نتایج جستجو برای: isms
تعداد نتایج: 386 فیلتر نتایج به سال:
Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefor...
Security threats are of major concern in information sensitive mobile ad-hoc networks (MANETs) like emergency military communication networks. We propose a Proactive Information Security Management System (PISMS) framework with vulnerable path determination module (VPDM) for such mobile ad-hoc networks. The chief security officer can use it to identify the most vulnerable paths, so that they ca...
Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues with...
This paper discusses the practical implementation of the Agile Security Development (ASD framework and presents a case study that reviews the process of building an information security management system utilizing the framework. The case study reveals the action steps for a small and medium-sized organization to utilize the method. The ASD framework and its output is fully ISO/IEC17799 complian...
Much research in machine learning has been focused on the problem of symbol-level learning (SLL), or learning improve the performance of a program given examples of its behavior on typical inputs. A common approach to symbol level learning is to use some sort of mechanism for saving and later re-using the solution paths used to solve previous search problems. Examples of such mechanisms are mac...
Security is a hot issue to be discussed, ranging from business activities, correspondence, banking and financial activities; it requires prudence and high precision. Since information security has a very important role in supporting activities of the organization, we need a standard or benchmark which regulates governance over information security. The main objective of this paper is to impleme...
F 2003 to 2012, the ISMS-MSI Practice Prize/Award competition has documented 25 impactful projects, with associated papers appearing in Marketing Science. This article reviews these papers and projects, examines their influence on the relevant organizations, and provides a perspective on the diffusion and impact of marketing science models within the organizations. We base our analysis on three...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید