[1]
“ A methodology to implement an information security management system ”, JISTEM J. Inf. Syst. Technol. Manag. (Online), vol. 2, no. 2, pp. 121–136, Jan. 2005, doi: 10.4301/S1807-17752005000200002.