ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Information Governance and Cyber Security

Verified

Added on  2023/01/17

|17
|6166
|47
AI Summary
This report discusses the importance of information governance system and current cyber security threats. It also explores the role of information security officer in an organization.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information Governance and Cyber
Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
Current Cyber Security Threats...................................................................................................3
Importance of Information Governance System..........................................................................5
Role of Information Security Officer in Organization.................................................................5
TASK 2............................................................................................................................................6
Approach Used for Information Security Management System..................................................6
Scope of The Information Security Management System..........................................................6
Content of the Information Security Management System..........................................................7
TASK 3............................................................................................................................................8
Risk Assessment Methodologies.................................................................................................9
Information Assets, Identify Threats Vulnerabilities and Risk Association..............................10
TASK 4..........................................................................................................................................10
Information Security policy.......................................................................................................10
Information Governance Policy Framework.............................................................................13
Implementation plan and monitoring mechanisms....................................................................14
Monitoring and Controlling.......................................................................................................15
CONCLUSION..............................................................................................................................15
REFERENCES..............................................................................................................................16
Document Page
INTRODUCTION
Information governance is process that is used by the business organizations to kept their
information and data safe and secure through various policies and processes that are mentioned
in the information security management system. This report is covering various criterion of the
Wallington Trust Hospital that provides the secondary health related services to the patients of
suburb of London Borough of Sutton. The current threats of cyber security will be assesses in the
report. The requirement and information of the information governance frame work will be
evaluated for the Wallington Trust Hospital. The frame work used or suggested for Wallington
Trust Hospital also will be justified in the report. Information system that is used in the
organization will be critically evaluated in the study process. Importance of the information
management system will be analysed in the study. Different quantitative and qualitative risk
assessment process will be discussed in the report. Implementation plan of the cyber security
frame work will be discussed in the report. Further evaluation of scope, purpose, roles and
responsibilities are also will be analysed in the report.
TASK 1
Current Cyber Security Threats
The most common threats that are considered in cyber security are -
Computer Viruses
This is one of the most common type of threats in the cyber security. Computer viruses
are basically known as the computer programs that are created by bad intention and designed to
harm the data, information and hardware of the user. This is most common and highly dangerous
threats that can cause damage to the information and data of particular computer. As a virus get
installed in a computer it starts to infect the operation of system (Laybats and Tredinnick, 2016).
This virus programs are written to create mess with process that is basically used by the system
to perform certain task. Operations of the computer virus replicate and execute its operations. It
also can cause leakage in the data and information of the Wallington Trust Hospital. Viruses can
affect the data and information processing in host computer. Viruses also can provide gate way
to the hackers to breach in the computer systems of organization.
Spyware Threats
It is also know as compute program that keep track on offline and online activity of user.
The operations and functions of this program is created to track activities of used on computer
Document Page
system and transfer to the creators. This is major threats for organization like Wallington Trust
Hospital cause it can reduce the confidentiality and privacy of the information and data of
hospital staff, patient and transaction details that are important for the organization.
Hackers and Predators
There are different people are using the internet and harmful software to intentionally
harm target. The purpose of this action could be depended on the mentality of the hacker. In this
process hackers that presents inside or outside the organization look for the gaps in the internet
gateway of computer and online system of organization to stole or damage their data base for
criminal purposes (Van Horenbeeck, 2018). This is how hackers and predators can misuse the
personal information of patient and organization to meet personal profits and criminal offence.
Phishing
On daily basis different kind of information is received by organization that can mislead
the process and operations of the organization. Mostly this kind of threats are exists in form of E-
mail,software or online link that can harm the online processes and operations of the
organization. By this process data and personal information of patient or nursing staff can be
stole by providing access to the external hackers to the computer system of organization.
There are some main threats that are possible for the computer and online system of
organization. These threats can affect the operations of organization with damage range of minor
to major.
Importance of Information Governance System
Information governance system is used by profit or non profit organization to to maintain
its operation without any major or minor issue in its information handling process and
operations. The information governance system has different advantages that can improve the
safety measures of organization. Some of main benefits of Information governance system are-
Turn data Safe and secure
This is one of the main feature of the information governance system that helps the
organization to keep their data and information safe and secure from different troubles that can
harm their operations.
Reduce the Risk
This is main function of the information governance system to prevent various kind of
risk for the information system of the organization. It consists of different layers of security

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
protocols that posses anti malware programs that are able to detect and eliminate those from the
system and prevent their impact on the information and data of patients and staff members.
Provide Better Experience to Patients
There are different people use the services provided by the Wallington Trust Hospital.
The confidentiality of their information is most important target of organization. Minor data or
information leak can cause major troubles to them and their patients. Information governance
consists of different regulations and policies that are capable to prevent any kind of breach in
their network. It helps them to provide better experience to them.
Role of Information Security Officer in Organization
Role of information security auditor is important for Wallington Trust Hospital. The
duties of the information security auditor is to evaluate the security concerns of organization
propose various plans that can help the organization to improve their security measures in
organization to prevent major security related troubles like social, ethical and legal troubles for
patient and organization (von Solms and von Solms, 2018). There are some legal, social and
ethical requirements organization needs to consider providing better satisfaction to the patients
and people who are working in company. The main role of the information security auditor to
evaluate the implication of the current measures of organization and and how the organization
can prevent the unauthorised access of malware, hacker or other issues to the information system
of Wallington Trust Hospital. This is duty of information security auditor to ensure the safety,
security and privacy of information that is hold by computer network of organization. There are
different measures are considered by the auditor to make system effective and safe for different
online and offline operations. By perform different tests they check the effectiveness of their
Information scurity management system.
This is Information security auditor can help the management of Wallington Trust
Hospital to maintain effective performance of information systems of company.
TASK 2
Approach Used for Information Security Management System
There are different approaches are possible for the information security management
system that is used in organization like Wallington Trust Hospital. In the hospital there is
different type of information is stored that is confidential and important for operations of
organization. For the operations and implementation of the Information security management
Document Page
system advance approach is used which is considered as one of the best approach to keep the
data and information of patients and staff members safe and secure (Bang, 2018). In this
approach the information that is stored in organization is categorised in different level. This
categorisation is depended on the importance and confidentiality of the information. This is how
by level of categories organization prioritised the level of information security. By this process
organization keep their information base secure from any external or internal breach. There is
also three layer protection is also used in order to prevent data breaches.
Scope of The Information Security Management System
Information security management systems are basically used in the organization to
improve the level of safety and privacy of data. While the organization are planning to
implementing information systems in their information system they consider different security
and safety measures to keep their private and confidential files safe and secure. The main scope
of the Information security management system is related to the protection of the confidential
information which is important for organization. By providing better security criteria
organization can provide better and effective service to patients and their relatives. This can help
them to improve their confidence and satisfaction level. By this process organization can
effectively improve the people experience. With help if this system organization can reduce the
level of risk in the information transfer process. It also helps the organization to provide better
effective management of information and data in organization. Information security management
system also provides the opportunities to the organization in order to make more improvement in
their security measures to protect their system from internal and external threats (Almuhammadi
and Alsaleh, 2017). The features of ISMS can help the organization to keep their information
secure for long term uses. This is the proposed information security system can help organization
to improve their data and information security measures. This system also able to mitigate the
risk factors of organization.
Content of the Information Security Management System
There are different information security and safety policies are used by the organization
in ISMS. These policies are more concerned about the handling of data with in the organization
network. The main purpose of the these policies is to improve the security measures during
transferring, collecting, storing and processing patient and organizational data. This is how the
policies of ISMS prevent the unauthorised handling and process of data and information that can
Document Page
affect the data confidentiality of patients (Anderson, 2016). The Information Governance frame
work is a outline of the data safety and security measures that can help the organization to
manage data safety to the maximum level. This is really important for the organization to
manage the personal and professional data of patient and organization confidential to maintain
the effective data handling with in the organization (Gashgari, Walters and Wills, 2017).
Wallington Trust Hospital provides the secondary health services to the people and this is basic
need of health care organization to keep the data of people confidential in order to provide better
services to them.
TASK 3
Fundamental Fiduciary Doctor Patient Relationship
This is important for the health care organization to have better relationship between the
doctor and patient. This relationship is based on different factors. These factors also consists of
personal safety, security socially and ethically (Cavelty and Mauer, 2016). If the relationship
between patient and doctor is not good than it can cause negative impact on the services of
organization. So basically I is required for organization to maintain the confidence level of
patient high to develop better understanding between doctors and patients. This is possible by
ensure the patient about data safety and privacy. This is all about developing trust between
doctor and patient for effective transfer of information in order to provide better services to the
patient. This is important for the doctor to maintain the data base of information that is provided
by the patient. This can help them to draw better solution for their medical issue. This is how
information governance frame work can help the organization to improve the trust level of
patient and their family in organization.
