Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "information security," wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Creating value added for an enterprise by managing information security incidents
Autorzy:
Żywiołek, Justyna
Taranto di, Alberto
Powiązania:
https://bibliotekanauki.pl/articles/88728.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
incident service
management of information security incidents
creation of value through information security
Opis:
This article presents the structure and analysis of information security incidents in a production company in 2015-2017. The purpose of the analysis is to identify incidental events and their frequencies. The analysis includes the occurrence of notifications, threatening events, employee errors and false alarms. The conducted research includes also the procedure for handling the incident in the enterprise. The enterprises very often avoid informing their contractors about the occurrence of incidents. Thanks to the analysis of incidents and a clearly defined action plan, the examined enterprise tested the incidents and actions taken with them as a method of creating the added value of the enterprise during the period under consideration. The conducted research has shown that contractors who are aware of preventive actions taken, as well as those affecting information security even after the occurrence of an incident, are more willing to provide trust and even support to the surveyed enterprise. The conducted analysis is a pilot study carried out in one large enterprise in the metallurgical industry. The aim of the conducted research is to show that the incident or negative event may have a positive impact on the company's image. The research was carried out with the use of a questionnaire and in-depth interview with representatives of enterprises that are co-operators of the examined company.
Źródło:
System Safety : Human - Technical Facility - Environment; 2019, 1, 1; 156-162
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Barriers to knowledge sharing in the field of information security
Autorzy:
Żywiołek, Justyna
Rosak-Szyrocka, Joanna
Jereb, Borut
Powiązania:
https://bibliotekanauki.pl/articles/1537544.pdf
Data publikacji:
2021
Wydawca:
STE GROUP
Tematy:
knowledge sharing
information security
knowledge management
Opis:
Today, sharing knowledge requires taking into account many aspects. Variable environmental conditions, the people factor, and the security of resources are just a few that should be considered for a noticeable improvement in the functioning of the company. Supporting this course of action requires the identification of all barriers that may exist in the enterprise. Only the owner and senior management by establishing system and organizational changes can influence this element of the business. The aim of the article is to indicate the problems in this respect that block the proper functioning of the company in the field of information and knowledge exchange. The survey was conducted with the help of a questionnaire among 189 respondents. The industry has significantly decreased in the last few decades, currently there are 307 companies operating in Poland. Conclusions from the conducted research were collected on the basis of a questionnaire survey. The further stage of the research will be to compare the collected results with the results from Western European countries.
Źródło:
Management Systems in Production Engineering; 2021, 2 (29); 114-119
2299-0461
Pojawia się w:
Management Systems in Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Access to data and employee actions for information security
Autorzy:
Żywiołek, Justyna
Taranto di, Alberto
Powiązania:
https://bibliotekanauki.pl/articles/103953.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
mobile devices
data security
user safety
bezpieczeństwo informacji
urządzenia mobilne
bezpieczeństwo danych
bezpieczeństwo użytkownika
Opis:
Access to data is a nefralgic information security zone. On the one hand, we do everything to protect them against disclosure, and on the other hand, we need a new employee to provide data and information to be able to do their job. Managing access to data in the enterprise significantly affects the level of security in all areas of activity. The article presents the results of research in the field of security of policy objectives in a selected production company. The purpose of preliminary research is to analyze selected issues in the field of data access, control methods and employee responsibility. The article discusses the results of research on the access to information by employees. Lack of access to the data paralyzes their work, but their excess causes information chaos and makes it difficult to make a decision. The research results clearly indicate that access to data is treated as a priority, forgetting about access to computer software, mobile devices, which can also be the security of the company.
Źródło:
Quality Production Improvement - QPI; 2019, 1, 1; 42-46
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Identification of attributes of information as an element of management security of information in the company
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/104152.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
information attributes
data processing in the enterprise
bezpieczeństwo informacji
atrybut informacji
przetwarzanie danych w przedsiębiorstwie
Opis:
Information is a special type of resource in an enterprise. is an indispensable element of every action taken. The article presents the essence of resources subject to special protection, affecting the company's information security. This allowed to identify the information attributes in the area of security of the surveyed enterprises. The article analyzes the attributes of information affecting the activities of the surveyed enterprises, the pace of work, information chaos. The research confirmed the importance of the information features, which will help the employer and superiors to evaluate the manner, frequency of providing information and making a screening to whom the information is provided.
Źródło:
Quality Production Improvement - QPI; 2019, 1, 1; 170-177
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of management security of information
Autorzy:
Żywiołek, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/2064878.pdf
Data publikacji:
2019
Wydawca:
STE GROUP
Tematy:
security of information
personal data
security management
Opis:
The article highlights the importance of information and the need to manage its security. The importance of information requires a systemic approach, which is why the standards of conduct for managing information security have been approximated. The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises. The survey was extended to include an analysis of one of the companies subject to the survey. In the following, the case study regarding the production enterprise was also presented.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2019, 2, 1; 515--522
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of competitive advantage
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/88539.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
personal data protection
competitive advantage
data management
information security
ochrona danych osobowych
przewaga konkurencyjna
zarządzanie danymi
bezpieczeństwo informacji
Opis:
The article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 55-61
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies