Information security assessment in public administration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrating Information Security with Information System Architecture and Administration Curricula

While the cost and flexibility benefits resulting from distributed and cloud computing environments are clearly evident, this approach also has farreaching implications for the threat surface presented as well as general information security risks, particularly to availability. The design of cloud-based storage services also implies that data once stored with such services may very hard to reca...

متن کامل

Information Security Risk Assessment in Hospitals

Background To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective The aim of this study was to assess the risks threatening information security in the hospitals located in one of t...

متن کامل

Information systems security in special and public libraries: an assessment of status

Explores the use of an assessment instrument based on a model named library information systems security assessment model (LISSAM) to assess the ISS status in special and public libraries in Malaysia. The study aims to determine the implementation status of technological and organizational components of the LISSAM model. An implementation index as well as a scoring tool is presented to assess t...

متن کامل

Information Systems Outsourcing in Public Administration: an Emergent Research Topic

After reviewing the most relevant academic sources, we believe that there is still little academic literature on information systems (IS) outsourcing specialized for public administration (PA). In this paper we present the few we have discovered references while deriving and expanding some analysis from them. The sparse results of this analysis are then summarized and classified. This situation...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2020

ISSN: 0167-4048

DOI: 10.1016/j.cose.2019.101709