@mastersthesis{MTMT:32080501, title = {A novel approach for information security risk assessment maturity framework based on ISO 27001}, url = {https://m2.mtmt.hu/api/publication/32080501}, author = {Abazi, Blerton}, doi = {10.14267/phd.2020016}, unique-id = {32080501}, year = {2020} } @article{MTMT:31097492, title = {Enterprise Technology Architecture solution for eHealth System and implementation Strategy}, url = {https://m2.mtmt.hu/api/publication/31097492}, author = {Qehaja, Besnik and Abazi, Blerton and Hajrizi, Edmond}, doi = {10.1016/j.ifacol.2019.12.554}, journal-iso = {IFACOL}, journal = {IFAC PAPERSONLINE}, volume = {52}, unique-id = {31097492}, issn = {2405-8971}, abstract = {ICT has covered most of the industries are also playing a very important role in healthcare. In this paper, I propose the drafting and implementation of the Health System Strategy, based on ICT solutions, as well as in this document will be proposed the steps for the establishment and development of the health information system, which provides access to electronic health records to support decision-making in healthcare institutions, including human resource management, patient management, disease management, health status management, pharmaceutical management, and participation in open market The health information system is the establishment of a standardized interchange platform of patient’s data, through network infrastructure, hardware equipment, and software solutions. Below is the strategy, I will try to visualize the architecture of the eHealth Information System. For us, it is very important to emphasize the life cycle of different entities and their interactions in the ecosystem of all the interoperable architecture, which is the basis for the proposed strategy. The information system architecture feasibility analysis is based on a personalized medical system, and interoperable between different modules or data.}, year = {2019}, eissn = {2405-8963}, pages = {370-375} } @article{MTMT:31097484, title = {Application of biometric models of authentication in mobile equipment}, url = {https://m2.mtmt.hu/api/publication/31097484}, author = {Abazi, Blerton and Qehaja, Besnik and Hajrizi, Edmond}, doi = {10.1016/j.ifacol.2019.12.602}, journal-iso = {IFACOL}, journal = {IFAC PAPERSONLINE}, volume = {52}, unique-id = {31097484}, issn = {2405-8971}, year = {2019}, eissn = {2405-8963}, pages = {543-546} } @article{MTMT:31036123, title = {Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level}, url = {https://m2.mtmt.hu/api/publication/31036123}, author = {Abazi, Blerton and Kő, Andrea}, doi = {10.1007/978-3-030-37632-1_13}, journal-iso = {LECT NOTES BUSI INF PROC}, journal = {LECTURE NOTES IN BUSINESS INFORMATION PROCESSING}, volume = {375}, unique-id = {31036123}, issn = {1865-1348}, year = {2019}, pages = {141-152}, orcid-numbers = {Abazi, Blerton/0000-0002-8434-0648; Kő, Andrea/0000-0003-0023-1143} } @article{MTMT:30845068, title = {A New Approach and Framework for Risk Assessment Maturity}, url = {https://m2.mtmt.hu/api/publication/30845068}, author = {Abazi, Blerton}, journal-iso = {SEFBIS J}, journal = {SEFBIS JOURNAL}, volume = {13}, unique-id = {30845068}, issn = {1788-2265}, year = {2019}, pages = {62-72} } @inproceedings{MTMT:30784849, title = {The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS)}, url = {https://m2.mtmt.hu/api/publication/30784849}, author = {Luma, A. and Abazi, Blerton}, booktitle = {2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)}, doi = {10.23919/MIPRO.2019.8756645}, unique-id = {30784849}, year = {2019}, pages = {1205-1208} } @article{MTMT:3335705, title = {The implications of Information security to the Internet of Things}, url = {https://m2.mtmt.hu/api/publication/3335705}, author = {Abazi, Blerton}, journal-iso = {JOURNAL OF NATURAL SCIENCES AND MATHEMATICS OF UT (JNSM)}, journal = {JOURNAL OF NATURAL SCIENCES AND MATHEMATICS OF UT (JNSM)}, volume = {2}, unique-id = {3335705}, issn = {2545-4072}, year = {2017}, pages = {86-90} } @{MTMT:3335164, title = {An approach to Information Security for SMEs based on the Resource-Based View theory}, url = {https://m2.mtmt.hu/api/publication/3335164}, author = {Abazi, Blerton}, booktitle = {Book of Abstracts}, unique-id = {3335164}, year = {2017}, pages = {160} } @{MTMT:3335163, title = {The importance of professional certifications within ICT institutions}, url = {https://m2.mtmt.hu/api/publication/3335163}, author = {Abazi, Blerton and Edmond, Hajrizi}, booktitle = {Book of Abstracts}, unique-id = {3335163}, year = {2017}, pages = {149} } @{MTMT:3335162, title = {Implementation of ICT in the management of transport vehicles}, url = {https://m2.mtmt.hu/api/publication/3335162}, author = {Eldion, Sheapi and Bilall, I Shaini and Abazi, Blerton}, booktitle = {Book of Abstracts}, unique-id = {3335162}, year = {2017}, pages = {132} }