Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,585,257 papers from all fields of science
Search
Sign In
Create Free Account
ISO/IEC 27001:2013
Known as:
ISO 27001
, ISO27001
, ISO2700X
Expand
ISO/IEC 27001:2013 is an information security standard that was published on the 25th September 2013. It supersedes ISO/IEC 27001:2005, and is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Application security
BS 7799
Cyber Essentials
ISO/IEC 27001:2005
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance
Vasiliki Diamantopoulou
,
A. Tsohou
,
Maria Karyda
Trust and Privacy in Digital Business
2019
Corpus ID: 201059044
The General Data Protection Regulation that is already in effect for about a year now, provisions numerous adjustments and…
Expand
2016
2016
Assessment of ISMS based on standard ISO/IEC 27001:2013 at DISKOMINFO Depok City
Nurbojatmiko
,
A. Susanto
,
Euis Shobariah
4th International Conference on Cyber and IT…
2016
Corpus ID: 46008143
This research is done on the Data and Information Division at the Department of Communications and Information Technology at…
Expand
2016
2016
Tata Kelola Keamanan Informasi Pada PDAM Menggunakan ISO/IEC 27001:2013 Dan Cobit 5
Mei Lenawati
,
Wing Wahyu Winarno
2016
Corpus ID: 115074647
Abstract - PDAM XYZ is a service company for public water providers around XYZ . As a company that is already using the…
Expand
2014
2014
Der Standard ISO/IEC 27001:2013
Kai Jendrian
Datenschutz und Datensicherheit - DuD
2014
Corpus ID: 255353948
Nach acht Jahren wurde 2013 der ISMS-Standard ISO/IEC 27001 überarbeitet. In diese überarbeitung sind viele Erfahrungen aus der…
Expand
2014
2014
Breaking the Web: Data Localization vs. the Global Internet
Anupam Chander
,
Uyen P. Le
2014
Corpus ID: 167149764
A BRICS Internet, the Euro Cloud, the Iranian Internet. Governments across the world eager to increase control over the World…
Expand
2013
2013
A pattern-based method for establishing a cloud-specific information security management system
Kristian Beckers
,
Isabelle Côté
,
Stephan Faßbender
,
M. Heisel
,
S. Hofbauer
Requirements Engineering
2013
Corpus ID: 52859352
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the…
Expand
2011
2011
Analysis of Smart Grid security standards
Yong Wang
,
Da Ruan
,
+6 authors
Jinshi Yang
International Conference on Computer Science and…
2011
Corpus ID: 2222457
Smart Grid security is very important subject. Vulnerabilities from cyber, smart meter, zone management, protection procedures…
Expand
2009
2009
Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001
W. Boehmer
ARES
2009
Corpus ID: 15041154
If companies wish to safeguard their value chain, they should invest with the singular goal of securing revenues by taking…
Expand
Highly Cited
2008
Highly Cited
2008
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001
W. Boehmer
Second International Conference on Emerging…
2008
Corpus ID: 17349232
The ISO27001:2005, as an information security management system (ISMS), is establishing itself more and more as the security…
Expand
2008
2008
Interactive Selection of ISO 27001 Controls under Multiple Objectives
T. Neubauer
,
Andreas Ekelhart
,
Stefan Fenz
IFIP International Information Security…
2008
Corpus ID: 6441996
IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE