Open Access
Issue
E3S Web Conf.
Volume 31, 2018
The 2nd International Conference on Energy, Environmental and Information System (ICENIS 2017)
Article Number 11013
Number of page(s) 6
Section 11. Smart Information Systems
DOI https://doi.org/10.1051/e3sconf/20183111013
Published online 21 February 2018
  1. Andriaole, S.. IGTT Governance in the Trenhes. 57-62 (2016) [Google Scholar]
  2. E. Bilbao, A. Bilbao, K. Pecina, and R. Estremera, Physical and Logical Security Management Organization Model Based On ISO 31000 and ISO 27001. IEEE, 1-5, (2011). [Google Scholar]
  3. E. Bilbao, A. Bilbao, K. Pecina, Physical Logical Security Risk Analysis Model. IEEE, 1-7, (2011). [Google Scholar]
  4. GEIT, Global Status Report on the Governance of Enterprise It. USA: ISACA, (2011). [Google Scholar]
  5. M. Gerber, and Solms, R. v. Information Security Requirements - Interprenting at Legal Aspects. Computers & Security, 124-135, (2008). [Google Scholar]
  6. E. Humphreys, Information security management standards: Compliance,. Information Security technical Report, 247-255, (2008). [CrossRef] [Google Scholar]
  7. C. Pelnekar, Planning for and Implementing ISO 27001. Journal ISACA, 1-8, (2011). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.