Accès libre

Information Security in Information Systems Among Employees of Industrial Enterprises as Societies 5.0

À propos de cet article

Citez

Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood. Search in Google Scholar

Colwill, C., 2009. Human factors in information security: The insider threat e Who can you trust these days?, Information Security Technical Report 14. Search in Google Scholar

Griffy-Brown Ch., D. Earp, B., Rosas, O., 2018. Technology and the good society, Technology in Society, 52, 1-3. Search in Google Scholar

Horton, G., 2018. Information politics: liberation and exploitation in the digital society, Information, Communication & Society Reviews, 21(12). Search in Google Scholar

Lee, A., 2018. Towards Informatic Personhood: understanding contemporary subjects in a data-driven society, Information, Communication & Society. Search in Google Scholar

Łuczak, J., Tyburski, M., 2010. Systemowe zarządzanie bezpieczeństwem informacji ISO/IEC 27001, Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, Poznań. Search in Google Scholar

Stewart, G., 2009. A safety approach to information security communications, Information Security Technical Report 14. Search in Google Scholar

Thomas, H., 2018. Powerful knowledge, technology and education in the future-focused good society, Technology in Society, 52, 54-59. Search in Google Scholar

Tutton, J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15. Search in Google Scholar

Żywiołek, J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf. Search in Google Scholar

Żywiołek, J., 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, 11(2), 36-39. Search in Google Scholar