Academic literature on the topic 'Information security, information security management system, ISMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security, information security management system, ISMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security, information security management system, ISMS"
Park, Sanghyun, and Kyungho Lee. "Advanced Approach to Information Security Management System Model for Industrial Control System." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/348305.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textPark, Jong Hyuk, Ki Jung Yi, and Young-Sik Jeong. "An enhanced smartphone security model based on information security management system (ISMS)." Electronic Commerce Research 14, no. 3 (September 19, 2014): 321–48. http://dx.doi.org/10.1007/s10660-014-9146-3.
Full textRyu, Seung-Han, Dae-Ryeong Jeong, and Hoe-Kyung Jung. "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 769–74. http://dx.doi.org/10.6109/jkiice.2013.17.4.769.
Full textKong, Hee-Kyung, Hyo-Jung Jun, Song-Ha Lee, Min-Seong Kang, and Tae-Sung Kim. "Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)." Journal of the Korea Institute of Information Security and Cryptology 26, no. 3 (June 30, 2016): 821–35. http://dx.doi.org/10.13089/jkiisc.2016.26.3.821.
Full textMantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (March 18, 2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.
Full textIbrahim, Noralinawati, and Nor’ashikin Ali. "The Role of Organizational Factors to the Effectiveness of ISMS Implementation in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.35 (November 30, 2018): 544. http://dx.doi.org/10.14419/ijet.v7i4.35.22907.
Full textSafonova, O. M., and N. V. Kotelnikov. "Modeling the information security management system (ISMS) of a medical organization." E3S Web of Conferences 224 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202022401035.
Full textPutra, Anggi Anugraha, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Perencanaan dan Implementasi Information Security Management System Menggunakan Framework ISO/IEC 20071." Jurnal Teknologi dan Sistem Komputer 4, no. 1 (January 23, 2016): 60. http://dx.doi.org/10.14710/jtsiskom.4.1.2016.60-66.
Full textPanda, Prof Subarna. "Implementation of Information Security Management System (ISMS) Aligned with ISO 27001." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 218–27. http://dx.doi.org/10.22214/ijraset.2019.5034.
Full textDissertations / Theses on the topic "Information security, information security management system, ISMS"
Erkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.
Full textInfoSec Toolkit&rdquo
, which is developed for this purpose in the thesis scope, is given. &ldquo
InfoSec Toolkit&rdquo
is based on ISO/IEC 27001:2005 and ISO 17799:2005. Five basic integrated modules constituting the &ldquo
InfoSec Toolkit&rdquo
are &ldquo
Gap Analysis Module&rdquo
, &ldquo
Risk Module&rdquo
, &ldquo
Policy Management Module&rdquo
, &ldquo
Monitoring Module&rdquo
and &ldquo
Query and Reporting Module&rdquo
. In addition a research framework is proposed in order to assess the public and private organizations&rsquo
information security situation in Turkey.
Trunkát, Jan. "Návrh zavedení ISMS ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-225000.
Full textAsp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.
Full textShoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.
Full textHavlík, Michal. "Návrh průmyslového řešení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318610.
Full textTomko, Michal. "Návrh zavedení bezpečnostních opatření na základě ISMS pro malý podnik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402087.
Full textDočekal, Petr. "Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378344.
Full textKuchařík, Lukáš. "Návrh ISMS v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241472.
Full textDokoupil, Ondřej. "Návrh metodiky pro zavedení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-254270.
Full textKameníček, Lukáš. "Návrh systém managementu ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229425.
Full textBooks on the topic "Information security, information security management system, ISMS"
Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.
Full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textSecurity for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.
Find full textMontana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. [Helena, Mont: Legislative Audit Division, 2005.
Find full textPresident's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Find full textOrganizational, legal, and technological dimensions of information system administration. Hershey, PA: Information Science Reference, 2014.
Find full textPearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.
Find full textNo computer system left behind: A review of the 2005 federal computer security scorecards : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, March 16, 2006. Washington: U.S. G.P.O., 2006.
Find full textBook chapters on the topic "Information security, information security management system, ISMS"
Alavi, Reza, Shareeful Islam, and Haralambos Mouratidis. "A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations." In Lecture Notes in Computer Science, 297–305. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07620-1_26.
Full textBeckers, Kristian, Maritta Heisel, Bjørnar Solhaug, and Ketil Stølen. "ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System." In Engineering Secure Future Internet Services and Systems, 315–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07452-8_13.
Full textHuang, Haibo, Yuxi Gao, Min Yan, and Xiaofan Zhang. "Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example." In Communications in Computer and Information Science, 71–85. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_6.
Full textPlate, Angelika. "ISMS: A Management Framework for Information Security." In Encyclopedia of Cryptography and Security, 647–48. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_289.
Full textMuhammed, Arej, Dan Lin, and Anna Squicciarini. "Location Privacy Policy Management System." In Information and Communications Security, 427–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_41.
Full textKo, KyoungHee, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, and Hyun Cheol Jeong. "Design and Implementation of SIP-aware Security Management System." In Information Security Applications, 10–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_2.
Full textAn, Hyeongcheol, Rakyong Choi, and Kwangjo Kim. "Blockchain-Based Decentralized Key Management System with Quantum Resistance." In Information Security Applications, 229–40. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_18.
Full textHong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.
Full textDhillon, Gurpreet. "A framework for interpreting the management of IS security." In Managing Information System Security, 29–39. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9_3.
Full textRay, Indrajit, Sudip Chakraborty, and Indrakshi Ray. "VTrust: A Trust Management System Based on a Vector Model of Trust." In Information Systems Security, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_7.
Full textConference papers on the topic "Information security, information security management system, ISMS"
Cosic, Zoran, and Marija Boban. "Information security management — Defining approaches to Information Security policies in ISMS." In 2010 IEEE 8th International Symposium on Intelligent Systems and Informatics (SISY 2010). IEEE, 2010. http://dx.doi.org/10.1109/sisy.2010.5647216.
Full textKwon, Sungho, Sangsoo Jang, and Jaeill Lee. "Study on the General Defects in the Information Security Management System (ISMS)." In 2006 ITI 4th International Conference on Information & Communications Technology. IEEE, 2006. http://dx.doi.org/10.1109/itict.2006.358288.
Full textJian, Zhang, Yuan Wei-hua, and Xu Jun-li. "Research on security management system PRS-ISMCS of information system." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5877065.
Full textAchmadi, Dedy, Yohan Suryanto, and Kalamullah Ramli. "On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center." In 2018 International Workshop on Big Data and Information Security (IWBIS). IEEE, 2018. http://dx.doi.org/10.1109/iwbis.2018.8471700.
Full textLuma, A., and B. Abazi. "The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS)." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756645.
Full textRivera, Rafael, and Jesus Torrado. "An IOT-Ontological Approach to the Implementation of the Information Security Management System (ISMS) in a Global Enterprise." In The 15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnership for Development and Engineering Education”. Latin American and Caribbean Consortium of Engineering Institutions, 2017. http://dx.doi.org/10.18687/laccei2017.1.1.200.
Full textZaydi, Mounia, and Bouchaib Nassereddine. "A New Approach of Information System Security Governance: A Proposition of the Continuous Improvement Process Model of Information System Security Risk Management: 4D-ISS." In 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2018. http://dx.doi.org/10.1109/wetice.2018.00028.
Full textYuan Wei-hua, Zhang Jian, and Qi Wen-jing. "Research on risk management and control system for information security K-PRS-ISMCS based on knowledge management." In 2011 International Symposium on Information Technology in Medicine and Education (ITME 2011). IEEE, 2011. http://dx.doi.org/10.1109/itime.2011.6130777.
Full textKanatov, Maksat, Lyazzat Atymtayeva, and Bagdat Yagaliyeva. "Expert systems for information security management and audit. Implementation phase issues." In 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS). IEEE, 2014. http://dx.doi.org/10.1109/scis-isis.2014.7044702.
Full textNorman, A. A., and N. M. Yasin. "An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402551.
Full textReports on the topic "Information security, information security management system, ISMS"
Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.
Full textLenaeu, Joseph D., Lori Ross O'Neil, Rosalyn M. Leitch, Clifford S. Glantz, Guy P. Landine, Janet L. Bryant, John Lewis, Gemma Mathers, Robert Rodger, and Christopher Johnson. Information security management system planning for CBRN facilities. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1236335.
Full textCapell, Peter. Analysis of Courses in Information Management and Network System Security & Survivability. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada363791.
Full textErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Full textSafeguarding through science: Center for Plant Health Science and Technology 2008 Accomplishments. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, December 2009. http://dx.doi.org/10.32747/2009.7296842.aphis.
Full text