Journal articles on the topic 'Information Security Management System (ISMS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information Security Management System (ISMS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mwangi Chege, Stanley. "Information Security Management System Practices in Kenya." Journal of International Business Research and Marketing 8, no. 2 (2024): 15–23. http://dx.doi.org/10.18775/10.18775/jibrm.1849-8558.2015.82.3002.
Full textHaufe, Knut, Ricardo Colomo-Palacios, Srdan Dzombeta, Knud Brandis, and Vladimir Stantchev. "A process framework for information security management." International Journal of Information Systems and Project Management 4, no. 4 (2022): 27–47. http://dx.doi.org/10.12821/ijispm040402.
Full textPark, Sanghyun, and Kyungho Lee. "Advanced Approach to Information Security Management System Model for Industrial Control System." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/348305.
Full textKwakye, Agyapong PhD, and Boakye Isaac. "An Assessment of the Effect of Information Security Management System on Organisational Performance." INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND ANALYSIS 08, no. 03 (2025): 1278–88. https://doi.org/10.5281/zenodo.15068119.
Full textArianty, Kiki Puspo. "Analysis of Information Security Management System Implementation at BSN." Jurnal Informatika: Jurnal Pengembangan IT 10, no. 1 (2025): 119–29. https://doi.org/10.30591/jpit.v10i1.8211.
Full textJevelin, Jevelin, and Ahmad Faza. "Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification." Journal of Information Systems and Informatics 5, no. 4 (2023): 1240–56. http://dx.doi.org/10.51519/journalisi.v5i4.572.
Full textRasyid, Rizky Muhamad, and Rizal Fathoni Aji. "Perancangan Manajemen Risiko Keamanan Informasi Menggunakan SNI ISO/IEC 27005: Studi Kasus Integrated School Management System milik PT XYZ." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 10, no. 1 (2025): 226. https://doi.org/10.30645/jurasik.v10i1.866.
Full textFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Full textIROTH, RANDA MATTHEW. "Information Security Management System (ISMS) at BPJS Kesehatan Tondano: Implementation of ISO 27001:2022 Standard." Jurnal Jaminan Kesehatan Nasional 5, no. 1 (2025): 62–74. https://doi.org/10.53756/jjkn.v5i1.247.
Full textAbdu Al-esaiy, Mohammad, and Nagi Ali Al-Shaibany. "ANALYSIS OF INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORKS." International Journal of Computer Science and Mobile Computing 10, no. 11 (2021): 29–46. http://dx.doi.org/10.47760/ijcsmc.2021.v10i11.005.
Full textDuggal, Kanika, and Seunghwan Myeong. "The Influence of Information Security Management System Implementation on the Financial Performance of Indian Companies: Examining the Moderating Effect of National Culture." Sustainability 16, no. 20 (2024): 9058. http://dx.doi.org/10.3390/su16209058.
Full textAgung Firmansyah, Rico, Yudi Prayudi, and Ahmad Luthfi. "INTEGRASI DIGITAL FORENSIC READINESS DAN INFORMATION SECURITY MANAGEMENT SYSTEM PADA ORGANISASI PEMERINTAHAN: SYSTEMATIC LITERATURE REVIEW." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 2 (2025): 2852–63. https://doi.org/10.36040/jati.v9i2.13126.
Full textBolek, Vladimír, Anita Romanová, and František Korček. "The Information Security Management Systems in E-Business." Journal of Global Information Management 31, no. 1 (2023): 1–29. http://dx.doi.org/10.4018/jgim.316833.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textIbrahim, Noralinawati, and Nor’ashikin Ali. "The Role of Organizational Factors to the Effectiveness of ISMS Implementation in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.35 (2018): 544. http://dx.doi.org/10.14419/ijet.v7i4.35.22907.
Full textMantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.
Full textAntipov, V. E., and V. V. Selifanov. "Problems of formalization of ISMS processes." Interexpo GEO-Siberia 6 (May 18, 2022): 3–8. http://dx.doi.org/10.33764/2618-981x-2022-6-3-8.
Full textPark, Jong Hyuk, Ki Jung Yi, and Young-Sik Jeong. "An enhanced smartphone security model based on information security management system (ISMS)." Electronic Commerce Research 14, no. 3 (2014): 321–48. http://dx.doi.org/10.1007/s10660-014-9146-3.
Full textSoesanto, Edy, Fadila Kurniasih, Putri Mutiara, and Salsabila Taqwaning Afifi. "Sistem manajemen keamanan informasi dengan standar ISO/IEC 27001 dan ISO/ICE 27002 pada PT Jasa Marga." Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi dan Bisnis 1, no. 4 (2023): 155–64. http://dx.doi.org/10.55904/cocreation.v1i4.700.
Full textPutra, Anggi Anugraha, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Perencanaan dan Implementasi Information Security Management System Menggunakan Framework ISO/IEC 20071." Jurnal Teknologi dan Sistem Komputer 4, no. 1 (2016): 60. http://dx.doi.org/10.14710/jtsiskom.4.1.2016.60-66.
Full textTupa, Jirí, and Frantisek Steiner. "Implementation of information security management system in the small healthcare organization." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2006): 52–58. http://dx.doi.org/10.26636/jtit.2006.2.370.
Full textMoses, Frank, and Kurt Sandkuhl. "Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach." Complex Systems Informatics and Modeling Quarterly, no. 37 (December 30, 2023): 54–68. http://dx.doi.org/10.7250/csimq.2023-37.03.
Full textPalaniappan, Shamala, Chinniah Muruga, Feresa Mohd Foozy Cik, Chai Wen Chuah, Mustapha Aida, and Ahmad Rabiah. "Information Structure Framework for ISMS Planning and Certification: Malaysian Data." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 634–40. https://doi.org/10.11591/ijeecs.v12.i2.pp634-640.
Full textShameli-Sendi, Alireza, Masoume Jabbarifar, Michel Dagenais, and Mehdi Shajari. "System Health Monitoring Using a Novel Method: Security Unified Process." Journal of Computer Networks and Communications 2012 (2012): 1–20. http://dx.doi.org/10.1155/2012/151205.
Full textShamala, Palaniappan, Muruga Chinniah, Cik Feresa Mohd Foozy, Chuah Chai Wen, Aida Mustapha, and Rabiah Ahmad. "Information Structure Framework for ISMS Planning and Certification: Malaysian Data." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 634. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp634-640.
Full textSafonova, O. M., and N. V. Kotelnikov. "Modeling the information security management system (ISMS) of a medical organization." E3S Web of Conferences 224 (2020): 01035. http://dx.doi.org/10.1051/e3sconf/202022401035.
Full textHo, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.
Full textPanda, Prof Subarna. "Implementation of Information Security Management System (ISMS) Aligned with ISO 27001." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 218–27. http://dx.doi.org/10.22214/ijraset.2019.5034.
Full textRyu, Seung-Han, Dae-Ryeong Jeong, and Hoe-Kyung Jung. "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (2013): 769–74. http://dx.doi.org/10.6109/jkiice.2013.17.4.769.
Full textKong, Hee-Kyung, Hyo-Jung Jun, Song-Ha Lee, Min-Seong Kang, and Tae-Sung Kim. "Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)." Journal of the Korea Institute of Information Security and Cryptology 26, no. 3 (2016): 821–35. http://dx.doi.org/10.13089/jkiisc.2016.26.3.821.
Full textSurya, Ignatius Christ, Rahmat Mulyana, and Ryan Adhitya Nugraha. "BPRDCo SME Digital Transformation by Designing Information Security Using ISO 27001:2022." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 8, no. 4 (2024): 1242–53. http://dx.doi.org/10.35870/jtik.v8i4.3148.
Full textBlanco, Carlos, Antonio Santos-Olmo, and Luis Enrique Sánchez. "QISS: Quantum-Enhanced Sustainable Security Incident Handling in the IoT." Information 15, no. 4 (2024): 181. http://dx.doi.org/10.3390/info15040181.
Full textRakan, Raihan, Rahmat Mulyana, and Muharman Lubis. "Utilizing ISO 27001:2022 to Design Information Security for BPRACo SME Digital Transformation." Jurnal Teknologi Dan Sistem Informasi Bisnis 6, no. 4 (2024): 820–31. http://dx.doi.org/10.47233/jteksis.v6i4.1621.
Full textChagas, Carlos Henrique Leão, and Andrew Hemerson Galeno Rodrigues. "ANÁLISE DO PROCESSO DE IMPLEMENTAÇÃO DE UM SISTEMA DE GESTÃO DA SEGURANÇA DA INFORMAÇÃO COM BASE NA ISO/IEC 27001." Revista ft 29, no. 142 (2025): 08–09. https://doi.org/10.69849/revistaft/pa10202501192208.
Full textMarhad, Siti Suhaida, Siti Zaleha Abd Goni, and Mad Khir Johari Abdullah Sani. "Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review." Environment-Behaviour Proceedings Journal 9, SI18 (2024): 197–203. http://dx.doi.org/10.21834/e-bpj.v9isi18.5483.
Full textHong, Bosung, Byungseop Yoon, and Myungsin Chae. "A Study on the Intention to Use of Issue Tracking System for the Information Security Management System: Focused on Experts and Managers in Information Security." Korean Society of Culture and Convergence 44, no. 8 (2022): 99–114. http://dx.doi.org/10.33645/cnc.2022.8.44.8.99.
Full textPartyka, A., O. Harasymchuk, E. Nyemkova, Y. Sovyn, and V. Dudykevych. "DEVELOPMENT OF A METHOD FOR INVESTIGATING CYBERCRIMES BY THE TYPE OF RANSOMWARE USING ARTIFICIAL INTELLIGENCE MODELS IN THE INFORMATION SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE." Computer systems and network 6, no. 1 (2024): 15–25. http://dx.doi.org/10.23939/csn2024.01.015.
Full textAhmad Atqan Setyoso, Fandi, Rahmat Mulyana, and Ryan Adhitya Nugraha. "Utilizing ISO 27001:2022 In Information Security Design For BPRCCo SME Digital Transformation." Ranah Research : Journal of Multidisciplinary Research and Development 6, no. 6 (2024): 2544–53. http://dx.doi.org/10.38035/rrj.v6i6.1121.
Full textMerchan Alarcon, Jhonatan Camilo. "Information security: A comprehensive approach to risk management in the digital world." SCT Proceedings in Interdisciplinary Insights and Innovations 1 (December 10, 2023): 84. http://dx.doi.org/10.56294/piii202384.
Full textMartínez Monterrubio, Sergio Mauricio, Juan Frausto Solis, Juan Antonio Recio García, and Josmell Antonio Chavarri Velasquez. "New ESVIT Software for IT Security Policy Verification in Production Systems." International Journal of Combinatorial Optimization Problems and Informatics 16, no. 3 (2025): 540–62. https://doi.org/10.61467/2007.1558.2025.v16i3.869.
Full textJo, Jung-Gi, and Sang-Hyun Choi. "Firm's Market Value Trends after Information Security Management System(ISMS) Certification acquisition." Journal of the Korea Convergence Society 7, no. 6 (2016): 237–47. http://dx.doi.org/10.15207/jkcs.2016.7.6.237.
Full textChoi, Dong-Kwon, and Yoon, Hyun Shik. "A Study on Impact of Information Security Management on Sales Performance and the Value of Corporate: Focusing on Information Security Management System(ISMS)." Journal of Digital Contents Society 20, no. 8 (2019): 1567–76. http://dx.doi.org/10.9728/dcs.2019.20.8.1567.
Full textSikman, Lj, T. Latinovic, N. Sarajlic, and G. Sikanjic. "A model of sustainable information security management system in higher education institutions." Journal of Physics: Conference Series 2540, no. 1 (2023): 012003. http://dx.doi.org/10.1088/1742-6596/2540/1/012003.
Full textPurba, Anton, and Mohammad Soetomo. "Assessing Privileged Access Management (PAM) using ISO 27001:2013 Control." ACMIT Proceedings 5, no. 1 (2019): 65–76. http://dx.doi.org/10.33555/acmit.v5i1.76.
Full textMohammed, Mustafa Khan. "Examining ISO/IEC 27001 Standard." European Journal of Advances in Engineering and Technology 8, no. 1 (2021): 123–28. https://doi.org/10.5281/zenodo.13950913.
Full textJang, Sang-Soo. "Estimating The Economic Value of Information Security Management System (ISMS) Certification by CVM." Journal of the Korea Academia-Industrial cooperation Society 15, no. 9 (2014): 5783–89. http://dx.doi.org/10.5762/kais.2014.15.9.5783.
Full textKala Kamdjoug, Jean Robert, Harold Junior Nguegang Tewamba, and Samuel Fosso Wamba. "IT capabilities, firm performance and the mediating role of ISRM." Business Process Management Journal 25, no. 3 (2019): 476–94. http://dx.doi.org/10.1108/bpmj-11-2017-0297.
Full textBae, Young-Sik. "A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance." Journal of the Korea Academia-Industrial cooperation Society 13, no. 9 (2012): 4224–33. http://dx.doi.org/10.5762/kais.2012.13.9.4224.
Full textMakhija, Anil K. "Information Security Management Systems - Evolving Landscape & ISO 27001: An Empirical Study." Journal of Accounting, Finance, Economics, and Social Sciences 6, no. 1 (2021): 9–17. http://dx.doi.org/10.62458/jafess.160224.6(1)9-17.
Full textCappelmann, Tim. "Informationssicherheit für Krankenhäuser und Kliniken IT-Sicherheit ist Patientensicherheit dank ISMS." Technische Sicherheit 13, no. 07-08 (2023): 39–41. http://dx.doi.org/10.37544/2191-0073-2023-07-08-39.
Full text