Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security audit" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Decision support system for information systems security audit (WABSI) as a component of it infrastructure management
Autorzy:
Rudowski, M.
Tarnowska, K.
Powiązania:
https://bibliotekanauki.pl/articles/95149.pdf
Data publikacji:
2016
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
security audit
information systems
IT management
Opis:
The paper presents the concepts and implementation of application for monitoring, analysis and reporting of enterprise information systems security. The purposes of the application are: comprehensive support for IT security administrator and auditors in checking information security and systems security levels, checking security policy implementation and compliance with security standards required by certificates and other regulations. The paper presents the requirements for the system, its architecture and implementation of particular components, evaluation of application and tests executed with regard to security standards. According to the authors, it is the IT management system which many organizations and solution providers lack. It results in that the effectiveness of the management of information security in these organizations may be less than expected.
Źródło:
Information Systems in Management; 2016, 5, 3; 389-400
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The principle of the evaluate of safety and the reliability of ERP systems
Autorzy:
Gąska, D.
Świć, A.
Powiązania:
https://bibliotekanauki.pl/articles/117958.pdf
Data publikacji:
2009
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
audit
security
evaluation
ERP system
Opis:
The paper presents the possibility of the realization of the evaluation of the security of the Enterprise Resource Planning (ERP) systems following the regulations specified by European and Polish norms which relate to the security of information systems in enterprises with the special regard to the ERP systems. It also introduces the possibility of creating the security system programme and the actions executed during the evaluation.
Źródło:
Applied Computer Science; 2009, 5, 2; 1-12
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of financial audit in assessing company's development ability and increasing investors' protection
Autorzy:
Kuczyńska-Cesarz, Anna
Szczerbak, Monika
Powiązania:
https://bibliotekanauki.pl/articles/111005.pdf
Data publikacji:
2020
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
financial audit
financial statement
audit report
letter to the board
security of commerce
Opis:
The development of global economic dependencies contributed to the significant demand increase for financial information about companies. Only reliable and transparent financial statements are a useful source of information. To provide security and protection for the stakeholders, financial statements must be audited. In Poland the current thresholds obliging companies to audit financial statements are relatively high. Therefore, the vast majority of enterprises do not audit their financial statements. If financial audit is of such a high rank, why does the vast majority of small and medium enterprises do not audit their financial statements? This article attempts to answer that question and prove that the audit norms, lack of knowledge of the report’s substance, and consequently - lack of conviction about its usefulness in making accurate and effective decisions in the company, is resulting in marginal interest among entrepreneurs to use the auditors’ services.
Źródło:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych; 2020, 2; 1-16
2450-1859
2450-8721
Pojawia się w:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cognitive Modeling and Formation of the Knowledge Base of the Information System for Assessing the Rating of Enterprises
Autorzy:
Kryvoruchko, Olena
Desiatko, Alona
Karpunin, Igor
Hnatchenko, Dmytro
Lakhno, Myroslav
Malikova, Feruza
Turdaliev, Ayezhan
Powiązania:
https://bibliotekanauki.pl/articles/27311936.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
audit
Bayesian network
artificial neural networks
Opis:
A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base (KB) for an intelligent information system (IIS). This IIS is developed to assess the financial condition (FC) of the company. Moreover, for circumstances related to the identification of individual weakly structured factors (signs). The proposed model makes it possible to increase the understanding of the analyzed economic processes related to the company's financial system. An iterative algorithm for IIS has been developed that implements a model of cognitive modeling. The scientific novelty of the proposed approach lies in the fact that, unlike existing solutions, it is possible to adjust the structure of the algorithm depending on the characteristics of a particular company, as well as form the information basis for the process of assessing the company's FC and the parameters of the cognitive model.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 4; 697--705
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automation of Information Security Risk Assessment
Autorzy:
Akhmetov, Berik
Lakhno, Valerii
Chubaievskyi, Vitalyi
Kaminskyi, Serhii
Adilzhanova, Saltanat
Ydyryshbayeva, Moldir
Powiązania:
https://bibliotekanauki.pl/articles/2124744.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information security
audit
Bayesian network
artificial neural networks
Opis:
An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DCS.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 3; 549--555
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of customer service quality and security in retail network
Autorzy:
Pilar, Damian
Kot, Sebastian
Powiązania:
https://bibliotekanauki.pl/articles/88635.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
customer service quality
quality audit
data security
distribution network
jakość obsługi klienta
jakość
audyt jakości
bezpieczeństwo danych
sieć dystrybucji
Opis:
One of main purposes of every enterprise is to satisfy the buyer, therefore customer service is perceived as the capability or the ability of satisfying customers expectations and requirements. The present article was devoted to the issue of the quality assessment of customer service assuring the data security on the basis of pharmacies network case study of. The survey was based on prepared questionnaire forms analyzing the quality of the customer service on the basis of three areas. Results of the survey indicate that modern IT tools are very helpful, because they can provide data for analysis of numerous distribution individuals in the context of the quality of customer service in a very fast way.
Źródło:
System Safety : Human - Technical Facility - Environment; 2019, 1, 1; 647-652
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies