A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Organisational Information Security Management Maturity Model
2021
International Journal of Advanced Computer Science and Applications
Several maturity models have been developed by international organisations, consultants, and researchers to assist organisations in assessing their ISM practices. ...
This model will ultimately help the organisations to improve the weaknesses in the implementations thus diminishing security incidents. ...
The authors also thank the practitioners and experts who participated in this study. ...
doi:10.14569/ijacsa.2021.0120974
fatcat:6r74jcnkezhozf4vik2ldholoi
Enablers of Open Source Software adoption: A case study of APS organisations
2012
Australasian Journal of Information Systems
This study explored various factors that may enable OSS adoption within Australian Public Sector (APS) organisations by interviewing those involved in software procurement. ...
Despite a considerable body of literature investigating factors involved in the Open Source Software (OSS) adoption process, there is little research into adoption of OSS by public sector organisations ...
All participating organisations in the case study were adopters. So in future research, attention could be given to collect representative data from both adopter and non-adopter organisations. ...
doi:10.3127/ajis.v17i2.731
fatcat:whbzczjfana7pe5erb2ukmrk2a
The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises
2014
Journal of Software Engineering and Applications
In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. ...
The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and ...
The Challenges of Using Systems Security Engineering-Capability Maturity Model It has been argued that the SSE-CMM is limited to security engineering and software design [19] . ...
doi:10.4236/jsea.2014.710079
fatcat:4ff3gar3sfa77odka5bg6gbl3m
Introduction to Cloud Computing
[chapter]
2018
The Cloud-Based Demand-Driven Supply Chain
Maturity of the Organisation The ability of the outsourcing organisation, in particular its IT department, to formulate a clear strategy and vision of what it wants to accomplish will be key to success ...
Public Cloud Public cloud infrastructure is owned by an organisation selling cloud services to the general public or to a large industry group. ...
As a follow on to this paper, research is currently under way to apply the IT Capability Maturity Framework (IT-CMF) in order to help companies that have moved, or are about to move to a cloud computing ...
doi:10.1002/9781119477792.ch2
fatcat:3njlyb4qszbw7dkmzhziuctepq
CESSDA Software Maturity Levels
2019
Zenodo
It was created so that readers interested in CESSDA's Software Maturity Levels (SMLs) can find out more, without having to browse through the entire Technical Architecture document. ...
Therefore the need to measure the maturity of software designed for use by CESSDA is essential to ensure the quality of the technical Research Infrastructure is maintained. ...
RRLs address this gap in the assessment of the maturity of software artefacts. ...
doi:10.5281/zenodo.2614049
fatcat:sfrhmtmqgfhdhd6fonvtyzoqju
Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework
2019
The African journal of information and communication
This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as ...
Using the software, organisations will be able input their relevant data and compute their CRQ and deduce appropriate remedial actions, if applicable. ...
Our subsequent publications will, among other things, focus on the detailed computational design, algorithms, and data structures for the CRMM software tool. ...
doi:10.23962/10539/27535
fatcat:xquyoatjtzbmjpsnn2t72i27se
Page 203 of Journal of Research and Practice in Information Technology Vol. 19, Issue 4
[page]
1987
Journal of Research and Practice in Information Technology
Caellit
With the maturing of the computer industry in the 1980s, the computer professional must now assume that computer and information systems are no longer used or even developed in a secure and safe ...
The computer professional is now faced with the implementation of security features in software and hard- ware systems in line with growing international standards, such as the International Standards ...
Operational Software Maturity: An Aerospace Industry Analysis
2017
Zenodo
The key research question addressed is, how can operational software maturity monitoring assist the aerospace industry in effectively managing large software portfolios? ...
By utilising these methodologies to assess the operational maturity of software applications in aerospace, benefits in maintenance activities and operations disruption avoidance have been observed, supporting ...
The author would like to gratefully acknowledge the support and assistance of Airbus as well as the contribution of participants from several aerospace organisations during the research. ...
doi:10.5281/zenodo.1132070
fatcat:nwzk5ue7fbarvmt6bsue5aesga
IT Control in the Australian Public Sector: An International Comparison
2005
European Conference on Information Systems
This paper reports upon research to benchmark the maturity levels of 15 key IT control processes from the Control Objectives for Information and Related Technology (COBIT) in public sector organisations ...
