User Care Level Audit of Information Data Security at PT XYZ Using Guttman Scale
نویسندگان
چکیده
منابع مشابه
Guttman Scale Analysis
Guttman scale analysis may be considered as two inseparable endeavors: (1) to ascertain if a set of stimu!'i are unidimensional in nature and if so, (2) to tank order respondents along the same continuum based on their reaction to toe stimuli. For example, suppose a set of four attitude statements (S1-54) are constructed such that similarity of content exists (e.g. all concern attitude toward i...
متن کاملTowards Continuous Information Security Audit
Requirement engineering calls for continuous possibility to check whether latest changes of significant requirements are met by the target systems. This review is important because the environment of the system, if impacted by changes, may lead to new exposures. Current paper reports on knowledge gained during the attempt to move towards continuous security audit by extending one business proce...
متن کاملTeaching Data Security at University Degree Level
There is a general consensus that courses on data security at university degree level should be research-oriented and teach fundamentals of the field, i.e., items of long-term knowledge in contrast to technology-oriented system knowledge. Unfortunately, this consensus often results in courses that are either too theoretical or are outdated with respect to current developments in security techno...
متن کاملGuttman scale analysis of the distance vision scale.
PURPOSE The Distance Vision Scale (DVS) is a self-assessment of visual acuity (VA). Like VA testing in which letter reading becomes progressively difficult through the test, DVS questions have a hierarchy of difficulty (Guttman scale). The aims were to determine whether the DVS fulfills Guttman scaling criteria and to test the relationship between DVS score and VA in a cataract population. ME...
متن کاملInformation Security and Privacy Audit Modeling
The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2020
ISSN: 1757-899X
DOI: 10.1088/1757-899x/879/1/012050