Redirigiendo al acceso original de articulo en 22 segundos...
ARTÍCULO
TITULO

Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach

Frank Moses    
Kurt Sandkuhl    

Resumen

The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect for most organizations. The dependency on technology for almost every single process in an organization has put ISMS at the top of the corporate agenda of public sector organizations. For public organizations in particular, the NIS 2 Directive describes abstract requirements for the development of an ISMS. On the other hand, only a few public administrations operate an ISMS. In this context, this article analyses the requirements of the NIS-2 Directive and complements them with the obstacles and reasons for success in the introduction of ISMS in small public sector organizations (SPSO). At the same time, minimum requirements should be defined that help municipal administration set up an ISMS quickly and easily. This article summarizes the different requirements and generates a foundation for a rough procedural model, for implementing the upcoming requirements of the NIS 2 Directive in local governments. The article also presents the conceptual design of the procedural model.

 Artículos similares

       
 
Lixin Wang, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu and Hao Luo    
As a critical raw material for the textile industry, cotton lint provides various types of cotton yarns, fabrics and finished products. However, due to the complexity of the supply chain and its many links, information records are often missing, inaccura... ver más
Revista: Applied Sciences

 
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences

 
Ping Huang and Yafeng Wu    
Airborne speech enhancement is always a major challenge for the security of airborne systems. Recently, multi-objective learning technology has become one of the mainstream methods of monaural speech enhancement. In this paper, we propose a novel multi-o... ver más
Revista: Aerospace

 
Lun-Min Shih, Huan-Liang Tsai and Cheng-Yu Tsai    
This paper presents an original wireless DYU Air Box of an environment-monitoring IoT (EMIoT) system on a campus to offer information on environmental conditions through the public ThingSpeak IoT platform for stakeholders including all the students and e... ver más
Revista: Applied Sciences

 
Jiao Su, Yi An, Jialin Wu and Kai Zhang    
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp... ver más
Revista: Algorithms