Repository of colleges and higher education institutions

Show document
A+ | A- | Help | SLO | ENG

Title:Vpeljava notranjih pravil z uporabo informacijske in komunikacijske tehnologije v izbrano organizacijo : magistrska naloga
Authors:ID Pintar, Jure (Author)
ID Delak, Boštjan (Mentor) More about this mentor... New window
Files:.pdf MAG_Pintar_Jure_i2016.pdf (1,56 MB)
MD5: 95CEBCBAFC46DA5462F49E5E7B2FAE42
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FIŠ - Faculty of Information Studies in Novo mesto
Abstract:Obvladovanje informacijskih in komunikacijskih tehnologij za sleherno organizacijo predstavlja ključen vir pri njenem poslovanju, saj dnevno nastajajo ogromne količine podatkov in informacij, ki jim je potrebno zagotoviti zaupnost, celovitost in razpoložljivost oziroma jih ustrezno zavarovati. Kako in na kakšen način je odvisno predvsem od organizacij samih in od definirane varnostne politike, v kolikor jo organizacija izvaja. Pomembno vlogo pri tem igrajo zaposleni, ki z informacijskimi in komunikacijskimi tehnologijami upravljajo, saj se pri svojem delu srečujejo s številnimi internimi postopki, ki so lahko v praksi že uveljavljeni, niso pa natančno definirani in dokumentirani. V ta namen je priporočljivo, da organizacija sprejme notranja pravila, kjer med drugim opredeli, kako bo potekalo izvajanje informatike v organizaciji in jih uskladi s priporočili strokovnjakov, s primeri dobrih praks in z veljavno zakonodajo.
Keywords:IKT, informacijska in komunikacijska tehnologija, informacijska varnost, varnostna politika, notranja pravila, vpeljava
Place of publishing:Novo mesto
Place of performance:Novo mesto
Publisher:[J. Pintar]
Year of publishing:2016
Year of performance:2016
Number of pages:78 str., [6] f. pril.
PID:20.500.12556/ReVIS-4978 New window
COBISS.SI-ID:2048402451 New window
UDC:659.2:004(043.2)
Note:Na ov.: Magistrska naloga : študijskega programa druge stopnje;
Publication date in ReVIS:22.08.2018
Views:4839
Downloads:190
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:21.08.2018

Secondary language

Language:English
Abstract:Managing information and communication technologies presents a key resource at each organization's business. A huge amount of data and information are produced on a daily basis and confidentiality, integrity and availability needs to be ensured. This all depends on the organizations and their defined security policy, if they implement it. Employees are given a significant role with it, because they manage with information and communication technologies. They face with numerous internal procedures, which are already established in practice, but no thoroughly defined and documented. For this purpose, it is recommended that the organization accepts the internal rules and defines exactly how information and communication technology in the organization will be carried out. It also has to be adjusted with the experts recommendations, examples of good practice and with the valid legislation.
Keywords:ICT, Information and communication technology, information security, security policy, internal rules, implementation


Back