To see the other types of publications on this topic, follow the link: Information security management.

Journal articles on the topic 'Information security management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Domozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Full text
Abstract:
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting th
APA, Harvard, Vancouver, ISO, and other styles
3

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Full text
Abstract:
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks
APA, Harvard, Vancouver, ISO, and other styles
4

Tipton, Harold, and Micki Krause. "Information Security Management." EDPACS 27, no. 12 (2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Full text
Abstract:
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Dhahri, Sahar, Manar Al-Sarti, and Azrilah Abdul. "Information Security Management System." International Journal of Computer Applications 158, no. 7 (2017): 29–33. http://dx.doi.org/10.5120/ijca2017912851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Andrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Monitor, I&S. "Information Security Management Handbook." Information & Security: An International Journal 4 (2000): 117–20. http://dx.doi.org/10.11610/isij.0410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Šalgovičová, Jarmila, and Vanessa Prajová. "Information Security Management (ISM)." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 20, Special-Number (2012): 114–19. http://dx.doi.org/10.2478/v10186-012-0019-0.

Full text
Abstract:
Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of
APA, Harvard, Vancouver, ISO, and other styles
10

Mollick, Joseph S. "Management of Information Security." Journal of Information Privacy and Security 4, no. 1 (2008): 64–65. http://dx.doi.org/10.1080/2333696x.2008.10855835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mitchell, Ruth C., Rita Marcella, and Graeme Baxter. "Corporate information security management." New Library World 100, no. 5 (1999): 213–27. http://dx.doi.org/10.1108/03074809910285888.

Full text
Abstract:
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security management. Postal questionnaires and telephone interviews were used. Findings indicate that companies are not proactively tackling information security management and thus are not prepared for security incidents when they occur. Reasons for this l
APA, Harvard, Vancouver, ISO, and other styles
12

Mordovets, V. A., A. A. Grafov, and G. V. Varlamov. "Information security risk management." Economics and Management 31, no. 1 (2025): 72–82. https://doi.org/10.35854/1998-1627-2025-1-72-82.

Full text
Abstract:
Aim. The work aimed to study the methods of information security risk management in the context of digital transformation of companies.Objectives. The work discusses existing approaches to the modernization of information systems, including the gradual modernization method, business process reengineering and reengineering technologies; it analyzes current risk assessment and control methods, such as the CRAMM method, the FRAP model, the OCTAVE technique, and the Microsoft risk management method; and highlights the advantages and disadvantages of these methods, as well as proposes recommendatio
APA, Harvard, Vancouver, ISO, and other styles
13

Wu, Yejun, and Fansong Meng. "Categorizing Security for Security Management and Information Resource Management." Journal of Strategic Security 11, no. 4 (2019): 72–84. http://dx.doi.org/10.5038/1944-0472.11.4.1694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ristov, Pančo, Ante Mrvica, and Pavao Komadina. "Security of Data and Information in Vessel Traffic Management Information Systems." Naše more 63, no. 1 (2016): 1–8. http://dx.doi.org/10.17818/nm/2016/1.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

von Solms, Rossouw. "Information security management (2): guidelines to the management of information technology security (GMITS)." Information Management & Computer Security 6, no. 5 (1998): 221–23. http://dx.doi.org/10.1108/eum0000000004542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

von Solms, Rossouw. "Information security management (1): why information security is so important." Information Management & Computer Security 6, no. 4 (1998): 174–77. http://dx.doi.org/10.1108/eum0000000004533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Full text
Abstract:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instru
APA, Harvard, Vancouver, ISO, and other styles
18

Nishida, Shinichiro. "Information Security Management for Health Information Systems." Japanese Journal of Radiological Technology 66, no. 12 (2010): 1655–64. http://dx.doi.org/10.6009/jjrt.66.1655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tabakaeva, Valeria, Valentin Selifanov, Vladimir An, Sergey Bularga, and Anatoly Vorozhtsov. "Intelligent information security management systems." Transaction of Scientific Papers of the Novosibirsk State Technical University, no. 3-4 (February 20, 2020): 165–76. http://dx.doi.org/10.17212/2307-6879-2019-3-4-165-176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bajor, Teresa, and Marlena Krakowiak. "Crisis management and information security." Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa 6 (2018): 649–59. http://dx.doi.org/10.16926/tiib.2018.06.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

KOTANI, Masashi. "Information security and records management." Journal of Information Processing and Management 49, no. 4 (2006): 191–98. http://dx.doi.org/10.1241/johokanri.49.191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bodin, Lawrence D., Lawrence A. Gordon, and Martin P. Loeb. "Information security and risk management." Communications of the ACM 51, no. 4 (2008): 64–68. http://dx.doi.org/10.1145/1330311.1330325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ike, Ellena. "Information Security and Knowledge Management." European Journal of Information and Knowledge Management 3, no. 2 (2024): 38–50. http://dx.doi.org/10.47941/ejikm.2063.

Full text
Abstract:
Purpose: The general objective of the study was to analyze information security and knowledge management. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data
APA, Harvard, Vancouver, ISO, and other styles
24

Krause, Micki, and Harold Tipton. "Handbook of Information Security Management." EDPACS 26, no. 3 (1998): 15. http://dx.doi.org/10.1201/1079/43275.26.3.19980901/31739.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kwok, Lam‐for, and Dennis Longley. "Information security management and modelling." Information Management & Computer Security 7, no. 1 (1999): 30–40. http://dx.doi.org/10.1108/09685229910255179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zammani, Mazlina, and Rozilawati Razali. "Information Security Management Success Factors." Advanced Science Letters 22, no. 8 (2016): 1924–29. http://dx.doi.org/10.1166/asl.2016.7746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Humphreys, Edward. "Information security management system standards." Datenschutz und Datensicherheit - DuD 35, no. 1 (2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kovacich, Gerald. "Information systems security metrics management." Computers & Security 16, no. 7 (1997): 610–18. http://dx.doi.org/10.1016/s0167-4048(97)80798-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Johnson, M. Eric, Eric Goetz, and Shari Lawrence Pfleeger. "Security through Information Risk Management." IEEE Security & Privacy Magazine 7, no. 3 (2009): 45–52. http://dx.doi.org/10.1109/msp.2009.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Basu, Choton. "Handbook of Information Security Management." Journal of Information Privacy and Security 7, no. 1 (2011): 74–75. http://dx.doi.org/10.1080/15536548.2011.10855907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Miloslavskaya, Natalia, and Svetlana Tolstaya. "Information Security Management Maturity Models." Procedia Computer Science 213 (2022): 49–57. http://dx.doi.org/10.1016/j.procs.2022.11.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Fal’, A. M. "Standardization in information security management." Cybernetics and Systems Analysis 46, no. 3 (2010): 512–15. http://dx.doi.org/10.1007/s10559-010-9227-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

von Solms, Rossouw. "Information security management (3): the Code of Practice for Information Security Management (BS 7799)." Information Management & Computer Security 6, no. 5 (1998): 224–25. http://dx.doi.org/10.1108/09685229810240158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Uddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

J, Kanishka, and Mr Manoj Kumar. "A Study on Information Security in Human Resource Management." International Journal of Research Publication and Reviews 5, no. 3 (2024): 7531–36. http://dx.doi.org/10.55248/gengpi.5.0324.0919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sharonova, N. V., G. A. Pliekhova, M. V. Kostikova, S. M. Neronov, and S. O. Kashkevych. "Information security risk management device in information systems." Bionics of Intelligence 2, no. 101 (2024): 48–51. https://doi.org/10.30837/bi.2024.2(101).07.

Full text
Abstract:
The paper proposes a device for managing information security risks in information systems. The proposed device contains an asset identification module, a threat identification module, a vulnerability identification module, an information security risk processing module, and an information security risk analysis report design module. The first output of the asset identification module is connected to the input of the threat identification module, and the second output is connected to the input of the vulnerability identification module, which are interconnected by feedback. The technical resul
APA, Harvard, Vancouver, ISO, and other styles
37

Palvia, Pankaj. "Security Risk Management: Building and Information Security Risk." Journal of Information Privacy and Security 7, no. 4 (2011): 72–73. http://dx.doi.org/10.1080/15536548.2011.10855925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Baker, Wade, and Linda Wallace. "Is Information Security Under Control?: Investigating Quality in Information Security Management." IEEE Security and Privacy Magazine 5, no. 1 (2007): 36–44. http://dx.doi.org/10.1109/msp.2007.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Anđelski, Hristo, Veljko Đerković, and Uroš Kondić. "Place and role of information security: Information security management model: For owners information." Zdravstvena zastita 40, no. 6 (2011): 28–33. http://dx.doi.org/10.5937/zz1102028a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Silic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.

