Journal articles on the topic 'ISO 27001 Compliance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ISO 27001 Compliance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Topa, Ioanna, and Maria Karyda. "From theory to practice: guidelines for enhancing information security management." Information & Computer Security 27, no. 3 (2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textAdebola Folorunso, Viqaruddin Mohammed, Ifeoluwa Wada, and Bunmi Samuel. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. http://dx.doi.org/10.30574/wjarr.2024.24.1.3169.
Full textAdebola, Folorunso, Mohammed Viqaruddin, Wada Ifeoluwa, and Samuel Bunmi. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. https://doi.org/10.5281/zenodo.15063305.
Full textReyes López, Felipe, Yaneth Betancurt Domínguez, Ingrid Lucia Muñoz Periñán, and Andrés Felipe Paz Loboguerrero. "Support tool for verifying the compliance of standards and regulations in implementations of strategies for information security." Sistemas y Telemática 13, no. 32 (2015): 27–39. http://dx.doi.org/10.18046/syt.v13i32.2032.
Full textRafli, Mohammad, Nuansa Cinta Akhwat Nusantara, Ella Rosediana Putri, Intan Pravda Sari, Naufal Zamzami, and Aflahal Insan Muharroman. "Information Security Behavior and Compliance with ISO 27001 in IT Companies." Journal of Digital Business and Innovation Management 3, no. 1 (2024): 62–76. http://dx.doi.org/10.26740/jdbim.v3i1.59163.
Full textSinaga, Rudolf, and Frangky Taan. "Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala." NUANSA INFORMATIKA 18, no. 2 (2024): 46–54. http://dx.doi.org/10.25134/ilkom.v18i2.205.
Full textPurba, Anton, and Mohammad Soetomo. "Assessing Privileged Access Management (PAM) using ISO 27001:2013 Control." ACMIT Proceedings 5, no. 1 (2019): 65–76. http://dx.doi.org/10.33555/acmit.v5i1.76.
Full textSarah Kuzankah Ewuga, Zainab Efe Egieya, Adedolapo Omotosho, and Abimbola Oluwatoyin Adegbite. "ISO 27001 IN BANKING: AN EVALUATION OF ITS IMPLEMENTATION AND EFFECTIVENESS IN ENHANCING INFORMATION SECURITY." Finance & Accounting Research Journal 5, no. 12 (2024): 405–25. http://dx.doi.org/10.51594/farj.v5i12.684.
Full textMakhija, Anil K. "Information Security Management Systems - Evolving Landscape & ISO 27001: An Empirical Study." Journal of Accounting, Finance, Economics, and Social Sciences 6, no. 1 (2021): 9–17. http://dx.doi.org/10.62458/jafess.160224.6(1)9-17.
Full textKurii, Y., and I. Opirskyy. "OVERVIEW OF THE CIS BENCHMARKS USAGE FOR FULFILLING THE REQUIREMENTS FROM INTERNATIONAL STANDARD ISO/IEC 27001:2022." Computer systems and network 6, no. 1 (2024): 89–98. http://dx.doi.org/10.23939/csn2024.01.089.
Full textPrawiranata, R. Teddy Adiyanto. "Sistem Manajemen Keamanan Informasi (SMKI) di PT. Surveyor Indonesia Cabang Surabaya: Penerapan Standar ISO 27001:2013." ULIL ALBAB : Jurnal Ilmiah Multidisiplin 3, no. 6 (2024): 105–12. https://doi.org/10.56799/jim.v3i6.3472.
Full textTrudy-Ann Campbell, Samson Eromonsei, and Olusegun Afolabi. "Automated API framework tools for evaluating cloud resources (IAM, S3, KMS) for compliance with ISO 27001 case study AWS." Global Journal of Engineering and Technology Advances 20, no. 1 (2024): 131–49. http://dx.doi.org/10.30574/gjeta.2024.20.1.0126.
Full textTrudy-Ann, Campbell, Eromonsei Samson, and Afolabi Olusegun. "Automated API framework tools for evaluating cloud resources (IAM, S3, KMS) for compliance with ISO 27001 case study AWS." Global Journal of Engineering and Technology Advances 20, no. 1 (2024): 131–49. https://doi.org/10.5281/zenodo.13694364.
Full textMuhammad Rijal, Demas, Mukhamad Fahmi Assydiqi, Yoel Rensisko Prasetya, Lidya Nurhapsari Prasetya Ningsih, Nisya Kayla Putri Anindra, and Pandu Dwi Luhur Pambudi. "Information Security Awareness Analysis of the Threat of Data Leakage in Educational Institutions with the ISO 27001 Framework." Journal of Digital Business and Innovation Management 3, no. 1 (2024): 36–52. http://dx.doi.org/10.26740/jdbim.v3i1.59167.
Full textArianty, Kiki Puspo. "Analysis of Information Security Management System Implementation at BSN." Jurnal Informatika: Jurnal Pengembangan IT 10, no. 1 (2025): 119–29. https://doi.org/10.30591/jpit.v10i1.8211.
Full textKitsios, Fotis, Elpiniki Chatzidimitriou, and Maria Kamariotou. "The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector." Sustainability 15, no. 7 (2023): 5828. http://dx.doi.org/10.3390/su15075828.
Full textLukitowati, Risma, and Kalamullah Ramli. "Assessing the Information Security Awareness of Employees in PT ABC Against International Organization for Standardization (ISO) 27001:2013." Journal of Computational and Theoretical Nanoscience 17, no. 2 (2020): 1441–46. http://dx.doi.org/10.1166/jctn.2020.8823.
Full textSanchez, Luis Enrique, Antonio Santos-Olmo, Esther Alvarez, Eduardo Fernandez-Medina, and Mario Piattini-Velthuis. "LOPD Compliance and ISO 27001 legal requirements in the Health Sector." IEEE Latin America Transactions 10, no. 3 (2012): 1824–37. http://dx.doi.org/10.1109/tla.2012.6222590.
Full textClarissa, Stella, and Gunawan Wang. "Assessing Information Security Management Using ISO 27001:2013." Jurnal Indonesia Sosial Teknologi 4, no. 9 (2023): 1361–71. http://dx.doi.org/10.59141/jist.v4i9.739.
Full textWibawa, I. Nyoman Adi Artha, Anak Agung Ngurah Hary Susila, and Muhammad Alam Pasirulloh. "Information Security Evaluation at Hospital Using Index KAMI 5.0 and Recommendations Based on ISO/IEC 27001:2022." Journal of Information Systems and Informatics 6, no. 4 (2024): 3070–86. https://doi.org/10.51519/journalisi.v6i4.949.
Full textNugraha, Arya Adhi, and Asyahri Hadi Nasyuha. "Integrating ISO 27001 and Indonesia's Personal Data Protection Law for Data Protection Requirement Model." Journal of Information Systems and Informatics 6, no. 2 (2024): 1052–69. http://dx.doi.org/10.51519/journalisi.v6i2.754.
Full textMeitarice, Sonya, Lidya Febyana, Aidil Fitriansyah, Rahmad Kurniawan, and Riki Ario Nugroho. "Risk Management Analysis of Information Security in an Academic Information System at a Public University in Indonesia: Implementation of ISO/IEC 27005:2018 and ISO/IEC 27001:2013 Security Controls." Journal of Information Technology and Cyber Security 2, no. 2 (2024): 58–75. https://doi.org/10.30996/jitcs.12099.
Full textMantra, IGN, Aedah Abd. Rahman, and Hoga Saragih. "Maturity Framework Analysis ISO 27001: 2013 on Indonesian Higher Education." International Journal of Engineering & Technology 9, no. 2 (2020): 429. http://dx.doi.org/10.14419/ijet.v9i2.30581.
Full textPartyka, A., O. Harasymchuk, E. Nyemkova, Y. Sovyn, and V. Dudykevych. "DEVELOPMENT OF A METHOD FOR INVESTIGATING CYBERCRIMES BY THE TYPE OF RANSOMWARE USING ARTIFICIAL INTELLIGENCE MODELS IN THE INFORMATION SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE." Computer systems and network 6, no. 1 (2024): 15–25. http://dx.doi.org/10.23939/csn2024.01.015.
Full textKurii, Yevhenii, and Ivan Opirskyy. "ISO 27001: ANALYSIS OF CHANGES AND COMPLIANCE FEATURES OF THE NEW VERSION OF THE STANDARD." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 46–55. http://dx.doi.org/10.28925/2663-4023.2023.19.4655.
Full textKomal, Komal, Muhammad Habib Mulia, and Rudianto Rudianto. "Audit Keamanan Sistem Informasi Menggunakan Standar ISO/IEC 27001:2013 pada PT Kereta Api Indonesia Persero Daop 1 Jakarta Unit Sistem Informasi." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 8, no. 2 (2025): 922–29. https://doi.org/10.32672/jnkti.v8i2.8925.
Full textBeirami, Nahid, Naser Modiri, and Abbas Toloie Eshlaghi. "Review the implementation of information security management system requirements in hospitals of Tabriz in East Azarbaijan." Journal of Management and Accounting Studies 4, no. 01 (2019): 72–77. http://dx.doi.org/10.24200/jmas.vol4iss01pp72-77.
Full textHemanth, Kumar. "Automating Compliance in Financial Technology through CI/CD Pipelines." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 4 (2019): 1–8. https://doi.org/10.5281/zenodo.14684792.
Full textSanskriti Choubey and Astitwa Bhargava. "Significance of ISO/IEC 27001 in the Implementation of Governance, Risk and Compliance." International Journal of Scientific Research in Network Security and Communication 6, no. 2 (2018): 30–33. http://dx.doi.org/10.26438/ijsrnsc/v6i2.3033.
Full textDionysiou, Ioanna. "An investigation on compliance with ISO 27001 in Cypriot private and public organisations." International Journal of Services and Standards 7, no. 3/4 (2011): 197. http://dx.doi.org/10.1504/ijss.2011.045049.
Full textAhler, Ekaterina. "The ISO/IEC 27001 standard provides a systematic approach to information security management." Upravlenie kachestvom (Quality management), no. 1 (January 1, 2021): 36–38. http://dx.doi.org/10.33920/pro-1-2101-07.
Full textHaghighat, Abdullateef, Majid Kalantari, and Mostafa Kolahdoozi. "Providing a Framework to Support the Analysis and Implementation of Information Security Management Systems Based on the ISO/IEC 27001 ISMS Standard in Several Subsidiary Companies of the Ministry of Roads and Urban Development." Management Strategies and Engineering Sciences 7, no. 4 (2025): 23–32. https://doi.org/10.61838/msesj.7.4.3.
Full textVivek Madan. "The Role of Compliance in Cybersecurity: Strengthening the Digital Fortress." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3757–61. https://doi.org/10.32628/cseit25112851.
Full textBeirami, Nahid, Naser Modiri, and Abbas Toloie Eshlaghi. "Check assumptions and requirements for the implementation of Information Security Management System hospital in Tabriz." Journal of Management and Accounting Studies 4, no. 01 (2019): 60–71. http://dx.doi.org/10.24200/jmas.vol4iss01pp60-71.
Full textJohn Robinson, Rachel. "Information security systems development and implementation—A development sector analysis." BOHR International Journal of Smart Computing and Information Technology 5, no. 1 (2024): 12–19. https://doi.org/10.54646/bijscit.2024.40.
Full textChagas, Carlos Henrique Leão, and Andrew Hemerson Galeno Rodrigues. "ANÁLISE DO PROCESSO DE IMPLEMENTAÇÃO DE UM SISTEMA DE GESTÃO DA SEGURANÇA DA INFORMAÇÃO COM BASE NA ISO/IEC 27001." Revista ft 29, no. 142 (2025): 08–09. https://doi.org/10.69849/revistaft/pa10202501192208.
