Have a personal or library account? Click to login

References

  1. Alina Mihaela Dima, Simona Vasilache (2009). ANN model for corporate credit risk assessment, 2009 International Association of Computer Science and Information Technology Spring Conference (IACSIT-SC2009), International Conference on Information and Financial Engineering (ICIFE2009), Singapore, 17-19 April 2009, pp. 94-98.
  2. Paul Cichonski, Thomas Millar, Tim Grance, Karen Scarfone (2012). Computer Security Incident Handling Guide [NIST SP 800-61 Rev. 2], Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
  3. Calder Alan, Watkins Steve G. (2009), Information Security Risk Management for ISO27001 / ISO27002, IT Governance Publishing, ISBN 978-1-84928-044-0
  4. Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan (2012), Information Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level, International Journal of Engineering and Technology Volume 2 No. 1
  5. By Barnaby Lewis (2019), How to tackle today’s IT security risks, retrieved from https://www.iso.org/news/ref2360.html
  6. Carol Hsu, Tawei Wang, Ang Lu (2016), The Impact of ISO 27001 Certification on Firm Performance, Koloa, HI, USA, ISBN 978-0-7695-5670-310.1109/HICSS.2016.600
  7. Eleni Philippoua, Sylvain Frey, Awais Rashid (2020), Contextualising and aligning security metrics and business objectives: A GQM-based methodology, Computers & Security, Volume 8810.1016/j.cose.2019.101634
  8. Jaya Sharma, Why do organizations need ISO 27001?, Retrieved from https://kratikal.com/blog
  9. ISO. (2017). ISO Survey. Retrieved from www.iso.org
  10. ISO27000. (2018). Information technology. Security techniques. Information security management systems. Overview and vocabulary. Retrieved from www.iso.org
  11. ISO27001. (2013). Information technology. Security techniques. Information security management systems. Requirements. Retrieved from www.iso.org
  12. ISO27002. (2013). Information technology. Security techniques. Code of practice for information security controls. Retrieved from www.iso.org
  13. ISO27005. (2016). Information technology. Security techniques. Information security risk management. Retrieved from www.iso.org
  14. LukeBriner (2018), Making information security easier, Computer Fraud & Security, Issue 4, 10-1410.1016/S1361-3723(18)30033-2
Language: English
Page range: 521 - 530
Published on: Jul 27, 2020
Published by: Bucharest University of Economic Studies
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2020 Liviu Adrian Stoica, Robert Adrian Candoi-Savu, published by Bucharest University of Economic Studies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.