Full text
Abstract:
Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They
APA, Harvard, Vancouver, ISO, and other styles
41

Zawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.

Full text
Abstract:
Information Security Aspect of Operational Risk ManagementImproving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as co
APA, Harvard, Vancouver, ISO, and other styles
42

Almutairi, Mohammed A. "Planning and Development of Health Management Information Systems." Journal of Medical Science And clinical Research 11, no. 09 (2023): 122–25. http://dx.doi.org/10.18535/jmscr/v11i9.16.

Full text
Abstract:
The research examines the field of Health Management Information Systems (HMIS) which are created and used in existing healthcare systems. It highlights the significance of HMIS as well as its advantages and drawbacks. Critical phases in the development of an HMIS are described in the methodology section. The existing findings support data-driven decision-making, improved patient care, cost savings, and higher data security. Among the difficulties include interoperability, data security, and workforce issues. In conclusion, HMIS is necessary for healthcare, requiring careful planning and inves
APA, Harvard, Vancouver, ISO, and other styles
43

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Full text
Abstract:
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
APA, Harvard, Vancouver, ISO, and other styles
44

Laybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management." Journal of Information Privacy and Security 1, no. 1 (2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kritzinger, E., and E. Smith. "Information security management: An information security retrieval and awareness model for industry." Computers & Security 27, no. 5-6 (2008): 224–31. http://dx.doi.org/10.1016/j.cose.2008.05.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Abdelaziz, Ahmed, and Alia N. Mahmoud. "Data Security in Healthcare Systems: Integration of Information Security and Information Management." Journal of Cybersecurity and Information Management 11, no. 2 (2023): 17–26. http://dx.doi.org/10.54216/jcim.110202.

Full text
Abstract:
Effective management of patient data is critical for improving the quality of care and patient outcomes in healthcare systems. However, ensuring the confidentiality, integrity, and availability of patient data while complying with regulatory requirements can be challenging. To address this challenge, this work proposes an artificial intelligence (AI)-enabled framework that integrates information security (IS) and information management (IM) capabilities into a unified solution for improving the overall functionality of healthcare systems. The proposed framework leverages AI algorithms to autom
APA, Harvard, Vancouver, ISO, and other styles
48

Ciekanowski, Marek, Slawomir Zurawski, Zbigniew Ciekanowski, Yury Pauliuchuk, and Artur Czech. "Chief Information Security Officer: A Vital Component of Organizational Information Security Management." EUROPEAN RESEARCH STUDIES JOURNAL XXVIΙ, Issue 2 (2024): 35–46. http://dx.doi.org/10.35808/ersj/3370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Fernandez, Sharra Mae. "Dormitory Management Information System with SMS Notification and Biometric Security." Indian Journal Of Science And Technology 15, no. 26 (2022): 1296–305. http://dx.doi.org/10.17485/ijst/v15i26.1578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

CREANGĂ, Liliana, and Anatoli BUZEV. "The Management of the Security Information." SCIENTIFIC ANNALS of the Academy "Stefan cel Mare" of the Ministry of Internal Affairs of the Republic of Moldova. Legal sciences 11 (October 7, 2020): 30–39. https://doi.org/10.5281/zenodo.4071173.

Full text
Abstract:
With the time advancement and the development of information technologies, the process of managing security information is present in most of the actions carried out at the level of state institutions, national economy, business, service provision, etc. And yet, when we talk about information security, in many entities there is a gap between awareness of security needs and compliance with security measures. This fact is explained by the wrong approach of the conceptions on the process of managing the security information, which can result in the implementation of some inefficient solutions. Th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!