The Australian data were collected in a mail survey of the 387 non-financial public sector organisations identified as having more than 50 employees, which returned a 27% response rate. ...
The COBIT Maturity Models is based on one defined by the Software Engineering Institute for the maturity of software development capability (IT Governance Institute 2000), associated with Capability Maturity ...
dblp:conf/ecis/LiuR05
fatcat:br6rk5pppbgflpn4zineohtvba
How Can SMEs Benefit from Big Data? Challenges and a Path Forward
2016
Quality and Reliability Engineering International
The paper then considers management perspectives and the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation. ...
The paper proposes a big data maturity model for SMEs as a first step towards an SME roadmap to data analytics. ...
Section 5 considers the path forward: in terms of the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation and the organisational models for business and ...
doi:10.1002/qre.2008
fatcat:hadsma6nwjcaxe3ulawmpfk5pe
Assessing the Feasibility of Security Metrics
[chapter]
2013
Lecture Notes in Computer Science
A software prototype was created and shows a proof of concept of the self-assessment framework. ...
Security metrics are used to measure the effectiveness of an organisation's Information Security Management System (ISMS) as well as the sub-processes, activities and controls of the ISMS. ...
Further publications in the area of security metrics mostly agree that security metrics are a difficult area and further research is strongly needed (Bellovin, 2006; Hinson, 2006; Jansen, 2009; Rosenquist ...
doi:10.1007/978-3-642-40343-9_13
fatcat:wagprla2rrecrchvhlyiz5ufji
CoreTrustSeal+FAIR Landscape of Capability Maturity Modeling - A FAIRsFAIR Discussion Paper
2020
Zenodo
This discussion paper provides an overview of the FAIRsFAIR project approach to evaluating Capability Maturity Modelling for use alongside the alignment of the CoreTrustSeal Requirements with the FAIR ...
But repositories exist in a range of organisational structures (standalone organisations, departments in universities, partnerships) mean that applicants do not always have control over the full organisational ...
Certification may be granted if some Requirements are in the implementation phase (3)." 7 In theory a capability/maturity measure may be applied to any defined organisational context for any defined set ...
doi:10.5281/zenodo.3862588
fatcat:fplemp5efzhvppsanalshcmuie
A Critical Review of Maturity Model Development in the Digitisation Era
2022
Buildings
The paper provides a guide to maturity model development in the digitisation era. ...
The study is crucial for proper maturity model development in the digitisation era. ...
capabilities, software industry, software process capability 8 Cloud computing, cyber security, product lifecycle management, technology transfer Buildings 2022, 12, x FOR PEER REVIEW 6 of 16
Table ...
doi:10.3390/buildings12060858
fatcat:3nvlzvd2ejb7focoshohctmxrq
Cybersecurity in the Era of Digital Transformation: The case of Greece
2020
Zenodo
issued a Ministerial Decree that helped establish a cybersecurity framework for the public sector and the critical infrastructures that reside in Greece. ...
This article presents the cyber security progress in Greece since the creation of the Greek National Cyber Security Authority as a nation-wide cybersecurity coordination and policy making unit. ...
In that way organisations will be able to adopt properly these regulations and help them to identify current potential security issues and structure new security plans.
IX. ...
doi:10.5281/zenodo.4462523
fatcat:it7j4eh27jdj5fgatif4tkass4
eHealth and Integrated Primary Health Care Centres
2017
International Journal of Integrated Care
Primary Health Care Centres (IPHCCs).Setting: Seven IPHCCs in metropolitan and rural settings in 3 Australian states: an enhanced private general practice, four GP SuperClinics, a "HealthOne" private-public ...
The ICM reflects how an organisation collects, manages and shares information in the health neighbourhood, manages information communication technologies (ICT), data quality management and governance, ...
doi:10.5334/ijic.3154
fatcat:htbrfnxh3fch3n7gnnxybbdn6e
« Previous
Showing results 1 — 15 out of 26,358 results