Information security management needs more holistic approach: A literature review

ZA Soomro, MH Shah, J Ahmed - International journal of information …, 2016 - Elsevier
Abstract Information technology has dramatically increased online business opportunities;
however these opportunities have also created serious risks in relation to information …

Information security governance challenges and critical success factors: Systematic review

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Computers & security, 2020 - Elsevier
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

A review of IT governance: A taxonomy to inform accounting information systems

CL Wilkin, RH Chenhall - Journal of Information Systems, 2010 - publications.aaahq.org
This paper reviews Information Systems (IS) literature that is relevant to Information
Technology Governance (ITG) and examines how it informs Accounting Information Systems …

Institutional strategies for cybersecurity in higher education institutions

ECK Cheng, T Wang - Information, 2022 - mdpi.com
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …

Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination

Z Tu, O Turel, Y Yuan, N Archer - Information & Management, 2015 - Elsevier
The loss and theft of mobile devices is a growing risk that has yet to be addressed in detail
by the IS community. This study extends the literature significantly by examining the roles of …

What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

A process model for implementing information systems security governance

M Nicho - Information & Computer Security, 2018 - emerald.com
Purpose The frequent and increasingly potent cyber-attacks because of lack of an optimal
mix of technical as well as non-technical IT controls has led to increased adoption of security …

Centralized IT decision making and cybersecurity breaches: Evidence from US higher education institutions

CW Liu, P Huang, HC Lucas Jr - Journal of Management …, 2020 - Taylor & Francis
Despite the consensus that information security should become an important consideration
in information technology (IT) governance rather than the sole responsibility of the IT …