Articoli di riviste sul tema "Information security standards"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Information security standards".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Pepper, Bill. "Information security standards for outsourcing". Information Security Technical Report 1, n. 3 (gennaio 1996): 59–61. http://dx.doi.org/10.1016/s1363-4127(97)83021-x.
Testo completoHumphreys, Edward. "Information security management system standards". Datenschutz und Datensicherheit - DuD 35, n. 1 (gennaio 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Testo completoHöne, Karin, e J. H. P. Eloff. "Information security policy — what do international information security standards say?" Computers & Security 21, n. 5 (ottobre 2002): 402–9. http://dx.doi.org/10.1016/s0167-4048(02)00504-7.
Testo completoGaivéo, José. "Information Security Standards in Healthcare Activities". International Journal of Reliable and Quality E-Healthcare 5, n. 4 (ottobre 2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.
Testo completoDykyi, O., e M. Fliunt. "Information security standards: a comparative research". Law and public administration 2, n. 1 (2019): 88–95. http://dx.doi.org/10.32840/pdu.2-1.14.
Testo completoLee, Chul Ho, Xianjun Geng e Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security". Information Systems Research 27, n. 1 (marzo 2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.
Testo completoPoore, Ralph Spencer. "Information Security Standards: Deluge and Dearth". Information Systems Security 10, n. 1 (marzo 2001): 1–6. http://dx.doi.org/10.1201/1086/43313.10.1.20010304/31392.4.
Testo completoGentile, Francesco, Luigi Giuri, Franco Guida, Emilio Montolivo e Michele Volpe. "Security evaluation in information technology standards". Computers & Security 13, n. 8 (gennaio 1994): 647–50. http://dx.doi.org/10.1016/0167-4048(94)90044-2.
Testo completoChenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management". Journal of Information Privacy and Security 1, n. 1 (gennaio 2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.
Testo completovon Solms, Rossouw. "Information security management: why standards are important". Information Management & Computer Security 7, n. 1 (marzo 1999): 50–58. http://dx.doi.org/10.1108/09685229910255223.
Testo completoSiponen, Mikko, e Robert Willison. "Information security management standards: Problems and solutions". Information & Management 46, n. 5 (giugno 2009): 267–70. http://dx.doi.org/10.1016/j.im.2008.12.007.
Testo completoAlghananeem, Kulthoom Mansour, Mohammed Abed Altaee e Bassem Khoder Jida. "The Impact of the Goals of Information Security Standards to Ensure Information Security". Journal of Management Research 6, n. 2 (19 marzo 2014): 74. http://dx.doi.org/10.5296/jmr.v6i2.5024.
Testo completoGray, C. "Review: Information Security Policies, Procedures and Standards: Guidelines for Effective Information Security Management". Computer Bulletin 45, n. 2 (1 marzo 2003): 30. http://dx.doi.org/10.1093/combul/45.2.30-b.
Testo completoSöderström, Eva, Rose‐Mharie Åhlfeldt e Nomie Eriksson. "Standards for information security and processes in healthcare". Journal of Systems and Information Technology 11, n. 3 (14 agosto 2009): 295–308. http://dx.doi.org/10.1108/13287260910983650.
Testo completoWu, Yu ’Andy’, e Carol Stoak Saunders. "Governing Information Security". Information Resources Management Journal 24, n. 1 (gennaio 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Testo completoAkowuah, Francis, Xiaohong Yuan, Jinsheng Xu e Hong Wang. "A Survey of Security Standards Applicable to Health Information Systems". International Journal of Information Security and Privacy 7, n. 4 (ottobre 2013): 22–36. http://dx.doi.org/10.4018/ijisp.2013100103.
Testo completoKuczabski, Mateusz. "Asian Cyber Security Standards". Safety & Defense 6, n. 2 (7 agosto 2020): 21–32. http://dx.doi.org/10.37105/sd.75.
Testo completoMeriah, Ines, e Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies". International Journal of Systems and Software Security and Protection 11, n. 1 (gennaio 2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.
Testo completoLim, Joo S., Sean B. Maynard, Atif Ahmad e Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, n. 2 (aprile 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Testo completoAnton, Nicolae, e Anișor Nedelcu. "Security Information and Risk Management Assessment". Applied Mechanics and Materials 809-810 (novembre 2015): 1522–27. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.1522.
Testo completoShahmoradi, Leila, Maryam Ebrahimi, Somayeh Shahmoradi, Ahmadreza Farzanehnejad, Hajar Moammaie e Mahdi Habibi Koolaee. "Usage of Standards to Integration of Hospital Information Systems". Frontiers in Health Informatics 9, n. 1 (8 marzo 2020): 28. http://dx.doi.org/10.30699/fhi.v9i1.215.
Testo completoArutyunov, V. V. "Clustering of information-security standards of the Russian Federation". Scientific and Technical Information Processing 44, n. 2 (aprile 2017): 125–33. http://dx.doi.org/10.3103/s0147688217020071.
Testo completoHumphreys, Edward. "Information security management standards: Compliance, governance and risk management". Information Security Technical Report 13, n. 4 (novembre 2008): 247–55. http://dx.doi.org/10.1016/j.istr.2008.10.010.
Testo completoFernández-Medina, Eduardo, e Mariemma I. Yagüe. "State of standards in the information systems security area". Computer Standards & Interfaces 30, n. 6 (agosto 2008): 339–40. http://dx.doi.org/10.1016/j.csi.2008.03.001.
Testo completoNicho, Mathew, Hussein Fakhry e Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation". International Journal of Information Security and Privacy 5, n. 3 (luglio 2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.
Testo completoAhler, Ekaterina. "The ISO/IEC 27001 standard provides a systematic approach to information security management". Upravlenie kachestvom (Quality management), n. 1 (1 gennaio 2021): 36–38. http://dx.doi.org/10.33920/pro-1-2101-07.
Testo completoTopa, Ioanna, e Maria Karyda. "From theory to practice: guidelines for enhancing information security management". Information & Computer Security 27, n. 3 (8 luglio 2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.
Testo completoOLIFER, Dmitrij, Nikolaj GORANIN, Arnas KACENIAUSKAS e Antanas CENYS. "CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS". Technological and Economic Development of Economy 23, n. 1 (22 gennaio 2017): 196–219. http://dx.doi.org/10.3846/20294913.2017.1280558.
Testo completoOtenko, Irina, e Olena Preobrazenska. "International Standards of Corporate Security". Advanced Engineering Forum 22 (maggio 2017): 53–61. http://dx.doi.org/10.4028/www.scientific.net/aef.22.53.
Testo completoFenz, Stefan, Stefanie Plieschnegger e Heidi Hobel. "Mapping information security standard ISO 27002 to an ontological structure". Information & Computer Security 24, n. 5 (14 novembre 2016): 452–73. http://dx.doi.org/10.1108/ics-07-2015-0030.
Testo completoBârsan, Mihai. "Aspects regarding the implementation of information security standards in organizations". Revista Română de Biblioteconomie și Știința Informării = Romanian Journal of Library and Information Science 13, n. 1 (2017): 21–26. http://dx.doi.org/10.26660/rrbsi.2017.13.1.21.
Testo completoMiloslavskaya, Natalia G., e Alexander I. Tolstoy. "Competence Requirements of ISO/IEC Standards for Information Security Professionals". Bezopasnost informacionnyh tehnology, n. 4 (novembre 2017): 6–18. http://dx.doi.org/10.26583/bit.2017.4.01.
Testo completoAmsenga, Johann. "ISO/IEC JTC1/SC27 - SE Standards for Information Technology Security". INSIGHT 17, n. 1 (aprile 2014): 20–22. http://dx.doi.org/10.1002/inst.201417120.
Testo completoThuraisingham, Bhavani, e Stefanos Gritzalis. "Information and communications security, privacy and trust: Standards and regulations". Computer Standards & Interfaces 32, n. 5-6 (ottobre 2010): 229. http://dx.doi.org/10.1016/j.csi.2010.04.001.
Testo completoSulistyowati, Diah, Fitri Handayani e Yohan Suryanto. "Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS". JOIV : International Journal on Informatics Visualization 4, n. 4 (18 dicembre 2020): 225. http://dx.doi.org/10.30630/joiv.4.4.482.
Testo completoADEBOWALE, AJAYI, NICULAE GOGA, OTUSILE OLUWABUKOLA e ABEL SAMUEL. "Formal Methods in Information Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, n. 4 (9 febbraio 2015): 5621–31. http://dx.doi.org/10.24297/ijct.v14i4.1963.
Testo completoАндрущак, І., В. Марценюк, I. Андрощук, В. Чудовець e М. Потейчук. "CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY". КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, n. 37 (28 dicembre 2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.
Testo completoYang, Guang Hong, Qing Zhang, Ding Yong Tang e Cong Min Huang. "A Solution about Application System How to Transfer Information Across Different Domains". Applied Mechanics and Materials 190-191 (luglio 2012): 898–901. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.898.
Testo completoBychkov, Oleksii. "TO THE CONCEPT OF A PROTECTED OPERATION SYSTEM". Information systems and technologies security, n. 1 (1) (2019): 42–51. http://dx.doi.org/10.17721/ists.2019.1.42-51.
Testo completoA. T. Zharkimbekov, A. B. Ospanov e K. M. Sagindykov. "THE ROLE OF REGULATORY DOCUMENTS IN THE FIELD OF INFORMATION SECURITY USED IN THE STUDY OF THE SECURITY OF COMPUTER NETWORKS". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 3, n. 77 (15 ottobre 2020): 77–81. http://dx.doi.org/10.47533/2020.1606-146x.08.
Testo completoHandoyo, Eko. "Analisis Tingkat Keamanan Informasi: Studi Komparasi Framework Cobit 5 Subdomain Manage Security Services (DSS05) dan NIST Sp 800 – 55". Jurnal CoSciTech (Computer Science and Information Technology) 1, n. 2 (31 ottobre 2020): 76–83. http://dx.doi.org/10.37859/coscitech.v1i2.2199.
Testo completoBackhouse, Hsu e Silva. "Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard". MIS Quarterly 30 (2006): 413. http://dx.doi.org/10.2307/25148767.
Testo completoDotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi e Vyacheslav Kharchenko. "Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045". Information & Security: An International Journal 43, n. 3 (2019): 305–17. http://dx.doi.org/10.11610/isij.4323.
Testo completoAfrianto, Irawan, Taryana Suryana e Sufa’atin Sufa’atin. "Pengukuran dan Evaluasi Keamanan Informasi Menggunakan Indeks KAMI - SNI ISO/IEC 27001:2009". Jurnal ULTIMA InfoSys 6, n. 1 (1 giugno 2015): 43–49. http://dx.doi.org/10.31937/si.v6i1.278.
Testo completoMagennis, Tina, e Jennifer Mitchell. "Privacy and Security: Are Your Health Information Systems up to Standard?" Health Information Management 26, n. 4 (dicembre 1996): 197–201. http://dx.doi.org/10.1177/183335839702600409.
Testo completoMartino, Lorenzo D., e Elisa Bertino. "Security for Web Services". International Journal of Web Services Research 6, n. 4 (ottobre 2009): 48–74. http://dx.doi.org/10.4018/jwsr.2009071303.
Testo completoSimić-Draws, Daniela, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer e Alexander Roßnagel. "Holistic and Law Compatible IT Security Evaluation". International Journal of Information Security and Privacy 7, n. 3 (luglio 2013): 16–35. http://dx.doi.org/10.4018/jisp.2013070102.
Testo completoMkuzangwe, Nenekazi N. P., e Zubeida C. Khan. "Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature". African Journal of Information and Communication, n. 25 (30 giugno 1999): 1–12. http://dx.doi.org/10.23962/10539/29191.
Testo completoLin, Ta Wei, Fu Tung Wang e Tzong Dar Wu. "Information Security Study on Innovative Power Meter System". Applied Mechanics and Materials 284-287 (gennaio 2013): 1057–61. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.1057.
Testo completoNikolaidis, I. "Network security essentials: applications ond standards [Books]". IEEE Network 14, n. 2 (marzo 2000): 6. http://dx.doi.org/10.1109/mnet.2000.826358.
Testo completo