When modern organizations are considered, information is one of the most critical assets that need to be protected against external and internal threats. Since there is a massive increase in threats related to information technology applications, information security has become a significant factor. Moreover, information security ensures business continuity and reduce the risk of damage to an organization's reputation. Therefore, internal information security management is a critical factor. There are several factors which affect implementation of information security management. This research is focused on finding out a methodology for information security management in software development companies. To achieve objective informat...
Information security has moved a long way from the early days when physical security, together with ...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
This paper reports a systematic literature review that explores challenges related to information se...
This study investigates the critical relationship between organizational system development policies...
News about various information security attacks against companies appears almost every day. The sour...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information security has become a much discussed subject all over the world in the last few years. T...
[[abstract]]This article uses qualitative research and grounded theories, to explore information sec...
More and more businesses and services are depending on software to run their daily operations and bu...
In the Fourth Industrial Revolution era, data-based business management activities among enterprises...
An organized strategy to ensure the security of an organization is an information security managemen...
Security is a property of an entire system in context. Rather than a software product; so a thorough...
Especially in software development information security is an everlasting race against changing thre...
PhD. (Informatics)Organizations become daily more dependent on information. Information is captured,...
Information technology has dramatically increased online business opportunities; however these oppor...
Information security has moved a long way from the early days when physical security, together with ...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
This paper reports a systematic literature review that explores challenges related to information se...
This study investigates the critical relationship between organizational system development policies...
News about various information security attacks against companies appears almost every day. The sour...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information security has become a much discussed subject all over the world in the last few years. T...
[[abstract]]This article uses qualitative research and grounded theories, to explore information sec...
More and more businesses and services are depending on software to run their daily operations and bu...
In the Fourth Industrial Revolution era, data-based business management activities among enterprises...
An organized strategy to ensure the security of an organization is an information security managemen...
Security is a property of an entire system in context. Rather than a software product; so a thorough...
Especially in software development information security is an everlasting race against changing thre...
PhD. (Informatics)Organizations become daily more dependent on information. Information is captured,...
Information technology has dramatically increased online business opportunities; however these oppor...
Information security has moved a long way from the early days when physical security, together with ...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
This paper reports a systematic literature review that explores challenges related to information se...