Academic literature on the topic 'ISO 27001/2'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ISO 27001/2.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ISO 27001/2"
Setiawan, Ito, Aldistya Riesta Sekarini, Retno Waluyo, and Fiby Nur Afiana. "Manajemen Risiko Sistem Informasi Menggunakan ISO 31000 dan Standar Pengendalian ISO/EIC 27001 di Tripio Purwokerto." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (2021): 389–96. http://dx.doi.org/10.30812/matrik.v20i2.1093.
Full textWoda, Juliet Regina, and Rahadian Bisma. "Manajemen keamanan informasi menggunakan framework COBIT 5 dan ISO 27001:2013 dalam pembuatan dokumen standard operating procedure." Teknologi 11, no. 2 (2021): 59–74. http://dx.doi.org/10.26594/teknologi.v11i2.2154.
Full textPardo, César, Francisco J. Pino, and Félix Garcia. "Towards an Integrated Management System (IMS), harmonizing the ISO/IEC 27001 and ISO/IEC 20000-2 standards." International Journal of Software Engineering and Its Applications 10, no. 9 (2016): 217–30. http://dx.doi.org/10.14257/ijseia.2016.10.9.18.
Full textMantra, IGN, Aedah Abd. Rahman, and Hoga Saragih. "Maturity Framework Analysis ISO 27001: 2013 on Indonesian Higher Education." International Journal of Engineering & Technology 9, no. 2 (2020): 429. http://dx.doi.org/10.14419/ijet.v9i2.30581.
Full textRaweni, Abuajila M. S., and Vidosav D. Majstorović. "ISO CERTIFICATIONS DIFFUSION IN EUROPEAN COUNTRIES 2007-2014 AND FORECASTINNG FOR 2022-STARE OF THE ART." International Journal "Advanced Quality" 44, no. 1 (2017): 53. http://dx.doi.org/10.25137/ijaq.n1.v44.y2016.p53-58.
Full textYuze, Yuni Cintia, Yudi Priyadi, and Candiwan . "Analisis Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001 : 2013 Serta Rekomendasi Model Sistem Menggunakan Data Flow Diagram pada Direktorat Sistem Informasi Perguruan Tinggi." JURNAL SISTEM INFORMASI BISNIS 6, no. 1 (2016): 38. http://dx.doi.org/10.21456/vol6iss1pp38-45.
Full textMentel, Urszula, and Marzena Hajduk-Stelmachowicz. "Does standardization have an impact on innovation activity in different countries?" Problems and Perspectives in Management 18, no. 4 (2020): 486–503. http://dx.doi.org/10.21511/ppm.18(4).2020.39.
Full textMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Full textIbrahim, Ibrahim, and Rahmat Hidayat. "EVALUASI PENERAPAN IT GOVERNANCE DENGAN MENGGUNAKAN KERANGKA KERJA COBIT 5 PADA LAYANAN PUBLIK." Barometer 6, no. 2 (2021): 360–67. http://dx.doi.org/10.35261/barometer.v6i2.5204.
Full textSimion, Cristina Petronela, Traian Valeriu Popescu, Mirona Ana Maria Popescu, and Andreea Maria G. Militaru. "Research on the Use of Integrated Management Systems." Advances in Science and Technology 110 (September 27, 2021): 31–36. http://dx.doi.org/10.4028/www.scientific.net/ast.110.31.
Full textDissertations / Theses on the topic "ISO 27001/2"
Mahopo, Ntombizodwa Bessy. "A risk based approach for managing information technology security risk within a dynamic environment." Diss., 2015. http://hdl.handle.net/10500/21925.
Full textBook chapters on the topic "ISO 27001/2"
"APPENDIX 2:." In Information Security Risk Management for ISO 27001/ISO 27002, third edition. IT Governance Publishing, 2019. http://dx.doi.org/10.2307/j.ctvndv9kx.23.
Full text"ABOUT THE AUTHORS." In Information Security Risk Management for ISO 27001/ISO 27002, third edition. IT Governance Publishing, 2019. http://dx.doi.org/10.2307/j.ctvndv9kx.2.
Full textKenyon, Bridget. "FOREWORD." In ISO 27001 controls – A guide to implementing and auditing. IT Governance Publishing, 2019. http://dx.doi.org/10.2307/j.ctvj4sxjm.2.
Full textHentea, Mariana. "Information Security Management." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch091.
Full textTong, Carrison K. S., and Eric T. T. Wong. "Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.
Full text"ABOUT THE AUTHORS." In ISO/IEC 27701:2019: An introduction to privacy information management. IT Governance Publishing, 2020. http://dx.doi.org/10.2307/j.ctvsn3pnr.2.
Full textConference papers on the topic "ISO 27001/2"
Mayer, Janice, and Leonardo Lemes Fagundes. "Modelo para Avaliar o Nível de Maturidade do Processo de Gestão de Riscos em Segurança da Informação." In VI Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2010. http://dx.doi.org/10.5753/sbsi.2010.14696.
Full text