نتایج جستجو برای: information security management system
تعداد نتایج: 3724607 فیلتر نتایج به سال:
the aim of this study was to investigate the impact of management information system on employees’ performance of tehran province water and wastewater company in district 5. the present study was an applied research in terms of purpose and a descriptive correlational survey in terms of method. cochran's formula was used to determine sample size which was 219 employees. the statistical samp...
This paper suggests a model, based on the continuous measuring and monitoring of information security parameters, by which information security management can be made more dynamic and relevant.
This paper investigates the association between the board structure of a firm and the possibility of information security breaches. Building on the agency theory and resource dependence theory, we hypothesize that the board structure could affect the guidance and advice capability of the board on the executives’ decision of information security management. Our results show that the board size a...
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a personal and social identity that they bring with them to work. The challenge that faces organisations is to manage this while trying to achieve th...
to apply them. Unfortunately, a disconnect often exists between principles and practice. Students sometimes feel that principles are boring or irrelevant, but without them, they can't go beyond " cookbook " remedies. In contrast, the competitive nature of matching wits with cyber-adversaries can be stimulating, but with perceptions molded by hyper-bolic news accounts, students can find critical...
the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...
Purpose: Study aims to: 1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effect...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید