Integrated framework for cybersecurity auditing
Organizations receive several cyberattacks on their daily operations, thus the need for
auditing. However, there is no unified tool to perform cybersecurity audit tasks which are …
auditing. However, there is no unified tool to perform cybersecurity audit tasks which are …
Key issues in data center security: An investigation of government audit reports
KJ Knapp, GD Denney, ME Barner - Government Information Quarterly, 2011 - Elsevier
The rising volume of electronic data, the growth in cloud computing and the need for secure
and affordable large-scale data storage all contribute to the increasing reliance on data …
and affordable large-scale data storage all contribute to the increasing reliance on data …
Developing and validating a common body of knowledge for information privacy
R Lavranou, A Tsohou - Information & Computer Security, 2019 - emerald.com
Purpose This paper aims to present a common body of knowledge (CBK) for the field of
information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide …
information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide …
Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions
D Barrett - Journal of Digital Forensics, Security and Law, 2017 - commons.erau.edu
The change in business models to incorporate a wide variety of cloud computing
environments has resulted in the escalation of computer crimes in the areas of security …
environments has resulted in the escalation of computer crimes in the areas of security …
How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study
BG Apple - 2017 - search.proquest.com
This qualitative study identified those factors that influence the perceived effectiveness of
traditional IA control frameworks. The key factors examined in this study are risk …
traditional IA control frameworks. The key factors examined in this study are risk …
What Privacy and Confidentiality Mechanisms are used in the Electronic Health Records (Clinical Master and ICT4 M-Power systems)? A design Science Research …
G Orishaba, D Serunjogi - Student's Journal of Health …, 2022 - sjhresearchafrica.org
Background: Patients are required to share information with their doctors to facilitate correct
diagnosis and determination of treatment, especially to avoid adverse drug interactions …
diagnosis and determination of treatment, especially to avoid adverse drug interactions …
ОБОРОННЫЙ КОМПЛЕКС-НАУЧНО-ТЕХНИЧЕСКОМУ ПРОГРЕССУ РОССИИ
ДК ЩЕГЛОВ, АГ САЙБЕЛЬ, ДА ФЁДОРОВ - … РОССИИ Учредители: Научно … - elibrary.ru
Описан формализованный подход к формированию прогнозной оценки сроков и
стоимости разработки военно-технических систем на основе метода аналогий и …
стоимости разработки военно-технических систем на основе метода аналогий и …
Data Center Security: Analysis of Two Audit Reports
K Knapp, GD Denney, ME Barner - 2009 - aisel.aisnet.org
The increasing volume of electronic data, the need for secure storage of this data and the
necessity for organizations to prepare for disaster are key reasons promoting the …
necessity for organizations to prepare for disaster are key reasons promoting the …
[引用][C] AN ENCRYPTION AND DECRYPTION TOOL FOR PRIVACY AND CONFIDENTIALITY OF PATIENTS'DATA IN ELECTRONIC
O GLORIOUS - 2022 - MAKERERE UNIVERSITY