نتایج جستجو برای: information security management
تعداد نتایج: 1990489 فیلتر نتایج به سال:
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
in recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. this question is of particular importanceabout government agencies that use information and internet systems. this issue enabled the top managers of organizations to implement a security system and minimize these costs. using in...
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
information security is one of the most important enterprise assets. for any organization, information is valuable and should be appropriately protected. also, security is to combine systems, operations, and internal controls to ensure the integrity and confidentiality of data and operation procedures in an organization. knowing the fact that with serious threat of unauthorized users on the int...
nowadays, access to reliable information has become an essential factor leading to success in business. in this regard, adequate security of information and systems that process it is critical to the operation of all organizations. therefore organizations must understand and improve the current status of their information security in order to ensure business continuity and increase rate of retu...
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید