The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda
Purpose After 15 years of research, this paper aims to present a review of the academic
literature on the ISO/IEC 27001, the most renowned standard for information security and the …
literature on the ISO/IEC 27001, the most renowned standard for information security and the …
[PDF][PDF] Securing the digital supply chain: Cybersecurity best practices for logistics and ship** companies
AC Odimarha, SA Ayodeji, EA Abaku - World Journal of Advanced …, 2024 - academia.edu
The review investigates the pressing need for robust cybersecurity measures within the
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …
Cybersecurity maturity model: Systematic literature review and a proposed model
The growing importance of cybersecurity stems from its strategic value to various
stakeholders, including individuals, businesses, governments, and society as a whole …
stakeholders, including individuals, businesses, governments, and society as a whole …
Context-based and adaptive cybersecurity risk management framework
HM Melaku - Risks, 2023 - mdpi.com
Currently, organizations are faced with a variety of cyber-threats and are possibly
challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact …
challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact …
Forecasting the diffusion of ISO/IEC 27001: a Grey model approach
Purpose The aim of this paper is to present the first diffusion analysis of ISO/IEC 27001, the
fourth most popular ISO certification at global level and the most important standard for …
fourth most popular ISO certification at global level and the most important standard for …
ZETAR: Modeling and computational design of strategic and adaptive compliance policies
Compliance management plays an important role in mitigating insider threats. Incentive
design is a proactive and noninvasive approach to achieving compliance by aligning an …
design is a proactive and noninvasive approach to achieving compliance by aligning an …
The Impact of Industrial Internet and the Digital Economy on the Management and Development of Manufacturing Information Systems Triggering Digitization as IoT …
Z Li, Z Li, Y Ren - Journal of Information Systems Engineering …, 2023 - jisem-journal.com
Technology adoption is crucial to organizational performance in the fast-changing digital
world. Due to their potential to boost efficiency, productivity, and competitiveness, disruptive …
world. Due to their potential to boost efficiency, productivity, and competitiveness, disruptive …
Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model
Risk measurement from standard operating procedures implemented by an institution
determines the level of maturity of a service system at that institution. The government's …
determines the level of maturity of a service system at that institution. The government's …
[PDF][PDF] Optimization of IT security in healthcare facilities
CA Unterwandling - 2024 - netlibrary.aau.at
This introductory chapter discusses the importance of IT security in healthcare facilities in
light of the increasing digitization of all aspects of life. It shows how critical infrastructures …
light of the increasing digitization of all aspects of life. It shows how critical infrastructures …
The Effectiveness of Using E-Learning Students The University of Lancang Kuning During Covid-19 Using COBIT 5.0
During the Covid-19 pandemic, the spread was very wide, including in Indonesia. This
affects the student learning system which changes drastically from face-to-face learning to …
affects the student learning system which changes drastically from face-to-face learning to …