Analysis of the Information Security Management in Czech Republic

被引:1
作者
Svoboda, T. [1 ]
Horalek, J. [1 ]
机构
[1] Univ Pardubice, Fac Elect Engn & Informat, Pardubice, Czech Republic
关键词
Certification; Standards; Information; Security; Survey; SERVICE;
D O I
10.1166/asl.2018.12303
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The aim of this article is to introduce an implementation of information security management into organizations in Czech Republic, using the OSN/EN ISO/IEC 27001 standard. Information security, on which a high demand is focused nowadays, is introduced firstly. Next, the evolution of information security standards is described in detail. Based on the theoretical background, the research about implementation of information security standards in Czech Republic is conducted, by using a questionnaire survey as a research method. The results of this survey, which reflect responses from more than 30 organizations, are presented in detail.
引用
收藏
页码:8562 / 8566
页数:5
相关论文
共 19 条
[1]   Security as a Service Model for Cloud Storage [J].
Abo-alian, Alshaimaa ;
Badr, Nagwa L. ;
Tolba, M. F. .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 :225-233
[2]   Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool [J].
Bashir, Masooda ;
Wee, Colin ;
Memon, Nasir ;
Guo, Boyi .
COMPUTERS & SECURITY, 2017, 65 :153-165
[3]   Governance Practices and Critical Success factors suitable for Business Information Security [J].
Bobbert, Yuri ;
Mulder, Hans .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :1097-1104
[4]  
Chen H., 2015, LECT NOTES ELECT ENG, V330, P1359
[5]   Security Aspects of Cloud Based Mobile Health Care Application [J].
Cimler, Richard ;
Matyska, Jan ;
Balik, Ladislav ;
Horalek, Josef ;
Sobeslav, Vladimir .
NATURE OF COMPUTATION AND COMMUNICATION, 2015, 144 :202-211
[6]  
Dionysiou Ioanna, 2011, International Journal of Services and Standards, V7, P197, DOI 10.1504/IJSS.2011.045049
[7]  
Grahn K, 2017, STUD COMPUT INTELL, V691, P175, DOI 10.1007/978-3-319-44257-0_8
[8]  
Hlaca B, 2008, POMORSTVO, V22, P245
[9]  
Holik F., 2015, 2015 25 INT C RAD RA, DOI [10.1109/RADIOELEK.2015.7128984, DOI 10.1109/RADIOELEK.2015.7128984]
[10]   IPv6 Firewall Functions Analysis [J].
Horalek, Josef ;
Sobeslav, Vladimir .
COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT II, 2016, 9876 :219-228