A mini literature review on integrating cybersecurity for business continuity

S Altaha, MMH Rahman - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Governments, organizations, and companies shall implement some measures to ensure the
security and continuity of their business operations especially those with high criticality and …

[HTML][HTML] Conceptual framework and documentation standards of cystoscopic media content for artificial intelligence

O Eminaga, TJ Lee, J Ge, E Shkolyar, M Laurie… - Journal of biomedical …, 2023 - Elsevier
Background The clinical documentation of cystoscopy includes visual and textual materials.
However, the secondary use of visual cystoscopic data for educational and research …

Modelling of Fuzzy Expert System for an Assessment of Security Information Management System UIS (University Information System)

L Sikman, N Sarajlic - Tehnički vjesnik, 2022 - hrcak.srce.hr
Sažetak Several methodologies based on the international standard ISO/IEC 27001 have
been developed for modelling information security management systems within higher …

[PDF][PDF] Adapting ISO/IEC 27001 Information Security Management Standard to SMEs

N Ramadhan, U Rose - 2022 - diva-portal.org
Information security management standards play an essential role when it comes to
enabling organizations to manage information security controls of various operations. There …

An Overview of Security and Risk Management in Business Intelligence Systems

I Stankov, D Gotseva - 2020 III International Conference on …, 2020 - ieeexplore.ieee.org
In modern business taking right and tamely decisions is of great importance. Business
intelligence systems substantially ease the taking of management decisions which are …

Inadequacy of Existing Security Management Frameworks in Addressing Internet of Things (IoT) Cybersecurity-Related Risks

FC Baker - 2021 - search.proquest.com
Cybersecurity risk management has become a necessary part of any risk management
strategy. The problem addressed in this study is the Internet of Things (IoT) cybersecurity …

Experience and Qualifications Required for a Chief Information Security Officer: An e-Delphi Study

S Cotton - 2022 - search.proquest.com
No consensus exists about the level of experience and qualifications required for a chief
information security officer (CISO) needed for a medium to large business (over 3,000 …

[PDF][PDF] PROTECCIÓN EN REDES: TENDENCIAS, DESARROLLOS PROPUESTOS Y UNA GUÍA DE SEGURIDAD

AA Cristian, LI John, MA Viviana, RM Juan… - 2023 - researchgate.net
La seguridad de las redes es un aspecto crítico que no debe pasarse por alto en ninguna
empresa u organización, sin importar su tamaño. Con el constante aumento en la …

The Exploration of Cyber-Security Information for Home Users: A Qualitative Exploratory Case Study

S Cohen - 2022 - search.proquest.com
Home users of computers that do not have technology experience do not have accurate and
consistent cybersecurity awareness or standardized guidance, which can lead to an …

[PDF][PDF] Diagnóstico del nivel de seguridad para una pyme del sector ambiental gestoras residuos peligrosos

JD Ardila-Puerto, DP Bulla-Orjuela, C BLANCO - 2022 - repository.ucatolica.edu.co
Este trabajo está basado en la estructuración de un apoyo analítico evalúa las acciones
ejecutadas por una empresa para fortalecer la seguridad de la información con respecto a …