Have a personal or library account? Click to login
Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management Systems Cover

Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management Systems

Open Access
|Jul 2024

References

  1. BSI. (2020). <em>Orientation guide to documentation of compliance according to Section 8a (3) BSIG</em>.
  2. European Commission (2003). <em>SME definition</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://single-market-economy.ec.europa.eu/smes/sme-definition_en">https://single-market-economy.ec.europa.eu/smes/sme-definition_en</ext-link>
  3. European Commission (2021). <em>Commission staff working document evaluation of Recommendation of 6 May 2003 concerning the definition of micro, small and mediumsized enterprises (2003/361/EC)</em>, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://ec.europa.eu/transparency/documents-register/detail?ref=SWD(2021)279&amp;lang=en">https://ec.europa.eu/transparency/documents-register/detail?ref=SWD(2021)279&amp;lang=en</ext-link>.
  4. Ionescu, R. C., Olaru M., Sargut K. (2019). Study of the Information Security Impact on the Business Continuity, in <em>Proceedings of the 34th International Business Information Management Association Conference (IBIMA), Madrid, Spain</em>, 11/13-14/2019, Pag.: 4279-4287, ISBN: 978-0-9998551-3-3, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://apps-webofknowledge-com.am.enformation.ro/full_record.do?product=WOS&amp;search_mode=GeneralSearch&amp;qid=1&amp;SID=F1Popqoibfu8upwkh1Q&amp;page=1&amp;doc=2">https://apps-webofknowledge-com.am.enformation.ro/full_record.do?product=WOS&amp;search_mode=GeneralSearch&amp;qid=1&amp;SID=F1Popqoibfu8upwkh1Q&amp;page=1&amp;doc=2</ext-link>
  5. Ismail, U. M., Islam, S. (2020). A unified framework for cloud security transparency and audit. <em>Journal of Information Security and Applications</em>, <em>54</em>, 102594. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jisa.2020.102594" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jisa.2020.102594</a>">https://doi.org/10.1016/j.jisa.2020.102594</ext-link>
  6. ISO (2018). <em>ISO 19011:2018—Guidelines for auditing management systems</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/standard/70017.html">https://www.iso.org/standard/70017.html</ext-link>
  7. ISO (2023). <em>ISO - The circular economy: Building trust through conformity assessment</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/insights/circular-economy-building-trust">https://www.iso.org/insights/circular-economy-building-trust</ext-link>
  8. Mandrakov, E. S., Vasiliev, V. A., Dudina, D. A. (2020). Non-conforming Products Management in a Digital Quality Management System. <em>2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&amp;QM&amp;IS)</em>, 266–268. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ITQMIS51053.2020.9322931" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ITQMIS51053.2020.9322931</a>">https://doi.org/10.1109/ITQMIS51053.2020.9322931</ext-link>
  9. Mejias, P. (2023). Adding value to audits of management systems. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.quality.org/article/adding-value-audits-management-systems">https://www.quality.org/article/adding-value-audits-management-systems</ext-link>
  10. Naden, C. (2020). Words to the wise on conformity assessment. <em>ISO</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2020/05/Ref2519.html">https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2020/05/Ref2519.html</ext-link>
  11. Naumann, J. (2022). <em>ISO/IEC 27001 ISO/IEC 27002 und IT-Grundschutz</em>. Books on Demand.
  12. Naumann, M. M., Olaru, S. M., Lampe, G. S., Pitz, F. (2023). Measuring and indicating the level of information security - an analysis of current approaches. <em>Ecoforum Journal</em>, <em>12</em>(2). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.ecoforumjournal.ro/index.php/eco/article/view/1739">http://www.ecoforumjournal.ro/index.php/eco/article/view/1739</ext-link>
  13. Qusef, A., Arafat, M., &amp; Al-Taher, S. (2018). Organizational management role in information security management system. <em>Proceedings of the 2nd International Conference on Future Networks and Distributed Systems</em>, 1–8. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/3231053.3231064" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/3231053.3231064</a>">https://doi.org/10.1145/3231053.3231064</ext-link>
  14. Stefanova-Stoyanova, V., &amp; Danov, P. (2022). Comparative Analysis of Specialized Standards and Methods on Increasing the Effectiveness and Role of PDCA for Risk Control in Management Systems. <em>2022 10th International Scientific Conference on Computer Science (COMSCI)</em>, 1–4. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/COMSCI55378.2022.9912583" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/COMSCI55378.2022.9912583</a>">https://doi.org/10.1109/COMSCI55378.2022.9912583</ext-link>
  15. Sven, L.G., Maftei, M., Surugiu, I., Bitan, G, Ionescu, R. C. (2020) Study of Information Security Management System and Business Continuity Management in the Context of the Global Crisis, <em>The 6th BASIQ International Conference on New Trends in Sustainable Business and Consumption, Messina, Italia, 2020</em>, vol. 01, pg. 942-949, ISSN 2457-483X, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www-webofscience-com.am.e-nformation.ro/wos/woscc/full-record/WOS:000630165800121">https://www-webofscience-com.am.e-nformation.ro/wos/woscc/full-record/WOS:000630165800121</ext-link>
  16. VDA (2023). <em>Information security</em>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.vda.de/en/topics/digitization/data/information-security">https://www.vda.de/en/topics/digitization/data/information-security</ext-link>
Language: English
Page range: 494 - 506
Published on: Jul 3, 2024
Published by: The Bucharest University of Economic Studies
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2024 Michael Matthias Naumann, Stelian Mircea Olaru, Georg Sven Lampe, Fabian Pitz, published by The Bucharest University of Economic Studies
This work is licensed under the Creative Commons Attribution 4.0 License.