User Care Level Audit of Information Data Security at PT XYZ Using Guttman Scale

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guttman Scale Analysis

Guttman scale analysis may be considered as two inseparable endeavors: (1) to ascertain if a set of stimu!'i are unidimensional in nature and if so, (2) to tank order respondents along the same continuum based on their reaction to toe stimuli. For example, suppose a set of four attitude statements (S1-54) are constructed such that similarity of content exists (e.g. all concern attitude toward i...

متن کامل

Towards Continuous Information Security Audit

Requirement engineering calls for continuous possibility to check whether latest changes of significant requirements are met by the target systems. This review is important because the environment of the system, if impacted by changes, may lead to new exposures. Current paper reports on knowledge gained during the attempt to move towards continuous security audit by extending one business proce...

متن کامل

Teaching Data Security at University Degree Level

There is a general consensus that courses on data security at university degree level should be research-oriented and teach fundamentals of the field, i.e., items of long-term knowledge in contrast to technology-oriented system knowledge. Unfortunately, this consensus often results in courses that are either too theoretical or are outdated with respect to current developments in security techno...

متن کامل

Guttman scale analysis of the distance vision scale.

PURPOSE The Distance Vision Scale (DVS) is a self-assessment of visual acuity (VA). Like VA testing in which letter reading becomes progressively difficult through the test, DVS questions have a hierarchy of difficulty (Guttman scale). The aims were to determine whether the DVS fulfills Guttman scaling criteria and to test the relationship between DVS score and VA in a cataract population. ME...

متن کامل

Information Security and Privacy Audit Modeling

The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOP Conference Series: Materials Science and Engineering

سال: 2020

ISSN: 1757-899X

DOI: 10.1088/1757-899x/879/1/012050