Analyzing Information Security Goals (original) (raw)

Information security goals in a Swedish hospital

Karin Hedström

2008

View PDFchevron_right

Information security management objectives and practices: a parsimonious framework

Qingxiong Ma

Information Management & Computer Security, 2008

View PDFchevron_right

Factors Affecting the Objectives of Information Security Management

Qingxiong Ma

2008

View PDFchevron_right

The Impact of the Goals of Information Security Standards to Ensure Information Security

Mohammed-abed altaee

Journal of Management Research, 2014

View PDFchevron_right

The Organisational Information Security Profile - A Tool to Assist The Board

Helen De Haar

2006

View PDFchevron_right

Understanding Information Security Strategy in Organisations

Craig Horne

The University of Melbourne, 2018

View PDFchevron_right

Organisational Information Security Strategy: Review, Discussion and Future Research

Craig Horne

Australasian Journal of Information Systems, 2017

View PDFchevron_right

Information Security Standards in Healthcare Activities

Jose Gaiveo

International journal of reliable and quality e-healthcare, 2016

View PDFchevron_right

A Model Performance to Information Security Management

christos siomos

2011

View PDFchevron_right

Development and Evaluation of Information System Security Policies

Sean B Maynard

2003

View PDFchevron_right

Redefining the Information System Security Policy

Sean B Maynard

View PDFchevron_right

Aligning the information security policy with the strategic information systems plan

Neil Doherty

Computers & Security, 2006

View PDFchevron_right

Security Management Standards: A Mapping

Srdan Dzombeta, Knut Haufe, Ricardo Colomo Palacios, Vladimir Stantchev

View PDFchevron_right

Information Systems Strategy and Security Policy: A Conceptual Framework

Fotis Kitsios

Electronics

View PDFchevron_right

Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment

Gurpreet Dhillon

View PDFchevron_right

The adoption of IT security standards in a healthcare environment

Luís Lapão

Studies in health technology and informatics, 2008

View PDFchevron_right

Information security policies in the UK healthcare sector: a critical evaluationisj_378 77..94

Bernd Carsten Stahl

View PDFchevron_right

Information Security Management

António Rosinha

International Journal of Cyber Warfare and Terrorism, 2013

View PDFchevron_right

Organizational information security policies: components of the study

John Giordani

Organizational information security policies: components of the study, 2022

View PDFchevron_right

Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness

Jose Sarriegi, Javier Santos

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Towards a Taxonomy of Information Security Management Practices in Organisations

Sean B Maynard

View PDFchevron_right

The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector

Fotis Kitsios

Sustainability

View PDFchevron_right

Information Security Strategy in Organisations: Review, Discussion and Future Research Directions

Craig Horne

Australasian Conference on Information Systems, 2015

View PDFchevron_right

Information security policies in the UK healthcare sector: a critical evaluation

Bernd Carsten Stahl

Information Systems Journal, 2012

View PDFchevron_right

Factors Contributing to the Success of Information Security Management Implementation

mazlina zammani

View PDFchevron_right

BC3I: towards requirements specification for preparing an information security budget

Moses Dlamini

2009

View PDFchevron_right

A comprehensive model of information security factors for decision-makers

Helmut Krcmar

Computers & Security, 2020

View PDFchevron_right

Information Security Culture

Sean B Maynard

International Journal of Cyber Warfare and Terrorism, 2015

View PDFchevron_right

Assessing federal and commercial information security needs

David Ferraiolo

View PDFchevron_right

Defining the information security posture: an empirical examination of structure, integration and managerial effectiveness

John Windsor

2008

View PDFchevron_right

Organizational information security policies A review and research framework

John Giordani

Organizational information security policies: a review and research framework, 2022

View PDFchevron_right

Information security risk management for computerized health information systems in hospitals: a case study of Iran

Farahnaz Sadoughi

Risk Management and Healthcare Policy, 2016

View PDFchevron_right

Determining a standard for information security culture

Frans Nel

2017

View PDFchevron_right

AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

Cristina Cachero

Applied Sciences

View PDFchevron_right