Skip to main content
    • by 
    •   4  
      Digital PreservationCapability ApproachInformation Security ManagementGovernance and Risk Management
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
    • by 
    •   22  
      Information TechnologyInformation SecuritySecurityDesign Research
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
    • by 
    •   3  
      BusinessInformation SecurityInformation Security Management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining... more
    • by 
    •   4  
      EconomicsInformation SecurityInformation Security ManagementISMS
    • by 
    •   9  
      Information SystemsInformation SecurityRisk ManagementSecurity Management
"Gap between technology and information risks threaten Europe’s SMEs • Decision makers in western European SMEs are agreed that information security is the highest risk to business. The top risk, identified by 66% of SMEs from a range of... more
    • by 
    •   13  
      Information SecurityInternational BusinessSMESecurity
    • by 
    • Information Security Management
These days, financial institutions such as banks are highly exposed to different cyberattacks and their electronic payment system is among the targets of the attack. This study is aimed at assessing the information security management... more
    • by 
    •   3  
      Information SecurityInformation Security and PrivacyInformation Security Management
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
    • by 
    •   8  
      System DynamicsModeling and SimulationSecurity ManagementInfrastructure Development
    • by 
    •   13  
      Information SystemsComputer ScienceInformation SecurityCorporate Governance
    • by 
    •   5  
      BusinessInformation SecurityIT SecurityInformation Security Management
    • by 
    •   7  
      Computer ScienceInformation SecurityAccess ControlComputer Security
SIEM ürünleri ve bu ürünlerin performans analizleri ürünleri değerlendirme açısından çok önemlidir. SIEM ürünlerinin çalışma performansları, gerek duydukları kaynaklar (CPU, RAM, DISK) ve ihtiyaç duyulan EPS değerlerinde nasıl bir... more
    • by 
    •   9  
      Network SecurityComputer SecurityINFORMATION SECURTIYInformation Security Management
Information is the key asset of all organizations and can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today's... more
    • by 
    •   7  
      Computer ScienceInformation SecurityJoomlaISO standards
The change in IT networks in the recent years has changed the role, definition and the scope of skills and responsibilities of a CISO. This paper provides an overview of the changing environments and the current state of a CISO. The paper... more
    • by 
    •   3  
      Information SecurityInformation Security ManagementChief Information Officer
Abstract — In this paper authors will discuss about (digital) privacy. They will try to define a new approach to defining a digital privacy and propose a framework for «calculating» a percentage of privacy in a specific case. Most... more
    • by 
    •   13  
      Information SystemsComputer ScienceSoftware EngineeringInformation Technology
    • by  and +2
    • Information Security Management
This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information Security Management standards and frameworks on one hand and SOA considerations on the other hand, the... more
    • by 
    •   5  
      Enterprise ArchitectureSecurityGovernanceService-Oriented Architecture
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
    • by 
    •   48  
      Information SystemsComputer Security And ReliabilityInformation ScienceInformation Technology
    • by 
    •   4  
      Information SystemsInformation ManagementBusiness and ManagementInformation Security Management
    • by 
    •   5  
      Risk ManagementSecurity ManagementComputer SoftwareIT Security
A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cyber security... more
    • by 
    •   3  
      Information SecurityComputer NetworksInformation Security Management
    • by 
    •   7  
      Information SecurityGap AnalysisInformation Security ManagementISO 27001
Know-how and information are essential for people and private or governmental organizations. As informatics and Internet develops, the vulnerability of information protection is rising everyday, mainly due to the facility of storage into... more
    • by 
    • Information Security Management
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Computer ScienceInformation SecurityInformation Security AuditingEncryption
    • by 
    •   11  
      EngineeringComputer ScienceInformation ManagementGovernment
Back cover text: Real Social Science presents a new, hands-on approach to social inquiry. The theoretical and methodological ideas behind the book, inspired by Aristotelian phronesis, represent an original perspective within the social... more
    • by  and +1
    •   1613  
      ScreenwritingCritical TheoryCritical TheoryCritical Theory
    • by  and +2
    •   4  
      Information SecurityContent AnalysisInformation Security ManagementData Format
Knowledge synthesis report submitted to the Social Sciences and Humanities Research Council of Canada Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual... more
    • by  and +1
    •   18  
      Information ScienceInformation TechnologyIntellectual PropertyInformation Security
    • by 
    •   3  
      Information Security ManagementEfficiencyISMS
This article examines five common misunderstandings about case-study research: (a) theoretical knowledge is more valuable than practical knowledge; (b) one cannot generalize from a single case, therefore, the single-case study cannot... more
    • by 
    •   958  
      Critical TheoryBusinessEntrepreneurshipOrganizational Behavior
    • by 
    •   180  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
RESUMO Este artigo tem como objetivo descrever e divulgar um processo de gestão do risco de Segurança da Informação e Cibersegurança devido à importância do mesmo no design, implementação e operação de um Sistema de Gestão de Segurança da... more
    • by 
    •   2  
      Risk ManagementInformation Security Management
In this paper, we describe research into the use of baselining for enhancing SIEM Correlation rules. Enterprise grade software has been updated with a capability that identifies anomalous events based on baselines as well as rule based... more
    • by 
    •   9  
      Information SecurityNetwork SecurityComputer SecurityBig Data
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
    • by 
    •   19  
      Mathematics of CryptographyInformation SecurityApplied CryptographyInformation Security Auditing
    • by 
    •   2  
      Information SecurityInformation Security Management
    • by 
    •   940  
      Critical TheoryBusinessEntrepreneurshipOrganizational Behavior
O objetivo principal desta publicação (Livro) é procurar responder à questão: – Como realizar o design, a implementação e operação de um Sistema de Gestão de Segurança de informação em uma Organização inserida num ambiente competitivo ou... more
    • by 
    •   3  
      Information SecurityCyber SecurityInformation Security Management
    • by  and +1
    •   7  
      Information SecurityInformation Systems SecuritySecurity RequirementsNon Functional Requirement
Management information system can be compared to the nervous system of a company. Its malfunction may cause adverse effects in many different areas of the company. Information Security Management is understood as tool of the information... more
    • by 
    •   3  
      Information SecurityCrisis ManagementInformation Security Management
King Abdullah Medical Complex in Jeddah (KAMCJ) is a 500-bed hospital with highly qualified staff, advanced equipment’s and technologies. The hospital provides a wide range of medical services round the clock. Equipped with the latest... more
    • by  and +2
    •   17  
      MathematicsComputer ScienceAlgorithmsInformation Technology
Phronetic organizational research is an approach to the study of management and organizations focusing on ethics and power. It is based on a contemporary interpretation of the Aristotelian concept phronesis, usually as ‘prudence’.... more
    • by 
    •   1348  
      ScreenwritingCritical TheoryBusinessEntrepreneurship
    • by 
    •   14  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and... more
    • by 
    • Information Security Management
Az Informatikai Biztonsági Irányítási Rendszer1 (IBIR) az ISO 27001:2005 szabvány alapvető fogalma. Az IBIR egy általános irányítási rendszer, amely az üzleti kockázat elemzésen alapul, megállapítja, megvalósítja, üzemelteti, ellenırzi,... more
    • by 
    • Information Security Management
SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT... more
    • by 
    •   9  
      ManagementSecurity StudiesCritical Security StudiesRisk Management