Advanced Search Results For "information security"
Your filters
A Simple Assessment of Information Security Awareness in Hospital Staff Across Five Danish Regions.
Publication Type: Academic Journal
Source(s): Studies in health technology and informatics [Stud Health Technol Inform] 2021 May 27; Vol. 281, pp. 635-639.
Abstract: Information Security Awareness among employees in healthcare has become an essential part in safeguarding health information systems against cyber-attacks and data breaches. We present three simple security awareness questions that can be included in l...
Defining Information Security.
Publication Type: Academic Journal
Source(s): Science and engineering ethics [Sci Eng Ethics] 2019 Apr; Vol. 25 (2), pp. 419-441. Date of Electronic Publication: 2017 Nov 15.
Abstract: This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a defin...
A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Apr 30; Vol. 22 (9). Date of Electronic Publication: 2022 Apr 30.
Abstract: Due to the competitive relationship among different smart factories, equipment manufacturers cannot integrate the private information of all smart factories to train the intelligent manufacturing equipment fault prediction model and improve the accurac...
Indirect effect of management support on users' compliance behaviour towards information security policies.
Publication Type: Academic Journal
Source(s): Health information management : journal of the Health Information Management Association of Australia [Health Inf Manag] 2018 Jan; Vol. 47 (1), pp. 17-27. Date of Electronic Publication: 2017 Mar 30.
Abstract: Background: Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modif...
[Application of classified protection of information security in the information system of air pollution and health impact monitoring].
Publication Type: Academic Journal
Source(s): Wei sheng yan jiu = Journal of hygiene research [Wei Sheng Yan Jiu] 2018 Jan; Vol. 47 (1), pp. 103-107.
Abstract: Objective: To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system.Methods: According to the re...
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
Publication Type: Academic Journal
Source(s): Безопасность информационных технологий, Vol 30, Iss 3, Pp 16-29 (2023)
Abstract: The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities. The security information and event ...
Formation of the Information and Psychological Security System of the Collective Security Treaty Organization
Publication Type: Academic Journal
Source(s): Евразийская интеграция: экономика, право, политика, Vol 17, Iss 2, Pp 132-142 (2023)
Abstract: The present study is devoted to the analysis of the process of formation at the CS TO level of a system of collective actions to ensure information and psychological security.Aim. To substantiate the relevance of the formation of the information and ps...
THE RELATIONSHIP BETWEEN QUALITY AND INFORMATION SECURITY MANAGEMENT, AND SAFETY CLIMATE IN HEALTHCARE
Publication Type: Academic Journal
Source(s): International Journal for Quality Research, Vol 17, Iss 3, Pp 815-832 (2023)
Abstract: The purpose of this paper is to determine the functional relationships among information security, patient safety climate, and quality management dimensions within a healthcare system. A cross-sectional, observational study was conducted among the heal...
Cybersecurity and the scope of designing information security systems in the organization
Publication Type: Academic Journal
Source(s): Journal of Modern Science, Vol 51, Iss 2, Pp 141-173 (2023)
Abstract: Objectives According to the authors, such an assumption requires describing the impact of information security management on the proper, efficient functioning of the organization in cyberspace. Increasingly, the concept of information is becoming a key...
ADOPTION OF THE INFORMATION SECURITY MANAGEMENT SYSTEM STANDARD ISO/IEC 27001: A STUDY AMONG GERMAN ORGANIZATIONS
Publication Type: Academic Journal
Source(s): International Journal for Quality Research, Vol 17, Iss 3, Pp 747-768 (2023)
Abstract: Against the backdrop of numerous security breaches and cyber-attacks, organizations need to take measures to secure their data and information. However, the well-known management system standard ISO/IEC 27001 for information security has shown a lower ...