Implementation of information security management system in organization

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of health information requirement in management information System

Introduction: Considering the importance of information, providing the management with a reliable information system, can facilitate decision making regarding planning, organizing and controlling. This study aimed to analyze and evaluate information needs of managers at vice - chancellorship for treatment in Iranian medical science universities. Methods: This cross-sectional study was car...

متن کامل

Curriculum Management Information System

Curriculum Management Information System

متن کامل

Policy Engineering for Security Management of Organization Information Systems

Security management of information systems is a complex and daunting task in most organizations. Management policies are then introduced to guide and control the management of information systems, but the management of management policies is also a complex task. Therefore, we propose a new concept—policy engineering, which uses the philosophy and paradigms of established engineering disciplines...

متن کامل

Medical Organization Information Security Management Based on ISO27001 Information Security Standard

Most of the information security events in medical organizations are due to improper management. This is a clear indication that the security of information is an issue related to information and communication technology and a management issue as well. In a review of literature, most research on information security has focused on information and communication technology issues, such as network...

متن کامل

Information Security Management: A System Dynamics Approach

Managing security for information assets presents a challenging task. The need for effective information security management assumes greater importance with growing reliance on distributed systems and Internet-accessible systems. Many factors play a role in determining the vulnerability of information assets to security threats. Using a system dynamics approach, this study evaluates information...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Collection "Information technology and security"

سال: 2016

ISSN: 2518-1033,2411-1031

DOI: 10.20535/2411-1031.2016.4.1.95933