Integrated framework for cybersecurity auditing

OMM Al-Matari, IMA Helal, SA Mazen… - … Security Journal: A …, 2021 - Taylor & Francis
Organizations receive several cyberattacks on their daily operations, thus the need for
auditing. However, there is no unified tool to perform cybersecurity audit tasks which are …

Key issues in data center security: An investigation of government audit reports

KJ Knapp, GD Denney, ME Barner - Government Information Quarterly, 2011 - Elsevier
The rising volume of electronic data, the growth in cloud computing and the need for secure
and affordable large-scale data storage all contribute to the increasing reliance on data …

Developing and validating a common body of knowledge for information privacy

R Lavranou, A Tsohou - Information & Computer Security, 2019 - emerald.com
Purpose This paper aims to present a common body of knowledge (CBK) for the field of
information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide …

Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions

D Barrett - Journal of Digital Forensics, Security and Law, 2017 - commons.erau.edu
The change in business models to incorporate a wide variety of cloud computing
environments has resulted in the escalation of computer crimes in the areas of security …

How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study

BG Apple - 2017 - search.proquest.com
This qualitative study identified those factors that influence the perceived effectiveness of
traditional IA control frameworks. The key factors examined in this study are risk …

What Privacy and Confidentiality Mechanisms are used in the Electronic Health Records (Clinical Master and ICT4 M-Power systems)? A design Science Research …

G Orishaba, D Serunjogi - Student's Journal of Health …, 2022 - sjhresearchafrica.org
Background: Patients are required to share information with their doctors to facilitate correct
diagnosis and determination of treatment, especially to avoid adverse drug interactions …

ОБОРОННЫЙ КОМПЛЕКС-НАУЧНО-ТЕХНИЧЕСКОМУ ПРОГРЕССУ РОССИИ

ДК ЩЕГЛОВ, АГ САЙБЕЛЬ, ДА ФЁДОРОВ - … РОССИИ Учредители: Научно … - elibrary.ru
Описан формализованный подход к формированию прогнозной оценки сроков и
стоимости разработки военно-технических систем на основе метода аналогий и …

Data Center Security: Analysis of Two Audit Reports

K Knapp, GD Denney, ME Barner - 2009 - aisel.aisnet.org
The increasing volume of electronic data, the need for secure storage of this data and the
necessity for organizations to prepare for disaster are key reasons promoting the …

[引用][C] AN ENCRYPTION AND DECRYPTION TOOL FOR PRIVACY AND CONFIDENTIALITY OF PATIENTS'DATA IN ELECTRONIC

O GLORIOUS - 2022 - MAKERERE UNIVERSITY