<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">IT security</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">security standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">305-317</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents analysis of existing knowledge management models and justification for introducing an integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security – common criteria and methodology for IT security evaluation. The model of knowledge management is elaborated by analysing the content of the relevant elements of standards and establishing the knowledge content that determines the forms of relations between them. The authors propose the application of an architecture of four-factor models towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/ IEC 27000.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">305</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Security Management System for Enterprises in Industry 4.0</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">control system</style></keyword><keyword><style  face="normal" font="default" size="100%">enterprise management system</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">integrated security management system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">294-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles. Key standards such as ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analysed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system, based on the cybernetic principles of control, is part of the enterprise management system. Security subsystems check and control according to individual and general objectives for physical, information and signal spaces and respective requirements-based models. On that basis the paper presents results and recommendations for enhancing and implementing integrated security management systems. </style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">294</style></section></record></records></xml>