Ensuring that sensitive information is protected is a serious concern all over the globe. Organizations often face many obstacles that can be mitigated by performing good security management practices. A prominent example of a sector in which sensitive information needs to be protected is the financial industry. The extent to which information is secured differs, and this could be explained by a number of influences, such as knowledge, culture, strategic decisions but also the availability and quality of self-assessment frameworks. A number of focus areas are involved in securing information, such as information security and cyber security. For a number of domains, such as information security, but also software product management, it has b...
Ensuring a solid security posture is critical for businesses of all sizes, and small and medium-size...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity sta...
Information security is mainly a topic that is considered to be information technology related. Howe...
An organized strategy to ensure the security of an organization is an information security managemen...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and i...
Cybersecurity is important to protect data from damage or theft. Researching cybersecurity is a vita...
The paper proposes a comprehensive information security maturity model (ISMM) that addresses both te...
Ph.D. (Informatics)Abstract: Subject to much focus and research, Information Security was initially ...
Advancing digitization in companies leads to increased importance of information and their security....
The COVID-19 pandemic has spurred organizations to move up their digitalization timeline to cope and...
Undoubtedly, in today’s new business information has donated the most competitive advantage for the ...
Summary: The importance of Information Security cannot be emphasised enough. It is therefore necessa...
Information has become a very important asset in most organizations today. For this reason, it is im...
Ensuring a solid security posture is critical for businesses of all sizes, and small and medium-size...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity sta...
Information security is mainly a topic that is considered to be information technology related. Howe...
An organized strategy to ensure the security of an organization is an information security managemen...
Each organization faces threats and risks in daily operations. One of the main risks is how to asses...
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and i...
Cybersecurity is important to protect data from damage or theft. Researching cybersecurity is a vita...
The paper proposes a comprehensive information security maturity model (ISMM) that addresses both te...
Ph.D. (Informatics)Abstract: Subject to much focus and research, Information Security was initially ...
Advancing digitization in companies leads to increased importance of information and their security....
The COVID-19 pandemic has spurred organizations to move up their digitalization timeline to cope and...
Undoubtedly, in today’s new business information has donated the most competitive advantage for the ...
Summary: The importance of Information Security cannot be emphasised enough. It is therefore necessa...
Information has become a very important asset in most organizations today. For this reason, it is im...
Ensuring a solid security posture is critical for businesses of all sizes, and small and medium-size...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity sta...