2018
DOI: 10.1201/9781315232355
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…Living in a digital age, including SC, in which most knowledge and information are now becoming extremely important. No one is able to deny that information and knowledge are valuable assets to be secured from unauthorized access including hackers, phishers, social engineers, viruses, and worms that endanger organizations from different angles via the use of intranet, extranet, and the internet [10]. Information systems (IS) are important in the operations of the organization.…”
Section: Impact Of Iot Implementation In Smart Cities Towards Informamentioning
confidence: 99%
See 2 more Smart Citations
“…Living in a digital age, including SC, in which most knowledge and information are now becoming extremely important. No one is able to deny that information and knowledge are valuable assets to be secured from unauthorized access including hackers, phishers, social engineers, viruses, and worms that endanger organizations from different angles via the use of intranet, extranet, and the internet [10]. Information systems (IS) are important in the operations of the organization.…”
Section: Impact Of Iot Implementation In Smart Cities Towards Informamentioning
confidence: 99%
“…This policy will ensure the security of information assets and information technology with a particular process to facilitate the goals and objectives of an organization. It consists of strategies, processes, and technological measures used to avoid unauthorized access to IS, modification, stealing, or physical harm [6,10].…”
Section: Citizen's Acceptancementioning
confidence: 99%
See 1 more Smart Citation
“…Susanto and Almunawar 31 show the importance of standard compliance and propose the information security framework (ISF). The framework is a semi-automated tool developed to assist organizations to assess their compliance with ISO 27001.…”
Section: Related Workmentioning
confidence: 99%
“…Another purpose of this standard is to verify the proper selection of proportionate security controls to provide an acceptable amount of protection for assets. In sum, its main features are information security policies, communication, and operational management, access control, information system acquisition, organization of information security, asset management, business continuity management, human resources security and physical security [34].…”
Section: Security Standardsmentioning
confidence: 99%