Access the full text.
Sign up today, get DeepDyve free for 14 days.
日本規格協会 (2013)
情報技術-セキュリティ技術-情報セキュリティ管理策の実践のための規範 : ISO/IEC 27002 = Information technology-Security techniques-Code of practice for information security controls : ISO/IEC 27002
Rui Gomes, Jorge Ribeiro (2009)
The Main Benefits of COBIT in a High Public Educational Institution - a Case Study
R. Solms (1998)
Information security management (1): why information security is so importantInf. Manag. Comput. Secur., 6
A. Alhogail (2015)
Design and validation of information security culture frameworkComput. Hum. Behav., 49
Hamed Taherdoost, Saman Chaeikar, M. Jafari, Nakisa Kar (2013)
Definitions and Criteria of CIA Security Triangle in Electronic Voting System
Loai Omari (2016)
It governance evaluation: Adapting and adopting the COBIT framework for public sector organisations
Rayner Alfred, Haviluddin, Patricia Anthony (2012)
The utilization of COBIT framework within IT governance: A study of literature
Steven Schlarman (2007)
Selecting an IT Control FrameworkEDPACS, 35
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks employed in organizations helps to protect the employee and user information which is essential as it puts employees and clients at ease that their information is secure. Identifying the ideal frameworks for an organization is important. However, this process can be a bit tricky as a lot has to be considered to identify the best framework for the organization.
HOLISTICA – Journal of Business and Public Administration – de Gruyter
Published: Aug 1, 2020
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.