Journal articles on the topic 'Information security management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Domozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Full textMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textTipton, Harold, and Micki Krause. "Information Security Management." EDPACS 27, no. 12 (2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.
Full textKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Full textAl-Dhahri, Sahar, Manar Al-Sarti, and Azrilah Abdul. "Information Security Management System." International Journal of Computer Applications 158, no. 7 (2017): 29–33. http://dx.doi.org/10.5120/ijca2017912851.
Full textAndrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.
Full textMonitor, I&S. "Information Security Management Handbook." Information & Security: An International Journal 4 (2000): 117–20. http://dx.doi.org/10.11610/isij.0410.
Full textŠalgovičová, Jarmila, and Vanessa Prajová. "Information Security Management (ISM)." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 20, Special-Number (2012): 114–19. http://dx.doi.org/10.2478/v10186-012-0019-0.
Full textMollick, Joseph S. "Management of Information Security." Journal of Information Privacy and Security 4, no. 1 (2008): 64–65. http://dx.doi.org/10.1080/2333696x.2008.10855835.
Full textMitchell, Ruth C., Rita Marcella, and Graeme Baxter. "Corporate information security management." New Library World 100, no. 5 (1999): 213–27. http://dx.doi.org/10.1108/03074809910285888.
Full textMordovets, V. A., A. A. Grafov, and G. V. Varlamov. "Information security risk management." Economics and Management 31, no. 1 (2025): 72–82. https://doi.org/10.35854/1998-1627-2025-1-72-82.
Full textWu, Yejun, and Fansong Meng. "Categorizing Security for Security Management and Information Resource Management." Journal of Strategic Security 11, no. 4 (2019): 72–84. http://dx.doi.org/10.5038/1944-0472.11.4.1694.
Full textRistov, Pančo, Ante Mrvica, and Pavao Komadina. "Security of Data and Information in Vessel Traffic Management Information Systems." Naše more 63, no. 1 (2016): 1–8. http://dx.doi.org/10.17818/nm/2016/1.7.
Full textvon Solms, Rossouw. "Information security management (2): guidelines to the management of information technology security (GMITS)." Information Management & Computer Security 6, no. 5 (1998): 221–23. http://dx.doi.org/10.1108/eum0000000004542.
Full textvon Solms, Rossouw. "Information security management (1): why information security is so important." Information Management & Computer Security 6, no. 4 (1998): 174–77. http://dx.doi.org/10.1108/eum0000000004533.
Full textLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Full textNishida, Shinichiro. "Information Security Management for Health Information Systems." Japanese Journal of Radiological Technology 66, no. 12 (2010): 1655–64. http://dx.doi.org/10.6009/jjrt.66.1655.
Full textTabakaeva, Valeria, Valentin Selifanov, Vladimir An, Sergey Bularga, and Anatoly Vorozhtsov. "Intelligent information security management systems." Transaction of Scientific Papers of the Novosibirsk State Technical University, no. 3-4 (February 20, 2020): 165–76. http://dx.doi.org/10.17212/2307-6879-2019-3-4-165-176.
Full textBajor, Teresa, and Marlena Krakowiak. "Crisis management and information security." Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa 6 (2018): 649–59. http://dx.doi.org/10.16926/tiib.2018.06.46.
Full textKOTANI, Masashi. "Information security and records management." Journal of Information Processing and Management 49, no. 4 (2006): 191–98. http://dx.doi.org/10.1241/johokanri.49.191.
Full textBodin, Lawrence D., Lawrence A. Gordon, and Martin P. Loeb. "Information security and risk management." Communications of the ACM 51, no. 4 (2008): 64–68. http://dx.doi.org/10.1145/1330311.1330325.
Full textIke, Ellena. "Information Security and Knowledge Management." European Journal of Information and Knowledge Management 3, no. 2 (2024): 38–50. http://dx.doi.org/10.47941/ejikm.2063.
Full textKrause, Micki, and Harold Tipton. "Handbook of Information Security Management." EDPACS 26, no. 3 (1998): 15. http://dx.doi.org/10.1201/1079/43275.26.3.19980901/31739.5.
Full textKwok, Lam‐for, and Dennis Longley. "Information security management and modelling." Information Management & Computer Security 7, no. 1 (1999): 30–40. http://dx.doi.org/10.1108/09685229910255179.
Full textZammani, Mazlina, and Rozilawati Razali. "Information Security Management Success Factors." Advanced Science Letters 22, no. 8 (2016): 1924–29. http://dx.doi.org/10.1166/asl.2016.7746.
Full textHumphreys, Edward. "Information security management system standards." Datenschutz und Datensicherheit - DuD 35, no. 1 (2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Full textKovacich, Gerald. "Information systems security metrics management." Computers & Security 16, no. 7 (1997): 610–18. http://dx.doi.org/10.1016/s0167-4048(97)80798-5.
Full textJohnson, M. Eric, Eric Goetz, and Shari Lawrence Pfleeger. "Security through Information Risk Management." IEEE Security & Privacy Magazine 7, no. 3 (2009): 45–52. http://dx.doi.org/10.1109/msp.2009.77.
Full textBasu, Choton. "Handbook of Information Security Management." Journal of Information Privacy and Security 7, no. 1 (2011): 74–75. http://dx.doi.org/10.1080/15536548.2011.10855907.
Full textMiloslavskaya, Natalia, and Svetlana Tolstaya. "Information Security Management Maturity Models." Procedia Computer Science 213 (2022): 49–57. http://dx.doi.org/10.1016/j.procs.2022.11.037.
Full textFal’, A. M. "Standardization in information security management." Cybernetics and Systems Analysis 46, no. 3 (2010): 512–15. http://dx.doi.org/10.1007/s10559-010-9227-9.
Full textvon Solms, Rossouw. "Information security management (3): the Code of Practice for Information Security Management (BS 7799)." Information Management & Computer Security 6, no. 5 (1998): 224–25. http://dx.doi.org/10.1108/09685229810240158.
Full textUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Full textJ, Kanishka, and Mr Manoj Kumar. "A Study on Information Security in Human Resource Management." International Journal of Research Publication and Reviews 5, no. 3 (2024): 7531–36. http://dx.doi.org/10.55248/gengpi.5.0324.0919.
Full textSharonova, N. V., G. A. Pliekhova, M. V. Kostikova, S. M. Neronov, and S. O. Kashkevych. "Information security risk management device in information systems." Bionics of Intelligence 2, no. 101 (2024): 48–51. https://doi.org/10.30837/bi.2024.2(101).07.
Full textPalvia, Pankaj. "Security Risk Management: Building and Information Security Risk." Journal of Information Privacy and Security 7, no. 4 (2011): 72–73. http://dx.doi.org/10.1080/15536548.2011.10855925.
Full textBaker, Wade, and Linda Wallace. "Is Information Security Under Control?: Investigating Quality in Information Security Management." IEEE Security and Privacy Magazine 5, no. 1 (2007): 36–44. http://dx.doi.org/10.1109/msp.2007.11.
Full textAnđelski, Hristo, Veljko Đerković, and Uroš Kondić. "Place and role of information security: Information security management model: For owners information." Zdravstvena zastita 40, no. 6 (2011): 28–33. http://dx.doi.org/10.5937/zz1102028a.
Full textSilic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.
Full textZawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.
Full textAlmutairi, Mohammed A. "Planning and Development of Health Management Information Systems." Journal of Medical Science And clinical Research 11, no. 09 (2023): 122–25. http://dx.doi.org/10.18535/jmscr/v11i9.16.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textLaybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.
Full textChenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management." Journal of Information Privacy and Security 1, no. 1 (2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.
Full textKritzinger, E., and E. Smith. "Information security management: An information security retrieval and awareness model for industry." Computers & Security 27, no. 5-6 (2008): 224–31. http://dx.doi.org/10.1016/j.cose.2008.05.006.
Full textAbdelaziz, Ahmed, and Alia N. Mahmoud. "Data Security in Healthcare Systems: Integration of Information Security and Information Management." Journal of Cybersecurity and Information Management 11, no. 2 (2023): 17–26. http://dx.doi.org/10.54216/jcim.110202.
Full textCiekanowski, Marek, Slawomir Zurawski, Zbigniew Ciekanowski, Yury Pauliuchuk, and Artur Czech. "Chief Information Security Officer: A Vital Component of Organizational Information Security Management." EUROPEAN RESEARCH STUDIES JOURNAL XXVIΙ, Issue 2 (2024): 35–46. http://dx.doi.org/10.35808/ersj/3370.
Full textFernandez, Sharra Mae. "Dormitory Management Information System with SMS Notification and Biometric Security." Indian Journal Of Science And Technology 15, no. 26 (2022): 1296–305. http://dx.doi.org/10.17485/ijst/v15i26.1578.
Full textCREANGĂ, Liliana, and Anatoli BUZEV. "The Management of the Security Information." SCIENTIFIC ANNALS of the Academy "Stefan cel Mare" of the Ministry of Internal Affairs of the Republic of Moldova. Legal sciences 11 (October 7, 2020): 30–39. https://doi.org/10.5281/zenodo.4071173.
Full text