Cite

Alina Mihaela Dima, Simona Vasilache (2009). ANN model for corporate credit risk assessment, 2009 International Association of Computer Science and Information Technology Spring Conference (IACSIT-SC2009), International Conference on Information and Financial Engineering (ICIFE2009), Singapore, 17-19 April 2009, pp. 94-98. Search in Google Scholar

Paul Cichonski, Thomas Millar, Tim Grance, Karen Scarfone (2012). Computer Security Incident Handling Guide [NIST SP 800-61 Rev. 2], Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Search in Google Scholar

Calder Alan, Watkins Steve G. (2009), Information Security Risk Management for ISO27001 / ISO27002, IT Governance Publishing, ISBN 978-1-84928-044-0 Search in Google Scholar

Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan (2012), Information Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level, International Journal of Engineering and Technology Volume 2 No. 1 Search in Google Scholar

By Barnaby Lewis (2019), How to tackle today’s IT security risks, retrieved from https://www.iso.org/news/ref2360.html Search in Google Scholar

Carol Hsu, Tawei Wang, Ang Lu (2016), The Impact of ISO 27001 Certification on Firm Performance, Koloa, HI, USA, ISBN 978-0-7695-5670-310.1109/HICSS.2016.600 Search in Google Scholar

Eleni Philippoua, Sylvain Frey, Awais Rashid (2020), Contextualising and aligning security metrics and business objectives: A GQM-based methodology, Computers & Security, Volume 8810.1016/j.cose.2019.101634 Search in Google Scholar

Jaya Sharma, Why do organizations need ISO 27001?, Retrieved from https://kratikal.com/blog Search in Google Scholar

ISO. (2017). ISO Survey. Retrieved from www.iso.org Search in Google Scholar

ISO27000. (2018). Information technology. Security techniques. Information security management systems. Overview and vocabulary. Retrieved from www.iso.org Search in Google Scholar

ISO27001. (2013). Information technology. Security techniques. Information security management systems. Requirements. Retrieved from www.iso.org Search in Google Scholar

ISO27002. (2013). Information technology. Security techniques. Code of practice for information security controls. Retrieved from www.iso.org Search in Google Scholar

ISO27005. (2016). Information technology. Security techniques. Information security risk management. Retrieved from www.iso.org Search in Google Scholar

LukeBriner (2018), Making information security easier, Computer Fraud & Security, Issue 4, 10-1410.1016/S1361-3723(18)30033-2 Search in Google Scholar

eISSN:
2558-9652
Language:
English