نتایج جستجو برای: information security management system

تعداد نتایج: 3724607  

ژورنال: مجله طب نظامی 2020

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

Journal: :iranian journal of public health 0
a rashidian dept. of health management and economics, school of public health / knowledge utilization research center, tehran university of medical sciences, tehran, iran ; national institute of health research, tehran university of medical sciences, tehran, iran. b damari b larijani a vosoogh moghadda s alikhani k shadpour

the islamic republic of iran, in her 20 year vision by the year 2025, is a developed country with the first economic, scientific and technological status in the region, with revolutionary and islamic identity, inspiring islamic world, as well as effective and constructive interaction in international relations. enjoying health, welfare, food security, social security, equal opportunities, fair ...

Journal: :Information & Security: An International Journal 2000

2012
Derek L. Nazareth Jae Choi

Managing security for information assets presents a challenging task. The need for effective information security management assumes greater importance with growing reliance on distributed systems and Internet-accessible systems. Many factors play a role in determining the vulnerability of information assets to security threats. Using a system dynamics approach, this study evaluates information...

Journal: :TIIS 2011
Heasuk Jo Seungjoo Kim Dongho Won

Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues with...

2017
Moufida Sadok Peter M. Bednar

This paper reports a teaching experience of business systems analysis (BSA) to cyber-security management students. This unit places great emphasis on connecting security function to business requirements from a socio-technical (ST) perspective. Specific topics of lectures and seminars are discussed to outline the necessity of tuning and tailoring BSA content to fit the needs of contemporary sec...

2007
Jai-Yeol Son Hyeun-Suk Rhee

Two well-grounded motivational models—command-and-control and self-regulation, which are viewed as competing explanations of why individuals follow rules (Tyler and Blader 2005)—are used as conceptual lenses through which to view employees’ adherence to information systems security policy (ISSP). Specifically, we aim to identify specific factors drawn from each of the two competing approaches t...

Journal: :Enterprise IS 2015
Daniel Curiac Mihai Pachia

Information security represents the cornerstone of every data processing system which resides in an organization’s trusted network, implementing all necessary protocols, mechanisms and policies to be one step ahead of possible threats. Starting from the need to strengthen the set of security services, in this paper we introduce a new and innovative process, named Controlled Information Destruct...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید