Journal articles on the topic 'Information security standards'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security standards.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pepper, Bill. "Information security standards for outsourcing." Information Security Technical Report 1, no. 3 (January 1996): 59–61. http://dx.doi.org/10.1016/s1363-4127(97)83021-x.
Full textHumphreys, Edward. "Information security management system standards." Datenschutz und Datensicherheit - DuD 35, no. 1 (January 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Full textHöne, Karin, and J. H. P. Eloff. "Information security policy — what do international information security standards say?" Computers & Security 21, no. 5 (October 2002): 402–9. http://dx.doi.org/10.1016/s0167-4048(02)00504-7.
Full textGaivéo, José. "Information Security Standards in Healthcare Activities." International Journal of Reliable and Quality E-Healthcare 5, no. 4 (October 2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.
Full textDykyi, O., and M. Fliunt. "Information security standards: a comparative research." Law and public administration 2, no. 1 (2019): 88–95. http://dx.doi.org/10.32840/pdu.2-1.14.
Full textLee, Chul Ho, Xianjun Geng, and Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security." Information Systems Research 27, no. 1 (March 2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.
Full textPoore, Ralph Spencer. "Information Security Standards: Deluge and Dearth." Information Systems Security 10, no. 1 (March 2001): 1–6. http://dx.doi.org/10.1201/1086/43313.10.1.20010304/31392.4.
Full textGentile, Francesco, Luigi Giuri, Franco Guida, Emilio Montolivo, and Michele Volpe. "Security evaluation in information technology standards." Computers & Security 13, no. 8 (January 1994): 647–50. http://dx.doi.org/10.1016/0167-4048(94)90044-2.
Full textChenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management." Journal of Information Privacy and Security 1, no. 1 (January 2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.
Full textvon Solms, Rossouw. "Information security management: why standards are important." Information Management & Computer Security 7, no. 1 (March 1999): 50–58. http://dx.doi.org/10.1108/09685229910255223.
Full textSiponen, Mikko, and Robert Willison. "Information security management standards: Problems and solutions." Information & Management 46, no. 5 (June 2009): 267–70. http://dx.doi.org/10.1016/j.im.2008.12.007.
Full textAlghananeem, Kulthoom Mansour, Mohammed Abed Altaee, and Bassem Khoder Jida. "The Impact of the Goals of Information Security Standards to Ensure Information Security." Journal of Management Research 6, no. 2 (March 19, 2014): 74. http://dx.doi.org/10.5296/jmr.v6i2.5024.
Full textGray, C. "Review: Information Security Policies, Procedures and Standards: Guidelines for Effective Information Security Management." Computer Bulletin 45, no. 2 (March 1, 2003): 30. http://dx.doi.org/10.1093/combul/45.2.30-b.
Full textSöderström, Eva, Rose‐Mharie Åhlfeldt, and Nomie Eriksson. "Standards for information security and processes in healthcare." Journal of Systems and Information Technology 11, no. 3 (August 14, 2009): 295–308. http://dx.doi.org/10.1108/13287260910983650.
Full textWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (January 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Full textAkowuah, Francis, Xiaohong Yuan, Jinsheng Xu, and Hong Wang. "A Survey of Security Standards Applicable to Health Information Systems." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 22–36. http://dx.doi.org/10.4018/ijisp.2013100103.
Full textKuczabski, Mateusz. "Asian Cyber Security Standards." Safety & Defense 6, no. 2 (August 7, 2020): 21–32. http://dx.doi.org/10.37105/sd.75.
Full textMeriah, Ines, and Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies." International Journal of Systems and Software Security and Protection 11, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.
Full textLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Full textAnton, Nicolae, and Anișor Nedelcu. "Security Information and Risk Management Assessment." Applied Mechanics and Materials 809-810 (November 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Full textShahmoradi, Leila, Maryam Ebrahimi, Somayeh Shahmoradi, Ahmadreza Farzanehnejad, Hajar Moammaie, and Mahdi Habibi Koolaee. "Usage of Standards to Integration of Hospital Information Systems." Frontiers in Health Informatics 9, no. 1 (March 8, 2020): 28. http://dx.doi.org/10.30699/fhi.v9i1.215.
Full textArutyunov, V. V. "Clustering of information-security standards of the Russian Federation." Scientific and Technical Information Processing 44, no. 2 (April 2017): 125–33. http://dx.doi.org/10.3103/s0147688217020071.
Full textHumphreys, Edward. "Information security management standards: Compliance, governance and risk management." Information Security Technical Report 13, no. 4 (November 2008): 247–55. http://dx.doi.org/10.1016/j.istr.2008.10.010.
Full textFernández-Medina, Eduardo, and Mariemma I. Yagüe. "State of standards in the information systems security area." Computer Standards & Interfaces 30, no. 6 (August 2008): 339–40. http://dx.doi.org/10.1016/j.csi.2008.03.001.
Full textNicho, Mathew, Hussein Fakhry, and Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.
Full textAhler, Ekaterina. "The ISO/IEC 27001 standard provides a systematic approach to information security management." Upravlenie kachestvom (Quality management), no. 1 (January 1, 2021): 36–38. http://dx.doi.org/10.33920/pro-1-2101-07.
Full textTopa, Ioanna, and Maria Karyda. "From theory to practice: guidelines for enhancing information security management." Information & Computer Security 27, no. 3 (July 8, 2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.
Full textOLIFER, Dmitrij, Nikolaj GORANIN, Arnas KACENIAUSKAS, and Antanas CENYS. "CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS." Technological and Economic Development of Economy 23, no. 1 (January 22, 2017): 196–219. http://dx.doi.org/10.3846/20294913.2017.1280558.
Full textOtenko, Irina, and Olena Preobrazenska. "International Standards of Corporate Security." Advanced Engineering Forum 22 (May 2017): 53–61. http://dx.doi.org/10.4028/www.scientific.net/aef.22.53.
Full textFenz, Stefan, Stefanie Plieschnegger, and Heidi Hobel. "Mapping information security standard ISO 27002 to an ontological structure." Information & Computer Security 24, no. 5 (November 14, 2016): 452–73. http://dx.doi.org/10.1108/ics-07-2015-0030.
Full textBârsan, Mihai. "Aspects regarding the implementation of information security standards in organizations." Revista Română de Biblioteconomie și Știința Informării = Romanian Journal of Library and Information Science 13, no. 1 (2017): 21–26. http://dx.doi.org/10.26660/rrbsi.2017.13.1.21.
Full textMiloslavskaya, Natalia G., and Alexander I. Tolstoy. "Competence Requirements of ISO/IEC Standards for Information Security Professionals." Bezopasnost informacionnyh tehnology, no. 4 (November 2017): 6–18. http://dx.doi.org/10.26583/bit.2017.4.01.
Full textAmsenga, Johann. "ISO/IEC JTC1/SC27 - SE Standards for Information Technology Security." INSIGHT 17, no. 1 (April 2014): 20–22. http://dx.doi.org/10.1002/inst.201417120.
Full textThuraisingham, Bhavani, and Stefanos Gritzalis. "Information and communications security, privacy and trust: Standards and regulations." Computer Standards & Interfaces 32, no. 5-6 (October 2010): 229. http://dx.doi.org/10.1016/j.csi.2010.04.001.
Full textSulistyowati, Diah, Fitri Handayani, and Yohan Suryanto. "Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS." JOIV : International Journal on Informatics Visualization 4, no. 4 (December 18, 2020): 225. http://dx.doi.org/10.30630/joiv.4.4.482.
Full textADEBOWALE, AJAYI, NICULAE GOGA, OTUSILE OLUWABUKOLA, and ABEL SAMUEL. "Formal Methods in Information Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 4 (February 9, 2015): 5621–31. http://dx.doi.org/10.24297/ijct.v14i4.1963.
Full textАндрущак, І., В. Марценюк, I. Андрощук, В. Чудовець, and М. Потейчук. "CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY." КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, no. 37 (December 28, 2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.
Full textYang, Guang Hong, Qing Zhang, Ding Yong Tang, and Cong Min Huang. "A Solution about Application System How to Transfer Information Across Different Domains." Applied Mechanics and Materials 190-191 (July 2012): 898–901. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.898.
Full textBychkov, Oleksii. "TO THE CONCEPT OF A PROTECTED OPERATION SYSTEM." Information systems and technologies security, no. 1 (1) (2019): 42–51. http://dx.doi.org/10.17721/ists.2019.1.42-51.
Full textA. T. Zharkimbekov, A. B. Ospanov, and K. M. Sagindykov. "THE ROLE OF REGULATORY DOCUMENTS IN THE FIELD OF INFORMATION SECURITY USED IN THE STUDY OF THE SECURITY OF COMPUTER NETWORKS." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 3, no. 77 (October 15, 2020): 77–81. http://dx.doi.org/10.47533/2020.1606-146x.08.
Full textHandoyo, Eko. "Analisis Tingkat Keamanan Informasi: Studi Komparasi Framework Cobit 5 Subdomain Manage Security Services (DSS05) dan NIST Sp 800 – 55." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (October 31, 2020): 76–83. http://dx.doi.org/10.37859/coscitech.v1i2.2199.
Full textBackhouse, Hsu, and Silva. "Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard." MIS Quarterly 30 (2006): 413. http://dx.doi.org/10.2307/25148767.
Full textDotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi, and Vyacheslav Kharchenko. "Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045." Information & Security: An International Journal 43, no. 3 (2019): 305–17. http://dx.doi.org/10.11610/isij.4323.
Full textAfrianto, Irawan, Taryana Suryana, and Sufa’atin Sufa’atin. "Pengukuran dan Evaluasi Keamanan Informasi Menggunakan Indeks KAMI - SNI ISO/IEC 27001:2009." Jurnal ULTIMA InfoSys 6, no. 1 (June 1, 2015): 43–49. http://dx.doi.org/10.31937/si.v6i1.278.
Full textMagennis, Tina, and Jennifer Mitchell. "Privacy and Security: Are Your Health Information Systems up to Standard?" Health Information Management 26, no. 4 (December 1996): 197–201. http://dx.doi.org/10.1177/183335839702600409.
Full textMartino, Lorenzo D., and Elisa Bertino. "Security for Web Services." International Journal of Web Services Research 6, no. 4 (October 2009): 48–74. http://dx.doi.org/10.4018/jwsr.2009071303.
Full textSimić-Draws, Daniela, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, and Alexander Roßnagel. "Holistic and Law Compatible IT Security Evaluation." International Journal of Information Security and Privacy 7, no. 3 (July 2013): 16–35. http://dx.doi.org/10.4018/jisp.2013070102.
Full textMkuzangwe, Nenekazi N. P., and Zubeida C. Khan. "Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature." African Journal of Information and Communication, no. 25 (June 30, 1999): 1–12. http://dx.doi.org/10.23962/10539/29191.
Full textLin, Ta Wei, Fu Tung Wang, and Tzong Dar Wu. "Information Security Study on Innovative Power Meter System." Applied Mechanics and Materials 284-287 (January 2013): 1057–61. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.1057.
Full textNikolaidis, I. "Network security essentials: applications ond standards [Books]." IEEE Network 14, no. 2 (March 2000): 6. http://dx.doi.org/10.1109/mnet.2000.826358.
Full text