Reaching escape velocity: A practiced approach to information security management system implementation

被引:3
|
作者
Bellone, Jason [1 ]
机构
[1] United Nations Office, Geneva, Switzerland
来源
关键词
D O I
10.1108/09685220810862742
中图分类号
学科分类号
摘要
引用
收藏
页码:49 / 57
相关论文
共 50 条
  • [31] Integrated Implementation of Service and Information Security Management System (case study: State Polytehnic of Lampung)
    Putra, Septafiansyah Dwi
    Sutikno, Sarwono
    Rosmansyah, Yusep
    Asrowardi, Imam
    2014 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2014, : 185 - 191
  • [32] Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis
    Chen, Qunlin
    2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185
  • [33] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [34] An Approach for Implementation of Project Management Information Systems
    Berzisa, Solvita
    Grabis, Janis
    INFORMATION SYSTEMS DEVELOPMENT: TOWARDS A SERVICE PROVISION SOCIETY, 2009, : 423 - 431
  • [36] Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach
    Brodin, Martin
    Rose, Jeremy
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (05) : 598 - 618
  • [37] The Measurement Design of Information Security Management System
    Nancylia, Merry
    Mudjtabar, Eddy K.
    Sutikno, Sarwono
    Rosmansyah, Yusep
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [38] The Design of Information Security Management System in College
    Li, Xinli
    INTERNATIONAL CONFERENCE ON EDUCATION & EDUCATIONAL RESEARCH AND ENVIRONMENTAL STUDIES (EERES 2016), 2016, : 49 - 52
  • [39] Building a Viable Information Security Management System
    Goldes, Sabine
    Schneider, Ralf
    Schweda, Christian M.
    Zamani, Jawed
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 73 - 78
  • [40] An integrated system theory of information security management
    Hong, Kwo-Shing
    Chi, Yen-Ping
    Chao, Louis R.
    Tang, Jih-Hsing
    Information Management and Computer Security, 2003, 11 (05): : 243 - 248