Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Information Security Governance Of Enterprise Information Systems: An Approach To Legislative Compliant

Benjamin Khoo    
Peter Harris    
Stephen Hartman    

Resumen

Enterprises are now operating in the network economy.  The network economy is dependent on the information infrastructure via the Internet.  Organizations of all types (business, academia, government, etc.) are facing risks resulting from their ever-increasing reliance on the information infrastructure.  Because of this, the US government implemented a number of legislations to secure cyberspace.  This paper will examine the issue of Information Security Governance (ISG) of an enterprise information system, it will elaborate on the ISG framework, discuss the legislations and finally, assess how ISG can be framed to meet legislations to show due diligence and continuous process monitoring.  

 Artículos similares

       
 
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences

 
Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei and Yusong Du    
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie?Hellman... ver más
Revista: Information

 
Lun-Min Shih, Huan-Liang Tsai and Cheng-Yu Tsai    
This paper presents an original wireless DYU Air Box of an environment-monitoring IoT (EMIoT) system on a campus to offer information on environmental conditions through the public ThingSpeak IoT platform for stakeholders including all the students and e... ver más
Revista: Applied Sciences

 
Jiao Su, Yi An, Jialin Wu and Kai Zhang    
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp... ver más
Revista: Algorithms

 
Iman I. M. Abu Sulayman, Peter Voege and Abdelkader Ouda    
The increasing significance of data analytics in modern information analysis is underpinned by vast amounts of user data. However, it is only feasible to amass sufficient data for various tasks in specific data-gathering contexts that either have limited... ver más
Revista: Information