2012 Eighth International Conference on the Quality of Information and Communications Technology 2012
DOI: 10.1109/quatic.2012.44
|View full text |Cite
|
Sign up to set email alerts
|

On Optimizing the Path to Information Security Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 15 publications
0
4
0
2
Order By: Relevance
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Table 1 presents the keywords and the search string. [11]; [12]; [13]; [14]; [15,16]; [17]; [18]; [19]; [20]; [21]; [22]; [23]; [24]; [25]; [26]; [27]; [28]; [29]; [30]; [31]; [32]; [33]; [34]; [35]; [36]; [37]; [38]; [39]; [40]; [41]; [42]; [43]; [44]; [45]; [44]; [8]; [46]; [47]. Generic and abstract proposals (Top-Level Ontologies) can be found in [48], [3], [49], [50], and [51].…”
Section: Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Además, se debe considerar el caso en el que una organización desea cumplir con más de una norma de seguridad, como las organizaciones públicas, que, además de intentar lograr una norma internacional, debe cumplir con las normas locales regulaciones y políticas gubernamentales (Diéguez, Cares, & Sepúlveda, 2012).…”
Section: Gestión De Los Controles De Seguridad De La Informaciónunclassified
“…En un artículo anterior (Diéguez et al, 2012), propusimos un método de selección de ISC. Nuestro modelo, al igual que los cinco seleccionados, puede considerarse como un problema de optimización multi-objetivos, pero, a diferencia de los anteriores, considera las dependencias entre los controles.…”
Section: Gestión De Los Controles De Seguridad De La Informaciónunclassified