AB

Bibliografia publikacji pracowników
Państwowej Szkoły Wyższej w Białej Podlaskiej

Baza tworzona przez Bibliotekę Akademii Bialskiej im. Jana Pawła II.



Zapytanie: INFORMATION SECURITY
Liczba odnalezionych rekordów: 5



Przejście do opcji zmiany formatu | Wyświetl/ukryj etykiety | Wyświetlenie wyników w wersji do druku | Pobranie pliku do edytora | Nowe wyszukiwanie
1/5
Nr opisu: 7000 standards, the role of the CISO, and information security threats. This method facilitated understanding existing theories, research frameworks, and practices in the field of information security, as well as the analysis of documents and reports containing current research, data, and information, enabling an understanding of practices and standards applicable in a given organization or sector. Findings: The process of developing, implementing, maintaining, improving, and auditing the quality management system impacts the security level of the organization. Consequently, it serves as a modern tool focused on instilling organizational order in the company, encompassing both the structure and creativity of all employees. Practical implications: The article addresses the topic of information security, emphasizing its significance in today's digital world, where data is a critical asset for organizations, and it focuses on the ISO 27000 standard, which is one of the most important standards related to information security management. It discusses its main assumptions, scope, and benefits resulting from its implementation. Another aspect addressed is the role of the CISO (Chief Information Security Officer) in the organization. The authors analyze the tasks, responsibilities, and expectations placed on the individual fulfilling this role. They explain that the CISO is a key player in ensuring the integrity, confidentiality, and availability of data within the organization, while also being a leader in the field of information security. The article also discusses the threats that CISOs must contend with in their work, encompassing both technical threats and those associated with human factors, such as lack of employee awareness regarding information security or neglect in security policies and procedures. The authors emphasize that the role of the CISO is becoming increasingly strategic in ensuring information security in organizations. Originality/Value: The authors accentuate in this article the fact that organizations must provide adequate support for their CISO and enable access to appropriate resources, including financial and human resources, to effectively fulfill their duties. Furthermore, they emphasize that continued research in the field of information security management is crucial because cyber threats are constantly evolving, and organizations must stay updated with the latest methods and tools for data protection. This research may include new technologies,^ainformation security^aISO 27000 standard^amanagement^aorganization
Autorzy: , information securityISO 27000 standardmanagementorganization.
Tytuł czasopisma:
Strony: 1108-2976003, Q, 003, 2024-05-06, 12:32
Charakterystyka formalna:
Charakterystyka merytoryczna:
Język publikacji:
Praca recenzowana
Słowa kluczowe ang.: ; ;

2/5
Autorzy: .
Tytuł pracy:
Charakterystyka wg MNiSW:
Słowa kluczowe ang.:
Streszczenie:

3/5
Nr opisu: e. The empirical data from global web statistics indicates, that four large-scale information overloads were caused by cyberattacks during the study period, which led to the rupture of "information bubbles". Application of autocorrelation functions allows us to determine that the period during which misinformation spreads is, on average, seven days. Solution of the Sedov-Taylor optimization problem and calculations of differential equations, as well as their derivatives, suggest several indicators. Namely, a breakpoint of the second kind, corresponds to the rupture of the "information bubble" with a subsequent adaptation of the system; the inflection point of the function identifies the levels of information activities related to cyber threats, which will change the consequences of the "information bubble" rupture; the minimum possible level of the reactions of economic agents in the global digital economic space.^adigital economy^ainformation activity^ainformation bubbles^ainformation injection^ainformation security^ainformation spacee. The empirical data from global web statistics indicates, that four large-scale information overloads were caused by cyberattacks during the study period, which led to the rupture of "information bubbles". Application of autocorrelation functions allows us to determine that the period during which misinformation spreads is, on average, seven days. Solution of the Sedov-Taylor optimization problem and calculations of differential equations, as well as their derivatives, suggest several indicators. Namely, a breakpoint of the second kind, corresponds to the rupture of the "information bubble" with a subsequent adaptation of the system; the inflection point of the function identifies the levels of information activities related to cyber threats, which will change the consequences of the "information bubble" rupture; the minimum possible level of the reactions of economic agents in the global digital economic space.^adigital economy^ainformation activity^ainformation bubbles^ainformation injection^ainformation security^ainformation space
Autorzy: .
Szczegóły:
Seria: 003Modeling of "information bubbles" in the global information spaceJournal of International Studies20212071-83302021/202210.14254/2071-8330.2021/14-4/18Cyburt, Agnieszkacyber threatFINAL_PUBLISHEDThe article uses the Sedov-Taylor function to model "information bubbles" formed in the global information space due to information attacks. The authors identify the most relevant determinants that describe information activities related to cyber threats and reactions of economic agents in the global digital economic space. The article hypothesizes about the emergence of "information bubbles" due to increases in information activities and their rupture due to information intrusion, leading to appropriate reactions of economic agents and their subsequent stabilization over time. The empirical data from global web statistics indicates, that four large-scale information overloads were caused by cyberattacks during the study period, which led to the rupture of "information bubbles". Application of autocorrelation functions allows us to determine that the period during which misinformation spreads is, on average, seven days. Solution of the Sedov-Taylor optimization problem and calculations of differential equations, as well as their derivatives, suggest se, 003, Vol. 14, 2306-3483, CC-BY, 2022-01-03, 16:48, no 4, x, AT_PUBLICATION ; 2023-03-17, 10:49 ; p. 270--285, 3230018591, OPEN_JOURNAL, 3127879190
Charakterystyka formalna: over time. The empirical data from global web statistics indicates, that four large-scale information overloads were caused by cyberattacks during the study period, which led to the rupture of "information bubbles". Application of autocorrelation functions allows us to determine that the period during which misinformation spreads is, on average, seven days. Solution of the Sedov-Taylor optimization problem and calculations of differential equations, as well as their derivatives, suggest several indicators. Namely, a breakpoint of the second kind, corresponds to the rupture of the "information bubble" with a subsequent adaptation of the system; the inflection point of the function identifies the levels of information activities related to cyber threats, which will change the consequences of the "information bubble" rupture; the minimum possible level of the reactions of economic agents in the global digital economic space.^adigital economy^ainformation activity^ainformation bubbles^ainformation injection^ainformation security^ainformation space
Charakterystyka wg MNiSW:
Punktacja ministerstwa: data from global web statistics indicates, that four large-scale information overloads were caused by cyberattacks during the study period, which led to the rupture of "information bubbles". Application of autocorrelation functions allows us to determine that the period during which misinformation spreads is, on average, seven days. Solution of the Sedov-Taylor optimization problem and calculations of differential equations, as well as their derivatives, suggest several indicators. Namely, a breakpoint of the second kind, corresponds to the rupture of the "information bubble" with a subsequent adaptation of the system; the inflection point of the function identifies the levels of information activities related to cyber threats, which will change the consequences of the "information bubble" rupture; the minimum possible level of the reactions of economic agents in the global digital economic space.^adigital economy^ainformation activity^ainformation bubbles^ainformation injection^ainformation security^ainformation space
Słowa kluczowe ang.: ;

DOI:

4/5
Nr opisu:
Tytuł pracy:
Szczegóły:
Charakterystyka formalna:
Charakterystyka merytoryczna:
Język publikacji:
Praca recenzowana
Słowa kluczowe: ;
Słowa kluczowe ang.:
Uwaga:

5/5
Nr opisu:
Autorzy: WNET:1;0:1;0:1;0 Agnieszka Oryginalny artykuł naukowyACPartykuł w czasopiœmie polskim 99986913.0000013.000PUNKTACJA KBNPUNKTACJA MINISTERSTWA13.000PUNKTACJA UWM 009986.000 B 003 Vol. 32 2449-8645 OTHER 1Syliwoniuk-Wapowskaoriginal-article998899009999.0000239-8818003Identity and Inventions of the Past in the City Space: the Case of DubaiHemispheres. Studies on Cultures and Societies20170239-88182019/2020Syliwoniuk-Wapowska, AgnieszkaUnited Arab EmiratesKopia dostępna w Sekcji Bibliometrii.FINAL_PUBLISHEDThe paper focuses on the process of inventing a.
Tytuł całości: W:
ISBN:
Wskaźnik Impact Factor ISI: oniuk-Wapowska^jAgnieszka^1Agnieszka^9A^lZakład Bezpieczeństwa Narodowego^mWydział Nauk Ekonomicznych i Technicznych^oSyliwoniuk-Wapowska Agnieszka^t0000024513^w ^31^41;1^6tak^a1^bWNET:1;0:1;0:1;0^cUNIT:1;0:1;0:1;0^d1^e1^f1^gtak^aSyliwoniuk-Wapowska
Punktacja ministerstwa:
Słowa kluczowe: ;
Słowa kluczowe ang.:


  Wyświetl ponownie stosując format:
Wyświetl/ukryj etykiety | Wyświetlenie wyników w wersji do druku | Pobranie pliku do edytora | Nowe wyszukiwanie | Biblioteka AB