2010
DOI: 10.1007/978-3-642-12189-0_44
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Comparative Analysis of the Information Security Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Therefore, the proposed evaluation checklist can place greater emphasis on risk factors in management security. • Revision of [38], [43], and [44]: In this paper, new revision is as follows: an added and modified checklist(TC and EC), an application of quantitative and qualitative analysis methodology, a separated application of self-evaluation and evaluation committee for information security management evaluation, and an evaluation of ISMES. The best method of ISMES evaluation is a uniform application throughout the real organization.…”
Section: Ismes Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the proposed evaluation checklist can place greater emphasis on risk factors in management security. • Revision of [38], [43], and [44]: In this paper, new revision is as follows: an added and modified checklist(TC and EC), an application of quantitative and qualitative analysis methodology, a separated application of self-evaluation and evaluation committee for information security management evaluation, and an evaluation of ISMES. The best method of ISMES evaluation is a uniform application throughout the real organization.…”
Section: Ismes Evaluationmentioning
confidence: 99%
“…Moreover, this study can be used as a guideline to develop new ISMSs for individual businesses. This paper is expanded and revised based on [38] [43], and [44].…”
Section: Introductionmentioning
confidence: 99%