An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks

TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …

Applying IT governance balanced scorecard and importance-performance analysis for providing IT governance strategy in university

K Jairak, P Praneetpolgrang - Information Management & Computer …, 2013 - emerald.com
Purpose–The purpose of this paper is to identify the current situation and the future
improvement for IT governance and controls in developing country like Thailand …

The SPARK agent framework

D Morley, K Myers - Proceedings of the Third International Joint …, 2004 - ieeexplore.ieee.org
There is a need for agent systems that can scale to realworld applications, yet retain the
clean semantic underpinning of more formal agent frameworks. We describe the SRI …

[PDF][PDF] Information security governance: a process model and pilot case study

CK Wong, SB Maynard, A Ahmad, H Naseer - 2020 - scholar.archive.org
The responsibility for information security governance (ISG) is increasingly falling to boards
of directors and executive management. Recent high-profile incidents such as the breaches …

A conceptual model for a metric based framework for the monitoring of information security tasks' efficiency

FÖ Sönmez - Procedia Computer Science, 2019 - Elsevier
Abstract Information Security Governance Systems are not adequate to measure the
effectiveness and efficiency of security tasks for the enterprises. Although some of the …

[PDF][PDF] Disentangling the Concept of Information Security Properties-Enabling Effective Information Security Governance.

M Bitzer, N Brinz, P Ollig - ECIS, 2021 - researchgate.net
The hyper-dynamic, global adoption of digital technologies due to the Covid-19 pandemic
and the increasing digitalization of business models necessitate a dialogue on fundamental …

[图书][B] Applied Technologies: First International Conference, ICAT 2019, Quito, Ecuador, December 3–5, 2019, Proceedings, Part I

M Botto-Tobar, MZ Vizuete, P Torres-Carrión, SM León… - 2020 - books.google.com
This first volume of the three-volume set (CCIS 1193, CCIS 1194, and CCIS 1195)
constitutes the refereed proceedings of the First International Conference on Applied …

The impact of cyber security issues on businesses and governments: A framework for implementing a cyber security plan

H Iguer, H Medromi, A Sayouti… - … on Future Internet of …, 2014 - ieeexplore.ieee.org
The use of internet has made people and organizations vulnerable to the outside attacks.
Indeed, cyber issues mainly affect information systems with different types of malicious …

Engagement et pratiques des organisations en matière de gouvernance de la sécurité de l'information

N Dagorn, N Poussing - Systèmes d'information et management, 2012 - cairn.info
Cet article aborde le thème de la gouvernance de la sécurité de l'information. Pour pallier
les faiblesses relevées dans la littérature, il explore (i) le processus d'engagement des …

Security in organisations: governance, risks and vulnerabilities in moving to the cloud

MO Alassafi, RK Hussain, G Ghashgari… - … Workshop, ES 2015 …, 2017 - Springer
Any organisation using the internet to conduct business is vulnerable to violation of security.
Currently security in most organizations relates to protection of data and the management of …