Journal articles on the topic 'Information security, information security management system, ISMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security, information security management system, ISMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Park, Sanghyun, and Kyungho Lee. "Advanced Approach to Information Security Management System Model for Industrial Control System." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/348305.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textPark, Jong Hyuk, Ki Jung Yi, and Young-Sik Jeong. "An enhanced smartphone security model based on information security management system (ISMS)." Electronic Commerce Research 14, no. 3 (September 19, 2014): 321–48. http://dx.doi.org/10.1007/s10660-014-9146-3.
Full textRyu, Seung-Han, Dae-Ryeong Jeong, and Hoe-Kyung Jung. "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 769–74. http://dx.doi.org/10.6109/jkiice.2013.17.4.769.
Full textKong, Hee-Kyung, Hyo-Jung Jun, Song-Ha Lee, Min-Seong Kang, and Tae-Sung Kim. "Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)." Journal of the Korea Institute of Information Security and Cryptology 26, no. 3 (June 30, 2016): 821–35. http://dx.doi.org/10.13089/jkiisc.2016.26.3.821.
Full textMantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (March 18, 2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.
Full textIbrahim, Noralinawati, and Nor’ashikin Ali. "The Role of Organizational Factors to the Effectiveness of ISMS Implementation in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.35 (November 30, 2018): 544. http://dx.doi.org/10.14419/ijet.v7i4.35.22907.
Full textSafonova, O. M., and N. V. Kotelnikov. "Modeling the information security management system (ISMS) of a medical organization." E3S Web of Conferences 224 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202022401035.
Full textPutra, Anggi Anugraha, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Perencanaan dan Implementasi Information Security Management System Menggunakan Framework ISO/IEC 20071." Jurnal Teknologi dan Sistem Komputer 4, no. 1 (January 23, 2016): 60. http://dx.doi.org/10.14710/jtsiskom.4.1.2016.60-66.
Full textPanda, Prof Subarna. "Implementation of Information Security Management System (ISMS) Aligned with ISO 27001." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 218–27. http://dx.doi.org/10.22214/ijraset.2019.5034.
Full textChoi, Dong-Kwon, and Yoon, Hyun Shik. "A Study on Impact of Information Security Management on Sales Performance and the Value of Corporate: Focusing on Information Security Management System(ISMS)." Journal of Digital Contents Society 20, no. 8 (August 31, 2019): 1567–76. http://dx.doi.org/10.9728/dcs.2019.20.8.1567.
Full textAl-Shawabkeh, Mahmoud, Madihah Mohd Saudi, Najwa Hayati Mohd Alwi, and Norhidayah Azman. "Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) Model Comparison." Advanced Science Letters 23, no. 6 (June 1, 2017): 5237–41. http://dx.doi.org/10.1166/asl.2017.7349.
Full textHo, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (June 8, 2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.
Full textShamala, Palaniappan, Muruga Chinniah, Cik Feresa Mohd Foozy, Chuah Chai Wen, Aida Mustapha, and Rabiah Ahmad. "Information Structure Framework for ISMS Planning and Certification: Malaysian Data." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 634. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp634-640.
Full textBychkov, Oleksii. "TO THE CONCEPT OF A PROTECTED OPERATION SYSTEM." Information systems and technologies security, no. 1 (1) (2019): 42–51. http://dx.doi.org/10.17721/ists.2019.1.42-51.
Full textJo, Jung-Gi, and Sang-Hyun Choi. "Firm's Market Value Trends after Information Security Management System(ISMS) Certification acquisition." Journal of the Korea Convergence Society 7, no. 6 (December 31, 2016): 237–47. http://dx.doi.org/10.15207/jkcs.2016.7.6.237.
Full textARFANUDIN, CITRA, Bambang Sugiantoro, and Yudi Prayudi. "ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX." Cyber Security dan Forensik Digital 2, no. 1 (July 5, 2019): 1–7. http://dx.doi.org/10.14421/csecurity.2019.2.1.1388.
Full textJang, Sang-Soo. "Estimating The Economic Value of Information Security Management System (ISMS) Certification by CVM." Journal of the Korea Academia-Industrial cooperation Society 15, no. 9 (September 30, 2014): 5783–89. http://dx.doi.org/10.5762/kais.2014.15.9.5783.
Full textShameli-Sendi, Alireza, Masoume Jabbarifar, Michel Dagenais, and Mehdi Shajari. "System Health Monitoring Using a Novel Method: Security Unified Process." Journal of Computer Networks and Communications 2012 (2012): 1–20. http://dx.doi.org/10.1155/2012/151205.
Full textBae, Young-Sik. "A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance." Journal of the Korea Academia-Industrial cooperation Society 13, no. 9 (September 30, 2012): 4224–33. http://dx.doi.org/10.5762/kais.2012.13.9.4224.
Full textHaufe, Knut, Srdan Dzombeta, and Knud Brandis. "Proposal for a Security Management in Cloud Computing for Health Care." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/146970.
Full textPurba, Anton, and Mohammad Soetomo. "Assessing Privileged Access Management (PAM) using ISO 27001:2013 Control." ACMIT Proceedings 5, no. 1 (March 19, 2019): 65–76. http://dx.doi.org/10.33555/acmit.v5i1.76.
Full textMantra, IGN, Aedah Abd. Rahman, and Hoga Saragih. "Maturity Framework Analysis ISO 27001: 2013 on Indonesian Higher Education." International Journal of Engineering & Technology 9, no. 2 (April 18, 2020): 429. http://dx.doi.org/10.14419/ijet.v9i2.30581.
Full textKala Kamdjoug, Jean Robert, Harold Junior Nguegang Tewamba, and Samuel Fosso Wamba. "IT capabilities, firm performance and the mediating role of ISRM." Business Process Management Journal 25, no. 3 (June 27, 2019): 476–94. http://dx.doi.org/10.1108/bpmj-11-2017-0297.
Full textKurnianto, Ari, Rizal Isnanto, and Aris Puji Widodo. "Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs." E3S Web of Conferences 31 (2018): 11013. http://dx.doi.org/10.1051/e3sconf/20183111013.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full textLukitowati, Risma, and Kalamullah Ramli. "Assessing the Information Security Awareness of Employees in PT ABC Against International Organization for Standardization (ISO) 27001:2013." Journal of Computational and Theoretical Nanoscience 17, no. 2 (February 1, 2020): 1441–46. http://dx.doi.org/10.1166/jctn.2020.8823.
Full textKim, Jungeun, and Seongjun Kim. "Study on Plans to Improve Small and Medium Corporations' Technological Protections Using Information Security Management System (ISMS)." Journal of the Korea Society of Digital Industry and Information Management 12, no. 3 (September 30, 2016): 33–54. http://dx.doi.org/10.17662/ksdim.2016.12.3.033.
Full textPark, Kyeong-Tae, and Sehun Kim. "A Study on Selection Factors of Consulting Company for the Certification of Information Security Management System." Journal of the Korea Institute of Information Security and Cryptology 24, no. 6 (December 31, 2014): 1309–18. http://dx.doi.org/10.13089/jkiisc.2014.24.6.1309.
Full textDas, Saini, Arunabha Mukhopadhyay, and Bharat Bhasker. "Today’s Action is Better than Tomorrow’s Cure - Evaluating Information Security at a Premier Indian Business School." Journal of Cases on Information Technology 15, no. 3 (July 2013): 1–23. http://dx.doi.org/10.4018/jcit.2013070101.
Full textTatiara, R., A. N. Fajar, B. Siregar, and W. Gunawan. "Analysis of factors that inhibiting implementation of Information Security Management System (ISMS) based on ISO 27001." Journal of Physics: Conference Series 978 (March 2018): 012039. http://dx.doi.org/10.1088/1742-6596/978/1/012039.
Full textLee, Choong-Cheang, Jin Kim, and Chung-Hun Lee. "A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (October 31, 2014): 919–29. http://dx.doi.org/10.13089/jkiisc.2014.24.5.919.
Full textSUHAIMI, Ahmad Iqbal Hakim, Yuichi GOTO, and Jingde CHENG. "An Information Security Management Database System (ISMDS) for Engineering Environment Supporting Organizations with ISMSs." IEICE Transactions on Information and Systems E97.D, no. 6 (2014): 1516–27. http://dx.doi.org/10.1587/transinf.e97.d.1516.
Full textKrawczyk-Jezierska, Agnieszka, and Jarosław Jezierski. "Zastosowanie normy ISO/EIC 27001 w sektorze finansowym — zakres i korzyści." Ekonomia 24, no. 2 (October 23, 2018): 107–21. http://dx.doi.org/10.19195/2084-4093.24.2.8.
Full textBanker, Rajiv D., and Cecilia (Qian) Feng. "The Impact of Information Security Breach Incidents on CIO Turnover." Journal of Information Systems 33, no. 3 (August 1, 2019): 309–29. http://dx.doi.org/10.2308/isys-52532.
Full textPutra, Mardi Yudhi, and Djajasukma Tjahjadi. "Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 1 (March 19, 2018): 95–104. http://dx.doi.org/10.33558/piksel.v6i1.1404.
Full textLee, Lorraine S., and William D. Brink. "Trust in Cloud-Based Services: A Framework for Consumer Adoption of Software as a Service." Journal of Information Systems 34, no. 2 (October 18, 2019): 65–85. http://dx.doi.org/10.2308/isys-52626.
Full textBrown, J. Owen, James A. Marcum, and Martin T. Stuebs. "Professional Virtue Reinforcements: A Necessary Complement to Technological and Policy Reforms." Journal of Information Systems 31, no. 2 (January 1, 2017): 5–23. http://dx.doi.org/10.2308/isys-51664.
Full textBakri, Muhammad, and Nia Irmayana. "ANALISIS DAN PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI SIMHP BPKP MENGGUNAKAN STANDAR ISO 27001." Jurnal Tekno Kompak 11, no. 2 (August 15, 2017): 41. http://dx.doi.org/10.33365/jtk.v11i2.162.
Full textHaislip, Jacob Z., Adi Masli, Vernon J. Richardson, and Juan Manuel Sanchez. "Repairing Organizational Legitimacy Following Information Technology (IT) Material Weaknesses: Executive Turnover, IT Expertise, and IT System Upgrades." Journal of Information Systems 30, no. 1 (September 1, 2015): 41–70. http://dx.doi.org/10.2308/isys-51294.
Full textAppelbaum, Deniz, and Robert A. Nehmer. "Auditing Cloud-Based Blockchain Accounting Systems." Journal of Information Systems 34, no. 2 (October 25, 2019): 5–21. http://dx.doi.org/10.2308/isys-52660.
Full textSteinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions." Journal of Information Systems 27, no. 2 (May 1, 2013): 65–86. http://dx.doi.org/10.2308/isys-50510.
Full textJayusman, Yus. "Evaluasi Tata Kelola Teknologi Informasi Dan Perancangan Kebijakan Evaluasi Tata Kelola Teknologi Informasi Dan Perancang." Jurnal Bangkit Indonesia 7, no. 2 (October 31, 2018): 49. http://dx.doi.org/10.52771/bangkitindonesia.v7i2.81.
Full textAl-Dhahri, Sahar, Manar Al-Sarti, and Azrilah Abdul. "Information Security Management System." International Journal of Computer Applications 158, no. 7 (January 17, 2017): 29–33. http://dx.doi.org/10.5120/ijca2017912851.
Full textMalimage, Kalana, Nirmalee Raddatz, Brad S. Trinkle, Robert E. Crossler, and Rebecca Baaske. "Impact of Deterrence and Inertia on Information Security Policy Changes." Journal of Information Systems 34, no. 1 (March 5, 2019): 123–34. http://dx.doi.org/10.2308/isys-52400.
Full textSteinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "SECURQUAL: An Instrument for Evaluating the Effectiveness of Enterprise Information Security Programs." Journal of Information Systems 30, no. 1 (August 1, 2015): 71–92. http://dx.doi.org/10.2308/isys-51257.
Full textKwon, Juhee, Jackie Rees Ulmer, and Tawei Wang. "The Association between Top Management Involvement and Compensation and Information Security Breaches." Journal of Information Systems 27, no. 1 (October 1, 2012): 219–36. http://dx.doi.org/10.2308/isys-50339.
Full textHumphreys, Edward. "Information security management system standards." Datenschutz und Datensicherheit - DuD 35, no. 1 (January 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Full textAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Full textXu, Howard, Savannah (Yuanyaun) Guo, Jacob Z. Haislip, and Robert E. Pinsker. "Earnings Management in Firms with Data Security Breaches." Journal of Information Systems 33, no. 3 (July 1, 2019): 267–84. http://dx.doi.org/10.2308/isys-52480.
Full text