نتایج جستجو برای: information security management system

تعداد نتایج: 3724607  

Journal: :مدیریت شهری 0
mohammadreza rabiee mandajin zahra pooresmaeel

the aim of this study was to investigate the impact of management information system on employees’ performance of tehran province water and wastewater company in district 5. the present study was an applied research in terms of purpose and a descriptive correlational survey in terms of method. cochran's formula was used to determine sample size which was 219 employees. the statistical samp...

2000
Elmarie von Solms Sebastiaan H. von Solms

This paper suggests a model, based on the continuous measuring and monitoring of information security parameters, by which information security management can be made more dynamic and relevant.

2010
Tawei Wang Carol Hsu

This paper investigates the association between the board structure of a firm and the possibility of information security breaches. Building on the agency theory and resource dependence theory, we hypothesize that the board structure could affect the guidance and advice capability of the board on the executives’ decision of information security management. Our results show that the board size a...

Journal: :Inf. Sec. Techn. Report 2008
Debi Ashenden

This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a personal and social identity that they bring with them to work. The challenge that faces organisations is to manage this while trying to achieve th...

Journal: :IEEE Security & Privacy 2005
Cynthia E. Irvine Michael F. Thompson Ken Allen

to apply them. Unfortunately, a disconnect often exists between principles and practice. Students sometimes feel that principles are boring or irrelevant, but without them, they can't go beyond " cookbook " remedies. In contrast, the competitive nature of matching wits with cyber-adversaries can be stimulating, but with perceptions molded by hyper-bolic news accounts, students can find critical...

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

Journal: :Inf. Manag. Comput. Security 2014
Sindhuja P. N.

Purpose: Study aims to: 1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effect...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید