The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

[HTML][HTML] Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework

K Razikin, B Soewito - Egyptian Informatics Journal, 2022 - Elsevier
The proposed work was a recommendation model for designing cyber security decision
support, in building an information technology security system based on risk analysis and …

Building relationships with customer 4.0 in the era of marketing 4.0: the case study of innovative enterprises in Poland

W Wereda, J Woźniak - Social Sciences, 2019 - mdpi.com
(1) Background: Contemporary enterprises are putting more and more emphasis on shaping
lasting and effective relationships with clients. This is not an easy task, especially in the …

Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

An integrated process-based HSE management system: A case study

V Hajipour, H Amouzegar, A Gharaei, MSG Abarghoei… - Safety Science, 2021 - Elsevier
Nowadays, companies are not only focused on achieving goals such as cost savings and
increasing efficiency and profitability, but are also making a great deal of effort to add other …

Ensuring privacy in the application of the Brazilian general data protection law (LGPD)

ETV de Castro, GRS Silva, ED Canedo - Proceedings of the 37th ACM …, 2022 - dl.acm.org
Currently, many organizations make use of the personal data of their users. Personal data is
the set of information that can lead to the identification of a specific person and, therefore …

Формализованная модель аудита информационной безопасности организации на предмет соответствия требованиям стандартов

АА Сиротский - Безопасность информационных технологий, 2021 - bit.mephi.ru
Аннотация Задача аудита информационной безопасности заключается в проверке
соответствия системы защиты объекта совокупности критериев, определяющих …

Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification

J Jevelin, A Faza - Journal of Information Systems and Informatics, 2023 - journal-isi.org
This study addresses the urgent need for robust data security by evaluating the Information
Security Management System (ISMS) of a private contractor poised for ISO 27001 …

Managing Risks in the Improved Model of Rolling Mill Loading: A Case Study

NV Syreyshchikova, DY Pimenov… - Journal of Risk and …, 2021 - mdpi.com
This article reflects the main sources of risks for metallurgical enterprises in Russia,
presenting the implementation of an innovative approach to increasing the competitiveness …

Teachers' digital skills in tourism sector to tackle the challenges of tourism enterprises

AM Moldovan - International Conference Interdisciplinarity in …, 2022 - Springer
There is need to equip teachers in the tourism sector with the necessary skills for being able
to promote entrepreneurship education and social entrepreneurship among pupils. This …