Open Access
MATEC Web Conf.
Volume 210, 2018
22nd International Conference on Circuits, Systems, Communications and Computers (CSCC 2018)
Article Number 04005
Number of page(s) 6
Section Computers
Published online 05 October 2018
  1. M. Kiedrowicz, J. Stanik, Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity, (in:) B. F. Kubiak and J. Maślankowski (eds), Information Management in Practice, pp. 231-249 (2015) [Google Scholar]
  2. M. Kiedrowicz, J. Stanik, Models and Method for the Risk Assessment of an Intellectual Resource, WSEAS Transactions on Information Science and Applications, 14, pp. 174-183 (2017) [Google Scholar]
  3. J. Stanik, M. Kiedrowicz, Model ryzyka procesów biznesowych. Zeszyty Naukowe Uniwersytetu Szczecińskiego, Ekonomiczne Problemy Usług, Szczecin (2017) [Google Scholar]
  4. M. D. Mesarovic, Matematyczna teoria systemów ogólnych, (in:) G. J. Klir (ed.), Ogólna teoria systemów, WNT, Warsaw (1976) [Google Scholar]
  5. R. Hoffmann, M. Kiedrowicz, J. Stanik, Evaluation of information safety as an element of improving the organization's safety management, MATEC Web of Conferences, 76 (2016) [Google Scholar]
  6. M. Kiedrowicz, Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity, MATEC Web of Conferences, 125 (2017) [Google Scholar]
  7. A. Najgebauer, R. Antkiewicz, D. Pierzchała, J. Rulka, Quantitative Methods of Strategic Planning Support: Defending the Front Line in Europe, in Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology - ISAT 2017, Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 656), ISSN: 2194-5357, (2017) [Google Scholar]
  8. D. Pierzchała, R. Antkiewicz, M. Dyk, R. Kasprzyk, A. Najgebauer, Z. Tarapata, Modelling, simulation and computer support of the Polish criminal procedure, in: Information Systems Architecture and Technology. The Use of IT Technologies to Support Organizational Management in Risky Environment, ed. Z. Wilimowska, L. Borzemski, A. Grzech, J. Świątek, ISBN 978-83-7493-858-7, pp. 51-60, Wrocław, (2014) [Google Scholar]
  9. Z. Tarapata, M. Zabielski, R. Kasprzyk, K. Szkółka, Profile Cloning Detection in Online Social Networks, Computer Science and Mathematical Modelling, vol. 3, pp.39-46, (2016) [Google Scholar]
  10. A. Najgebauer, R. Antkiewicz, M. Chmielewski, M. Dyk, R. Kasprzyk, D. Pierzchała, J. Rulka, Z. Tarapata, The Qualitative and Quantitative Support Method for Capability Based Planning of Armed Forces Development, LNAI, Springer, vol. 9012, pp. 224-234, (2015) [Google Scholar]
  11. J. Stanik, Utrzymywanie wymaganego poziomu bieżącej niezawodności funkcjonalnej komputerowego systemu zautomatyzowanego dowodzenia, praca doktorska, WAT, Warszawa (1987) [Google Scholar]
  12. ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements, pp. 10-22, Geneva (2013) [Google Scholar]
  13. ISO/IEC 27006:2015 Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems, pp. 29-34, Geneva (2013) [Google Scholar]
  14. PN-ISO/IEC 27005 Technika informatyczna, Techniki bezpieczeństwa. Zarządzanie ryzykiem w bezpieczeństwie informacji, PKN (2013) [Google Scholar]
  15. PN-ISO 31000:2012 Zarządzanie ryzykiem - Zasady i wytyczne, PKN (2012) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.