共 50 条
- [41] Information security objectives and the output legitimacy of ISO/IEC 27001: stakeholders’ perspective on expectations in private organizations in Sweden [J]. Information Systems and e-Business Management, 2023, 21 : 699 - 722
- [42] Model Driven Information Security Management - Evaluating and Applying the Meta Model of ISO 27001 [J]. AMCIS 2011 PROCEEDINGS, 2011,
- [44] Developing an ISO27001 Information Security Management System for an Educational Institute: Hashemite University as a Case Study [J]. JORDAN JOURNAL OF MECHANICAL AND INDUSTRIAL ENGINEERING, 2014, 8 (02): : 102 - 118
- [45] Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 14 - +
- [46] Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 242 - 248
- [47] Compliance with Saudi NCA-ECC based on ISO/IEC 27001 [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (06): : 2090 - 2097
- [48] Security Characteristic Evaluation Based On ISO/IEC 25023 Quality Model, Case Study: Laboratory Management Information System [J]. 2018 ELECTRICAL POWER, ELECTRONICS, COMMUNICATIONS, CONTROLS, AND INFORMATICS SEMINAR (EECCIS), 2018, : 332 - 336
- [49] Appraisal of Mask Manufacture Information Security Based on ISO27001 and Common Criteria [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 2317 - 2320
- [50] A security requirement management database based on ISO/IEC 15408 [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1 - 10