A METHODOLOGY TO IMPLEMENT AN INFORMATION SECURITY MANAGEMENT SYSTEM

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings

While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutio...

متن کامل

A Multi-objective Approach to Implement an Integrated Management System: Quality, Security, Environment

This paper proposes a partial implementation of an integrated Quality, Security and Environment management system [1] to deal with the definition of an appropriate global management plan. This implementation is based on the multi-objective influence diagrams [12] which are one of the most commonly used graphical decision models for reasoning under uncertainty with multiple objectives.

متن کامل

Issues encountered in an attempt to implement a second-generation management information system.

Human service organization are beset by internal and external requests for information. As the scale and complexity of such delivery systems has increased, the use of computer-based information systems has become a necessity. The evolution of a client information system in a large, decentralized mental health center is reviewed in this paper to illustrate several critical issues that can be enc...

متن کامل

Information Security Management: A System Dynamics Approach

Managing security for information assets presents a challenging task. The need for effective information security management assumes greater importance with growing reliance on distributed systems and Internet-accessible systems. Many factors play a role in determining the vulnerability of information assets to security threats. Using a system dynamics approach, this study evaluates information...

متن کامل

Curriculum Management Information System

Curriculum Management Information System

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JISTEM Journal of Information Systems and Technology Management

سال: 2005

ISSN: 1807-1775

DOI: 10.4301/s1807-17752005000200002