Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Anne Kohnke"'
Publikováno v:
Journal of Technology Management & Innovation, Vol 9, Iss 2 (2014)
Telemedicine programs within health care are experiencing significant growth as healthcare organizations seek to reduce expenditures and improve efficiency. The high costs of treating chronic diseases, compounded by an aging population, has given foc
Externí odkaz:
https://doaj.org/article/65e0892d51614e55a0b01b1c5f1c01cd
Publikováno v:
Teaching Cybersecurity ISBN: 9781003187172
The Cybersecurity Body of Knowledge ISBN: 9781003022596
The Cybersecurity Body of Knowledge ISBN: 9781003022596
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ff6ec6ae3da3d900f2983841a02d05a5
https://doi.org/10.1201/9781003187172-4
https://doi.org/10.1201/9781003187172-4
Publikováno v:
Teaching Cybersecurity ISBN: 9781003187172
The Cybersecurity Body of Knowledge ISBN: 9781003022596
The Cybersecurity Body of Knowledge ISBN: 9781003022596
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f4c62208ad71913d604a0003e22666f6
https://doi.org/10.1201/9781003187172-8
https://doi.org/10.1201/9781003187172-8
Publikováno v:
Teaching Cybersecurity ISBN: 9781003187172
The Cybersecurity Body of Knowledge ISBN: 9781003022596
The Cybersecurity Body of Knowledge ISBN: 9781003022596
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::72997e91ce3470b219f53bfa56e95646
https://doi.org/10.1201/9781003187172-7
https://doi.org/10.1201/9781003187172-7
Publikováno v:
IEEE Security & Privacy. 18:60-66
Acquisition is the most common method for introducing new technology into organizations, but security and integrity are difficult to guarantee using conventional acquisition techniques. Best practices for secure acquisition are an essential part of t
Publikováno v:
Proceedings of the Annual Hawaii International Conference on System Sciences.
Publikováno v:
EDPACS. 60:1-7
This paper argues that the creation of a Joint Security Operations Center (JSOC) must be coordinated, implemented, and administered by a single dedicated entity, one that operates at the hi...
Publikováno v:
EDPACS. 60:1-10
Ethics is probably the last topic that anybody thinks about when planning a cybersecurity response. Still, the organization’s honest commitment to the confidentiality, integrity and availability of...
Publikováno v:
EDPACS. 59:1-12
Expert models specify repeatable actions that are designed to ensure an organization’s resources are utilized for maximum effectiveness. Therefore, a commonly accepted expert model can serv...
Publikováno v:
EDPACS. 59:6-18
This chapter argues that the profession must find ways to ensure that the real-world practice of cyber security is based on the creation and adoption of a complete, correct, and highly effective set of well-defined and commonly accepted controls; one