[書籍][B] Implementing the ISO/IEC 27001: 2013 ISMS Standard

E Humphreys - 2016 - books.google.com
… This book addresses the requirements of the second edition of ISO/IEC 27001. All the other
members of the ISO/IEC 27001 family that are quoted are the current versions at the time of …

Management of enterprise cyber security: A review of ISO/IEC 27001: 2022

M Malatji - … International conference on cyber management and …, 2023 - ieeexplore.ieee.org
… Abstract— The ISO/IEC 27001 standard is one of the most … standard was published as
ISO/IEC 27001:2022 to address … and contrast the ISO/IEC 27001:2022 and ISO/IEC 27001:2013 …

[PDF][PDF] Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review

D Ganji, C Kalloniatis, H Mouratidis… - Int. J. Adv …, 2019 - researchgate.net
… with the requirements of the ISO/IEC 27001 international standard, … in the ISMS as specified
by the ISO/IEC 27001 standard, aiming to … to adopt the ISO/IEC 27001 standard. Keywords–…

Information security and value creation: The performance implications of ISO/IEC 27001

M Podrecca, G Culot, G Nassimbeni, M Sartor - Computers in Industry, 2022 - Elsevier
… -scale academic analysis on ISO/IEC 27001 impact on firms’ … performance effects of ISO/IEC
27001 for certified firms. This … we briefly introduce the ISO/IEC 27001 standard and outline …

Information security fortification by ontological mapping of the ISO/IEC 27001 standard

S Fenz, G Goluch, A Ekelhart, B Riedl… - 13th Pacific Rim …, 2007 - ieeexplore.ieee.org
ISO/IEC 27001ISO/IEC 27001 artifacts can be integrated into this ontology. A basic
introduction to security ontologies is given first. Specific examples show how certain ISO/IEC 27001

The effect of ISO/IEC 27001 standard over open-source intelligence

A Qusef, H Alkilani - PeerJ Computer Science, 2022 - peerj.com
… and classify an entity as ISO/IEC 27001:2013 compliant. … the report complies with the ISO/IEC
27001:2013 specification and … the ISO/IEC 27001:2013 standard during a Stage Two audit. …

ISO/IEC 27001 implementation in public organizations: A case study

B Sussy, C Wilber, L Milagros… - 2015 10th Iberian …, 2015 - ieeexplore.ieee.org
… guidelines for security information as ISO/IEC 27001, ISO/IEC … situation of the ISO/IEC 27001
implementation process in … Furthermore, it was conducted a review of the ISO/IEC 27001

[PDF][PDF] ISO/IEC 27000, 27001 and 27002 for information security management

G Disterer - Journal of Information Security, 2013 - serwiss.bib.hs-hannover.de
… With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization
and thus … Guidance on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001

[PDF][PDF] A model of an information security management system based on NTC-ISO/IEC 27001 standard

OA Fonseca-Herrera, AE Rojas… - IAENG Int. J. Comput …, 2021 - researchgate.net
… all the mandatory requirements of the NTC-ISO/IEC 27001:2013 standard. Each item should
… the state of the controls of the NTCISO/IEC 27001:2013, we recommend using the existing …

Information security objectives and the output legitimacy of ISO/IEC 27001: stakeholders' perspective on expectations in private organizations in Sweden

Y Kamil, S Lund, MS Islam - Information Systems and e-Business …, 2023 - Springer
… Organizations use the ISO/IEC 27001 standard to establish … the application and impact of
ISO/IEC 27001, as well as to … the output legitimacy of ISO/IEC 27001 from the perspective of …