
Adrian Munteanu
Adrian is a graduate of the Alexandru Ioan Cuza University from Iași, PhD Professor at the Faculty of Economics and Business Administration (www.feaa.uaic.ro).
It is also Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Control Objectives for Information and Related Technologies Certificate (COBIT), IT Infrastructure Library Certificates (ITIL), Accessdata Certified Examiner (ACE) and Microsoft Certified Professional (MCP).
He has published "Accounting information systems audit"(2002), "Local Area Networks. Design and Management "(Ed. I -2003, Ed. II -2004), "Windows Networks. Servers and clients. Practical examples "(2006).
As sole author or coauthor he has published articles in international journals and participated at conferences in auditing and information systems security in Czech Republic, Hungary, Germany, Austria, Turkey, Morocco, Spain.
He teach "Information Systems Audit", "Computer Networks" and "IT Governance and service management".
Since 2003 he is engaged in audit projects, consulting Security (ISO 27001) and ITC training for private companies, public utility providers and banks. In 2007 and 2010 he was Service Trainer Provider/Instructor for the course CISA - ISACA Romania Chapter.
He was also coordinator and translator of the COBIT 4.1 and COBIT 5 Romanian version. Since 2010 he is ISACA Academic Advocate.
Starting 2014 he is also ENISA expert.
Can be contacted by mail at [email protected].
ResearcherID: A-5245-2013
It is also Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Control Objectives for Information and Related Technologies Certificate (COBIT), IT Infrastructure Library Certificates (ITIL), Accessdata Certified Examiner (ACE) and Microsoft Certified Professional (MCP).
He has published "Accounting information systems audit"(2002), "Local Area Networks. Design and Management "(Ed. I -2003, Ed. II -2004), "Windows Networks. Servers and clients. Practical examples "(2006).
As sole author or coauthor he has published articles in international journals and participated at conferences in auditing and information systems security in Czech Republic, Hungary, Germany, Austria, Turkey, Morocco, Spain.
He teach "Information Systems Audit", "Computer Networks" and "IT Governance and service management".
Since 2003 he is engaged in audit projects, consulting Security (ISO 27001) and ITC training for private companies, public utility providers and banks. In 2007 and 2010 he was Service Trainer Provider/Instructor for the course CISA - ISACA Romania Chapter.
He was also coordinator and translator of the COBIT 4.1 and COBIT 5 Romanian version. Since 2010 he is ISACA Academic Advocate.
Starting 2014 he is also ENISA expert.
Can be contacted by mail at [email protected].
ResearcherID: A-5245-2013
less
Related Authors
Doina Fotache
"Alexandru Ioan Cuza" University, Iasi
Mircea Georgescu
Universitatea Alexandru Ioan Cuza Iasi
Daniela Popescul
Univ. Al. I. Cuza, Iasi
Edward Borodzicz
University of Portsmouth
ALEXIS CONIDES
Hellenic Centre of Marine Research
Edward Borodzicz
University of Portsmouth
Uploads
Papers by Adrian Munteanu
Yet we have to consider the subjectivism of the information that we process (Von Bayer, 2004). Depending on the country or the region, we can notice that there are discrepancies between our own perceptions and the perceptions of our fellows. Human behaviour adjusts depending on our own experiences that are also specific to the environment in which we live (Lorenz, 1969).
Can actual information security risk assessment models provide objective, sci-entific information on a wide range of social and technological risks? Can indi-viduals develop unique and precise judgments that can be limited only to math-ematic forms and calculus? “Risk does not exist ‘out there’, independent of our minds and cultures, waiting to be measured” (Slovic,1992). As early as the 1950s opera-tional risk theoreticians stated that risk cannot be defined beyond human per-ceptions (Rappaport, 1953).
Yet we have to consider the subjectivism of the information that we process (Von Bayer, 2004). Depending on the country or the region, we can notice that there are discrepancies between our own perceptions and the perceptions of our fellows. Human behaviour adjusts depending on our own experiences that are also specific to the environment in which we live (Lorenz, 1969).
Can actual information security risk assessment models provide objective, sci-entific information on a wide range of social and technological risks? Can indi-viduals develop unique and precise judgments that can be limited only to math-ematic forms and calculus? “Risk does not exist ‘out there’, independent of our minds and cultures, waiting to be measured” (Slovic,1992). As early as the 1950s opera-tional risk theoreticians stated that risk cannot be defined beyond human per-ceptions (Rappaport, 1953).