نتایج جستجو برای: information security management system
تعداد نتایج: 3724607 فیلتر نتایج به سال:
The aim of this research is to investigate the role of strong organizational cultures in setting information systems security goals. In doing so, it explores and discusses the concept of strong culture within three financial organizations with different social organizational structures and seeks to demonstrate the importance of having a strong culture in setting efficiently information security...
This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system im...
This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system im...
This paper analyses the network structure mode of bidding management information system (MIS) —B/S model and its working principle, expounds security problems existed under the mode, and then brings out a new security architecture according to the existing loopholes of data layer, application layer and presentation layer as a result of a sharp increase in system
Security management of information systems is a complex and daunting task in most organizations. Management policies are then introduced to guide and control the management of information systems, but the management of management policies is also a complex task. Therefore, we propose a new concept—policy engineering, which uses the philosophy and paradigms of established engineering disciplines...
The risk assessment methodologies that are portrayed in traditional information security management literature often do not scale into the multi-level stakeholder environment of corporate governance. This is because they focus on one type of stakeholder, the IT infrastructure. A risk assessment methodology that is to successfully operate in such an environment must have effective mechanisms of ...
Even though software engineering have become a fundamental component to produce information systems and related software components, it is not adequate and effective for developing secure information systems. In this paper, we propose holistic, consistent, and integrated security engineering procedures for analyzing, designing, developing, testing, and maintaining secure enterprise information ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید