Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The SSE-CMM model has been approved as the ISO/IEC 21827 International Standard and henceforth, its certification is maintained by the International Systems Security Engineering Association (ISSEA). The ISO/IEC 21827 additionally covers areas of concurrent interaction within the organization and other organizations, and the security project execution cycle [18]. The Information Security Program Maturity Grid (ISPMG) is a tool composed of five stages of security maturity and five measurement categories that may be used by management in evaluating an enterprise's maturity from the perspective of information security [19].…”
Section: Standard Modelsmentioning
confidence: 99%
“…The SSE-CMM model has been approved as the ISO/IEC 21827 International Standard and henceforth, its certification is maintained by the International Systems Security Engineering Association (ISSEA). The ISO/IEC 21827 additionally covers areas of concurrent interaction within the organization and other organizations, and the security project execution cycle [18]. The Information Security Program Maturity Grid (ISPMG) is a tool composed of five stages of security maturity and five measurement categories that may be used by management in evaluating an enterprise's maturity from the perspective of information security [19].…”
Section: Standard Modelsmentioning
confidence: 99%
“…Thus, if a software or hardware component goes down or malfunctions, the system can switch to a backup component. Moreover, healthcare providers must apply ISO/IEC 24762:2008 standard guidelines for providing the provision of information and communications technology disaster recovery services to ensure business continuity[76] [77]. www.ijacsa.thesai.org…”
mentioning
confidence: 99%
“…However, these standards are generic in nature, giving rise to possible lack of understanding or applicability. While there is a number of research papers on these standards that aim to inform security managers and explain ISO standards, their aims and practices more thoroughly to security managers (Tsohou et al, 2009;Tsohou et al, 2010) they do not draw on the findings of the different theories, or focus mainly on applying the principles of deterrence theories such as General Deterrence Theory and other crime theories on ISO Standards (Coles- Kemp & Theoharidou, 2010).…”
Section: Information Security Policy Compliance and Security Behaviour: Backgroundmentioning
confidence: 99%