ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 13, No. 3, December 2024: 428-435
434
within an organization. This underscores the fundamental role of education in cultivating a more robust and
secure information system.
REFERENCES
[1] B. H. Ahmedi, X. Thaqi, and R. Mustafa, “Separate jobs of three types of users for better functioning of e-learning in UKZ,”
International Journal of Smart Education and Urban Society, vol. 13, no. 1, pp. 1–9, Feb. 2022, doi: 10.4018/ijseus.291710.
[2] B. Ahmedi, X. Thaqi, R. Mustafa, D. Artan, E. and Alimi, and N. Demaku, “Development of massive open online courses,”
in Innovations, Technologies and Research in Education, 2018, pp. 61–73.
[3] UKZ, “Sistemi Menaxhimit Universitar, SMU,” Unisoft-SMU, 2020. https://smu.uni-gjilan.net/Account/Login.
[4] UKZ-M, “T-edu,” UKZ, 2020. https://ukz-platforma.net/login.
[5] E. Humphreys, “Information security management standards: compliance, governance and risk management,” Information
Security Technical Report, vol. 13, no. 4, pp. 247–255, Nov. 2008, doi: 10.1016/j.istr.2008.10.010.
[6] R. Davis, “The art of network penetration testing: how to take over any company in the world,” Shelter Island, USA: Manning, p.
304, 2020.
[7] M. P. Da Silva and R. M. De Barros, “Maturity model of information security for software developers,” IEEE Latin America
Transactions, vol. 15, no. 10, pp. 1994–1999, Oct. 2017, doi: 10.1109/TLA.2017.8071246.
[8] T. Weil, “Standards for cloud risk assessments - what’s missing,” IT Professional, vol. 22, no. 6, pp. 16–23, Nov. 2020,
doi: 10.1109/MITP.2019.2949361.
[9] G. Culot, F. Fattori, M. Podrecca, and M. Sartor, “Addressing industry 4.0 cybersecurity challenges,” IEEE Engineering
Management Review, vol. 47, no. 3, pp. 79–86, Sep. 2019, doi: 10.1109/EMR.2019.2927559.
[10] L. E. Sánchez, A. Santos-Olmo, E. Álvarez, E. Fernandez-Medina, and M. Piattini-Velthuis, “LOPD compliance and ISO 27001
legal requirements in the health sector,” IEEE Latin America Transactions, vol. 10, no. 3, pp. 1824–1837, Apr. 2012, doi:
10.1109/TLA.2012.6222590.
[11] I. Mantra, A. A. Rahman, and H. Saragih, “Maturity framework analysis ISO 27001: 2013 on Indonesian Higher Education,”
International Journal of Engineering & Technology, vol. 9, no. 2, pp. 429–436, Apr. 2020, doi: 10.14419/ijet.v9i2.30581.
[12] F. Djebbar and K. Nordstrom, “A comparative analysis of industrial cybersecurity standards,” IEEE Access, vol. 11,
pp. 85315–85332, 2023, doi: 10.1109/ACCESS.2023.3303205.
[13] L. H. Collante, Y. Escobar, F. Acosta, A. Pranolo, and A. Prasetya, “Preparation of the information security management system
implementation based on the NTC-ISO-IEC 27001:2013 standard at the IUB University Institution,” in 1st IEEE Colombian
Caribbean Conference, C3 2023, Nov. 2023, pp. 1–6, doi: 10.1109/C358072.2023.10436270.
[14] F. Kitsios, E. Chatzidimitriou, and M. Kamariotou, “The ISO/IEC 27001 information security management standard: how to
extract value from data in the IT sector,” Sustainability (Switzerland), vol. 15, no. 7, p. 5828, Mar. 2023,
doi: 10.3390/su15075828.
[15] D. Milicevic and M. Goeken, “Ontology-based evaluation of ISO 27001,” in IFIP Advances in Information and Communication
Technology, vol. 341 AICT, 2010, pp. 93–102.
[16] E. Humphreys, Implementing the ISO/IEC 27001 ISMS Standard, Second Edition, Second Edi. Norwood: Artech House, 2016.
[17] M. Mirtsch, J. Kinne, and K. Blind, “Exploring the adoption of the international information security management system
standard ISO/IEC 27001: a web mining-based analysis,” IEEE Transactions on Engineering Management, vol. 68, no. 1, pp. 87–
100, Feb. 2021, doi: 10.1109/TEM.2020.2977815.
[18] M. Siponen and R. Willison, “Information security management standards: problems and solutions,” Information and
Management, vol. 46, no. 5, pp. 267–270, Jun. 2009, doi: 10.1016/j.im.2008.12.007.
[19] D. Makupi and S. M. Karume, “Towards an information security maturity model for universities based on ISO 27001,” American
Journal of Humanities and Social Sciences Research, no. 6, pp. 241–245, 2019, [Online]. Available: www.ajhssr.com.
[20] A. Y. Eskaluspita, “ISO 27001:2013 for laboratory management information system at school of applied science Telkom
University,” IOP Conference Series: Materials Science and Engineering, vol. 879, no. 1, p. 012074, 2020, doi: 10.1088/1757-
899X/879/1/012074.
[21] R. Von Solms, “Information security management: why standards are important,” Information Management and Computer
Security, vol. 7, no. 1, pp. 50–57, Mar. 1999, doi: 10.1108/09685229910255223.
[22] C. Hsu, T. Wang, and A. Lu, “The impact of ISO 27001 certification on firm performance,” in Proceedings of the Annual Hawaii
International Conference on System Sciences, Jan. 2016, vol. 2016-March, pp. 4842–4848, doi: 10.1109/HICSS.2016.600.
[23] W. Boehmer, “Cost-benefit trade-off analysis of an ISMS based on ISO 27001,” in Proceedings - International Conference on
Availability, Reliability and Security, ARES 2009, 2009, pp. 392–399, doi: 10.1109/ARES.2009.128.
[24] J. Velasco, R. Ullauri, L. Pilicita, B. Jacome, P. Saa, and O. Moscoso-Zea, “Benefits of implementing an ISMS according to the
ISO 27001 standard in the ecuadorian manufacturing industry,” in Proceedings - 3rd International Conference on Information
Systems and Computer Science, INCISCOS 2018, Nov. 2018, vol. 2018 -December, pp. 294–300,
doi: 10.1109/INCISCOS.2018.00049.
[25] H. Guo, M. Wei, P. Huang, and E. G. Chekole, “Enhance enterprise security through implementing ISO/IEC 27001 standard,” in
2021 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2021, Dec. 2021, pp. 1–6,
doi: 10.1109/SOLI54607.2021.9672401.
[26] J. Flaus, “Standards, guides, and regulatory aspects,” in Cybersecurity of Industrial Systems, Wiley, 2019, pp. 141–166.
[27] B. KENYON, ISO 27001 Controls – A guide to implementing and auditing, Second edi. IT Governance Publishing, 2024.
[28] A. R. McGee, F. A. Bastry, U. Chandrashekhar, S. R. Vasireddy, and L. A. Flynn, “Using the Bell Labs security framework to
enhance the ISO 17799/27001 information security management system,” Bell Labs Technical Journal, vol. 12, no. 3, pp. 39–54,
Nov. 2007, doi: 10.1002/bltj.20248.
[29] A. Tanovic and I. S. Marjanovic, “Development of a new improved model of ISO 20000 standard based on recommendations
from ISO 27001 standard,” in 2019 42nd International Convention on Information and Communication Technology, Electronics
and Microelectronics, MIPRO 2019 - Proceedings, May 2019, pp. 1503–1508, doi: 10.23919/MIPRO.2019.8756843.