نتایج جستجو برای: information security management

تعداد نتایج: 1990489  

2015

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

Journal: :Inf. Manag. Comput. Security 2010
Yngve Monfelt Sofie Pilemalm Jonas Hallberg Louise Yngström

The ultimate aim of the COINS COntrolled INformation Security – project is to investigate, assess, and provide tools to improve the information security status in organizations with a focus on public agencies. A central question for the project is how information security issues are communicated within the organizations, specifically underlining that communication is control in a cybernetic sen...

2006
C. Onwubiko A. P. Lenaghan

With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...

Journal: :international journal of information, security and systems management 2012
amir ashkan nasiripour somayeh hamzeh sina golesorkhi

background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...

Journal: :JSW 2012
Kuo-Hsiung Liao Hao-En Chueh

Most of the information security events in medical organizations are due to improper management. This is a clear indication that the security of information is an issue related to information and communication technology and a management issue as well. In a review of literature, most research on information security has focused on information and communication technology issues, such as network...

Journal: :حقوق اسلامی 0
سیدوحید ابوالمعالی الحسینی دانشجوی دکتری حقوق جزا و جرم شناسی دانشگاه تهران زهراسادات علیزاده طباطبایی دانشجوی دکتری حقوق جزا و جرم شناسی دانشگاه تهران

0

Journal: :Inf. Manag. Comput. Security 1994
William J. Caelli

Users who downloaded this article also downloaded: Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),"Formalizing information security requirements", Information Management & Computer Security, Vol. 9 Iss 1 pp. 32-37 Dieter Fink, (1994),"A Security Framework for Information Systems Outsourcing", Information Management & Computer Security, Vol. 2 Iss 4 pp. 3-8 Kevin J. Fitzgerald,...

2012
Samantha Rule Adrie Stander Jacques Ophoff

This paper explores whether a relationship exists between the Certified Information Systems Security Professional (CISSP) certification and digital forensics. The key findings show that the CISSP Common Body of Knowledge (CBK) covers a wide spectrum of information security practices, processes, and procedures and that the CISSP certification can provide a basic introduction to digital forensic ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید