Information security governance challenges and critical success factors: Systematic review

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Computers & security, 2020 - Elsevier
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …

[PDF][PDF] Critical success factors analysis on effective information security management: A literature review

Z Tu, Y Yuan - 2014 - core.ac.uk
Abstract Information security has been a crucial strategic issue in organizational
management. Information security management is a systematic process of effectively coping …

The association between top management involvement and compensation and information security breaches

J Kwon, JR Ulmer, T Wang - Journal of Information Systems, 2013 - publications.aaahq.org
This paper examines how an information technology (IT) executive's position in a top
management team and how his/her compensation are associated with the likelihood of …

Value-focused assessment of ICT security awareness in an academic environment

L Drevin, HA Kruger, T Steyn - Computers & Security, 2007 - Elsevier
Security awareness is important to reduce human error, theft, fraud, and misuse of computer
assets. A strong ICT security culture cannot develop and grow in a company without …

Role of artificial intelligence in enterprise information security: a review

M Dhingra, M Jain, RS Jadon - 2016 fourth international …, 2016 - ieeexplore.ieee.org
The major objective of information security is to prevent valuable resources of an
organization like hardware, software, and financial resources, tangible and intangible …

The quality of E-Government management, information security and quality

A Qekaj-Thaçi, L Thaçi - Emerging Science Journal, 2022 - ijournalse.org
The purpose of the presented paper was to present the state of e-government services in the
Republic of Kosovo within the management of electronic services and the role of ICT in data …

Bridging the gap between general management and technicians–A case study on ICT security in a developing country

JK Bakari, CN Tarimo, L Yngström, C Magnusson… - Computers & …, 2007 - Elsevier
The lack of planning, business re-engineering, and coordination in the whole process of
computerisation is the most pronounced problem facing organisations. These problems …

Comparative analysis of information security governance frameworks: a public sector approach

O Rebollo, D Mellado, LE Sánchez… - The Proceedings of …, 2011 - books.google.com
Security awareness has spread inside many organizations leading them to tackle
information security not just as a technical matter, but from a corporate point of view …

Marco para el Gobierno de la Seguridad de la Infornación en servicios Cloud Computing.

OR Martínez - 2014 - dialnet.unirioja.es
El modelo de servicios Cloud Computing ha surgido como una alternativa real con la que
atender la demanda de la industria de las Tecnologías de la Información y las …

Access to user data stored by organizations—divides surrounding information security professionals in Chinese IT organizations

X Ma, H Cho - Chinese Journal of Communication, 2022 - Taylor & Francis
With the rapid development of computer-based information systems in China, securing
organizational systems as information assets is central to achieving a strategic advantage …