Filters








26,358 Hits in 3.8 sec

Organisational Information Security Management Maturity Model

Mazlina Zammani, Rozilawati Razali, Dalbir Singh
2021 International Journal of Advanced Computer Science and Applications  
Several maturity models have been developed by international organisations, consultants, and researchers to assist organisations in assessing their ISM practices.  ...  This model will ultimately help the organisations to improve the weaknesses in the implementations thus diminishing security incidents.  ...  The authors also thank the practitioners and experts who participated in this study.  ... 
doi:10.14569/ijacsa.2021.0120974 fatcat:6r74jcnkezhozf4vik2ldholoi

Enablers of Open Source Software adoption: A case study of APS organisations

Kavitha Gurusamy, John Campbell
2012 Australasian Journal of Information Systems  
This study explored various factors that may enable OSS adoption within Australian Public Sector (APS) organisations by interviewing those involved in software procurement.  ...  Despite a considerable body of literature investigating factors involved in the Open Source Software (OSS) adoption process, there is little research into adoption of OSS by public sector organisations  ...  All participating organisations in the case study were adopters. So in future research, attention could be given to collect representative data from both adopter and non-adopter organisations.  ... 
doi:10.3127/ajis.v17i2.731 fatcat:whbzczjfana7pe5erb2ukmrk2a

The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises

Ja'far Alqatawna
2014 Journal of Software Engineering and Applications  
In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed.  ...  The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and  ...  The Challenges of Using Systems Security Engineering-Capability Maturity Model It has been argued that the SSE-CMM is limited to security engineering and software design [19] .  ... 
doi:10.4236/jsea.2014.710079 fatcat:4ff3gar3sfa77odka5bg6gbl3m

Introduction to Cloud Computing [chapter]

2018 The Cloud-Based Demand-Driven Supply Chain  
Maturity of the Organisation The ability of the outsourcing organisation, in particular its IT department, to formulate a clear strategy and vision of what it wants to accomplish will be key to success  ...  Public Cloud Public cloud infrastructure is owned by an organisation selling cloud services to the general public or to a large industry group.  ...  As a follow on to this paper, research is currently under way to apply the IT Capability Maturity Framework (IT-CMF) in order to help companies that have moved, or are about to move to a cloud computing  ... 
doi:10.1002/9781119477792.ch2 fatcat:3njlyb4qszbw7dkmzhziuctepq

CESSDA Software Maturity Levels

John Shepherdson
2019 Zenodo  
It was created so that readers interested in CESSDA's Software Maturity Levels (SMLs) can find out more, without having to browse through the entire Technical Architecture document.  ...  Therefore the need to measure the maturity of software designed for use by CESSDA is essential to ensure the quality of the technical Research Infrastructure is maintained.  ...  RRLs address this gap in the assessment of the maturity of software artefacts.  ... 
doi:10.5281/zenodo.2614049 fatcat:sfrhmtmqgfhdhd6fonvtyzoqju

Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework

Uche M. Mbanaso, Lucienne Abrahams, Oghenevovwero Zion Apene
2019 The African journal of information and communication  
This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as  ...  Using the software, organisations will be able input their relevant data and compute their CRQ and deduce appropriate remedial actions, if applicable.  ...  Our subsequent publications will, among other things, focus on the detailed computational design, algorithms, and data structures for the CRMM software tool.  ... 
doi:10.23962/10539/27535 fatcat:xquyoatjtzbmjpsnn2t72i27se

Page 203 of Journal of Research and Practice in Information Technology Vol. 19, Issue 4 [page]

1987 Journal of Research and Practice in Information Technology  
Caellit With the maturing of the computer industry in the 1980s, the computer professional must now assume that computer and information systems are no longer used or even developed in a secure and safe  ...  The computer professional is now faced with the implementation of security features in software and hard- ware systems in line with growing international standards, such as the International Standards  ... 

Operational Software Maturity: An Aerospace Industry Analysis

Raúl González Muñoz, Essam Shehab, Martin Weinitzke, Chris Fowler, Paul Baguley
2017 Zenodo  
The key research question addressed is, how can operational software maturity monitoring assist the aerospace industry in effectively managing large software portfolios?  ...  By utilising these methodologies to assess the operational maturity of software applications in aerospace, benefits in maintenance activities and operations disruption avoidance have been observed, supporting  ...  The author would like to gratefully acknowledge the support and assistance of Airbus as well as the contribution of participants from several aerospace organisations during the research.  ... 
doi:10.5281/zenodo.1132070 fatcat:nwzk5ue7fbarvmt6bsue5aesga

IT Control in the Australian Public Sector: An International Comparison

Qiang Liu, Gail Ridley
2005 European Conference on Information Systems  
This paper reports upon research to benchmark the maturity levels of 15 key IT control processes from the Control Objectives for Information and Related Technology (COBIT) in public sector organisations  ...  The Australian data were collected in a mail survey of the 387 non-financial public sector organisations identified as having more than 50 employees, which returned a 27% response rate.  ...  The COBIT Maturity Models is based on one defined by the Software Engineering Institute for the maturity of software development capability (IT Governance Institute 2000), associated with Capability Maturity  ... 
dblp:conf/ecis/LiuR05 fatcat:br6rk5pppbgflpn4zineohtvba

How Can SMEs Benefit from Big Data? Challenges and a Path Forward

Shirley Coleman, Rainer Göb, Giuseppe Manco, Antonio Pievatolo, Xavier Tort-Martorell, Marco Seabra Reis
2016 Quality and Reliability Engineering International  
The paper then considers management perspectives and the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation.  ...  The paper proposes a big data maturity model for SMEs as a first step towards an SME roadmap to data analytics.  ...  Section 5 considers the path forward: in terms of the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation and the organisational models for business and  ... 
doi:10.1002/qre.2008 fatcat:hadsma6nwjcaxe3ulawmpfk5pe

Assessing the Feasibility of Security Metrics [chapter]

Bernhard Heinzle, Steven Furnell
2013 Lecture Notes in Computer Science  
A software prototype was created and shows a proof of concept of the self-assessment framework.  ...  Security metrics are used to measure the effectiveness of an organisation's Information Security Management System (ISMS) as well as the sub-processes, activities and controls of the ISMS.  ...  Further publications in the area of security metrics mostly agree that security metrics are a difficult area and further research is strongly needed (Bellovin, 2006; Hinson, 2006; Jansen, 2009; Rosenquist  ... 
doi:10.1007/978-3-642-40343-9_13 fatcat:wagprla2rrecrchvhlyiz5ufji

CoreTrustSeal+FAIR Landscape of Capability Maturity Modeling - A FAIRsFAIR Discussion Paper

Hervé L'Hours, Frans Huigen
2020 Zenodo  
This discussion paper provides an overview of the FAIRsFAIR project approach to evaluating Capability Maturity Modelling for use alongside the alignment of the CoreTrustSeal Requirements with the FAIR  ...  But repositories exist in a range of organisational structures (standalone organisations, departments in universities, partnerships) mean that applicants do not always have control over the full organisational  ...  Certification may be granted if some Requirements are in the implementation phase (3)." 7 In theory a capability/maturity measure may be applied to any defined organisational context for any defined set  ... 
doi:10.5281/zenodo.3862588 fatcat:fplemp5efzhvppsanalshcmuie

A Critical Review of Maturity Model Development in the Digitisation Era

Samuel Adeniyi Adekunle, Clinton Aigbavboa, Obuks Ejohwomu, Matthew Ikuabe, Babatunde Ogunbayo
2022 Buildings  
The paper provides a guide to maturity model development in the digitisation era.  ...  The study is crucial for proper maturity model development in the digitisation era.  ...  capabilities, software industry, software process capability 8 Cloud computing, cyber security, product lifecycle management, technology transfer Buildings 2022, 12, x FOR PEER REVIEW 6 of 16 Table  ... 
doi:10.3390/buildings12060858 fatcat:3nvlzvd2ejb7focoshohctmxrq

Cybersecurity in the Era of Digital Transformation: The case of Greece

Leandros Maglaras, George Drivas, Nestoras Chouliaras, Eerke Boiten, Costas Lambrinoudakis, Sotiris Ioannidis
2020 Zenodo  
issued a Ministerial Decree that helped establish a cybersecurity framework for the public sector and the critical infrastructures that reside in Greece.  ...  This article presents the cyber security progress in Greece since the creation of the Greek National Cyber Security Authority as a nation-wide cybersecurity coordination and policy making unit.  ...  In that way organisations will be able to adopt properly these regulations and help them to identify current potential security issues and structure new security plans. IX.  ... 
doi:10.5281/zenodo.4462523 fatcat:it7j4eh27jdj5fgatif4tkass4

eHealth and Integrated Primary Health Care Centres

Siaw-Teng Liaw, Rachael Kearns, Jane Taggart, Oliver Frank, Riki Lane, Michael Tam, Sarah Dennis, Hairong Yu, Christine Walker, Grant Russell, Mark Harris
2017 International Journal of Integrated Care  
Primary Health Care Centres (IPHCCs).Setting: Seven IPHCCs in metropolitan and rural settings in 3 Australian states: an enhanced private general practice, four GP SuperClinics, a "HealthOne" private-public  ...  The ICM reflects how an organisation collects, manages and shares information in the health neighbourhood, manages information communication technologies (ICT), data quality management and governance,  ... 
doi:10.5334/ijic.3154 fatcat:htbrfnxh3fch3n7gnnxybbdn6e
« Previous Showing results 1 — 15 out of 26,358 results