The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

G Culot, G Nassimbeni, M Podrecca, M Sartor - The TQM Journal, 2021 - emerald.com
Purpose After 15 years of research, this paper aims to present a review of the academic
literature on the ISO/IEC 27001, the most renowned standard for information security and the …

[HTML][HTML] Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management

S Mushtaq, M Shah - Information, 2024 - mdpi.com
This review addresses the fragmented literature on administrative interventions for
cybercrime mitigation within e-government services, which often prioritise technological …

The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

Information security objectives and the output legitimacy of ISO/IEC 27001: stakeholders' perspective on expectations in private organizations in Sweden

Y Kamil, S Lund, MS Islam - Information Systems and e-Business …, 2023 - Springer
Organizations use the ISO/IEC 27001 standard to establish an information security
management system (ISMS). This standard outlines specific security measures and …

The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model

A Alyami, D Sammon, K Neville… - Information Technology & …, 2023 - emerald.com
Purpose This study explores the critical success factors (CSFs) for Security Education,
Training and Awareness (SETA) program effectiveness. The questionable effectiveness of …

Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

Security requirements engineering framework with BPMN 2.0. 2 extension model for development of information systems

S Zareen, A Akram, S Ahmad Khan - Applied Sciences, 2020 - mdpi.com
Featured Application This work can be applied with the Requirements Engineering Process
to elicit the security requirements for an information system's development. Abstract With …

Evaluating the threat to national information security

HM Yarovenko - 2020 - essuir.sumdu.edu.ua
An effective strategy for managing the national information security with capabilities to resist
information threats significantly impacts its further development. This study aims to assess …

Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework

C Daah, A Qureshi, I Awan, S Konur - Electronics, 2024 - mdpi.com
As financial institutions navigate an increasingly complex cyber threat landscape and
regulatory ecosystem, there is a pressing need for a robust and adaptive security …

Issues and trends in information security policy compliance

SH Bhaharin, U Asma'Mokhtar… - … on Research and …, 2019 - ieeexplore.ieee.org
In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for
information security. The basic approach to addressing information leakage threats is to …