departamento de Caldas: Un aporte al bienestar ya la inclusión
2017
[263] ELABORACIÓN Y PLAN DE IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD DE LA INFORMACIÓN APLICADAS A UNA EMPRESA INDUSTRIAL DE …
2017
[264] Walden University
2017
[265] Examining the relationship of business operations and the information security culture in the United States
2017
[266] Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools
2017
[267] Caraterização da Integração de Sistemas de Gestão Certificados: Estudo de Caso–Organizações Localizadas no Distrito de Braga
2017
[268] UNIVERSIDAD DE LAMBAYEQUE
2017
[269] Exploring information technology: Why the use of information technology governance negatively influences revenue performance
2016
[270] STANDARD OPERATING PROCEDURES (SOPS) FOR HEALTH AND DEMOGRAPHIC RESEARCH DATA QUALITY ASSURANCE: THE CASE OF VADU …
2016
[271] Definição de política de segurança informática no IPCB
2016
[272] 37. Estrategia de validación para aplicaciones móviles de salud
2016
[273] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
Future Internet, 2016
[274] Nástroj pro bezpečnostní audit OS Linux/Unix/AIX
2016
[275] Contribuição para a estruturação do sistema integrado de gestão do grupo Cooprofar-Medlog com integração da gestão de segurança da informação
2016
[276] The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets†
Future Internet, 2016
[277] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2016
[278] Die tägliche Arbeit des IT-Betriebs: Was muss gemacht werden, selbst wenn es keine Änderungen an den Services gibt?
IT-Betrieb, 2016
[279] Sistema de gestión de seguridad de la información para los tres procesos misionales de la corporación autónoma regional de Risaralda (CARDER)
2016
[280] Avaliação de Segurança da Informação Usando o Modelo ITMark
2016
[281] Implementation of information security and data processing center protection standards
2016
[282] Big Data Security Management
2016
[283] An expert system for risk assessment of information system security based on ISO 27002
2016
[284] Information technology security professionals' knowledge and use intention based on UTAUT model
ProQuest Dissertations Publishing, 2016
[285] Validation strategy to mobile health applications Estrategia de validación para aplicaciones móviles de salud
2016
[286] Standard operating procedures (SOPS) for health and demographic research data quality assurance: the case of VADU HDSS site
2016
[287] The importance of the security culture in SMEs as regards the correct management of the security of their assets
Future Internet, 2016
[288] Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
2016
[289] Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
2015
[290] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals.
2015
[291] Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov
2015
[292] Dealing with Information Security and Privacy
Encyclopedia of Information Science and Technology, 2015
[293] Understanding information technology security standards diffusion: An institutional perspective
2015
[294] The Incident Prevention Team: A proactive approach to Information Security
2015
[295] The effects of organizational culture traits on information security principles for organizations located in the United States: An exploratory quantitative study
ProQuest Dissertations Publishing, 2015
[296] A model for the design of next generation e-supply chain digital forensic readiness tools
2015
[297] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals
New Contributions in Information Systems and Technologies, 2015
[298] Análise ao processo de gest?o de palavras-chave num sistema informático e riscos inerentes
2015
[299] Factors Affecting Individual Information Security Practices
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
[300] An information security control assessment methodology for organizations' financial information
International Journal of Accounting Information Systems, 2015
[301] Information Architecture for Quality Management Support in Hospitals
Journal of medical systems, 2015
[302] Security Operations Centers: A Business Perspective
2015
[303] Proposta de um Modelo de Governança de TI Enxuta
Revista Eletrônica Produção em Foco, 2015
[304] The cloud computing standard ISO/IEC 27018 through the lens of the EU legislation on data protection
Computer Law & Security Review, 2015
[305] A Framework to Extend COBIT Security Framework to Overcome Confidentiality Threats in Electronic Commerce
2015
[306] Tendências de implementação e segurança nas redes wireless organizacionais
2015
[307] The comparison of information security standards by using analytic hierarchy process
2015
[308] THE INCIDENT PREVENTION TEAM
2015
[309] An Adaptive Security Framework for Evaluating and Assessing Security Implementations in PaaS Cloud Models
2015
[310] THESIS/THÈSE
2015
[311] FACTORS AFFECTING THE INFORMATION SECURITY AWARENESS IN MALDIVES CUSTOMS SERVICE
2015
[312] Identifying factors that influence individual information security practices at work
2015
[313] IMPLEMENTATION OF INTEGRATED MANAGEMENT SYSTEM: A COSTS MODEL
2014
[314] Standards ISO 27001 for Internet Services
2014
[315] TISA: a layered Trust Information Security Architecture
R de Oliveira Albuquerque, F Buiati, LJ Garc?a - downloads.hindawi.com, 2014
[316] A Layered Trust Information Security Architecture
Sensors, 2014
[317] Comparison of File Integrity Monitoring (FIM) techniques for small business networks
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 2014
[318] Model upravljanja informacijskom sigurnošću u tijelima državne uprave u Republici Hrvatskoj
9th International Scientific and Professional Conference Management And Safety M&S 2014: CONTROLLING AND SAFETY, 2014
[319] A Methodology to Develop the Integration of the Environmental Management System with Other Standardized Management Systems
Computational Water, Energy, and Environmental Engineering, 2014
[320] Implementation Analysis Of Information Security Through Quality Standards ISO 27001 for Internet Services
2014
[321] Analysis and Implementation Of Information Security Through Quality Standards ISO 27001 for Internet Services): 2nd International Seminar & Conference in …
2014
[322] The spy within: Corporate security compromised by business software
ProQuest Dissertations Publishing, 2013
[323] Characterization of Selected Security-related Standards in the Field of Security Requirements Engineering
[324] Using Design Science Research Method to Develop a Cyber Security Framework for HEIs in Moldova
[325] Trustworthiness Models to Categorize and Prioritize Code for Security Improvement
[326] Informationssäkerhet i små och stora vårdorganisationer
[327] A view of trust and information system security under the perspective of critical infrastructure protection A view of trust and information system security …
[328] FENOpinaonline
[329] ANALISIS DAN MANAJEMEN RISIKO KEAMANAN INFORMASI MENGGUNAKAN METODE FAILURE MODE AND EFFECTS ANALYSIS (FMEA) DAN KONTROL ISO …
[330] Analysis of Information Technology Security Management UKSW SIASAT Using ISO/IEC 27001: 2013
[331] AUDITORIA DE SISTEMAS
[332] RIA E
[333] Modelo de seguridad de la información para el control de acceso a la red a nivel de la capa de enlace de datos aplicando el estándar IEEE 802.1 X para evitar el …
[334] TÜRKİYE CUMHURİYETİ ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ İŞLETME ANABİLİMDALI
[335] Towards standardization of audit procedures for the new version of ISO/IEC 27002
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top