Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 9

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  information security policy
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. Survey questionnaires were sent to all sixteen Marshal Offices in Poland. The aim of the research was identifying in which government offices information security management systems are implemented, according to which standards are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems encountered in the implementation of this system and documentation concerning information security.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. The aim of the research was identifying in which government offices ISMS are implemented, according to which standards are developed and certified and gathering information about documentation concerning information security. The article is an extended version of the paper notified at the VIII Scientific Conference „Information Systems In Management”, taking place on 21-22 November 2013.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in municipal offices between December 2014 and June 2015. The aim of the research was identifying in which municipal offices information security management systems are implemented, according to which standards ISMS are developed and certified and gathering information about: factors facilitate the implementation, problems encountered in the implementation process and offices’ documentation concerning information security.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. Survey questionnaires were sent to all sixteen Marshal Offices in Poland. The aim of the research was identifying in which government offices information security management systems are implemented, according to which standards are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems encountered in the implementation of this system and documentation concerning information security.
EN
The paper presents author’s view for significant reliable Information security system documentation for information risk management. It presents an outline of activity assemble ; on information risk management. It explains the way of understanding the term “policy” in information security area. In details there is described the content of information security policy document.
EN
The EU GDPR Regulation introduced rules and regulations on the protection of individuals with regard to the processing of their personal data regardless of their citizenship or place of residence. The article focuses on issues related directly to the regulation on the protection of personal data and related to documents that regulate the protection of personal data and their processing in public institutions in Poland. The author presents basic estimates about the entry of the GDPR Regulation, indicates the importance of individual Dobies/organisations and entities playing a key role in the protection of personal data on the territory of Poland. It describes the documents that establish minimum standards for personal data protection systems to be developed in public institutions to guarantee security. In this article, the author attempted to indicate the scope and nature of changes in personal data systems in the light of the provisions of the GDPR Regulation.
PL
Informacja we współczesnym świecie stanowi zasób strategiczny, decydujący o przewadze konkurencyjnej państw na arenie międzynarodowej. Dążąc do zapewnienia właściwej jakości posiadanych zasobów informacyjnych oraz procesów i mechanizmów ich pozyskiwania, przetwarzania i ochrony, poszczególne państwa opracowują i wdrażają politykę bezpieczeństwa informacyjnego. Realizacji tej polityki służą różnorodne instrumenty, wśród których na uwagę zasługują nadzór i kontrola Internetu. Celem artykułu jest omówienie nadzoru i kontroli Internetu jako instrumentu polityki bezpieczeństwa informacyjnego, z uwzględnieniem specyfiki państw demokratycznych oraz totalitarnych i autorytarnych. Na potrzeby badań posłużono się metodą analizy literatury przedmiotu oraz metodą syntezy. Dowiedziono, że niezależnie od reżimu politycznego podmioty państwowe wykorzystują nadzór i kontrolę Internetu, zasadnicze cele tych działań są natomiast odmienne. W państwach demokratycznych chodzi przede wszystkim o ochronę i obronę cenionych społecznie wartości i dóbr, w państwach totalitarnych i autorytarnych zaś o realizację partykularnych interesów osób sprawujących władzę.
EN
Information in the modern world is a strategic resource that determines the competitive advantage of countries on the international arena. To ensure the appropriate quality of the information resources held as well as the processes and mechanisms of their acquisition, processing, and protection, individual countries develop and implement an information security policy. The implementation of this policy is supported by various instruments, among which the supervision and control of the Internet deserve attention. The aim of the article is to discuss the supervision and control of the Internet as an instrument of information security policy, considering the specificity of democratic, totalitarian, and authoritarian states. For the purposes of the research, the method of analyzing the literature and the method of synthesis were used. It has been proven that, regardless of the political regime, state-owned entities use Internet supervision and control, while the main objectives of these activities are different. In democratic countries, it is primarily for the protection and defense of cherished social values and goods, in totalitarian and authoritarian countries for the realization of the particular interests of those in power.
EN
In 2017 Executive Order 13800 was enacted for all federal entities to use the NIST Cybersecurity Framework to report on FISMA compliance. According to GAO-19-545 report sixteen agencies were identified as failing to successfully implement FISMA regulations rooted in information security policies (ISPs). This paper will introduce the link between information assurance awareness with the prescribed actions and its direct influence on information security policies. While organizations are conscious of the federal rules and regulations, most continue to fail to successfully implement and comply with the guidelines due to a sincere lack of information assurance and awareness, which ties directly into human behavior. A discussion on the intersection of information security awareness and behavior will be presented. The UTAUT theory measures and informs the researcher on factors that influence the end-user. Conclusively, recommendations will be offered on why organizations need to invest in a mechanism that measures these factors, which increases information awareness to change behavior, thus achieving better compliance with their organizational ISPs.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.