{"title":"信息安全维护任务解决方案的人员配置策略","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/DIPDMWC.2016.7529399","DOIUrl":null,"url":null,"abstract":"The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Staffing policy for information security maintenance tasks solution\",\"authors\":\"N. Miloslavskaya, A. Tolstoy\",\"doi\":\"10.1109/DIPDMWC.2016.7529399\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.\",\"PeriodicalId\":298218,\"journal\":{\"name\":\"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)\",\"volume\":\"160 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DIPDMWC.2016.7529399\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DIPDMWC.2016.7529399","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Staffing policy for information security maintenance tasks solution
The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.