期刊文献+
共找到2,162篇文章
< 1 2 109 >
每页显示 20 50 100
The Role of Information Security Development (ISD) in Effective Information Security Management (ISM) Implementation in the Banks: A Nigerian Case
1
作者 Dorcas Adebola Babatunde Mohamad Hisyam Selamat Ramat Titilayo Salman 《Journal of Modern Accounting and Auditing》 2014年第5期614-619,共6页
This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, inform... This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in effective information security management (ISM) implementation in the banks (a Nigerian case). This paper explores the existing literature and a proposed framework that consists of ISD such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in ISM implementation. ISD factors are found to be statistically significant, because it motivates an organization to implement effective ISM in the banks. Hence, it could be said that the role of ISD practices in an effective implementation of ISM among banks in Nigeria will be of great value. 展开更多
关键词 information security management ism information security plans perceived quality training programs organizational culture Nigeria
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Trust and Security on Semantic HIM (Health Information Management)
3
作者 Nasim Khozouei Razie Vanda Peyman Khozouei 《Intelligent Information Management》 2012年第6期401-406,共6页
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base... Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution. 展开更多
关键词 HEALTH information management (HIM) MEDICAL Document HEALTH information System(HIS) SEMANTIC Web security TRUST
下载PDF
Study on Architecture-Oriented Information Security Management Model for Using Mobile Devices Control
4
作者 Wei-ming Ma 《Chinese Business Review》 2018年第9期442-464,共23页
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th... The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results. 展开更多
关键词 information security management structure behavior COALESCENCE MOBILE devices MILITARY ARMY
下载PDF
Information Security Management Measures for College Archives Under the Network Environment
5
作者 Litao Cui 《Journal of Electronic Research and Application》 2022年第6期15-19,共5页
The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelera... The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives. 展开更多
关键词 Network environment University archives information security management
下载PDF
Developing a Geological Management Information System: National Important Mining Zone Database 被引量:1
6
作者 左仁广 汪新庆 夏庆霖 《Journal of China University of Geosciences》 SCIE CSCD 2006年第1期79-83,94,共6页
Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics data... Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system. 展开更多
关键词 geological management information system checking data ARCSDE transforming data format data sharing data security
下载PDF
Information Security Service Support-Helping End-Users Cope with Security
7
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
下载PDF
Management Strategies of Information Assurance Utilizing Biometrics Authentication via Wireless Bio-Aesthitires of Endysis or Emphyteusis
8
作者 Panagiotis Petratos Soydemir Gokce 《通讯和计算机(中英文版)》 2012年第12期1372-1382,共11页
关键词 生物特征识别技术 信息安全保障 管理 无线 州立大学 生物识别技术 信息系统 识别方法
下载PDF
基于《ISM规则》的国际航运安全管理信息系统的设计与实现 被引量:3
9
作者 胡家宝 张迪 +2 位作者 谢艳平 谢承望 余艳丽 《武汉理工大学学报(交通科学与工程版)》 2006年第1期170-173,共4页
介绍了《国际船舶安全营运和防止污染管理规则》(《ISM规则》)的基本概念和内容.分析了在异构计算机网络中设计《ISM规则》管理信息系统遇到的问题.重点论述了在异构网络平台上《ISM规则》管理信息系统的设计思想与技术路线,通信软件的... 介绍了《国际船舶安全营运和防止污染管理规则》(《ISM规则》)的基本概念和内容.分析了在异构计算机网络中设计《ISM规则》管理信息系统遇到的问题.重点论述了在异构网络平台上《ISM规则》管理信息系统的设计思想与技术路线,通信软件的设计,给出了基于《ISM规则》的国际航运安全管理信息系统的设计与实现的方法. 展开更多
关键词 ism规则 异构网络 数据通信 通信管理
下载PDF
信息安全中Safety与Security的比较研究 被引量:4
10
作者 吴志军 王慧 《信息网络安全》 2013年第8期84-86,共3页
文章针对Security和Safety在信息网络安全领域和在具体行业中应用的含义进行了探讨,给出了它们的相关定义,对信息安全风险评估、风险管理、等级保护及信息安全评价指标体系的研究具有一定的指导意义。
关键词 信息安全 网络安全 安全评估 风险管理 评价指标
下载PDF
通用准则(CC)与信息安全管理体系(ISMS)的比较分析 被引量:6
11
作者 谢宗晓 李宽 《中国质量与标准导报》 2018年第7期28-32,共5页
本文从CC和ISMS的发展过程、现状、应用的风险模型以及框架设计四个方面进行了比较。
关键词 通用准则 信息安全管理体系 信息安全
下载PDF
ISMS概念模型探索 被引量:6
12
作者 姚轶崭 江常青 +1 位作者 张利 李建彬 《计算机工程》 CAS CSCD 北大核心 2008年第2期133-134,146,共3页
ISO 27001给出了信息安全管理体系要求方面的最佳实践标准,但并没有说明体系要求方面内在的逻辑关系。该文将ISO 27001分解为过程方法要求和安全控制要求2个部分,在过程方法上按照PDCA的循环模型重新解构了过程方法要求之间的关系,在安... ISO 27001给出了信息安全管理体系要求方面的最佳实践标准,但并没有说明体系要求方面内在的逻辑关系。该文将ISO 27001分解为过程方法要求和安全控制要求2个部分,在过程方法上按照PDCA的循环模型重新解构了过程方法要求之间的关系,在安全控制上按照主体访问客体的方式重组了安全控制要求之间的关系。 展开更多
关键词 信息安全管理体系 PDCA循环 主客体 过程方法要求 安全控制要求
下载PDF
按ISM规则设计船舶机务管理系统 被引量:1
13
作者 牛洪波 贾传荧 《世界海运》 2004年第1期43-45,共3页
基于服务器/客户端数据通信的基础上,按照ISM规则要求,讨论了船舶机务管理系统的设计。对船舶机务管理模式与功能进行了较为详细的讨论,提出了现代船舶管理公司船舶管理信息网建设方案与用于船岸之间信息交换的途径。该系统对于提高ISM... 基于服务器/客户端数据通信的基础上,按照ISM规则要求,讨论了船舶机务管理系统的设计。对船舶机务管理模式与功能进行了较为详细的讨论,提出了现代船舶管理公司船舶管理信息网建设方案与用于船岸之间信息交换的途径。该系统对于提高ISM管理水平具有重大作用。 展开更多
关键词 ism规则 船舶管理 机务管理 系统设计 信息管理系统
下载PDF
论ISMS中的有效性测量——基于ISO/IEC27004:2009的ISMS有效性测量浅析 被引量:1
14
作者 李尧 《电子产品可靠性与环境试验》 2010年第3期53-58,共6页
基于对ISO/IEC27004:2009《信息技术-安全技术-信息安全管理测量》的研究,分析如何测量信息安全管理体系的有效性,确保其控制措施的有效和安全需求的满足。
关键词 信息安全管理体系 有效性 测量
下载PDF
ISMS与BCM体系融合实现方法的初探
15
作者 王凤娇 徐然 魏军 《信息安全与通信保密》 2015年第1期109-111,共3页
近年来,随着各行业对信息技术依赖程度的不断提高、网络安全威胁的日益加剧以及各类突发事件的频发,信息资产的安全和业务的连续性成为社会各界关注的焦点,很多组织已经建立或即将建立信息安全管理体系(ISMS)和业务连续性管理体系(BCMS)... 近年来,随着各行业对信息技术依赖程度的不断提高、网络安全威胁的日益加剧以及各类突发事件的频发,信息资产的安全和业务的连续性成为社会各界关注的焦点,很多组织已经建立或即将建立信息安全管理体系(ISMS)和业务连续性管理体系(BCMS),必将面临两个管理体系(甚至包括ISO 9001等多个管理体系)并存的问题,如何有效利用组织资源,实现利益最大化是一个值得关注的问题。本文在对ISMS和BCMS进行比较分析的基础上,提出了一种实现ISMS与BCMS融合的思路。 展开更多
关键词 业务连续性管理 信息安全管理 风险评估 业务影响分析 业务连续性计划
下载PDF
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
16
作者 Mohammed Abu Lamddi 《Journal of Software Engineering and Applications》 2017年第2期211-244,共34页
Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier t... Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier than before. The rapid increase of technology adoption in the different aspects of life has made technology affordable and has led to an even stronger adoption in the society. As technology advances, almost every kind of technology is now connected to the network like infrastructure, automobiles, airplanes, chemical factories, power stations, and many other systems that are business and mission critical. Because of our high dependency on technology in most, if not all, aspects of life, a system failure is considered to be very critical and might result in harming the surrounding environment or put human life at risk. We apply our conceptual framework to integration between security and safety by creating a SaS (Safety and Security) domain model. Furthermore, it demonstrates that it is possible to use goal-oriented KAOS (Knowledge Acquisition in automated Specification) language in threat and hazard analysis to cover both safety and security domains making their outputs, or artifacts, well-structured and comprehensive, which results in dependability due to the comprehensiveness of the analysis. The conceptual framework can thereby act as an interface for active interactions in risk and hazard management in terms of universal coverage, finding solutions for differences and contradictions which can be overcome by integrating the safety and security domains and using a unified system analysis technique (KAOS) that will result in analysis centrality. For validation we chose the Systems-Theoretic Accident Model and Processes (STAMP) approach and its modelling language, namely System-Theoretic Process Analysis for safety (STPA), on the safety side and System-Theoretic Process Analysis for Security (STPA-sec) on the security side in order to be the base of the experiment in comparison to what was done in SaS. The concepts of SaS domain model were applied on STAMP approach using the same example @RemoteSurgery. 展开更多
关键词 Safety information MODEL security information MODEL DEPENDABILITY Requirements GOAL Modeling KAOS Obstacles Base Risk management
下载PDF
Optimum Spending on Cybersecurity Measures: Part II
17
作者 Sherita Tara Kissoon 《Journal of Information Security》 2021年第1期137-161,共25页
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i... The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures. 展开更多
关键词 information security Risk management Strategy GOVERNANCE Organizational Decision Making
下载PDF
云计算环境下的拟态IAM系统设计实现方法 被引量:1
18
作者 宋玉 孙贺 +2 位作者 王家兴 潘云飞 张建辉 《计算机工程与设计》 北大核心 2024年第5期1297-1304,共8页
随着云计算的快速发展及其普及,企业的传统数据安全边界被打破,出现云资产管理混乱、越权、误操作等现象,对用户的信息安全产生巨大威胁。基于此,对目前云计算环境下身份认证和访问管理(identity and access management,IAM)的安全问题... 随着云计算的快速发展及其普及,企业的传统数据安全边界被打破,出现云资产管理混乱、越权、误操作等现象,对用户的信息安全产生巨大威胁。基于此,对目前云计算环境下身份认证和访问管理(identity and access management,IAM)的安全问题进行研究,提出结合内生安全思想,采取拟态防御手段构建出一种具有内生安全效应的拟态身份认证和访问管理(mimicry identity and access management,MIAM)体系架构方案,并对其进行详细描述。将该方案分别进行稳定性测试、系统性能测试以及系统安全性评估,实验数据表明,该方案具有可行性和安全性。 展开更多
关键词 云计算 拟态防御 内生安全 身份认证 访问管理 信息安全 网络安全
下载PDF
Study and Application Techniques on Web System Security Based on B/S Mode
19
作者 Xinbo Qi Qingliang Li Xueguang Chen 《通讯和计算机(中英文版)》 2006年第5期82-85,102,共5页
关键词 网络安全 软件开发 WEB系统 B/S模式
下载PDF
实验室管理信息系统的建设与应用 被引量:3
20
作者 马淼 张文祥 马婷 《办公自动化》 2024年第4期12-14,共3页
文章主要探讨了实验室管理信息系统的构成、功能、建设过程、优势和发展趋势。通过详细介绍实验室管理信息系统的主要组成部分和基本功能,阐述了该系统具有较强的数据管理、设备调度和实验进度跟踪功能,可以提高实验室管理的效率和精度... 文章主要探讨了实验室管理信息系统的构成、功能、建设过程、优势和发展趋势。通过详细介绍实验室管理信息系统的主要组成部分和基本功能,阐述了该系统具有较强的数据管理、设备调度和实验进度跟踪功能,可以提高实验室管理的效率和精度。针对该系统的建设过程,强调了需对实验室管理的具体需求进行详细的分析和系统设计,同时选择适合的硬件设施和软件平台进行搭建,并利用网络通信和信息安全技术进行保障和优化。最后,提出了实验室管理信息系统将面临更多智能化和数据化趋势的展望,未来将经历更多深度集成和优化,以进一步提高实验室管理和研究工作的效率和质量。 展开更多
关键词 实验室 管理信息系统、信息安全技术 建设
下载PDF
上一页 1 2 109 下一页 到第
使用帮助 返回顶部