Information security governance challenges and critical success factors: Systematic review

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Computers & security, 2020 - Elsevier
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …

TD2SecIoT: temporal, data-driven and dynamic network layer based security architecture for industrial IoT

D Dejene, B Tiwari, V Tiwari - IJIMAI, 2020 - dialnet.unirioja.es
Resumen The Internet of Things (IoT) is an emerging technology, which comprises wireless
smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart …

[PDF][PDF] Best practice framework for information technology security governance in Indonesian government

R Yuliana, ZA Hasibuan - International Journal of …, 2022 - pdfs.semanticscholar.org
Information technology security is crucial for a digital government system to have so that the
continuity of business processes can run smoothly. However, the current best practice of …

Prototype to Identify the Capacity in Cybersecurity Management for a Public Organization

R Romero Izurieta, MS Toapanta Toapanta… - 2023 - repositorio.ister.edu.ec
Public organizations are subjected to a complex security situation, which can be addressed
by permanently strengthening and evaluating their cybersecurity capabilities. The objective …

Model to Optimize the Management of Strategic Projects Using Genetic Algorithms in a Public Organization

R Romero Izurieta, SM Toapanta Toapanta… - Information, 2022 - mdpi.com
Public organizations lack adequate models and methods to efficiently support and manage
processes related to information security and IT investments. The objective is to optimize the …

Model to Optimize the Management of Strategic Projects Using Genetic Algorithms in a Public Organization

RR Izurieta, SMT Toapanta, LJC Morales… - …, 2022 - search.proquest.com
Public organizations lack adequate models and methods to efficiently support and manage
processes related to information security and IT investments. The objective is to optimize the …

[图书][B] Evidence-based Cybersecurity: Foundations, Research, and Practice

PL Pomerleau, D Maimon - 2022 - taylorfrancis.com
The prevalence of cyber-dependent crimes and illegal activities that can only be performed
using a computer, computer networks, or other forms of information communication …

Analysis of the Information Security of Public Organizations in Ecuador

RR Izurieta, LJC Morales… - 2021 International …, 2021 - ieeexplore.ieee.org
Public organizations have the responsibility by law to manage sensitive data that must be
shared; the problem was found that organizations are very vulnerable and that computer …

Applied cryptography in designing e-learning platforms

MI Mihailescu, SL Nita… - The International Scientific …, 2020 - search.proquest.com
Cryptography plays an important role when we are designing and implementing electronic
systems. Two directions will be covered, providing privacy and securing e-learning. First one …

[PDF][PDF] Laporan Penelitian Best Practice Framework for Information Technology Security in Indonesia

R Yuliana - 2023 - repository.ar-raniry.ac.id
Ketika peretas semakin pintar, kebutuhan untuk melindungi aset digital dan perangkat
jaringan Anda semakin besar. Ancaman terhadap keamanan TI dapat muncul dalam …