An inability to handle IT-related security incidents can have devastating effects on both organizations and society at large. The European Union Agency for Network and Information Security (ENISA) emphasizes that cyber-security incidents affecting critical information infrastructures may simultaneously create significant negative impacts for several countries, and when incidents strike, the primary business processes of many organizations may be jeopardized. For example, the Swedish civil contingencies agency, MSB, reported in 2011 that a major Swedish IT services provider caused an IT-related security incident which in turn created large operational disruptions for a number of public and private organizations in Sweden. The management of I...
This article provides a maturity model for information security for healthcare organizations in the ...
Successful management of incidents that threaten an organization's computer security is a complex en...
The paper proposes a comprehensive information security maturity model (ISMM) that addresses both te...
An inability to handle IT-related security incidents can have devastating effects on both organizati...
In this early stage paper we present a draft of an IT Security Risk Escalation Capability Maturity M...
Critical infrastructures are vital services, and attacks on such systems affect people's social and ...
This paper reports the primary results of a design science research study to deal with the problem o...
An organized strategy to ensure the security of an organization is an information security managemen...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
As our dependence on IT systems increases, evaluating the dependability of critical IT systems becom...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
Information system (IS) incidents are on the rise. With low manning and undertrained information sec...
Successful management of incidents that threaten an organizations computer security is a complex end...
This article provides a maturity model for information security for healthcare organizations in the ...
Successful management of incidents that threaten an organization's computer security is a complex en...
The paper proposes a comprehensive information security maturity model (ISMM) that addresses both te...
An inability to handle IT-related security incidents can have devastating effects on both organizati...
In this early stage paper we present a draft of an IT Security Risk Escalation Capability Maturity M...
Critical infrastructures are vital services, and attacks on such systems affect people's social and ...
This paper reports the primary results of a design science research study to deal with the problem o...
An organized strategy to ensure the security of an organization is an information security managemen...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
As our dependence on IT systems increases, evaluating the dependability of critical IT systems becom...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
Information system (IS) incidents are on the rise. With low manning and undertrained information sec...
Successful management of incidents that threaten an organizations computer security is a complex end...
This article provides a maturity model for information security for healthcare organizations in the ...
Successful management of incidents that threaten an organization's computer security is a complex en...
The paper proposes a comprehensive information security maturity model (ISMM) that addresses both te...