Zobrazeno 1 - 10
of 77
pro vyhledávání: '"Maciej Kiedrowicz"'
Autor:
Jerzy Stanik, Maciej Kiedrowicz
Publikováno v:
Ekonomiczne Problemy Usług, Vol 130 (2018)
The authors present the model of the organization's safety management system (OSMS) for the purposes of shaping the information security policy. The proposed model is a comprehensive solu-tion. It can be easily implemented and implemented in any orga
Externí odkaz:
https://doaj.org/article/0ea3d5e4b8734730a50ec1fcccc6c236
Autor:
Jerzy Stanik, Maciej Kiedrowicz
Publikováno v:
Ekonomiczne Problemy Usług, Vol 126 (2017)
Presented in this paper the methodology constitutes a proposal of approach to risk analysis and management of business processes, taking into account the different categories of risk factors with different areas of activities of an organization. Prop
Externí odkaz:
https://doaj.org/article/ebc7989f4164459796de14630035338e
Autor:
Robert Waszkowski, Agata Chodowska, Maciej Kiedrowicz, Tadeusz Nowicki, Zbigniew Wesołowski, Kazimierz Worwa
Publikováno v:
MATEC Web of Conferences, Vol 76, p 04004 (2016)
The paper presents models of data flow between RFID devices in a modern restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of
Externí odkaz:
https://doaj.org/article/52521f099d184caaa0d6fcb38e92f661
Publikováno v:
MATEC Web of Conferences, Vol 76, p 04003 (2016)
The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialis
Externí odkaz:
https://doaj.org/article/6a900317704e4accb70590dc75ea2b8c
Publikováno v:
Procedia Structural Integrity. 22:334-344
The article presents the concept of maintaining the required level of the engineering infrastructure (IT) usefulness through the use of a reconfiguration mechanism in relation to the usefulness of the safeguard subsystem and the hazard subsystem. Bas
Autor:
Maciej Kiedrowicz, Jerzy Stanik
Publikováno v:
Ekonomiczne Problemy Usług. 131:331-346
Autorzy przedstawiają model systemu zarzadzania bezpieczenstwem organizacji (SZBO) na potrze-by ksztaltowania polityki bezpieczenstwa informacyjnego. Zaproponowany model ma charakter rozwiązania kompleksowego. Daje sie latwo zaimplementowac i wdroz
Autor:
Jerzy Stanik, Maciej Kiedrowicz
Publikováno v:
Ekonomiczne Problemy Usług. 126:339-354
Proponowana w artykule metodyka stanowi propozycje podejścia do analizy i zarządzania ryzykiem procesow biznesowych, biorącego pod uwage rozne kategorie czynnikow ryzyka z roznych obszarow dzialalności organizacji. Przedstawiona w niniejszej prac
Publikováno v:
Intelligent Information and Database Systems: Recent Developments ISBN: 9783030141318
ACIIDS (Extended Posters)
ACIIDS (Extended Posters)
The article outlines a concept of maintaining the required level of security of assets of the information system in the organization (ISO) by making appropriate steering decisions, initiating the generation of the security configurations. The authors
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c39e5cc50d76cf2a04e700e0f1d5124a
https://doi.org/10.1007/978-3-030-14132-5_34
https://doi.org/10.1007/978-3-030-14132-5_34
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319974897
The paper discusses selected problems and issues in the scope of safety and risk of the production process. Various categories of risk factors have been classified and characterized, affecting the level of functional and information security of the p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::27d152b1eb3e1bc15f683dd81d1bf991
https://doi.org/10.1007/978-3-319-97490-3_66
https://doi.org/10.1007/978-3-319-97490-3_66
Autor:
Maciej Kiedrowicz, Jerzy Stanik
Publikováno v:
MATEC Web of Conferences, Vol 210, p 04005 (2018)
The article outlines the concept of maintaining the required security level of the information system in the organization (SIO) through appropriate control of the security configurations of the security system. The security system (SS) model was prop