Higher Data Quality
This is main function of the information governance system to maintain the quality od the
data that is stored in the data base of organization. There is different type of data and information
is stored in their data base. Information governance system helps the organization to maintain the
relevance and accuracy of the data base to draw better results in the end. This is difficult for the
organization like Wallington Trust hospital to maintain the data and information quality in order
to keep their operations and working effective and stay on their organization objectives. This is
how better data and information quality can help organization to provide better service to the
patients.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Fairness and Transparency In Health Care System
Patients are mostly afraid of actions that are performed by the health care organization
and they possess certain confusion in their mind about the treatment they are taking in the
hospital. In this case information governance system help the organization maintain safety and
security of data along with certain level of transparency to provide better satisfaction to the
patient about the treatment they are taking in the health care facility. By this process of
information governance organization ca provide better services to the patients and their relatives.
This is how there are different benefits of using information governance framework in
order to maintain effective handling of data and information of organization and patients. This
benefits of information governance make it more crucial fir health care organization.
Risk Assessment Methodologies
There are two types of risk assessment methodologies can be used in the health care
organization like Wallington Trust Hospital organisation in order to maintain quality and
accuracy of data that is stored in the process. There are two types of risk assessment tools are
used in the organization in order to avoid the possible risks in the information handling process.
This assessment methods are classified in quantitative and quantitative assessment method. The
risk assessment tools that are used in the Wallington Trust Hospital are- Risk Categorization, risk
probability and impact assessment and SWOT analysis. These tools help the organization to
maintain least risk in information handling.
Risk Categorisation
In this process of risk evaluation various risks of the data and information are evaluated
on basis of their sources. This process help the Information security management system to
check the credibility of the information source. By this process Wallington Trust Hospital can
categories the sources on the basis of level of risk. In this process most exposed areas that are
ex[posed to the system are selected for further safety and security information data base.
Risk Probability and Impact Assessment
This is also a risk assessment process that can be used as qualitative risk assessment tool.
By using this process organization can investigate the probability of risk in the data handling
process. And through the risk impact helps the organization to assess the possible cost of that
particular risk on the data base of the organization. This how by calculating probability of risk
Document Page
and probable impact of risk organization can over come the issues in the data management and
security process.
Information Assets, Identify Threats Vulnerabilities and Risk Association
Information Assets
This can be consider as the body of knowledge that is available to the organization. This
type of information is managed and stored as single quality in data base. This also can be taken
as data packets stored in the data base of information system.
Threats
There are different threats in the data handling process. This risks are associated with the
data safety and privacy. a[part form the data privacy and safety the accuracy and relevancy of
data and information is also important for the organization. These some risks are need to be
considered by organization to prevent major impact on their performance and operation.
Vulnerabilities and Risk Association
There are four main type of vulnerabilities can be considered that can have impact on the
processing of the organization. Physical, social, economical and environmental vulnerabilities
can be considered in order to prevent the major issues in the information security management
system. There are also some risk are associated with this process and by considering this
measures organization can improve their work and performance.
TASK 4
Information governance is a process that is known as holistic approach that used by
corporation to manage information by implementing different processes, controls, roles and
metrics to make important information of business more valuable. There are different type of
frame works are used by the organizations to ensure the effective management of the data and
information. These frame works are consists of various kind of rules and regulations that can
protect data of organization and its clients. The main objective of this frame work is to keep data
private and protected in order to maintain the security in organization (Smallwood, 2018). The
Information governance frame work provides set of basic set of rules and processes that can help
to manage the security assets of organization. These frame work are used by various organization
to maintain the safety and security for the information and data base of company. Throughout
this process of implementing frame work for information governance key stakeholders of
organization are included in the process.
Document Page
A Information Security Management Systems required different type of content to
manage the security of organization effectively. This content is used to justify the importance of
security operations that are performed by them. The content used in the information security
management system is known as a defined and effectively documented management system that
includes the policies, processes and systems to manage the security and privacy of the
information which is available in the data base of Wallington Trust Hospital.
Information Security policy
Importance of the Information Governance system for Wallington Trust Hospital can be
understand in different ways. There are mainly two areas are focused by the organization in the
data safety and security processes. These two criterion are data safety and data privacy. This is
how by considering certain factors health care organization can effectively manage information
and data safely. Some advantages of information governance system can justify its importance in
the health care organization like Wallington Trust Hospital.
Introduction
Information security policy (ISP) can be defined as set of policies that are issued by organization
in order to ensure that all information technology users within the domain of the organization or
within their network comply with rules, regulations and guidelines related to security of data or
information that is stored digitally within the network and within the boundaries of the
organization (Edaibat, Dever and Stuban, 2017). These policies are required to set a general plan
of implementation so that desired outcomes can be achieved that further helps in making
decisions. ISP helps in governing protection of data or information which is required to be
protected. It is important for all the organizations to develop an ISP plan in a logical manner so
that they can further enhance security of the information system which is being used by them and
for this they need to identify key users of their information security management system. this
will help them to identify areas of improvement of areas that are required to be focused on in
order to enhance security of their management system. there are many uses of ISP such as data
storage facility to store medical facilities data. In order to maintain integrity of clinical
management system of WTH hospital and provide privacy and confidentiality to all the digital
information of patients which is being stored within the system it is important for the
organization to develop a information security policy framework for all the users of the system
so that data present within the system can be secured and protected in a much better manner

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
(Zende, Patil and Patil, 2018). This Security policy might be different for different users for
example: staff members who communicate with patients of the organization are bound to never
ever share information until and unless higher authorized authorities have asked then to share a
particular information.
Information security policy manual of WTH hospital will help them to develop some policies for
all the users of information system so that they can comply with general rules, regulation and
guidelines of the system.
Purpose
There are variety of reasons due to which organizations create information security policy
such as:
In order to establish a general approach to information security of the system. It helps in setting
some guidelines for the users of the information system so that they can understand the basic
approach of the system to maintain information security(Fu, He and Dong, 2018).
To detect as well as protect compromise of information security for example: misuse of
networks, data, applications and computer system. it is one of the most important purpose of this
Information security purpose so that any kind of misuse of fraud can be prevented or protected.
For WTH it is important because any kind of misuse of information such as patient’s information
can result in serious complications.
To protect as well as maintain reputation of the organization in such a manner that it complies
with both legal and ethical responsibilities of the requirement (Wei, Ci and hang, 2018). For
organization like Wallington Trust Hospital (WTH) it is extremely important to maintain and
comply with ethical and legal responsibilities of the organization as it will help them to maintain
as well as protect their image or reputation.
To observe rights of their patients and deal with their complains or queries.
So, On the basis of this overview of purpose Information security policy of WTH are:
Observe and recognize professional practises of Information security management system.
Ensure system compliance with health standards and regulations like CMS, HIPAA and many
more.
On the basis of health unit create a standard system that comply with legal and ethical
requirements.
Document Page
Provide information or enhance knowledge of hospital staff for various functions of information
security management system so that they can comply with the needs and requirements of the
system and organization as well (Kazemi, Sadeghi and Akinci,2016).
To reduce chances of automatic or manual errors of the system by providing some specific
guidelines rather than completely relying on the system blindly.
Scope
Information security policy should be build in such a manner that it addresses all the programs,
data, facilities, systems, technical infrastructure including information system, third parties of the
organization without any kind of exception. It is one of the most important point which is
required to be covered in ISP manual so that readers can understand what is been covered in the
policy, resolve any kind of ambiguity, identify factors that are not required to be covered in the
policy (Grist, Porter and Stallard,2017). It also helps in identifying whether the policy covers all
the required and acceptable policies that are helpful for the business or not.
This ISP policy of WTH hospital applies to all the staff members, faculty, employees, patients,
trainees. For all the staff members that uses this information system to handle, view or deal with
information system, this ISP system deals with provision access through:
Staff members who uses the system manages authorization and authentication that are mainly
used to provide access to others users of the system in order to maintain security and privacy of
the system (Werker, Cascadden and Zmuda, 2017).
Integrate Information system providers in order to maintain digital medical records of the
patients.
Direct connectivity of network to service providers, administration functionalities including all
the components in connection such as firewall.
Integrate the information system as well as the processes of the system so that the overall quality
of the data submitted or saved with the system can be ensured.
Roles and responsibilities
It focuses on general rights roles and responsibilities of all the users of the information system
(Choi, Lee and Kim, 2020). In order to carry out implementation, knowledge of the information
security management system in a much better manner. it helps in defining roles and
responsibilities of all the users of the system so that theft of information can be protected, users
Document Page
can understand the way in which information is required to be managed, benefits of the
information system, digital assets of the system, rights of the users and responsibilities of the
users in order to carry out all the functionalities of the system in a much better and appropriate
manner.
Privacy and security committee: they are required to focus on rectifying all the policies of
information system and well as standards associated with the system in order to maintain security
and privacy of the system.
Application oversight body: they are required to approve all kinds of required standards and
policies associated with the system. they have the authority of rejecting or denying all kinds of
information security exemption request.
Security and privacy operation team: thy are required to provide information security guidelines
to the hospital staff members. They are also required to develop as well as maintain security
program that will establish information security governance framework for staff members,
service providers etc. They are also required to provide guidelines to the trainees participating
information security management system awareness activities.
Staff members: All the staff members are required to develop, maintain and implement a security
policy of the system by maintaining all the other relevant documents of the system.
Information Governance Policy Framework
Introduction: It helps in giving a overview of policies, guidelines and code of practise that can be
applied to information security management system of WTH hospital. It also helps in identifying
as well as providing information governance training to the staff members in order to increase
their awareness within this field (Campbell., Gutierrez, and Lancelott., 2017).
Aim: Main aim of this framework is to provide information system users to comply with main
obligations, legal and regulatory obligations, deliver high quality service, improve/handle as well
as protect main digital information of the patients stored within the system.
Scope: main scope of this framework is to electronically store data or process by fixing all the
systems or devices stored, data or information which is to be transmitted on the network.
Benefits: Main benefits of this information governance policy framework are- improve the
process through which data is stored within the systems, helps in improving staff members times
and quality of work, enhances security of information stored within the system, enhances
management of all kinds of risk and issues, manages the data in a more better and improved

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
manner. It simply helps in increasing efficiency and effectiveness of management system of
WTH hospital.
Implementation plan and monitoring mechanisms
This is important for the health care organization to maintain better and efficient
information of Information security Management System in information storing and processing
in order to maintain the performance of organization as high as possible. This process can not be
implemented directly in working of organization. It needs specific plan to implement information
security management system. This implementation plan includes deriving the aims and objective
for ISMS implementation process and after that process proper strategy will be explained in
order to effectively implement system in organization. The information security management
system also includes the predefined processes to over come the mishandling of the information
and patient data that is important for Wallington Trust Hospital. This processes provide better
data handling process to keep maintain the safety and security of data. This is how various
processes and plans that are followed in the information security management system helps the
organization to mitigate the risk in information management process. Some of main principles of
Information security management system are- Confidentiality, Integrity, Accessibility,
Accessibility, Reliability and Accountability. By taking this measures organization can improve
safety and security of organization.
Aim- To implement information Security Management system in Wallington Trust Hospital.
Objectives
1. To check requirements of the health care organization related to the information security
management plan.
2. To Develop effective plan to assemble the components of design effectively.
3. To test and implement system in the Organization for operations.
Strategies
There are different strategies can be used in this process to implement information
security management system in organization. This is a very complex process to implement ISMS
in Wallington Trust Hospital. For effective development of this tool management can use system
development life cycle to reduce the chances of failure in the process. The information that is
used in the organization is very vulnerable for and difficult to understand. By developing better
and efficient plan organization can improve the implementation process. For the implementation
Document Page
of system in organization on initial level people need classified information to target all the
security requirements of the organization (Altepeter, 2017). There are different resources are
required to develop system that can manage the security concerns of organization. For example
organization can use direct change over, parallel conversion, gradual phased conversion and
modular conversion. By this process organization can effectively develop information security
management system in health care organization. There is also requuirement of preventing
security threats in organization in order to prevent data loss and hacking. Cyber security is
major concern of organization that are handling the data and information of people and
organization processes. There are various threats organization related to the information system
they used in order to maintain the safety and privacy of data. These threats are of to types which
are internal and external. Internal threats are considered on the basis of the internal security
protocols and the other external threats are known as factors that can harm the data base of the
organization.
Monitoring and Controlling
This is important for the organization to keep track on the performance of the system
development and data collection process to avoid issues in complete process. By using different
tools and technology management can effectively track the performance of the system
development life cycle. For example CCTV cameras, Artificial intelligence and automation tools
can be used to manage and track the performance of all processes. In any unwanted situation
organization can change their actions to make the operations going smoothly to maintain security
and safety of personal information of patient and classified information of organization.
CONCLUSION
This report is concluding the importance of information security management process.
There are security and safety management are used in organization to manage the performance
level in the organization. There are different security issues are faced by organization in the
operations and there are also some threats in the information processing system are analysed in
this report. The requirement of the information security management system has been analysed
in this report in order to know the importance of the information security management system for
the organization. The role of information security auditor has been evaluated to meet the social,
ethical and legal requirements of the organization. The approach which used for maintain
security in organization also has been analysed in order to justify its selection for the Wallington
Document Page
Trust Hospital. Principles of information security system has been studied in report. Risk
assessment for the information processing and storing has been conducted to evaluate
development process. Various risk assessment process has been studied to evaluate the efficiency
of the risk of different factor on information that is collected by organization. Information
Security management plan has been developed in order to implement ISMS system in
organization.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journal
Almuhammadi, S. and Alsaleh, M., 2017. Information Security Maturity Model for Nist Cyber
Security Framework. Computer Science & Information Technology. 51.
Altepeter, A., 2017. The Case for: Including RIM in Information Security. Information
Management. 51(2). p.40.
Anderson, C., 2016. Cyber Security and the Need for International Governance. Available at
SSRN 2769579.
Bang, K.C., 2018. A Building Method of Designing National Cyber Security Governance Model
Through Diagnosis of Operational Experience. Journal of Digital Convergence. 16(6).
pp.205-212.
Campbell, A., Gutierrez, M. and Lancelott, M., 2017. Operating Model Canvas. Van Haren
Publishing.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the
role of the state in cyberspace. Routledge.
Choi, W.N., Lee, U. and Kim, H.R., 2020. Radiological assessment on spent resin treatment
facility and transportation for radioactive waste disposal. Progress in Nuclear Energy. 118.
p.103125.
Edaibat, E.A., Dever, J. and Stuban, S.M., 2017. System dynamics simulation modeling of health
information exchange (HIE) adoption and policy intervention: A case study in the State of
Maryland. Operations Research for Health Care. 12. pp.60-70.
Fu, Y., He, X. and Dong, Z., 2018. A Runtime Checker with Evolutionary Algorithm decision
making. Alabama A and M University Huntsville United States.
Gashgari, G., Walters, R.J. and Wills, G., 2017, April. A Proposed Best-practice Framework for
Information Security Governance. In IoTBDS (pp. 295-301).
Grist, R., Porter, J. and Stallard, P., 2017. Mental health mobile apps for preadolescents and
adolescents: a systematic review. Journal of medical internet research. 19(5). p.e176.
Kazemi, H., Sadeghi, S. and Akinci, H., 2016. Developing a land evaluation model for faba bean
cultivation using geographic information system and multi-criteria analysis (A case study:
Gonbad-Kavous region, Iran). Ecological indicators. 63. pp.37-47.
Laybats, C. and Tredinnick, L., 2016. Information security.
Smallwood, R.F., 2018. Information Governance for Healthcare Professionals: A Practical
Approach. Productivity Press.
Van Horenbeeck, M., 2018. The future of Internet governance and cyber-security. Computer
Fraud & Security. 2018(5). pp.6-8.
von Solms, B. and von Solms, R., 2018. Cybersecurity and information security–what goes
where?. Information & Computer Security. 26(1). pp.2-9.
Wei, N., Ci, D. and Zhang, T., 2018. Effects of geography and climatic factors on special
nutrients of highland barley in Tibet plateau. Journal of Agricultural Science and
Technology (Beijing). 20(12). pp.115-121.
Werker, E., Cascadden, M. and Zmuda, K., 2017. Policies for Generating Socioeconomic
Benefits from Natural Resource Extraction Projects: A Research Report for the Government
of the Northwest Territories.
Zende, A.M., Patil, R.A. and Patil, V.M., 2018. Water security assessment in semi-arid region
using geospatial techniques. Materials Today: Proceedings. 5(1). pp.620-627.
1 out of 17
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]