Introduction ISO/IEC 27002 standard is considered in the area of information security management. Its characteristics has made it applicable in various organizations and applied fields. In this study the status of information security management performance was examined in the Libraries of State Medical Sciences Universities in Tehran based on ISO/IEC 27002. Methods: In this study that is an applied research and its method is descriptive/ analytical, all of the senior and intermediate managers in the libraries of state medical sciences Universities in Tehran cosist the research population. 50 managers participated in the current study. The data were collected with the questionnaire. Results: With regard to the 11 indexes for observing the I...
Information security is intended to protect the confidentiality, integrity and availability of infor...
The master thesis has analytical character and focuses on information security issues in enterprises...
Organizations have different takes on Information Security Management Systems (ISMS) since security ...
This chapter introduces major information security management methods and standards, and particu- la...
With the increasing significance of information technology, there is an urgent need for adequate mea...
Information security management is very important to use, especially for educational instutions, bec...
Technological shift has become significant and an area of concern in the health sector with regard t...
Information is currently the most important asset of modern companies. Its security is therefore ver...
This research aimed to study the perceived threats of information security, their frequency of occur...
Information security is a problem effected business process of an organization, so it needs special ...
The rapid development of technology makes threats to information systems increasing. Management and ...
The main purpose of the information systems security is to maintain 3 (three) attributes: confidenti...
In this paper we attempt to find the reasons for low adoption of the international standard ISO/IEC ...
The flexibility of digital information can be regarded as a great strength. As software and hardware...
The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certific...
Information security is intended to protect the confidentiality, integrity and availability of infor...
The master thesis has analytical character and focuses on information security issues in enterprises...
Organizations have different takes on Information Security Management Systems (ISMS) since security ...
This chapter introduces major information security management methods and standards, and particu- la...
With the increasing significance of information technology, there is an urgent need for adequate mea...
Information security management is very important to use, especially for educational instutions, bec...
Technological shift has become significant and an area of concern in the health sector with regard t...
Information is currently the most important asset of modern companies. Its security is therefore ver...
This research aimed to study the perceived threats of information security, their frequency of occur...
Information security is a problem effected business process of an organization, so it needs special ...
The rapid development of technology makes threats to information systems increasing. Management and ...
The main purpose of the information systems security is to maintain 3 (three) attributes: confidenti...
In this paper we attempt to find the reasons for low adoption of the international standard ISO/IEC ...
The flexibility of digital information can be regarded as a great strength. As software and hardware...
The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certific...
Information security is intended to protect the confidentiality, integrity and availability of infor...
The master thesis has analytical character and focuses on information security issues in enterprises...
Organizations have different takes on Information Security Management Systems (ISMS) since security ...