Academic literature on the topic 'Information security, information security management system, ISMS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security, information security management system, ISMS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security, information security management system, ISMS"

1

Park, Sanghyun, and Kyungho Lee. "Advanced Approach to Information Security Management System Model for Industrial Control System." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/348305.

Full text
Abstract:
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.
APA, Harvard, Vancouver, ISO, and other styles
2

Anton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.

Full text
Abstract:
This work approaches the assessment of the security and information risks in order to find the optimal values of the risks by applying and comparing different methods to measure and assess the security risks. By describing structural characteristics of standards and methods implemented in the information security management system (ISMS), this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlights the importance of standards and methods of risk management assessment.
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Jong Hyuk, Ki Jung Yi, and Young-Sik Jeong. "An enhanced smartphone security model based on information security management system (ISMS)." Electronic Commerce Research 14, no. 3 (September 19, 2014): 321–48. http://dx.doi.org/10.1007/s10660-014-9146-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ryu, Seung-Han, Dae-Ryeong Jeong, and Hoe-Kyung Jung. "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 769–74. http://dx.doi.org/10.6109/jkiice.2013.17.4.769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kong, Hee-Kyung, Hyo-Jung Jun, Song-Ha Lee, Min-Seong Kang, and Tae-Sung Kim. "Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)." Journal of the Korea Institute of Information Security and Cryptology 26, no. 3 (June 30, 2016): 821–35. http://dx.doi.org/10.13089/jkiisc.2016.26.3.821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (March 18, 2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.

Full text
Abstract:
There is a need for an Information Security Management System Standard (ISO 27001:2005) at Perbanas University in general. Particularly ABFII Perbanas needs IT governance on Information Security. ISO 27001:2005 is an Information Security Standard that widely used as Information Security Management System (ISMS). IT Governance approach is the main interest within ISO 27001:2005 for Perbanas University.
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahim, Noralinawati, and Nor’ashikin Ali. "The Role of Organizational Factors to the Effectiveness of ISMS Implementation in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.35 (November 30, 2018): 544. http://dx.doi.org/10.14419/ijet.v7i4.35.22907.

Full text
Abstract:
Many organizations have initiated efforts to manage the security of their information by implementing an Information Security Management System (ISMS). ISMS is a set of guiding principles for managing organization’s confidential information and minimizing risk for business continuity. However, information security remains a major challenge and the effectiveness of ISMS is often argued due to the exposure of organizations to information security threats, incidents, risks, and vulnerabilities. One of the reasons is the unsuccessful ISMS current practices amongst all employees and lack of ISMS awareness in organizations. Several critical success factors are identified from previous studies that lead to the ISMS success. Among the success factors are human, organizational and technical factors. This study explores the factors that contribute to the success of ISMS and identify the organizational factors that relate to the information security effectiveness. The conceptual model is developed and will be tested within the Malaysian Public Sectors (MPS) organizations to provide a preliminary insight, understanding, and clarification of the organizational factors, together with the significant effects on ISMS effectiveness. This study used a quantitative approach and data collected from personnel’s that were directly involved with the ISMS implementation through a questionnaire survey.
APA, Harvard, Vancouver, ISO, and other styles
8

Safonova, O. M., and N. V. Kotelnikov. "Modeling the information security management system (ISMS) of a medical organization." E3S Web of Conferences 224 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202022401035.

Full text
Abstract:
The implementation of information security systems is one of the main components, without which the existence of any modern medical institution is impossible. This question is actual for the healthcare industry. This is confirmed by the presence of large-scale measures that are being implemented as part of the Russian Federation’s healthcare modernization program. But the result of informatization is not always achieved easily and successfully. This process includes the equipment of the technical support of the organization and the fragmentary implementation of information systems to the full informatization of medical institutions with the introduction of full-featured medical information systems. Informatization of healthcare organizations makes it possible to systematize a large amount of information. In turn, this requires the implementation of personal data protection systems, storage, archiving and access to this data. The introduction of these systems into the healthcare industry of the Russian Federation has recently entered a new stage. It has complex tasks to integrate new technologies that provide information security to medicine. So, the most pressing problem of the medical industry is information protection, that is, the creation of an ISMS (information security management system).
APA, Harvard, Vancouver, ISO, and other styles
9

Putra, Anggi Anugraha, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Perencanaan dan Implementasi Information Security Management System Menggunakan Framework ISO/IEC 20071." Jurnal Teknologi dan Sistem Komputer 4, no. 1 (January 23, 2016): 60. http://dx.doi.org/10.14710/jtsiskom.4.1.2016.60-66.

Full text
Abstract:
Penerapan tata kelola Teknologi Informasi saat ini sudah menjadi kebutuhan dan tuntutan di setiap instansi penyelenggara pelayanan publik mengingat peran TI yang semakin penting bagi upaya peningkatan kualitas layanan sebagai salah satu realisasi dari tata kelola pemerintahan yang baik (Good Corporate Governance). Dalam penyelenggaraan tata kelola TI, faktor keamanan informasi merupakan aspek yang sangat penting diperhatikan mengingat kinerja tata kelola TI akan terganggu jika informasi sebagai salah satu objek utama tata kelola TI mengalami masalah keamanan informasi yang menyangkut kerahasiaan (confidentiality), keutuhan (integrity) dan ketersediaan (availability). Information Security Management System (ISMS) adalah seperangkat kebijakan berkaitan dengan manajemen keamanan informasi atau terkait dengan risiko TI. Prinsip yang mengatur di balik ISMS adalah bahwa organisasi harus merancang, menerapkan dan memelihara seperangkat kebijakan, proses dan sistem untuk mengelola risiko aset informasi mereka, sehingga memastikan tingkat risiko keamanan informasi yang dapat diterima. Dari perencanaan dan implementasi sistem manajemen keamanan informasi ini, dihasilkan daftar nilai risiko akhir aset- aset kritikal dan dokumen-dokumen tata kelola penunjang ISMS. Metode penelitian yang digunakan adalah studi kasus yang didalam hal ini, merupakan penelitian kualitatif. Adapun proses yang digunakan untuk mengukur tingkat kematangan dari tata kelola keamanan sistem informasi ini berdasarkan kerangka kerja ISO/IEC 27001. Dari kerangka tersebut kemudian dilakukan evaluasi terhadap objek kontrol yang dimiliki ISO/IEC 27001. Hasil yang didapat adalah peningkatan terhadap tata kelola keamanan sistem informasi. Kesimpulan dari penelitian ini adalah dibutuhkannya tata kelola keamanan sistem informasi agar IT dapat diandalkan untuk mencapai tujuan bisnis.
APA, Harvard, Vancouver, ISO, and other styles
10

Panda, Prof Subarna. "Implementation of Information Security Management System (ISMS) Aligned with ISO 27001." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 218–27. http://dx.doi.org/10.22214/ijraset.2019.5034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security, information security management system, ISMS"

1

Erkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.

Full text
Abstract:
This thesis focuses on automation of processes of Information Security Management System. In accordance with two International Standards, ISO/IEC 27001:2005 and ISO/IEC 17799:2005, to automate the activities required for a documented ISMS as much as possible helps organizations. Some of the well known tools in this scope are analyzed and a comparative study on them including &ldquo
InfoSec Toolkit&rdquo
, which is developed for this purpose in the thesis scope, is given. &ldquo
InfoSec Toolkit&rdquo
is based on ISO/IEC 27001:2005 and ISO 17799:2005. Five basic integrated modules constituting the &ldquo
InfoSec Toolkit&rdquo
are &ldquo
Gap Analysis Module&rdquo
, &ldquo
Risk Module&rdquo
, &ldquo
Policy Management Module&rdquo
, &ldquo
Monitoring Module&rdquo
and &ldquo
Query and Reporting Module&rdquo
. In addition a research framework is proposed in order to assess the public and private organizations&rsquo
information security situation in Turkey.
APA, Harvard, Vancouver, ISO, and other styles
2

Trunkát, Jan. "Návrh zavedení ISMS ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-225000.

Full text
Abstract:
The master´s thesis is aimed at Proposal for the information security management system implementation in the company. It introduces with basic concepts of information security and provides general procedures for information security management system. As part of the work was carried out a risk analysis company and proposed measures to reduce risk. Work is mainly drawn from the series of standards ISO/IEC 27000.
APA, Harvard, Vancouver, ISO, and other styles
3

Asp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.

Full text
Abstract:
Over the past year, cyber threats have been growing tremendously, which has led to an essential need to strengthen the organization's security. One way of strengthening security is to implement an information security management system (ISMS). Although an ISMS will help improve the information security work within the business, organizations struggle with its implementation, and significantly smaller organizations. That results in smaller organization's information being potentially less protected.This thesis investigates how an ISMS based on MSB can be simplified to make it suitable for a small organization to implement. This thesis aims to open for further research about how it can be simplified and if it has a value of doing it.The study is based on a qualitative approach where semi-structured interviews with experts were conducted. This thesis concludes that it is possible to simplify an ISMS based on MSB for a small organization by removing external analysis, information classification, information classification model, continuity management for information assets, and incident management. In addition, the study provides tips on what a small organization should think about before and during implementation.
APA, Harvard, Vancouver, ISO, and other styles
4

Shoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.

Full text
Abstract:
Within the modern and globally connected business landscape, the information assets of organizations are constantly under attack. As a consequence, protection of these assets is a major challenge. The complexities and vulnerabilities of information systems (ISs) and the increasing risks of failure combined with a growing number of security incidents, prompts these entities to seek guidance from information security management standards. The International Organization of Standardization (ISO) Information Security Management System (ISMS) standard specifies the requirements for establishing, operating, monitoring, and improving an information security management system within the context of an organization's overall business risks. Importantly, this standard is designed to ensure the selection of adequate information security controls for the protection of an organization's information assets and is the only auditable international standard for information security management. The adoption of, and certification against the ISO ISMS standard is a complex process which impacts many different security aspects of organizations and requires significant investments in information security. Although many benefits are associated with the adoption of an information security management standard, organizations are increasingly employing economic measures to evaluate and justify their information security investments. With the growing emphasis on the importance of understanding the economic aspects of information security, this study investigated the economic value of the ISO ISMS standard adoption and certification. The principles of the efficient market hypothesis and the event study methodology were employed to establish whether organizations realized economic gains from obtaining certification against the ISO ISMS standard. The results of this research showed that capital markets did not react to the ISO ISMS certification announcements. Furthermore, the capital market reaction to information security breaches was not different between ISO ISMS certified and non-certified firms. It was concluded that the ISO ISMS certification did not create economic value for the certified firms
APA, Harvard, Vancouver, ISO, and other styles
5

Havlík, Michal. "Návrh průmyslového řešení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318610.

Full text
Abstract:
Thesis deals with industrial solutions of ISMS mainly network infrastructure. First introduction into theoretical background of the thesis. Further analysis of the current situation in the company and its evaluation. Consequently, the design of solution done to meet the standards of ISO / IEC 27000.
APA, Harvard, Vancouver, ISO, and other styles
6

Tomko, Michal. "Návrh zavedení bezpečnostních opatření na základě ISMS pro malý podnik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402087.

Full text
Abstract:
The master`s thesis deals with implementation of security countermeasures in accordance with information security management system for small company. Main concern of the master`s thesis will be design of security countermeasures in company. Solution of the design comes from the analysis of current state of the company including all important parts and assist evaluation which has been processed along with responsible persons.
APA, Harvard, Vancouver, ISO, and other styles
7

Dočekal, Petr. "Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378344.

Full text
Abstract:
The master’s thesis focuses on area of security countermeasures in accordance with information security management system. Presents basic theoretical background of information and cyber security and describes a current state in the company. The thesis’s output is the design of security countermeasures implementation which contribute to information security in the company.
APA, Harvard, Vancouver, ISO, and other styles
8

Kuchařík, Lukáš. "Návrh ISMS v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241472.

Full text
Abstract:
The master’s thesis is aimed at the proposal of network infrastructure and introduction of the managerial system for the safety of information in the industrial environment. At the beginning the work is focused on theoretical knowledge concerning the safety of information wherein it describes basic concepts and common procedures of the managerial system of the safety of information. Further, the work deals with risk analysis in which the measures for reduction in hazard are suggested. The proposal for a new network infrastructure is finally carried out. The work draws the information from CSN standards ISO/IEC, series 27000.
APA, Harvard, Vancouver, ISO, and other styles
9

Dokoupil, Ondřej. "Návrh metodiky pro zavedení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-254270.

Full text
Abstract:
This master’s thesis deals with the design of methodology for implementation of ISMS (Information Security Management System). The theoretical part describes the basic principles and procedures for processing of this domain, including normative and legal - legislative aspects. The next section is an analysis of the current state of the organization. On its basis the practical part is drafted, including an economic evaluation of the project and possible benefits of implementation.
APA, Harvard, Vancouver, ISO, and other styles
10

Kameníček, Lukáš. "Návrh systém managementu ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229425.

Full text
Abstract:
This diploma thesis analyses the current state of information security management in an organization. In the theoretical part of the thesis general concepts are described as well as the relations between risk management and information security, applicable laws and standards. Further, the theoretical part deals with the risk analysis and risk management, strategies, standard procedures and methods applied in this field. In the practical part a methodology is suggested for information risk analysis in a particular organization and appropriate measures are selected.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information security, information security management system, ISMS"

1

Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Montana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. [Helena, Mont: Legislative Audit Division, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

President's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

P, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Organizational, legal, and technological dimensions of information system administration. Hershey, PA: Information Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

No computer system left behind: A review of the 2005 federal computer security scorecards : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, March 16, 2006. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information security, information security management system, ISMS"

1

Alavi, Reza, Shareeful Islam, and Haralambos Mouratidis. "A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations." In Lecture Notes in Computer Science, 297–305. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07620-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Beckers, Kristian, Maritta Heisel, Bjørnar Solhaug, and Ketil Stølen. "ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System." In Engineering Secure Future Internet Services and Systems, 315–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07452-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Haibo, Yuxi Gao, Min Yan, and Xiaofan Zhang. "Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example." In Communications in Computer and Information Science, 71–85. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_6.

Full text
Abstract:
AbstractBuilding a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense. However, due to technical and management constraints, the current ISEMS has problems such as scattered security organizations, poor sharing channels, and fails to form an overall security guarantee capability for threat reporting, analyzing, warning, and disposing. The blockchain technology has the characters of decentralized trust construction, inter-organizational data sharing, data integrity assurance, data traceability, which just meets the requirements of the emergency management process. This paper analyzes the situation and challenges of ISEMS, describes the system architecture and organizational structure based on the blockchain, and describes the key implementation processes of blockchain-based ISEMS, including threat report, risk analysis, warning release and emergency response.
APA, Harvard, Vancouver, ISO, and other styles
4

Plate, Angelika. "ISMS: A Management Framework for Information Security." In Encyclopedia of Cryptography and Security, 647–48. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Muhammed, Arej, Dan Lin, and Anna Squicciarini. "Location Privacy Policy Management System." In Information and Communications Security, 427–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ko, KyoungHee, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, and Hyun Cheol Jeong. "Design and Implementation of SIP-aware Security Management System." In Information Security Applications, 10–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

An, Hyeongcheol, Rakyong Choi, and Kwangjo Kim. "Blockchain-Based Decentralized Key Management System with Quantum Resistance." In Information Security Applications, 229–40. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dhillon, Gurpreet. "A framework for interpreting the management of IS security." In Managing Information System Security, 29–39. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ray, Indrajit, Sudip Chakraborty, and Indrakshi Ray. "VTrust: A Trust Management System Based on a Vector Model of Trust." In Information Systems Security, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security, information security management system, ISMS"

1

Cosic, Zoran, and Marija Boban. "Information security management — Defining approaches to Information Security policies in ISMS." In 2010 IEEE 8th International Symposium on Intelligent Systems and Informatics (SISY 2010). IEEE, 2010. http://dx.doi.org/10.1109/sisy.2010.5647216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kwon, Sungho, Sangsoo Jang, and Jaeill Lee. "Study on the General Defects in the Information Security Management System (ISMS)." In 2006 ITI 4th International Conference on Information & Communications Technology. IEEE, 2006. http://dx.doi.org/10.1109/itict.2006.358288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jian, Zhang, Yuan Wei-hua, and Xu Jun-li. "Research on security management system PRS-ISMCS of information system." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5877065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Achmadi, Dedy, Yohan Suryanto, and Kalamullah Ramli. "On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center." In 2018 International Workshop on Big Data and Information Security (IWBIS). IEEE, 2018. http://dx.doi.org/10.1109/iwbis.2018.8471700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Luma, A., and B. Abazi. "The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS)." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rivera, Rafael, and Jesus Torrado. "An IOT-Ontological Approach to the Implementation of the Information Security Management System (ISMS) in a Global Enterprise." In The 15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnership for Development and Engineering Education”. Latin American and Caribbean Consortium of Engineering Institutions, 2017. http://dx.doi.org/10.18687/laccei2017.1.1.200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zaydi, Mounia, and Bouchaib Nassereddine. "A New Approach of Information System Security Governance: A Proposition of the Continuous Improvement Process Model of Information System Security Risk Management: 4D-ISS." In 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2018. http://dx.doi.org/10.1109/wetice.2018.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan Wei-hua, Zhang Jian, and Qi Wen-jing. "Research on risk management and control system for information security K-PRS-ISMCS based on knowledge management." In 2011 International Symposium on Information Technology in Medicine and Education (ITME 2011). IEEE, 2011. http://dx.doi.org/10.1109/itime.2011.6130777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kanatov, Maksat, Lyazzat Atymtayeva, and Bagdat Yagaliyeva. "Expert systems for information security management and audit. Implementation phase issues." In 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS). IEEE, 2014. http://dx.doi.org/10.1109/scis-isis.2014.7044702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Norman, A. A., and N. M. Yasin. "An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402551.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security, information security management system, ISMS"

1

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lenaeu, Joseph D., Lori Ross O'Neil, Rosalyn M. Leitch, Clifford S. Glantz, Guy P. Landine, Janet L. Bryant, John Lewis, Gemma Mathers, Robert Rodger, and Christopher Johnson. Information security management system planning for CBRN facilities. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1236335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Capell, Peter. Analysis of Courses in Information Management and Network System Security & Survivability. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada363791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Full text
Abstract:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
APA, Harvard, Vancouver, ISO, and other styles
5

Safeguarding through science: Center for Plant Health Science and Technology 2008 Accomplishments. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, December 2009. http://dx.doi.org/10.32747/2009.7296842.aphis.

Full text
Abstract:
The Center for Plant Health Science and Technology (CPHST) was designed and developed to support the regulatory decisions and operations of the Animal and Plant Health Inspection Service’s (APHIS) Plant Protection and Quarantine (PPQ) program through methods development work, scientific investigation, analyses, and technology—all in an effort to safeguard U.S. agriculture and natural resources. This 2008 CPHST Annual Report is intended to offer an in-depth look at the status of its programs and the progress it has made toward the Center’s long-term strategic goals. One of CPHST’s most significant efforts in 2008 was to initiate efforts to improve the Center’s organizational transparency and overall responsiveness to the needs of its stakeholders. As a result of its focus in this area, CPHST is now developing a new workflow process that allows the customers to easily request and monitor projects and ensures that the highest priority projects are funded for successful delivery. This new system will allow CPHST to more dynamically identify the needs of the agency, more effectively allocate and utilize resources, and provide its customers timely information regarding a project’s status. Thus far, while still very much a work in progress, this new process is proving to be successful, and will continue to advance and expand the service to its customers and staff. The considerable and growing concern of homeland security and the management of critical issues drives CPHST to lead the methods development of science-based systems for prevention, preparedness, response, and recovery. CPHST is recognized nationally and internationally for its leadership in scientific developments to battle plant pests and diseases.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography