Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"ISO/IEC 27000, 27001 and 27002 for Information Security Management"
written by Georg Disterer,
published by Journal of Information Security, Vol.4 No.2, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A Conceptual Hybrid Approach for Information Security Governance
2021
[2] Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard
2021
[3] System of Systems Lifecycle Management—A New Concept Based on Process Engineering Methodologies
2021
[4] MARISMA-BiDa pattern: Integrated risk analysis for big data
2021
[5] Information Security Management in ICT and Non-ICT Sector Companies: A Preventive Innovation Perspective
2021
[6] ANALYSIS OF SECURITY FRAMEWORKS IMPLEMENTED IN HEI's
2021
[7] Control Design of Information Security Related to Privacy in The Smart SIM Business Process
2021
[8] System of Systems Lifecycle Management: A New Concept Based on Process Engineering Methodologies
2021
[9] Combating the Exploitation of Children in Cyberspace: Technical Mechanisms to Protect Children From Sexual Content
2021
[10] Cybersecurity Incident Response Capabilities in the Ecuadorian Small Business Sector: A Qualitative Study
2020
[11] Applying Data Security in a Cloud Service Consumer Business an Exploratory Qualitative Inquiry
2020
[12] Analysis of ISO 27001 Compliance in Tonga Organisations Information Security
2020
[13] Enhancing and integration of security testing in the development of a microservices environment
2020
[14] A Study on Enterprises Based on Information Security Education and Training to Improve Continuous Information Security Governance
2020
[15] An Integrative Model of Information Security and Trust in Socio-technical Environments
2020
[16] A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
2020
[17] Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN
2020
[18] Beadle Schola r
2020
[19] Comparing Blockchain Standards and Recommendations
2020
[20] International diffusion of the information security management system standard ISO/IEC 27001: exploring the role of culture
2020
[21] Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal
2020
[22] Analysis of cybersecurity standard and framework components
2020
[23] The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)
2020
[24] Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education …
2020
[25] Vulnerable Code Detection Using Software Metrics and Machine Learning
2020
[26] Un Nouveau Modèle de Gestion Dynamique de la Confiance pour la Fédération des Identités Dans le Cloud Computing
2020
[27] Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
2020
[28] ISO/IEC 27001 eo Regulamento Geral de Proteção de Dados (RGPD): das medidas de segurança de informação à conformidadecom a proteção de dados …
2020
[29] Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era
2020
[30] Manual de buenas prácticas en seguridad de la información para entornos hospitalarios
2020
[31] Skladnost zaščite in varovanja v podjetju s standardom ISO/IEC 27001: 2013: Magistrska naloga
2020
[32] LA CONTINUIDAD DE NEGOCIO EN LAS INSTITUCIONES DE EDUCACIÓN SUPERIOR DEL ECUADOR. CASO DE ESTUDIO.
2020
[33] DESARROLLO DE UN SISTEMA DE CONTROL DE ACCESO INFORMÁTICO BASADO EN LLAVES ANÁLOGAS DE SEGURIDAD APLICADAS A SISTEMAS LINUX …
2020
[34] Information security management frameworks and strategies in higher education institutions: a systematic review
2020
[35] ANALISIS SECURITY ASSESSMENT MENGGUNAKAN METODE PENETRATION TESTING DALAM MENJAGA KAPABILITAS KEAMANAN TEKNOLOGI INFORMASI …
2020
[36] A novel approach for information security risk assessment maturity framework based on ISO 27001
2020
[37] Påverkande faktorer att beakta vid införandet av ett LIS
2020
[38] Effekterna av en ISO/IEC 27001-certifiering: Upplevda förändringar bland små svenska organisationer
2020
[39] Diseño de una política de seguridad de la información para los hoteles miembros de la asociación hotelera de Imbabura, basado en la norma ISO/IEC 27002: 2013
2020
[40] A novel approach for information security risk assessment maturity framework based on ISO 27001 [védés előtt]
2020
[41] DISEÑO DE UN SISTEMA DE GESTION DE INFORMACIÓN WEB PARA LA UNIDAD EDUCATIVA JOSÉ ALFREDO LLERENA DE LA CIUDAD DE GUAYAQUIL EN …
2020
[42] Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis
2020
[43] Performance evaluation of real-time stream processing systems for Internet of Things applications
2020
[44] Security Requirements Engineering Framework with BPMN 2.0. 2 Extension Model for Development of Information Systems
2020
[45] Isolation Design Flow Effectiveness Evaluation Methodology for Zynq SoCs
2020
[46] Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region
2020
[47] Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag
2020
[48] Assessment of Malaysian E-Passport PKI based on ISO 27000 Series International Standards
2020
[49] Smart City Development in Taiwan: From the Perspective of the Information Security Policy
2020
[50] Integration of Software Security Design Analysis to the Agile Development Process
2020
[51] Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations
2020
[52] Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC …
2020
[53] A Study on Organizational IT Security in Mobile Software Ecosystems Literature
2020
[54] Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
2020
[55] An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
2020
[56] Standardisation, Data Interoperability, and GDPR
2020
[57] BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study
2020
[58] ISO/IEC 27001 and IT baseline protection (IT-Grundschutz)
2020
[59] Implementing Security and Trust in IoT/M2M using Middleware
2020
[60] A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard
2020
[61] Data Management: a gentle introduction: Balancing theory and practice
2020
[62] Security in Telehealth Systems from a Software Engineering Viewpoint: A Systematic Mapping Study
2020
[63] The Implementation of an Integrated Management System at Qatar Biobank
2019
[64] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG MENGGUNAKAN …
2019
[65] IMPLEMENTACION DE UN PORTAL WEB DE GESTIÓN Y CONTROL DE APADRINAMIENTO A MENORES “CASA AMANECER” DE LA CIUDAD DE GUAYAQUIL …
2019
[66] Actividad física y salud ósea en escolares entre 8 y 16 años de la ciudad de Cartago-Valle
2019
[67] Facultad de Ingeniería en Electricidad y Computación
2019
[68] Managing security and compliance risks of outsourced IT projects
2019
[69] Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
2019
[70] Taloushallinnon yrityksen valmistautuminen EU: n uuteen tietosuoja-asetukseen
2019
[71] DISEÑO DE UN SITIO WEB PUBLICITARIO PARA LA VETERINARIA “GARRAS Y PATAS” DE LA CIUDAD DE GUAYAQUIL EN EL PERÍODO 2017”.
2019
[72] ISO/IEC 27001-sertifioinnin hankintaperusteet ja sertifiointielimen valintaperusteet
2019
[73] The cyber-resilience of financial institutions: significance and applicability
2019
[74] Developing Dynamic Digital Information Security Management Model for Indian University Libraries
2019
[75] Cybersecurity for railways–A maturity model
2019
[76] YMPÄRISTÖTEKIJÖIDEN VAIKUTUS TIETOJÄRJESTELMIEN HANKINTAAN, KÄYTTÖÖNOTTOON JA KÄYTTÖÖN KOULUTUS-JA TUTKIMUS …
2019
[77] Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
2019 IEEE International Conference on Industrial Technology (ICIT), 2019
[78] Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
2019
[79] PROPUESTA DE SISTEMA DE GESTIÓN DE SEGURIDAD DE LA INFORMACIÓN UTILIZANDO LA NORMA ISO 27001 PARA LA UNIDAD EDUCATIVA NUESTRA …
2019
[80] A new comprehensive solution to handle information security Governance in organizations
2019
[81] Is human the weakest link in information security?: systematic literature review
2019
[82] Diseño de un modelo de seguridad de la información, basado en OSSTMMV3, NIST SP 800-30 E ISO 27001, para centros de educación: caso de estudio …
2019
[83] SGSI project at CNAF
2019
[84] A Quantitative Predictive Assessment of Burnout and the Personal Profile of Information Technology Staff in Medium-sized Organizations
2019
[85] Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …
2019
[86] Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
2019
[87] Moving Target Defense to Improve Industrial Control System Resiliency
2019
[88] Communication and Cybersecurity of Autonomous Passenger Ferry
2019
[89] Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems
2019
[90] Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
2019
[91] A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
2019
[92] Encouraging Employees on Compliant Behaviours about Information Security Measures in Workplaces
2019
[93] Information Security Management Frameworks in Higher Education Institutions: An Overview
2019
[94] Security Safety and OrganizationalStandard Compliance in Cyber PhysicalSystems
2019
[95] Implementation of security system on humanitarian organization: case study of dompet dhuafa foundation
2019
[96] An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …
2019
[97] A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency
2019
[98] Security Safety and Organizational Standard Compliance in Cyber Physical Systems
INFOCOMMUNICATIONS JOURNAL, 2019
[99] Information System Risk Assessment And Management (Study Case at XYZ University)
2019
[100] SECURITY VISUALIZATION INFRASTRUCTURES, TECHNIQUES, AND METHODOLOGIES FOR IMPROVED ENTERPRISE SECURITY
2019
[101] Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
2019
[102] Risk Management: Typologies, Principles And Approaches
2019
[103] Diseño de un plan de gestión de la seguridad y de la información para el sistema de intranet de la Prefectura de Esmeraldas, Basado en Estándares Internacionales
2019
[104] Analisis sistem manajemen keamanan informasi menggunakan standar iso/Iec 27001 dan iso/lec 27002 pada kantor pusat pt jasa mar
Thesis, 2019
[105] Transferring Risk through Contractual Deterrents to Cloud Service Providers: A Phenomenological Study with Information Assurance Practitioners
2019
[106] Evolution of Access Network Sharing and Its Role in 5G Networks
2019
[107] FANE: A Firewall Appliance for the Smart Home
2019
[108] Экспертное оценивание мероприятий по обеспечению информационной безопасности
2019
[109] Entendiendo las decisiones del consumidor de servicios de salud: principales hallazgos sobre hábitos, riesgos percibidos y factores que impactan el uso de servicios
2019
[110] Política pública de juventud en el distrito de Buenaventura y la problemática de reclutamiento ilegal a jóvenes durante el período 2005-2015
2019
[111] ESTUDIO COMPARATIVO ENTRE INSTITUCIONES PÚBLICAS LATINOAMERICANAS REFERENTE A LA APLICACIÓN DEL GOBIERNO DE LA SEGURIDAD DE LA …
2019
[112] MARISMA-BiDa: Gestión y Control del riesgo en Big Data. Caso de Estudio
2019
[113] Integration der Legal Compliance Vorgaben der DSGVO in ein ISO/IEC zertifiziertes Information Security Management System: am Fallbeispiel der Energie AG …
2019
[114] AUDIT KEAMANAN SISTEM INFORMASI MANAJEMEN DAERAH (SIMDA) KEUANGAN DI BADAN KEUANGAN DAERAH PROVINSI LAMPUNG …
2019
[115] Byod-insure: A security assessment model for enterprise byod
2019
[116] Perencanaan Pengelolaan Keamanan Informasi Berbasis ISO 27001 Menggunakan Indeks Kami Studi Kasus: Dinas Komunikasi dan Informatika Kabupaten …
2019
[117] The effect of information quality integrity on information security risk management
2019
[118] Factors Effecting Information Security Management and their impacts on Organization performance in the work environment: Case study; Hatif Libya Company …
2019
[119] MCP: The risk modelling framework for the banking sector
2019
[120] The implementation of information security policy using iso 27001: a case study in a software company
2019
[121] SECURITY DATA GOVERNANCE SYSTEM
2019
[122] MEDICAL DEVICE QUALITY: MANAGING CYBERSECURITY DESIGN REQUIREMENTS THROUGH THE APPLICATION OF PDSA AND QFD _ A Thesis
2019
[123] Blockchain Governance: An Evaluation from COBIT 5 Perspective
2018
[124] Usulan Evaluasi Sistem Keamanan Informasi Berdasarkan Standar ISO/IEC 27002: 2013 pada Pondok Pesantren Kafila International Islamic School Jakarta
2018
[125] Information technology control and audit
2018
[126] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA?UPT. PPTI UNIVERSITAS NEGERI SURABAYA
LPPM - UNIVERSITAS NEGERI SURABAYA, 2018
[127] CESIMAS: a continual evaluative self-aware immune-inspired multi agent critical information infrastructure protection system
2018
[128] A multi-domain approach for security compliance, insider threat modelling and risk management.
2018
[129] Research Progress of Security Protection for Dispatching Automation System
2018
[130] Reframing Security in Contemporary Software Development Life Cycle
2018
[131] Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa
2018
[132] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2018
[133] Desarrollo de un Sistema de Gestión de Seguridad de la Información para bibliotecas basado en una metodología mejorada para análisis de riesgos compatible con …
2018
[134] VALIDEZ DE UNA RÚBRICA PARA LA AUDITORÍA DE REDES EN EL CONTEXTO DE UNA INSTITUCIÓN PÚBLICA DE GUAYAQUIL
2018
[135] ANALISIS TINGKAT KESIAPAN DAN KEMATANGAN IMPLEMENTASI ISO 27001: 2013 MENGGUNAKAN INDEKS KEAMANAN INFORMASI 3: 2015 PADA UPT. PPTI …
2018
[136] The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
2018
[137] ISMSs In outsourcing Context
2018
[138] A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)
2018
[139] SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions
2018
[140] Specialized CSIRT for Incident Response Management in Smart Grids
Journal of Network and Systems Management, 2018
[141] ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018
[142] Monitoring Industry 4.0 applications for security and safety standard compliance
2018
[143] Ki-Ngā-Kōpuku: a Decentralised, Distributed Security Model for Cloud Computing
2018
[144] Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework
2018
[145] Cybersecurity challenges and practices: A case study of Bhutan
2018
[146] Information Security of Russia in the Digital Economy: The Economic and Legal Aspects
2018
[147] Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001
2018
[148] Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
2018
[149] Acceptance of IT governance framework in Ecuadorian Public Institutions
2018
[150] Factors that Influence Selection of Frameworks for Information Security Program Management: A Correlational Study
2018
[151] The Effects of Information Technology Leadership and Information Security Governance on Information Security Risk Management in Usa Organizations
2018
[152] An Approach for Trustworthiness Benchmarking Using Software Metrics
2018
[153] ANALISIS KINERJA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[154] Personvern, europeisering og norske kommuner
2018
[155] Amenazas a la seguridad de la información y sus implicancias en la gestión de la seguridad de la información en las universidades privadas de la región …
2018
[156] Diseño de una política de seguridad para el control de la información del área de tics de la empresa Flower Village Ecuador basada en la Norma ISO 27002
2018
[157] RÉPLICA DE UN MODELO DE CUMPLIMIENTO DE LA POLÍTICA DE SEGURIDAD DE LA INFORMACIÓN EN LAS ORGANIZACIONES
2018
[158] Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire
2018
[159] INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODS
2018
[160] Blockchain in Supply Chain: Case Study of Lottemart Ciputat
2018
[161] A função do Chief Information Security Officer nas organizações
2018
[162] Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0.
2018
[163] Assessment of Information Security Maturity Level on Ethiopian Public Universities
2018
[164] Communications Architecture: Distributed Systems
2018
[165] Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy
2018
[166] Security Evaluation Framework for Military IoT devices
Security and Communication Networks, 2018
[167] ANALIZA IN ZASNOVA PROGRAMSKE REŠITVE VODENJA EVIDENC NA URADU VLADE REPUBLIKE SLOVENIJE ZA
2018
[168] KONSEP DAN STRATEGI EVALUASI MANAJEMEN KEAMANAN INFORMASI MENGGUNAKAN INDEKS KEAMANAN INFORMASI (KAMI) DAN EVALUASI …
2018
[169] Propuesta de normativa basada en COBIT, para el control interno de tecnologías de la información del sector público ecuatoriano
2018
[170] EVALUASI TINGKAT KEMATANGAN KEAMANAN INFORMASI PADA SISTEM INFORMASI MANAJEMEN UNIVERSITAS COKROAMINOTO PALOPO
2018
[171] Responsabilidad penal corporativa y cibercriminalidad. El compliance penal relativo al Derecho de las TIC
2017
[172] Metodología Ágil para la Gestión de Riesgos Informáticos
2017
[173] Examining the Potential Benefits of Micro Entrepreneurs' Use of Information Security Measures against the Effect of Disasters
ProQuest Dissertations Publishing, 2017
[174] A Proposal of an Information Security Framework for Geospatial Data and Systems Case Study: Abu Dhabi Government
2017
[175] Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems
2017
[176] Threat Intelligence in Support of Cyber Situation Awareness
ProQuest Dissertations Publishing, 2017
[177] Elaboración y plan de implementación de políticas de seguridad de la información aplicadas a una empresa industrial de alimentos
2017
[178] A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls
Thesis, 2017
[179] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …
Computers & Security, 2017
[180] A view of trust and information system security under the perspective of critical infrastructure protection
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, 2017
[181] Informationssäkerhet i små och stora vårdorganisationer: en jämförelsestudie mellan två organisationer
2017
[182] Компаративна анализа и детален приказ на процесот на сертификација на информациски системи во државните институции на Република Македонија
2017
[183] Strategies to Minimize the Effects of Information Security Threats on Business Performance
Walden Dissertations and Doctoral Studies, 2017
[184] Dead reckoning: where we stand on privacy and security controls for the Internet of Things
2017
[185] Seguridad en Entornos BPM: Firma Digital y Gestión de Clave
2017
[186] A Model for Monitoring End-User Security Policy Compliance
2017
[187] How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention
Walden Dissertations and Doctoral Studies, 2017
[188] Maturity Model of Information Security for Software Developers
2017
[189] Challenges with Funding of Information Security Projects per Threat Perceptions: A Qualitative Case Study
ProQuest Dissertations Publishing, 2017
[190] Pattern Based Security Testing
Dissertation, Open Repository of the University of Porto, 2017
[191] Metodología Ágil para la Gestión de Riesgos Informáticos Agile Methodology for Computer Risk Management
2017
[192] Fatores críticos de sucesso para o aprimoramento da maturidade da gestão da segurança da informação das instituições federais de ensino superior
2017
[193] Sistema inteligente para validar una lista de control de acceso (ACL) en una red de comunicaciones
2017
[194] SECURITY POLICY: WHAT IT IS, WHY and challenges”
Adcances in Management and Informatics, 2017
[195] Le problème de Sécurité par le Data mining
2017
[196] STANDARDS, BEST PRACTICES AND CODES OF ETHICS IMPACT ON IT SERVICE QUALITY-THE CASE OF SLOVENIAN IT DEPARTMENTS.
Economic & Business Review, 2017
[197] Government and private sector cooperation on security of critical information infrastructures
2017
[198] ELABORACIÓN Y PLAN DE IMPLEMENTACIÓN DE POLÍTICAS DE SEGURIDAD DE LA INFORMACIÓN APLICADAS A UNA EMPRESA INDUSTRIAL DE …
2017
[199] Walden University
2017
[200] Examining the relationship of business operations and the information security culture in the United States
2017
[201] Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools
2017
[202] Standards, best practices and codes of ethics impact on it service quality–the case of Slovenian IT departments
2017
[203] Política pública de Salud Mental del departamento de Caldas: Un aporte al bienestar ya la inclusión
2017
[204] Caraterização da Integração de Sistemas de Gestão Certificados: Estudo de Caso–Organizações Localizadas no Distrito de Braga
2017
[205] UNIVERSIDAD DE LAMBAYEQUE
2017
[206] Exploring information technology: Why the use of information technology governance negatively influences revenue performance
2016
[207] Definição de política de segurança informática no IPCB
2016
[208] 37. Estrategia de validación para aplicaciones móviles de salud
2016
[209] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
Future Internet, 2016
[210] Nástroj pro bezpečnostní audit OS Linux/Unix/AIX
2016
[211] Contribuição para a estruturação do sistema integrado de gestão do grupo Cooprofar-Medlog com integração da gestão de segurança da informação
2016
[212] The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets†
Future Internet, 2016
[213] CENTRO ESTADUAL DE EDUCAÇÃO TECNOLÓGICA PAULA SOUZA UNIDADE DE PÓS-GRADUAÇÃO, EXTENSÃO E PESQUISA MESTRADO …
2016
[214] Die tägliche Arbeit des IT-Betriebs: Was muss gemacht werden, selbst wenn es keine Änderungen an den Services gibt?
IT-Betrieb, 2016
[215] Sistema de gestión de seguridad de la información para los tres procesos misionales de la corporación autónoma regional de Risaralda (CARDER)
2016
[216] Avaliação de Segurança da Informação Usando o Modelo ITMark
2016
[217] Implementation of information security and data processing center protection standards
2016
[218] Big Data Security Management
2016
[219] An expert system for risk assessment of information system security based on ISO 27002
2016
[220] Information technology security professionals' knowledge and use intention based on UTAUT model
ProQuest Dissertations Publishing, 2016
[221] Validation strategy to mobile health applications Estrategia de validación para aplicaciones móviles de salud
2016
[222] Standard operating procedures (SOPS) for health and demographic research data quality assurance: the case of VADU HDSS site
2016
[223] The importance of the security culture in SMEs as regards the correct management of the security of their assets
Future Internet, 2016
[224] Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
2016
[225] Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
2015
[226] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals.
2015
[227] Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov
2015
[228] Dealing with Information Security and Privacy
Encyclopedia of Information Science and Technology, 2015
[229] Understanding information technology security standards diffusion: An institutional perspective
2015
[230] The Incident Prevention Team: A proactive approach to Information Security
2015
[231] The effects of organizational culture traits on information security principles for organizations located in the United States: An exploratory quantitative study
ProQuest Dissertations Publishing, 2015
[232] A model for the design of next generation e-supply chain digital forensic readiness tools
2015
[233] QUALITUS: An Integrated Information Architecture for the Quality Management System of Hospitals
New Contributions in Information Systems and Technologies, 2015
[234] Análise ao processo de gest?o de palavras-chave num sistema informático e riscos inerentes
2015
[235] Factors Affecting Individual Information Security Practices
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
[236] An information security control assessment methodology for organizations' financial information
International Journal of Accounting Information Systems, 2015
[237] Information Architecture for Quality Management Support in Hospitals
Journal of medical systems, 2015
[238] Security Operations Centers: A Business Perspective
2015
[239] Proposta de um Modelo de Governança de TI Enxuta
Revista Eletrônica Produção em Foco, 2015
[240] The cloud computing standard ISO/IEC 27018 through the lens of the EU legislation on data protection
Computer Law & Security Review, 2015
[241] A Framework to Extend COBIT Security Framework to Overcome Confidentiality Threats in Electronic Commerce
2015
[242] Tendências de implementação e segurança nas redes wireless organizacionais
2015
[243] The comparison of information security standards by using analytic hierarchy process
2015
[244] THE INCIDENT PREVENTION TEAM
2015
[245] An Adaptive Security Framework for Evaluating and Assessing Security Implementations in PaaS Cloud Models
2015
[246] THESIS/THÈSE
2015
[247] FACTORS AFFECTING THE INFORMATION SECURITY AWARENESS IN MALDIVES CUSTOMS SERVICE
2015
[248] Identifying factors that influence individual information security practices at work
2015
[249] IMPLEMENTATION OF INTEGRATED MANAGEMENT SYSTEM: A COSTS MODEL
2014
[250] Standards ISO 27001 for Internet Services
2014
[251] TISA: a layered Trust Information Security Architecture
R de Oliveira Albuquerque, F Buiati, LJ Garc?a - downloads.hindawi.com, 2014
[252] A Layered Trust Information Security Architecture
Sensors, 2014
[253] Comparison of File Integrity Monitoring (FIM) techniques for small business networks
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 2014
[254] Model upravljanja informacijskom sigurnošću u tijelima državne uprave u Republici Hrvatskoj
9th International Scientific and Professional Conference Management And Safety M&S 2014: CONTROLLING AND SAFETY, 2014
[255] A Methodology to Develop the Integration of the Environmental Management System with Other Standardized Management Systems
Computational Water, Energy, and Environmental Engineering, 2014
[256] Implementation Analysis Of Information Security Through Quality Standards ISO 27001 for Internet Services
2014
[257] Analysis and Implementation Of Information Security Through Quality Standards ISO 27001 for Internet Services): 2nd International Seminar & Conference in …
2014
[258] The spy within: Corporate security compromised by business software
ProQuest Dissertations Publishing, 2013
[259] Requisitos e recomendações para o desenvolvimento e operação de um SGSI–Abordagem com ISO 27001/27002
[260] Automated Enterprise Architecture Model Mining
[261] A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
[262] Doxing: Painting a Target on Someone's back: Characterization and Mitigation Practices
[263] A view of trust and information system security under the perspective of critical infrastructure protection A view of trust and information system security …
[264] Analysis of ISO/IEC 27001 to Encourage its Adoption in Nigerian Businesses
[265] Analysis of System Security Levels of Tax Payment and Regional Retribution Based on ISO/IEC27002: 2013 Standard Using SSE-CCM
[266] CRITICAL SUCCESS FACTORS FOR MANAGING INFORMATION SYSTEMS SECURITY IN SMART CITY ENABLED BY INTERNET OF THINGS
Free SCIRP Newsletters
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top