Systematic literature review to investigate the application of open source intelligence (OSINT) with artificial intelligence

JRG Evangelista, RJ Sassi, M Romero… - Journal of Applied …, 2021‏ - Taylor & Francis
Abstract Open Source Intelligence (OSINT) is a concept to describe the search, collection,
analysis, and use of information from open sources, as well as the techniques and tools …

Information security maturity model for healthcare organizations in the United States

B Barnes, T Daim - IEEE Transactions on Engineering …, 2022‏ - ieeexplore.ieee.org
Thisarticle provides a maturity model for information security for healthcare organizations in
the United States. Healthcare organizations are faced with increasing threats to the security …

Develo** a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022‏ - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

[HTML][HTML] GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking

JN Al-Karaki, A Gawanmeh, S El-Yassami - Journal of King Saud …, 2022‏ - Elsevier
The lack of national security standardization bodies can have adverse impact on the
adoption of international security standards and best practices. To assure security …

A process framework for information security management

K Haufe, R Colomo-Palacios, S Dzombeta… - International Journal of …, 2016‏ - aisel.aisnet.org
Securing sensitive organizational data has become increasingly vital to organizations. An
Information Security Management System (ISMS) is a systematic approach for establishing …

A model for assessing COBIT 5 and ISO 27001 simultaneously

R Almeida, R Lourinho, MM da Silva… - 2018 IEEE 20th …, 2018‏ - ieeexplore.ieee.org
The assessment of Enterprise Governance of IT (EGIT) frameworks and standards such as
COBIT 5 and ISO 27001, when adopted simultaneously, implies an unreasonable effort …

Using ITIL 4 in security management

D Berger, N Shashidhar, C Varol - 2020 8th International …, 2020‏ - ieeexplore.ieee.org
Organizations of any size are tasked with managing security and risks of varying degrees of
impact and complexity. Managing security can be one of the most intricate yet pervasive …

[PDF][PDF] Map** the State of Security Standards Map**s.

A Mussmann, M Brunner, R Breu - Wirtschaftsinformatik (zentrale …, 2020‏ - library.gito.de
Companies often have to comply with more than one security standard and refine parts of
security standards to apply to their domain and specific security goals. To understand which …

Risk Assessment on Information Asset an academic Application Using ISO 27001

L Haris - 2018 6th International Conference on Cyber and IT …, 2018‏ - ieeexplore.ieee.org
This research an assessment of the risk correlated with information security related to assets
within an academic application at a university. Universities should value data as a critical …

Security management in cloud computing for healthcare data

M Asad - 2023‏ - diva-portal.org
Abstract" In today's research field interconnected world, preventing security issues and
confidentiality breaches has become paramount to safeguarding sensitive information, and …