Full textGodwin Nzeako, Michael Oladipo Akinsanya, Oladapo Adeboye Popoola, Excel G Chukwurah, Chukwuekem David Okeke, and Ijeoma Scholastica Akpukorji. "Theoretical insights into IT governance and compliance in banking: Perspectives from African and U.S. regulatory environments." International Journal of Management & Entrepreneurship Research 6, no. 5 (2024): 1457–66. http://dx.doi.org/10.51594/ijmer.v6i5.1094.
Full textKumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.
Full textAhmad, Mohd Ridzam, Mohd Hafeez Osman, Azizol Abdullah, and Khaironi Yatim Sharif. "Evolution of Information Security Awareness towards Maturity: A Systematic Review." International Journal on Advanced Science, Engineering and Information Technology 14, no. 5 (2024): 1738–47. http://dx.doi.org/10.18517/ijaseit.14.5.20234.
Full textBasri, Ahmedi, and Ibrahimi Aferdita. "Mastering information security through standard implementation." International Journal of Informatics and Communication Technology 13, no. 3 (2024): 428–35. https://doi.org/10.11591/ijict.v13i3.pp428-435.
Full textChandra, Nungky Awang, Kalamullah Ramli, Anak Agung Putri Ratna, and Teddy Surya Gunawan. "Information Security Risk Assessment Using Situational Awareness Frameworks and Application Tools." Risks 10, no. 8 (2022): 165. http://dx.doi.org/10.3390/risks10080165.
Full textHernandez Collante, Leonel, Andri Pranolo, and Aji Prasetya Wibawa. "Implementation plan of the information security management system based on the NTC-ISO-IEC 27001:2013 standard and security risk analysis. Case study: Higher education institution." Transactions on Energy Systems and Engineering Applications 5, no. 2 (2024): 1–20. http://dx.doi.org/10.32397/tesea.vol5.n2.635.
Full textAhmedi, Basri, and Aferdita Ibrahimi. "Mastering information security through standard implementation." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 3 (2024): 428. http://dx.doi.org/10.11591/ijict.v13i3.pp428-435.
Full textKamal, Mustafa, Muhamad Muhamad, Yupit Sudianto, et al. "Information Technology Security Audit at the YDSF National Zakat Institution Using the ISO 27001 Framework." Jurnal Sisfokom (Sistem Informasi dan Komputer) 13, no. 1 (2024): 98–103. http://dx.doi.org/10.32736/sisfokom.v13i1.1987.
Full textBiroğul, Serdar, Özkan Şahin, and Hüseyn əsgərli. "Exploring the Impact of ISO/IEC 42001:2023 AI Management Standard on Organizational Practices." Advances in Artificial Intelligence Research 5, no. 1 (2025): 14–22. https://doi.org/10.54569/aair.1709628.
Full textGusrion, Deval. "Audit Infrastruktur IT Dalam Memenuhi Kebutuhan Bisnis." KOMTEKINFO 8, no. 1 (2021): 49–56. http://dx.doi.org/10.35134/komtekinfo.v8i1.1649.
Full textMarhad, Siti Suhaida, Siti Zaleha Abd Goni, and Mad Khir Johari Abdullah Sani. "Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review." Environment-Behaviour Proceedings Journal 9, SI18 (2024): 197–203. http://dx.doi.org/10.21834/e-bpj.v9isi18.5483.
Full textEzziane, Zoheir, and Abdulla Al Shamisi. "Improvement of the Organizational Performance through Compliance with Best Practices in Abu-Dhabi." International Journal of IT/Business Alignment and Governance 4, no. 2 (2013): 19–36. http://dx.doi.org/10.4018/ijitbag.2013070102.
Full textVikas, Kulkarni. "Zero Trust Security in Cloud Banking a Framework for Financial Institutions." International Journal of Leading Research Publication 5, no. 3 (2024): 1–12. https://doi.org/10.5281/zenodo.15051169.
Full text