Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "information management" wg kryterium: Temat


Wyświetlanie 1-5 z 5
Tytuł:
Creating value added for an enterprise by managing information security incidents
Autorzy:
Żywiołek, Justyna
Taranto di, Alberto
Powiązania:
https://bibliotekanauki.pl/articles/88728.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
incident service
management of information security incidents
creation of value through information security
Opis:
This article presents the structure and analysis of information security incidents in a production company in 2015-2017. The purpose of the analysis is to identify incidental events and their frequencies. The analysis includes the occurrence of notifications, threatening events, employee errors and false alarms. The conducted research includes also the procedure for handling the incident in the enterprise. The enterprises very often avoid informing their contractors about the occurrence of incidents. Thanks to the analysis of incidents and a clearly defined action plan, the examined enterprise tested the incidents and actions taken with them as a method of creating the added value of the enterprise during the period under consideration. The conducted research has shown that contractors who are aware of preventive actions taken, as well as those affecting information security even after the occurrence of an incident, are more willing to provide trust and even support to the surveyed enterprise. The conducted analysis is a pilot study carried out in one large enterprise in the metallurgical industry. The aim of the conducted research is to show that the incident or negative event may have a positive impact on the company's image. The research was carried out with the use of a questionnaire and in-depth interview with representatives of enterprises that are co-operators of the examined company.
Źródło:
System Safety : Human - Technical Facility - Environment; 2019, 1, 1; 156-162
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Barriers to knowledge sharing in the field of information security
Autorzy:
Żywiołek, Justyna
Rosak-Szyrocka, Joanna
Jereb, Borut
Powiązania:
https://bibliotekanauki.pl/articles/1537544.pdf
Data publikacji:
2021
Wydawca:
STE GROUP
Tematy:
knowledge sharing
information security
knowledge management
Opis:
Today, sharing knowledge requires taking into account many aspects. Variable environmental conditions, the people factor, and the security of resources are just a few that should be considered for a noticeable improvement in the functioning of the company. Supporting this course of action requires the identification of all barriers that may exist in the enterprise. Only the owner and senior management by establishing system and organizational changes can influence this element of the business. The aim of the article is to indicate the problems in this respect that block the proper functioning of the company in the field of information and knowledge exchange. The survey was conducted with the help of a questionnaire among 189 respondents. The industry has significantly decreased in the last few decades, currently there are 307 companies operating in Poland. Conclusions from the conducted research were collected on the basis of a questionnaire survey. The further stage of the research will be to compare the collected results with the results from Western European countries.
Źródło:
Management Systems in Production Engineering; 2021, 2 (29); 114-119
2299-0461
Pojawia się w:
Management Systems in Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of management security of information
Autorzy:
Żywiołek, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/2064878.pdf
Data publikacji:
2019
Wydawca:
STE GROUP
Tematy:
security of information
personal data
security management
Opis:
The article highlights the importance of information and the need to manage its security. The importance of information requires a systemic approach, which is why the standards of conduct for managing information security have been approximated. The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises. The survey was extended to include an analysis of one of the companies subject to the survey. In the following, the case study regarding the production enterprise was also presented.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2019, 2, 1; 515--522
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Value stream mapping in the process of knowledge exchange while maintaining data security in a manufacturing company
Autorzy:
Żywiołek, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/103973.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
data stream mapping methods
data management
data analysis
information
metody mapowania strumieni danych
zarządzanie danymi
analiza danych
informacja
Opis:
The article presents methods of mapping data, information and knowledge value stream in order to identify the flow of key processes and to return knowledge exchange in the examined company. One large production company was audited. The amount of incoming to the company and processing information is so large that it must implement methods to improve their flow. Problems with knowledge exchange associated with high rotation contributed to analyzing the problem.
Źródło:
Quality Production Improvement - QPI; 2020, 2, 1; 11-18
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of competitive advantage
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/88539.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
personal data protection
competitive advantage
data management
information security
ochrona danych osobowych
przewaga konkurencyjna
zarządzanie danymi
bezpieczeństwo informacji
Opis:
The article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 55-61
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies