共 50 条
- [21] Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings [J]. SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2009, 42 : 201 - 212
- [22] INTEGRATING THE INFORMATION SECURITY MANAGEMENT SYSTEM (ISO/IEC 27001) WITH OTHER MANAGEMENT SYSTEMS: A CASE STUDY IN A PHARMACEUTICAL ORGANISATION [J]. IRF2016: 5TH INTERNATIONAL CONFERENCE INTEGRITY-RELIABILITY-FAILURE, 2016, : 843 - 844
- [23] THEORETICAL AND PRACTICAL CONSIDERATIONS REGARDING THE INFORMATION SECURITY MANAGEMENT SYSTEM WITHIN ORGANIZATIONS IN CONCORDANCE WITH THE NEW INTERNATIONAL STANDARD ISO/IEC 27001:2013 [J]. GLOBALIZATION AND INTERCULTURAL DIALOGUE: MULTIDISCIPLINARY PERSPECTIVES - ECONOMY AND MANAGEMENT, 2014, : 62 - 68
- [25] Goal- Based Establishment of an Information Security Management System Compliant to ISO 27001 [J]. SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 102 - 113
- [26] IMPROVING THE SECURITY OF LIBRARY-INFORMATION SYSTEM BY APPLYING STANDARD ISO 27001 [J]. BOSNIACA-JOURNAL OF THE NATIONAL AND UNIVERSITY LIBRARY OF BOSNIA AND HERZEGOVINA, 2018, (23): : 95 - 98
- [27] Evaluation of the Degree of Knowledge and Implementation of Information Security Management Systems, based of the NCh-ISO 27001 Standard, in Health Institutions [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION/XXIII CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (ICA-ACCA), 2018,
- [28] The Evaluation of the Electronic Services with Accordance to IT-security Requirements Based on ISO/IEC 27001 [J]. PROCEEDINGS OF THE 2016 IEEE CONFERENCE ON QUALITY MANAGEMENT, TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&MQ&IS), 2016,
- [29] Analysis of factors that inhibiting implementation of Information Security Management System (ISMS) based on ISO 27001 [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
- [30] Assessment of ISMS Based On Standard ISO/IEC 27001:2013 at DISKOMINFO Depok City [J]. 2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 43 - 48