نتایج جستجو برای: isms

تعداد نتایج: 386  

2015
Heru Susanto Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefor...

2013
Arunabha Mukhopadhyay Saini Das Samir K. Sadhukhan Debashis Saha

Security threats are of major concern in information sensitive mobile ad-hoc networks (MANETs) like emergency military communication networks. We propose a Proactive Information Security Management System (PISMS) framework with vulnerable path determination module (VPDM) for such mobile ad-hoc networks. The chief security officer can use it to identify the most vulnerable paths, so that they ca...

Journal: :TIIS 2011
Heasuk Jo Seungjoo Kim Dongho Won

Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues with...

2007
Jarkko M. Holappa Timo J. Wiander

This paper discusses the practical implementation of the Agile Security Development (ASD framework and presents a case study that reviews the process of building an information security management system utilizing the framework. The case study reveals the action steps for a small and medium-sized organization to utilize the method. The ASD framework and its output is fully ISO/IEC17799 complian...

Journal: :Computational Intelligence 1992
William W. Cohen

Much research in machine learning has been focused on the problem of symbol-level learning (SLL), or learning improve the performance of a program given examples of its behavior on typical inputs. A common approach to symbol level learning is to use some sort of mechanism for saving and later re-using the solution paths used to solve previous search problems. Examples of such mechanisms are mac...

Journal: :CoRR 2012
Heru Susanto Mohammad Nabil Almunawar Yong Chee Tuan

Security is a hot issue to be discussed, ranging from business activities, correspondence, banking and financial activities; it requires prudence and high precision. Since information security has a very important role in supporting activities of the organization, we need a standard or benchmark which regulates governance over information security. The main objective of this paper is to impleme...

Journal: :Marketing Science 2013
Gary L. Lilien John H. Roberts Venkatesh Shankar

F 2003 to 2012, the ISMS-MSI Practice Prize/Award competition has documented 25 impactful projects, with associated papers appearing in Marketing Science. This article reviews these papers and projects, examines their influence on the relevant organizations, and provides a perspective on the diffusion and impact of marketing science models within the organizations. We base our analysis on three...

Journal: :International Journal in Foundations of Computer Science & Technology 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید