Open Access
E3S Web Conf.
Volume 328, 2021
International Conference on Science and Technology (ICST 2021)
Article Number 04012
Number of page(s) 5
Section Information System, Big Data, Design Application, IOT
Published online 06 December 2021
  1. O. M. e. all, “Methodology for Creating, Implementation and System Effectiveness Evaluation of the Business Processes Information Security System,” in International Conference of Quality Management, Transport and Information Security, Information System, Yaroslavl, Russia, (2020). [Google Scholar]
  2. e. Semi Yulianto, “Information security maturity model: A best practice driven approach to PCI DSS compliance,” in IEEE, Bali, Indonesia, (2016). [Google Scholar]
  3. J. A. et.all, “Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations,” in 2012 Seventh International Conference on Availability, Reliability and Security, Prague, Czech Republic, (2012). [Google Scholar]
  4. e. Sevgi Ozkan, “Collaborative risk method for information security management practices: A case context within Turkey,” International Journal of Information Management, vol. 30, no. 6, pp. 567-572, (2010). [CrossRef] [Google Scholar]
  5. N.V. Syreyshchikova, “Information Safety Process Development According to ISO 27001 for an Industrial Enterprise,” Manufacturing System, vol. 32, pp. 278-285, (2019). [Google Scholar]
  6. Y. Zhiwei, “A Survey on the Evolution of Risk Evaluation for Information Systems Security,” Energy Procedia, vol. 17, pp. 1288-1294, (2012). [CrossRef] [Google Scholar]
  7. M. S. et.all, “Information security evaluation using KAMI index for security improvement in BMKG,” in 2017 5th International Conference on Cyber and IT Service Management (CITSM), Denpasar, Indonesia, (2017). [Google Scholar]
  8. e. Syopiansyah Jaya Putra, “Information Security Risk Management Analysis Using ISO 27005: 2011 For The Telecommunication Company,” in 2020 8th International Conference on Cyber and IT Service Management (CITSM), Pangkal, Indonesia, (2020). [Google Scholar]
  9. e. Muhammad Yasin, “Designing Information Security Governance Recommendations and Roadmap Using COBIT 2019 Framework and ISO 27001:2013 (Case Study Ditreskrimsus Polda XYZ),” in 2020 14th International Conference on Telecommunication Systems, Services, and Applications (TSSA, Bandung, Indonesia, (2020). [Google Scholar]
  10. S. Zhang, “A model for evaluating computer network security systems with 2-tuple linguistic information,” Computers and Mathematics with Application, vol. 62, no. 4, pp. 1916-1922, (2011). [CrossRef] [Google Scholar]
  11. e. Dmitri Palko, “Model of Information Security Critical Incident Risk Assessment,” in 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, (2020). [Google Scholar]
  12. V. Monev, “Organisational Information Security Maturity Assessment Based on ISO 27001 and ISO 27002,” in 2020 International Conference on Information Technologies (InfoTech), Varna, Bulgaria, (2020). [Google Scholar]
  13. I. V. Mashkina, “Issues of information security control in virtualization segment of company information system,” in 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, Russia, (2016). [Google Scholar]
  14. e. a. Milena, “Information system integrated security,” in 2008 7th Computer Information Systems and Industrial Management Applications, Ostrava, Czech Republic, (2008). [Google Scholar]
  15. e. ChristopherSchmitz, “LiSRA: Lightweight Security Risk Assessment for decision support in information security,” Computers and Security, vol. 90, p. 101656, (2020). [CrossRef] [Google Scholar]
  16. e. Mariana Gerber, “Information security requirements – Interpreting the legal aspects,” Computers and Security, vol. 27, pp. 124-135, (2008). [CrossRef] [Google Scholar]
  17. e. ChristopherSchmitz, “Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities,” Computers and Secutrity, vol. 108, p. 102306, (2021). [CrossRef] [Google Scholar]
  18. e. Nelli V. Syreyshchikova, “Information Safety Process Development According to ISО 27001 for an Industrial Enterprise,” Procedia Manufacturing, vol. 32, pp. 278-285, (2019). [CrossRef] [Google Scholar]
  19. G. Pernul, “Information systems security: Scope, state-of-the-art, and evaluation of techniques,” International Journal of Information Management, vol. 15, no. 3, pp. 165-180, (1995). [CrossRef] [Google Scholar]
  20. S. C. Patel, “Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements,” International Journal of Information Management, vol. 28, no. 6, pp. 483-491, (2008). [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.