نتایج جستجو برای: security management

تعداد نتایج: 1006782  

Journal: :International Journal of Computer Applications 2017

Journal: :FBIM Transactions 2020

Journal: :Acta Informatica Pragensia 2015

Journal: :Internet Research 1995
Gregory R. Doddrell

Users who downloaded this article also downloaded: Lam#for Kwok, Dennis Longley, (1999),"Information security management and modelling", Information Management & Computer Security, Vol. 7 Iss 1 pp. 30-40 Kevin J. Fitzgerald, (1995),"Information security baselines", Information Management & Computer Security, Vol. 3 Iss 2 pp. 8-12 Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),...

2006
Frank Innerhofer-Oberperfler Ruth Breu

In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...

2000
Elmarie von Solms Sebastiaan H. von Solms

This paper suggests a model, based on the continuous measuring and monitoring of information security parameters, by which information security management can be made more dynamic and relevant.

2010
Alberto Partida Diego Andina

Now, we come to offer you the right catalogues of book to open. it security management it securiteers setting up an it security function is one of the literary work in this world in suitable to be reading material. That's not only this book gives reference, but also it will show you the amazing benefits of reading a book. Developing your countless minds is needed; moreover you are kind of peopl...

2001
Christian Schwingenschlögl Andreas Pilz

– Nobody is really responsible for security management. – A wrong sense for security, i.e. someone did a security check years ago and there was no related activity afterwards. – Securing the Network is often considered a "non-productive" task. Unfortunately, this attitude is not likely to be changed before a major security incident occurs. But as everyone knows the alarm systems installed direc...

2010
Tawei Wang Carol Hsu

This paper investigates the association between the board structure of a firm and the possibility of information security breaches. Building on the agency theory and resource dependence theory, we hypothesize that the board structure could affect the guidance and advice capability of the board on the executives’ decision of information security management. Our results show that the board size a...

Journal: :مدیریت ورزشی 0
مسعود نادریان جهرمی دانشگاه اصفهان حسین پورسلطان زرندی پژوهشکده تربیت بدنی الهام روحانی دانشگاه اصفهان

the main aim of this study was to identify and present indicators and standards necessary for security management of sport facilities. these standards were recognized via a set of interviews and questionnaires through delphi method. the revised questionnaire of panteza et al. (2003) with 0.89 of reliability and interviews were used to collect data. the subjects were selected from purposeful sam...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید