To see the other types of publications on this topic, follow the link: Information Security Management System (ISMS).

Journal articles on the topic 'Information Security Management System (ISMS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information Security Management System (ISMS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mwangi Chege, Stanley. "Information Security Management System Practices in Kenya." Journal of International Business Research and Marketing 8, no. 2 (2024): 15–23. http://dx.doi.org/10.18775/10.18775/jibrm.1849-8558.2015.82.3002.

Full text
Abstract:
This research analyzes international standards and frameworks that support organizations in Kenya in building, implementing, maintaining, and enhancing their ISMS (ISMS). Security risks are increasingly complex, and this study outlines best practices for managing those risks. A case study approach is applied to investigate the use of ISMS frameworks within Kenyan organizations. Through analyzing relevant literature and Kenyan organizations, the study identifies key practices, insights, frameworks, and their practical applications. There is a relation between an effective ISMS and business perf
APA, Harvard, Vancouver, ISO, and other styles
2

Haufe, Knut, Ricardo Colomo-Palacios, Srdan Dzombeta, Knud Brandis, and Vladimir Stantchev. "A process framework for information security management." International Journal of Information Systems and Project Management 4, no. 4 (2022): 27–47. http://dx.doi.org/10.12821/ijispm040402.

Full text
Abstract:
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Sanghyun, and Kyungho Lee. "Advanced Approach to Information Security Management System Model for Industrial Control System." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/348305.

Full text
Abstract:
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial contr
APA, Harvard, Vancouver, ISO, and other styles
4

Kwakye, Agyapong PhD, and Boakye Isaac. "An Assessment of the Effect of Information Security Management System on Organisational Performance." INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND ANALYSIS 08, no. 03 (2025): 1278–88. https://doi.org/10.5281/zenodo.15068119.

Full text
Abstract:
This study examines the effect of an Information Security Management System (ISMS) on organizational performance in a Small and Medium Business (SMB), with a focus on Red Mango Ltd. The study employed a correlational survey design to assess the relationship between ISMS implementation and organizational performance. Primary data was collected from 44 respondents, including management and staff, through structured questionnaires. The convenience sampling technique was used for respondent selection, and data analysis was conducted using the Statistical Package for Social Sciences (SPSS) version
APA, Harvard, Vancouver, ISO, and other styles
5

Arianty, Kiki Puspo. "Analysis of Information Security Management System Implementation at BSN." Jurnal Informatika: Jurnal Pengembangan IT 10, no. 1 (2025): 119–29. https://doi.org/10.30591/jpit.v10i1.8211.

Full text
Abstract:
SNI ISO/IEC 27001:2013, adopted by the National Standardization Agency of Indonesia (BSN), is a national standard derived from the international ISO/IEC 27001 published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). This study evaluates the effectiveness of BSN's Information Security Management System (ISMS) implementation, focusing on compliance with international standards, risk management strategies, and organizational commitment to safeguarding information. Employing qualitative descriptive methods, data were collected t
APA, Harvard, Vancouver, ISO, and other styles
6

Jevelin, Jevelin, and Ahmad Faza. "Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification." Journal of Information Systems and Informatics 5, no. 4 (2023): 1240–56. http://dx.doi.org/10.51519/journalisi.v5i4.572.

Full text
Abstract:
This study addresses the urgent need for robust data security by evaluating the Information Security Management System (ISMS) of a private contractor poised for ISO 27001 certification. It introduces the context of pervasive data breaches that necessitate stringent security measures. Employing a mixed-methods approach, the research method combines the KAMI index for quantitative maturity assessment with qualitative insights from staff interviews and literature reviews. The results reveal the contractor's ISMS maturity at levels I+ to II, indicating a shortfall in meeting the ISO 27001 benchmar
APA, Harvard, Vancouver, ISO, and other styles
7

Rasyid, Rizky Muhamad, and Rizal Fathoni Aji. "Perancangan Manajemen Risiko Keamanan Informasi Menggunakan SNI ISO/IEC 27005: Studi Kasus Integrated School Management System milik PT XYZ." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 10, no. 1 (2025): 226. https://doi.org/10.30645/jurasik.v10i1.866.

Full text
Abstract:
The existence of information technology has provided various conveniences and opportunities for conducting business online, one of which is the Software as a Service (SaaS) industry. PT XYZ is one of the startups focused on the SaaS business as a provider of integrated school management system (ISMS) solutions. IT plays a vital role in the operational activities of ISMS. PT XYZ is aware of this and has implemented a zero-security incident policy for its ISMS. However, the ISMS still experiences security incidents due to vulnerabilities in the system that result in losses for PT XYZ. This indic
APA, Harvard, Vancouver, ISO, and other styles
8

Fajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.

Full text
Abstract:
The rapid development of information and communication technology has also led to a significant increase in cybercrime activities. According to the Annual Cybersecurity Monitoring Report by the National Cyber and Cryptography Agency, there were 495 million instances of traffic anomalies or attempted attacks in 2020, which rose to 1.6 billion in 2021 in Indonesia. Implementing the ISO 27001 standard for information security management system (ISMS) can help mitigate these cyber-attack attempts. However, with various levels of resources and organizational commitment, different levels of ISMS mat
APA, Harvard, Vancouver, ISO, and other styles
9

IROTH, RANDA MATTHEW. "Information Security Management System (ISMS) at BPJS Kesehatan Tondano: Implementation of ISO 27001:2022 Standard." Jurnal Jaminan Kesehatan Nasional 5, no. 1 (2025): 62–74. https://doi.org/10.53756/jjkn.v5i1.247.

Full text
Abstract:
Information security is crucial for organizations managing sensitive data in the digital era. This is especially true for institutions like the Social Security Administrative Body for Health (BPJS Kesehatan), which organizes social health security for the Indonesian people and handles various important information, including participant, medical, and financial data. However, as threats to information security increase, organizations need to implement an effective information security management system. This research examines the implementation of the Information Security Management System (ISM
APA, Harvard, Vancouver, ISO, and other styles
10

Abdu Al-esaiy, Mohammad, and Nagi Ali Al-Shaibany. "ANALYSIS OF INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORKS." International Journal of Computer Science and Mobile Computing 10, no. 11 (2021): 29–46. http://dx.doi.org/10.47760/ijcsmc.2021.v10i11.005.

Full text
Abstract:
ISMS is a set of policies, activities, and procedures implemented by the Information Security Department to maintain the confidentiality, integrity, and availability of information from threats and risks. Activities and procedures include identifying security needs, strategies required for implementation, and measuring results for security improvement. This paper aims to review the previous literature to verify the factors that affect information security management. Examination of current information security frameworks and standards, and this paper concluded that, for an organization to adop
APA, Harvard, Vancouver, ISO, and other styles
11

Duggal, Kanika, and Seunghwan Myeong. "The Influence of Information Security Management System Implementation on the Financial Performance of Indian Companies: Examining the Moderating Effect of National Culture." Sustainability 16, no. 20 (2024): 9058. http://dx.doi.org/10.3390/su16209058.

Full text
Abstract:
The extensive focus on information technology (IT) within organizations, along with the substantial significance of information security issues, has made information security a top priority for executives. The International Organization for Standardization 27001 (ISO-27001) policy outlines the requirements for an effective Information Security Management System (ISMS). Implementing an ISMS not only enhances the overall profitability of a firm, but it also has a significant impact in various scenarios. In this study, we examined how ISMS implementation can assist corporations financially, with
APA, Harvard, Vancouver, ISO, and other styles
12

Agung Firmansyah, Rico, Yudi Prayudi, and Ahmad Luthfi. "INTEGRASI DIGITAL FORENSIC READINESS DAN INFORMATION SECURITY MANAGEMENT SYSTEM PADA ORGANISASI PEMERINTAHAN: SYSTEMATIC LITERATURE REVIEW." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 2 (2025): 2852–63. https://doi.org/10.36040/jati.v9i2.13126.

Full text
Abstract:
Transformasi digital di Indonesia dan berbagai negara membawa manfaat signifikan, seperti peningkatan layanan publik melalui e-government, e-payment dan layanan lainnya. Namun, transformasi ini menghadirkan tantangan dalam pengelolaan keamanan data digital dengan meningkatnya insiden seperti serangan ransomware, eksploitasi sistem, pelanggaran data, dan insiden keamanan siber lainnya. Information Security Management System (ISMS) standar dan framework yang mendukung tata kelola dan manajemen keamanan informasi, namun sering kali tidak mencakup Digital Forensic Readiness (DFR) yang menjadi fram
APA, Harvard, Vancouver, ISO, and other styles
13

Bolek, Vladimír, Anita Romanová, and František Korček. "The Information Security Management Systems in E-Business." Journal of Global Information Management 31, no. 1 (2023): 1–29. http://dx.doi.org/10.4018/jgim.316833.

Full text
Abstract:
Enterprises trading on the electronic markets are exposed to security risks due to the active use of ICT in several transformation process activities. Realized risks cause particular damage to the enterprises that lack ISMS (information security management systems) or a basic process approach to IS management. In this article, the authors identify similarities and differences in information security management models from various aspects. The scientific article compares the presented models, their essence, goal, focus, and starting points. Based on advantages and disadvantages, the authors eva
APA, Harvard, Vancouver, ISO, and other styles
14

Anton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.

Full text
Abstract:
This work approaches the assessment of the security and information risks in order to find the optimal values of the risks by applying and comparing different methods to measure and assess the security risks. By describing structural characteristics of standards and methods implemented in the information security management system (ISMS), this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlights the importance of standards and methods of risk management assessment.
APA, Harvard, Vancouver, ISO, and other styles
15

Ibrahim, Noralinawati, and Nor’ashikin Ali. "The Role of Organizational Factors to the Effectiveness of ISMS Implementation in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.35 (2018): 544. http://dx.doi.org/10.14419/ijet.v7i4.35.22907.

Full text
Abstract:
Many organizations have initiated efforts to manage the security of their information by implementing an Information Security Management System (ISMS). ISMS is a set of guiding principles for managing organization’s confidential information and minimizing risk for business continuity. However, information security remains a major challenge and the effectiveness of ISMS is often argued due to the exposure of organizations to information security threats, incidents, risks, and vulnerabilities. One of the reasons is the unsuccessful ISMS current practices amongst all employees and lack of ISMS aw
APA, Harvard, Vancouver, ISO, and other styles
16

Mantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.

Full text
Abstract:
There is a need for an Information Security Management System Standard (ISO 27001:2005) at Perbanas University in general. Particularly ABFII Perbanas needs IT governance on Information Security. ISO 27001:2005 is an Information Security Standard that widely used as Information Security Management System (ISMS). IT Governance approach is the main interest within ISO 27001:2005 for Perbanas University.
APA, Harvard, Vancouver, ISO, and other styles
17

Antipov, V. E., and V. V. Selifanov. "Problems of formalization of ISMS processes." Interexpo GEO-Siberia 6 (May 18, 2022): 3–8. http://dx.doi.org/10.33764/2618-981x-2022-6-3-8.

Full text
Abstract:
This article raises the problem of formalization of processes in the information security management system. The question of the necessity and importance of the stage of formalization of processes, the study and analysis of national and international standards is considered. In the course of the work, approaches to the development of an information security management system were analyzed, as well as national standards ГОСТ Р ИСО/МЭК 27001-2006, ГОСТ Р ИСО/МЭК 27002-2012 and ГОСТ Р ИСО/МЭК 27005-2010, which are the main ones when creating an information security management system (ISMS) and ap
APA, Harvard, Vancouver, ISO, and other styles
18

Park, Jong Hyuk, Ki Jung Yi, and Young-Sik Jeong. "An enhanced smartphone security model based on information security management system (ISMS)." Electronic Commerce Research 14, no. 3 (2014): 321–48. http://dx.doi.org/10.1007/s10660-014-9146-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Soesanto, Edy, Fadila Kurniasih, Putri Mutiara, and Salsabila Taqwaning Afifi. "Sistem manajemen keamanan informasi dengan standar ISO/IEC 27001 dan ISO/ICE 27002 pada PT Jasa Marga." Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi dan Bisnis 1, no. 4 (2023): 155–64. http://dx.doi.org/10.55904/cocreation.v1i4.700.

Full text
Abstract:
This study aims to analyze the security management system with ISO/IEC 27001 and 27002 standards at PT Jasa Marga. This study uses a literature search study method with an ISMS approach. Information security management system (ISMS) means a form of process organization based on a business risk approach for planning (Plan), implementation and operation (Execute), monitoring and inspection (Check), and maintenance and improvement or development (Act) of security gossip, ISO/IEC 27000, 27001 and 27002 companies are accepted and adapted using standards. Based on the results of the study, companies
APA, Harvard, Vancouver, ISO, and other styles
20

Putra, Anggi Anugraha, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Perencanaan dan Implementasi Information Security Management System Menggunakan Framework ISO/IEC 20071." Jurnal Teknologi dan Sistem Komputer 4, no. 1 (2016): 60. http://dx.doi.org/10.14710/jtsiskom.4.1.2016.60-66.

Full text
Abstract:
Penerapan tata kelola Teknologi Informasi saat ini sudah menjadi kebutuhan dan tuntutan di setiap instansi penyelenggara pelayanan publik mengingat peran TI yang semakin penting bagi upaya peningkatan kualitas layanan sebagai salah satu realisasi dari tata kelola pemerintahan yang baik (Good Corporate Governance). Dalam penyelenggaraan tata kelola TI, faktor keamanan informasi merupakan aspek yang sangat penting diperhatikan mengingat kinerja tata kelola TI akan terganggu jika informasi sebagai salah satu objek utama tata kelola TI mengalami masalah keamanan informasi yang menyangkut kerahasia
APA, Harvard, Vancouver, ISO, and other styles
21

Tupa, Jirí, and Frantisek Steiner. "Implementation of information security management system in the small healthcare organization." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2006): 52–58. http://dx.doi.org/10.26636/jtit.2006.2.370.

Full text
Abstract:
The contribution describes the scope and main subject designed within DIGI-Q project. The paper contains results from subprojects of information security management system (ISMS) implementation, managed by students of DIGI-Q course. Very interesting simple risk assessment method and risk management and their application within in small healthcare organization were developed. Criteria and procedures accepted are described
APA, Harvard, Vancouver, ISO, and other styles
22

Moses, Frank, and Kurt Sandkuhl. "Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach." Complex Systems Informatics and Modeling Quarterly, no. 37 (December 30, 2023): 54–68. http://dx.doi.org/10.7250/csimq.2023-37.03.

Full text
Abstract:
The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect for most organizations. The dependency on technology for almost every single process in an organization has put ISMS at the top of the corporate agenda of public sector organizations. For public organizations in particular, the NIS 2 Directive describes abstract requirements for the development of an ISMS. On the other hand, only a few public a
APA, Harvard, Vancouver, ISO, and other styles
23

Palaniappan, Shamala, Chinniah Muruga, Feresa Mohd Foozy Cik, Chai Wen Chuah, Mustapha Aida, and Ahmad Rabiah. "Information Structure Framework for ISMS Planning and Certification: Malaysian Data." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 634–40. https://doi.org/10.11591/ijeecs.v12.i2.pp634-640.

Full text
Abstract:
Information security are becoming an important aspect of organizations. Organisations also are progressively conscious of its important in their business strategy. The awareness make organisations are currently applying for information security management system (ISMS) to effectively manage their information assets. Therefore, this research aims to provide an Information Structure Framework for ISMS planning and certification. Then Likert structured questionnaire was distributed and the findings have been analyzed using Rasch Measurement Model (RMM). The results from this study, managed to dev
APA, Harvard, Vancouver, ISO, and other styles
24

Shameli-Sendi, Alireza, Masoume Jabbarifar, Michel Dagenais, and Mehdi Shajari. "System Health Monitoring Using a Novel Method: Security Unified Process." Journal of Computer Networks and Communications 2012 (2012): 1–20. http://dx.doi.org/10.1155/2012/151205.

Full text
Abstract:
Iterative and incremental mechanisms are not usually considered in existing approaches for information security management System (ISMS). In this paper, we propose SUP (security unified process) as a unified process to implement a successful and high-quality ISMS. A disciplined approach can be provided by SUP to assign tasks and responsibilities within an organization. The SUP architecture comprises static and dynamic dimensions; the static dimension, or disciplines, includes business modeling, assets, security policy, implementation, configuration and change management, and project management
APA, Harvard, Vancouver, ISO, and other styles
25

Shamala, Palaniappan, Muruga Chinniah, Cik Feresa Mohd Foozy, Chuah Chai Wen, Aida Mustapha, and Rabiah Ahmad. "Information Structure Framework for ISMS Planning and Certification: Malaysian Data." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 634. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp634-640.

Full text
Abstract:
Information security are becoming an important aspect of organizations. Organisations also are progressively conscious of its important in their business strategy. The awareness make organisations are currently applying for information security management system (ISMS) to effectively manage their information assets. Therefore, this research aims to provide an Information Structure Framework for ISMS planning and certification. Then Likert structured questionnaire was distributed and the findings have been analyzed using Rasch Measurement Model (RMM). The results from this study, managed to dev
APA, Harvard, Vancouver, ISO, and other styles
26

Safonova, O. M., and N. V. Kotelnikov. "Modeling the information security management system (ISMS) of a medical organization." E3S Web of Conferences 224 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202022401035.

Full text
Abstract:
The implementation of information security systems is one of the main components, without which the existence of any modern medical institution is impossible. This question is actual for the healthcare industry. This is confirmed by the presence of large-scale measures that are being implemented as part of the Russian Federation’s healthcare modernization program. But the result of informatization is not always achieved easily and successfully. This process includes the equipment of the technical support of the organization and the fragmentary implementation of information systems to the full
APA, Harvard, Vancouver, ISO, and other styles
27

Ho, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.

Full text
Abstract:
Purpose – The purpose of this paper is to analyze the cause-and-effect relationship and the mutually influential level among information security control items, as well as to provide organizations with a method for analyzing and making systematic decisions for improvement. Design/methodology/approach – This study utilized the Fuzzy DEMATEL to analyze cause-and-effect relationships and mutual influence of the 11 control items of the International Organization for Standardization (ISO) 27001 Information Security Management System (ISMS), which are discussed by seven experts in Taiwan to identify
APA, Harvard, Vancouver, ISO, and other styles
28

Panda, Prof Subarna. "Implementation of Information Security Management System (ISMS) Aligned with ISO 27001." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 218–27. http://dx.doi.org/10.22214/ijraset.2019.5034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ryu, Seung-Han, Dae-Ryeong Jeong, and Hoe-Kyung Jung. "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (2013): 769–74. http://dx.doi.org/10.6109/jkiice.2013.17.4.769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kong, Hee-Kyung, Hyo-Jung Jun, Song-Ha Lee, Min-Seong Kang, and Tae-Sung Kim. "Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)." Journal of the Korea Institute of Information Security and Cryptology 26, no. 3 (2016): 821–35. http://dx.doi.org/10.13089/jkiisc.2016.26.3.821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Surya, Ignatius Christ, Rahmat Mulyana, and Ryan Adhitya Nugraha. "BPRDCo SME Digital Transformation by Designing Information Security Using ISO 27001:2022." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 8, no. 4 (2024): 1242–53. http://dx.doi.org/10.35870/jtik.v8i4.3148.

Full text
Abstract:
In the digital era of the Industrial Revolution 4.0, organizations such as BPRDCo must undergo Digital Transformation (DT) to remain competitive. A significant obstacle in this process is often the inadequacy of information security controls, which can lead to DT failure. Previous research has highlighted the necessity of ambidextrous information security management—integrating both traditional and agile approaches—as a crucial mechanism for DT success in large banks, particularly in data management and information security. However, this strategy has not been proven effective for smaller bank
APA, Harvard, Vancouver, ISO, and other styles
32

Blanco, Carlos, Antonio Santos-Olmo, and Luis Enrique Sánchez. "QISS: Quantum-Enhanced Sustainable Security Incident Handling in the IoT." Information 15, no. 4 (2024): 181. http://dx.doi.org/10.3390/info15040181.

Full text
Abstract:
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, the essential function of an Information Security Management System (ISMS) in safeguarding vital information assets comes to the fore. Within this framework, risk management is key, tasked with the responsibility of adequately restoring the system in the event of a cybersecurity incident and evaluating potential response options. To achieve this,
APA, Harvard, Vancouver, ISO, and other styles
33

Rakan, Raihan, Rahmat Mulyana, and Muharman Lubis. "Utilizing ISO 27001:2022 to Design Information Security for BPRACo SME Digital Transformation." Jurnal Teknologi Dan Sistem Informasi Bisnis 6, no. 4 (2024): 820–31. http://dx.doi.org/10.47233/jteksis.v6i4.1621.

Full text
Abstract:
In the digital age of the Industrial Revolution 4.0, organizations like BPRACo must undergo Digital Transformation (DT). A significant challenge is the lack of adequate information security controls, which can lead to DT failure. Smaller banks, such as BPR, face difficulties in adopting effective information security management strategies that are proven for larger institutions. This study aims to identify the application of ISO 27001:2022 standards and develop an information security management system focusing on the most critical annex clauses for SME digital transformation. It also seeks to
APA, Harvard, Vancouver, ISO, and other styles
34

Chagas, Carlos Henrique Leão, and Andrew Hemerson Galeno Rodrigues. "ANÁLISE DO PROCESSO DE IMPLEMENTAÇÃO DE UM SISTEMA DE GESTÃO DA SEGURANÇA DA INFORMAÇÃO COM BASE NA ISO/IEC 27001." Revista ft 29, no. 142 (2025): 08–09. https://doi.org/10.69849/revistaft/pa10202501192208.

Full text
Abstract:
The theme of this research is the implementation of an Information Security Management System (ISMS) based on the ISO/IEC 27001 standard in an information technology organization. The main objective was to analyze the ISMS implementation process, addressing the stages of the PDCA cycle (Plan, Do, Check, Act) and the challenges faced by the organization. The methodology adopted was qualitative and exploratory, using case study, participant observation and document analysis to identify assets, assess risks and implement security controls. The main results showed significant improvements in infor
APA, Harvard, Vancouver, ISO, and other styles
35

Marhad, Siti Suhaida, Siti Zaleha Abd Goni, and Mad Khir Johari Abdullah Sani. "Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review." Environment-Behaviour Proceedings Journal 9, SI18 (2024): 197–203. http://dx.doi.org/10.21834/e-bpj.v9isi18.5483.

Full text
Abstract:
This systematic literature review investigates the implementation of Information Security Management Systems (ISMS) as a pivotal strategy for safeguarding organizational information in the digital era. Focusing on key factors influencing ISMS implementation, its impact on data protection, and the methodologies employed, the review underscores the significance of awareness and training in fostering compliance. Emphasizing the ISO/IEC 27001 standard as a prevalent framework, the study reveals positive impacts on organizational performance, financial outcomes, corporate reputation, and branding.
APA, Harvard, Vancouver, ISO, and other styles
36

Hong, Bosung, Byungseop Yoon, and Myungsin Chae. "A Study on the Intention to Use of Issue Tracking System for the Information Security Management System: Focused on Experts and Managers in Information Security." Korean Society of Culture and Convergence 44, no. 8 (2022): 99–114. http://dx.doi.org/10.33645/cnc.2022.8.44.8.99.

Full text
Abstract:
Recently, it is very difficult to flexibly and efficiently operate the ISMS to achieve the purpose of information security of companies, because service complexity is increasing and IT is also being changed very quickly. This study analyzed the intention to apply the Issue tracking system as a tool to efficiently operate the ISMS using the ‘UTAUT’ model because the ITS, a flexible collaboration tool, is applied to various ranges. As a result, it was confirmed that ‘Performance Expectancy’, ‘Social Influence’, and additional variables ‘Future Expansion Expectation’ had a significant effect on u
APA, Harvard, Vancouver, ISO, and other styles
37

Partyka, A., O. Harasymchuk, E. Nyemkova, Y. Sovyn, and V. Dudykevych. "DEVELOPMENT OF A METHOD FOR INVESTIGATING CYBERCRIMES BY THE TYPE OF RANSOMWARE USING ARTIFICIAL INTELLIGENCE MODELS IN THE INFORMATION SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE." Computer systems and network 6, no. 1 (2024): 15–25. http://dx.doi.org/10.23939/csn2024.01.015.

Full text
Abstract:
In this article the authors focused on analyzing the possibilities of using artificial intelligence models for effective detection and analysis of cybercrimes. A comprehensive method using artificial intelligence algorithms such as Random Forest and Isolation Forest algorithms is developed and described to detect ransomware which is one of the main threats to information security management systems (ISMS) in the field of critical infrastructure. The result of the study is the determination of the compatibility of such methods with the requirements of ISO 27001:2022 emphasizing the importance o
APA, Harvard, Vancouver, ISO, and other styles
38

Ahmad Atqan Setyoso, Fandi, Rahmat Mulyana, and Ryan Adhitya Nugraha. "Utilizing ISO 27001:2022 In Information Security Design For BPRCCo SME Digital Transformation." Ranah Research : Journal of Multidisciplinary Research and Development 6, no. 6 (2024): 2544–53. http://dx.doi.org/10.38035/rrj.v6i6.1121.

Full text
Abstract:
In the industrial revolution 4.0 era, organizations like BPRCCo need to carry out Digital Transformation (TD) to remain competitive. However, the main challenge in this process is information security which is often result of TD failure. Previous research highlights the importance of ambidextrous information security management (traditional and agile approaches) for large banks in achieving TD, especially in information security. However, this approach has not been proven for small-scale banks such as BPR. Therefore, this research aims to develop recommendations for information security manage
APA, Harvard, Vancouver, ISO, and other styles
39

Merchan Alarcon, Jhonatan Camilo. "Information security: A comprehensive approach to risk management in the digital world." SCT Proceedings in Interdisciplinary Insights and Innovations 1 (December 10, 2023): 84. http://dx.doi.org/10.56294/piii202384.

Full text
Abstract:
This research examined information security as a comprehensive strategy for risk management in the digital world. A literature review was conducted, including frameworks, international standards and best practices. Cyber-attacks, malware, phishing and data leakage are some of the main risks and threats to information security in the digital world. Comprehensive risk management strategies and measures were compiled, including the implementation of an ISO/IEC 27001-compliant information security management system (ISMS), staff training and awareness, adoption of security technologies, and incide
APA, Harvard, Vancouver, ISO, and other styles
40

Martínez Monterrubio, Sergio Mauricio, Juan Frausto Solis, Juan Antonio Recio García, and Josmell Antonio Chavarri Velasquez. "New ESVIT Software for IT Security Policy Verification in Production Systems." International Journal of Combinatorial Optimization Problems and Informatics 16, no. 3 (2025): 540–62. https://doi.org/10.61467/2007.1558.2025.v16i3.869.

Full text
Abstract:
Computer security policies are relatively new to many organisations, particularly regarding their Information Security Management Systems (ISMS). Although their conceptual origins date back to the 1980s, verifying these policies computationally remains a significant challenge. This research proposes a new tool for the verification of ISMS policies based on the VPD methodology. This methodology assesses information security policies and their compliance with ISMS by comparing the set of directive policies (M1) with the implemented policies (M2). The case study presented in this paper involves t
APA, Harvard, Vancouver, ISO, and other styles
41

Jo, Jung-Gi, and Sang-Hyun Choi. "Firm's Market Value Trends after Information Security Management System(ISMS) Certification acquisition." Journal of the Korea Convergence Society 7, no. 6 (2016): 237–47. http://dx.doi.org/10.15207/jkcs.2016.7.6.237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Choi, Dong-Kwon, and Yoon, Hyun Shik. "A Study on Impact of Information Security Management on Sales Performance and the Value of Corporate: Focusing on Information Security Management System(ISMS)." Journal of Digital Contents Society 20, no. 8 (2019): 1567–76. http://dx.doi.org/10.9728/dcs.2019.20.8.1567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sikman, Lj, T. Latinovic, N. Sarajlic, and G. Sikanjic. "A model of sustainable information security management system in higher education institutions." Journal of Physics: Conference Series 2540, no. 1 (2023): 012003. http://dx.doi.org/10.1088/1742-6596/2540/1/012003.

Full text
Abstract:
Abstract Modern business systems have the expectations and requirements of users and stakeholders for safer and better services that are constantly growing. The increasing use of information technology in business increases the threats and vulnerabilities to which information resources are exposed, which causes an increase in information risks. Many business institutions must constantly monitor their activities to establish an organized and sustainable information security management system and services. The requirements of the international standard ISO/IEC 27001 and the generally accepted CO
APA, Harvard, Vancouver, ISO, and other styles
44

Purba, Anton, and Mohammad Soetomo. "Assessing Privileged Access Management (PAM) using ISO 27001:2013 Control." ACMIT Proceedings 5, no. 1 (2019): 65–76. http://dx.doi.org/10.33555/acmit.v5i1.76.

Full text
Abstract:
ISO 27001 is one of the most widely adopted and respected information security standards in use today. It is promulgated by the International Standards Organization (ISO). Many organizations seek to be certified for the standard, which provides a framework for implementing an Information Security Management System (ISMS). The standard touches on virtually every aspect of information security. Access controls - including Privileged Access Management (PAM), thus figure prominently into the ISO 27001 certification and audit processes. In order to manage their privileged accounts, organization sho
APA, Harvard, Vancouver, ISO, and other styles
45

Mohammed, Mustafa Khan. "Examining ISO/IEC 27001 Standard." European Journal of Advances in Engineering and Technology 8, no. 1 (2021): 123–28. https://doi.org/10.5281/zenodo.13950913.

Full text
Abstract:
The demand for risk analysis and information security of systems by institutions that run an information system is rapidly increasing. The utilization of modern information technology in businesses mandates the introduction of different measures to protect the information and systems that house this information. One of the fundamental aspects that has been recommended to achieve information security is the international standard ISO/IEC 27001. ISO/IEC 27001 was jointly established by ISO (International Organization for Standardization) and IEC (International Electronical Commission). The ISO/I
APA, Harvard, Vancouver, ISO, and other styles
46

Jang, Sang-Soo. "Estimating The Economic Value of Information Security Management System (ISMS) Certification by CVM." Journal of the Korea Academia-Industrial cooperation Society 15, no. 9 (2014): 5783–89. http://dx.doi.org/10.5762/kais.2014.15.9.5783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kala Kamdjoug, Jean Robert, Harold Junior Nguegang Tewamba, and Samuel Fosso Wamba. "IT capabilities, firm performance and the mediating role of ISRM." Business Process Management Journal 25, no. 3 (2019): 476–94. http://dx.doi.org/10.1108/bpmj-11-2017-0297.

Full text
Abstract:
Purpose The purpose of this paper is to develop and test a research model that looks at the direct impact of information technology (IT) capabilities on firm performance and the mediating effects of the information security management system (ISMS) on this relationship. Design/methodology/approach The study uses a hypothetico-deductive approach based on quantitative data collected from 136 surveyed professionals in the field of IS, IT and the related security environment. Findings The results confirm the direct impact of IT capabilities on firm performance and the mediating effects of ISMS on
APA, Harvard, Vancouver, ISO, and other styles
48

Bae, Young-Sik. "A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance." Journal of the Korea Academia-Industrial cooperation Society 13, no. 9 (2012): 4224–33. http://dx.doi.org/10.5762/kais.2012.13.9.4224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Makhija, Anil K. "Information Security Management Systems - Evolving Landscape & ISO 27001: An Empirical Study." Journal of Accounting, Finance, Economics, and Social Sciences 6, no. 1 (2021): 9–17. http://dx.doi.org/10.62458/jafess.160224.6(1)9-17.

Full text
Abstract:
ABSTRACT In order to strengthen the partnership both economically and politically among countries in the region, the Belt and Road Initiative (BRI) was introduced and implemented since 2013 by the People Republic of China. Information technology has become an integral part of all business activities. Managing information security has been a key aspect in ensuring that increased information security risks (due to reliance on IT) are managed effectively. The reliance on digital and technology platforms has increased even further due to pandemic driven changes. This has led to higher information
APA, Harvard, Vancouver, ISO, and other styles
50

Cappelmann, Tim. "Informationssicherheit für Krankenhäuser und Kliniken IT-Sicherheit ist Patientensicherheit dank ISMS." Technische Sicherheit 13, no. 07-08 (2023): 39–41. http://dx.doi.org/10.37544/2191-0073-2023-07-08-39.

Full text
Abstract:
Neue Gesetze und Verordnungen nehmen Krankenhaus- und Klinikbetreiber in Sachen Informations- und IT-Sicherheit in die Pflicht zu deren Umsetzung. Risiken müssen strukturiert bewertet und Gegenmaßnahmen gesteuert werden. Die Herausforderungen liegen dabei vor allem in heterogenen Systemen, Wissens- und Zuständigkeitssilos sowie in den vorhandenen Denkmustern begründet. Ein Information Security Management System (ISMS) kann hierzu bestehende Standards (ISO-Bestimmungen, IT-Grundschutz, etc.) nutzen und neue schaffen. So ermöglicht es ein ISMS, Workflows zu automatisieren und dafür zu sorgen, da
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!