Journal articles on the topic 'ISO/IEC 27004'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ISO/IEC 27004.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Winarni, Ade. "Penilaian Tingkat Efektivitas Penerapan Keamanan Sistem Informasi Menggunakan Iso/Iec 27004:2009 Dan Iso/Sni 27001:2009 (Studi." Jurnal Bangkit Indonesia 5, no. 2 (October 31, 2016): 90. http://dx.doi.org/10.52771/bangkitindonesia.v5i2.77.
Full textAldya, A. P., S. Sutikno, and Y. Rosmansyah. "Measuring effectiveness of control of information security management system based on SNI ISO/IEC 27004: 2013 standard." IOP Conference Series: Materials Science and Engineering 550 (August 23, 2019): 012020. http://dx.doi.org/10.1088/1757-899x/550/1/012020.
Full textDisterer, Georg. "ISO/IEC 27000, 27001 and 27002 for Information Security Management." Journal of Information Security 04, no. 02 (2013): 92–100. http://dx.doi.org/10.4236/jis.2013.42011.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (June 8, 2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textال فيحان, اثير عبد الهادي, and عامر حمدي عبد غريب. "تقييم نظام أدارة امن المعلومات في الهيئة العراقية للحاسبات والمعلوماتية على وفق المواصفة الدولية (ISO/IEC 27001:2013." Journal of Economics and Administrative Sciences 21, no. 86 (December 1, 2015): 1. http://dx.doi.org/10.33095/jeas.v21i86.764.
Full textSugianto, Anindya Dwi Lestari, Febriliyan Samopa, and Hanim Maria Astuti. "PENILAIAN DAN KONTROL RISIKO TERHADAP INFRASTRUKTUR DAN KEAMANAN INFORMASI BERDASARKAN STANDAR ISO/IEC 27001:2013 (STUDI KASUS: INSTITUT TEKNOLOGI SEPULUH NOPEMBER)." Sebatik 24, no. 1 (June 18, 2020): 96–101. http://dx.doi.org/10.46984/sebatik.v24i1.910.
Full textMauladani, Furqon, and Daniel Oranova Siahaan. "Perancangan SMKI Berdasarkan SNI ISO/IEC27001:2013 dan SNI ISO/IEC27005:2013 (Studi Kasus DPTSI-ITS)." CSRID (Computer Science Research and Its Development Journal) 10, no. 1 (March 27, 2018): 32. http://dx.doi.org/10.22303/csrid.10.1.2018.32-43.
Full textChoi, Ju-Young, Eun-Jung Choi, and Myuhng-Joo Kim. "A Comparison Study between Cloud Service Assessment Programs and ISO/IEC 27001:2013." Journal of Digital Policy and Management 12, no. 1 (January 28, 2014): 405–14. http://dx.doi.org/10.14400/jdpm.2014.12.1.405.
Full textHermawan, Wawan. "Perancangan Manajemen Risiko Keamanan Informasi pada Penyelenggara Sertifikasi Elektronik (PSrE)." Jurnal Telekomunikasi dan Komputer 9, no. 2 (August 31, 2019): 129. http://dx.doi.org/10.22441/incomtech.v9i2.6474.
Full textJendrian, Kai. "Der Standard ISO/IEC 27001:2013." Datenschutz und Datensicherheit - DuD 38, no. 8 (August 2014): 552–57. http://dx.doi.org/10.1007/s11623-014-0182-x.
Full textPordesch, Ulrich. "DIN ISO/IEC 27001-orientiertes ISMS." Datenschutz und Datensicherheit - DuD 41, no. 11 (October 31, 2017): 667–71. http://dx.doi.org/10.1007/s11623-017-0855-3.
Full textFauzi, Rokhman. "Implementasi Awal Sistem Manajemen Keamanan Informasi pada UKM Menggunakan Kontrol ISO/IEC 27002." JTERA (Jurnal Teknologi Rekayasa) 3, no. 2 (December 3, 2018): 145. http://dx.doi.org/10.31544/jtera.v3.i2.2018.145-156.
Full textAkowuah, Francis, Xiaohong Yuan, Jinsheng Xu, and Hong Wang. "A Survey of Security Standards Applicable to Health Information Systems." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 22–36. http://dx.doi.org/10.4018/ijisp.2013100103.
Full textNykänen, Riku, and Tommi Kärkkäinen. "Aligning Two Specifications for Controlling Information Security." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 46–62. http://dx.doi.org/10.4018/ijcwt.2014040104.
Full textKurnianto, Ari, Rizal Isnanto, and Aris Puji Widodo. "Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs." E3S Web of Conferences 31 (2018): 11013. http://dx.doi.org/10.1051/e3sconf/20183111013.
Full textSundari, Piski, and Wella Wella. "SNI ISO/IEC 27001 dan Indeks KAMI: Manajemen Risiko PUSDATIN (PUPR)." Ultima InfoSys : Jurnal Ilmu Sistem Informasi 12, no. 1 (June 29, 2021): 35–42. http://dx.doi.org/10.31937/si.v12i1.1701.
Full textLoomans, Dirk, and Manuela Matz. "ISO/IEC 27001:2013 — Sicherheit durch mehr Freiheit!" Wirtschaftsinformatik & Management 6, no. 2 (February 2014): 62–67. http://dx.doi.org/10.1365/s35764-014-0404-x.
Full textKholis Gunawan, Nur, Raden Budiarto Hadiprakoso, and Herman Kabetta. "Comparative Study Between the Integration of ITIL and ISO / IEC 27001 with the Integration of COBIT and ISO / IEC 27001." IOP Conference Series: Materials Science and Engineering 852 (July 21, 2020): 012128. http://dx.doi.org/10.1088/1757-899x/852/1/012128.
Full textMusyarofah, Sitta Rif’atul, and Rahadian Bisma. "Analisis kesenjangan sistem manajemen keamanan informasi (SMKI) sebagai persiapan sertifikasi ISO/IEC 27001:2013 pada institusi pemerintah." Teknologi 11, no. 1 (January 1, 2021): 1–15. http://dx.doi.org/10.26594/teknologi.v11i1.2152.
Full textPradipta, Yudhistira Candra, Yani Rahardja, and Melkior Nikolar Ngalumsine Sitokdana. "AUDIT SISTEM MANAJEMEN KEAMANAN INFORMASI PUSAT TEKNOLOGI INFORMASI DAN KOMUNIKASI PENERBANGAN DAN ANTARIKSA (PUSTIKPAN) MENGGUNAKAN SNI ISO/IEC 27001:2013." Sebatik 23, no. 2 (December 1, 2019): 352–58. http://dx.doi.org/10.46984/sebatik.v23i2.782.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full textMedve, Anna. "Model-based Framework for Change Management and Integrated Development of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (September 15, 2013): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.4225.
Full textMedve, Anna. "Model-based Framework for Change Management and Integrated Devlopment of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (September 15, 2018): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.759.
Full textPardo, César, Francisco J. Pino, and Félix Garcia. "Towards an Integrated Management System (IMS), harmonizing the ISO/IEC 27001 and ISO/IEC 20000-2 standards." International Journal of Software Engineering and Its Applications 10, no. 9 (September 30, 2016): 217–30. http://dx.doi.org/10.14257/ijseia.2016.10.9.18.
Full textLukitowati, Risma, and Kalamullah Ramli. "Assessing the Information Security Awareness of Employees in PT ABC Against International Organization for Standardization (ISO) 27001:2013." Journal of Computational and Theoretical Nanoscience 17, no. 2 (February 1, 2020): 1441–46. http://dx.doi.org/10.1166/jctn.2020.8823.
Full textMataracioglu, Tolga, and Sevgi Ozkan Yildirim. "Obstructions of Turkish Public Organizations Getting ISO/IEC 27001 Certified." International Journal of Managing Value and Supply Chains 5, no. 2 (June 2014): 1–10. http://dx.doi.org/10.5121/ijmvsc.2014.5201.
Full textالذنيبات, معاذ يوسف, عدنان عواد الشوابكة, and خيرو خلف البقور. "دور عمليات إدارة الموارد البشرية في تحقيق الأمن المعلوماتي: دراسة تطبيقية على الجامعات الحكومية السعودية." Management & Economics Research Journal 2, no. 3 (June 21, 2020): 1–23. http://dx.doi.org/10.48100/merj.v2i3.107.
Full textParadise, Paradise, Kusrini Kusrini, and Asro Nasiri. "Audit Keamanan Aplikasi E-Cash Menggunakan Iso 27001." Creative Information Technology Journal 5, no. 4 (March 19, 2020): 243. http://dx.doi.org/10.24076/citec.2018v5i4.209.
Full textKozhedub, Yuliia. "Modern aspects of updating international standards of series ISO/IEC 27000." Collection "Information technology and security" 4, no. 1 (June 30, 2016): 20–26. http://dx.doi.org/10.20535/2411-1031.2016.4.1.95921.
Full textRosa, Ferrucio De Franco, Mario Jino, Paulo Marcos Siqueira Bueno, and Rodrigo Bonacin. "Applying heuristics to the selection and prioritisation of security assessment items in software assessment: the case of ISO/IEC 27001 the case of ISO/IEC 27001." ACTA IMEKO 8, no. 2 (June 27, 2019): 12. http://dx.doi.org/10.21014/acta_imeko.v8i2.624.
Full textMaingak, Akmal Zaifullah, Candiwan Candiwan, and Listyo Dwi Harsono. "Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution." TRIKONOMIKA 17, no. 1 (September 17, 2018): 28. http://dx.doi.org/10.23969/trikonomika.v17i1.1138.
Full textKrawczyk-Jezierska, Agnieszka, and Jarosław Jezierski. "Zastosowanie normy ISO/EIC 27001 w sektorze finansowym — zakres i korzyści." Ekonomia 24, no. 2 (October 23, 2018): 107–21. http://dx.doi.org/10.19195/2084-4093.24.2.8.
Full textMaletić, Siniša. "IMPLEMENTACIJA SISTEMABEZBEDNOSTI INFORMACIJAISO/IEC 27001 U KOMPANIJI „FMS“ BEOGRAD, SA OSVRTOM NA PROCENU RIZIKA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 05 (April 15, 2019): 822–24. http://dx.doi.org/10.24867/02gi06maletic.
Full textMarcos, Antonio Folgueras, José Carlos Alva Tello, Belén Ruiz-Mezcua, and Ángel García Crespo. "Detection of Strategies in IT Organizations through an Integrated IT Compliance Model." International Journal of IT/Business Alignment and Governance 1, no. 4 (October 2010): 40–57. http://dx.doi.org/10.4018/jitbag.2010100103.
Full textMuthaiyah, Saravanan, and Thein Oak Kyaw Zaw. "ISO/IEC 27001 Implementation in SMEs: Investigation on Management of Information Assets." Indian Journal of Public Health Research & Development 9, no. 12 (2018): 2631. http://dx.doi.org/10.5958/0976-5506.2018.02112.5.
Full textChiChang Chang, PeiRan Sun, KuoHsiung Liao, and YiFen Chen. "Evaluating the ISO/IEC 27001 with Experts' Knowledge for Taiwanese Medical Center." Journal of Convergence Information Technology 6, no. 10 (October 31, 2011): 63–70. http://dx.doi.org/10.4156/jcit.vol6.issue10.9.
Full textAfrianto, Irawan, Taryana Suryana, and Sufa’atin Sufa’atin. "Pengukuran dan Evaluasi Keamanan Informasi Menggunakan Indeks KAMI - SNI ISO/IEC 27001:2009." Jurnal ULTIMA InfoSys 6, no. 1 (June 1, 2015): 43–49. http://dx.doi.org/10.31937/si.v6i1.278.
Full textCruz-Gavilánez, Yolanda de la N., and Carlos J. Martinez-Santander. "ISO / IEC 27001 aseguramiento de la calidad de la información: Línea de tiempo." Polo del Conocimiento 3, no. 6 (June 5, 2018): 478. http://dx.doi.org/10.23857/pc.v3i6.641.
Full textCulot, Giovanna, Guido Nassimbeni, Matteo Podrecca, and Marco Sartor. "The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda." TQM Journal 33, no. 7 (March 16, 2021): 76–105. http://dx.doi.org/10.1108/tqm-09-2020-0202.
Full textPutra, Mardi Yudhi, and Djajasukma Tjahjadi. "Evaluasi Keamanan Informasi Pada Perguruan Tinggi Bina Insani Berdasarkan Indeks Keamanan Informasi SNI ISO/IEC 27001." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 1 (March 19, 2018): 95–104. http://dx.doi.org/10.33558/piksel.v6i1.1404.
Full textГаршина, Вероника Викторовна, Вячеслав Алексеевич Степанцов, and Анастасия Юрьевна Данковцева. "Семантический анализ информационных рисков и угроз на основе онтологии стандарта ISO/IEC 27001." Вестник ВГУ. Серия: Системный анализ и информационные технологии, no. 4 (August 30, 2018): 73–80. http://dx.doi.org/10.17308/sait.2018.4/1255.
Full textSholikhatin, Siti Alvi, and Khairunnisak Nur Isnaini. "Analysis of Information Security Using ISO 27001 and Triangular Fuzzy Number Weighting." Jurnal Ilmiah Informatika 6, no. 1 (June 30, 2021): 43–49. http://dx.doi.org/10.35316/jimi.v6i1.1224.
Full textSanskriti Choubey and Astitwa Bhargava. "Significance of ISO/IEC 27001 in the Implementation of Governance, Risk and Compliance." International Journal of Scientific Research in Network Security and Communication 6, no. 2 (April 30, 2018): 30–33. http://dx.doi.org/10.26438/ijsrnsc/v6i2.3033.
Full textAhler, Ekaterina. "The ISO/IEC 27001 standard provides a systematic approach to information security management." Upravlenie kachestvom (Quality management), no. 1 (January 1, 2021): 36–38. http://dx.doi.org/10.33920/pro-1-2101-07.
Full textTanaamah, Andeka Rocky, and Friska Juliana Indira. "Analysis of Information Technology Security Management UKSW SIASAT Using ISO/IEC 27001:2013." IJITEE (International Journal of Information Technology and Electrical Engineering) 5, no. 2 (August 6, 2021): 68. http://dx.doi.org/10.22146/ijitee.65670.
Full textRabii, Anass, Saliha Assoul, Khadija Ouazzani Touhami, and Ounsa Roudies. "Information and cyber security maturity models: a systematic literature review." Information & Computer Security 28, no. 4 (June 6, 2020): 627–44. http://dx.doi.org/10.1108/ics-03-2019-0039.
Full textArruda, Paulo Cesar Andrade, Marcio Lima Da Silva, and Edilson Da Silva Pedro. "Um Estudo da Segurança da Informação na Propriedade Intelectual nas ICTs." Cadernos de Prospecção 13, no. 4 (July 12, 2020): 1053. http://dx.doi.org/10.9771/cp.v13i4.29512.
Full textTiszolczi, Balázs Gergely. "Fizikai biztonsági kontrollok tervezésének és alkalmazásának gyakorlata az ISO/IEC 27001 szabvány elvárásainak tükrében." Magyar Rendészet 19, no. 2-3 (2019): 233–49. http://dx.doi.org/10.32577/mr.2019.2-3.12.
Full textMaquera Quispe, Henry George, and Paola Nhataly Serpa Guillermo. "GESTIÓN DE ACTIVOS BASADO EN ISO/IEC 27002 PARA GARANTIZAR SEGURIDAD DE LA INFORMACIÓN." Ciencia & Desarrollo, no. 21 (June 11, 2019): 100–112. http://dx.doi.org/10.33326/26176033.2017.21.736.
Full textAndriana, Myra, Irwan Sembiring, and Kristoko Dwi Hartomo. "SOP of Information System Security on Koperasi Simpan Pinjam Using ISO/IEC 27002:2013." Jurnal Transformatika 18, no. 1 (July 29, 2020): 25. http://dx.doi.org/10.26623/transformatika.v18i1.2020.
Full text