The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

G Culot, G Nassimbeni, M Podrecca, M Sartor - The TQM Journal, 2021 - emerald.com
Purpose After 15 years of research, this paper aims to present a review of the academic
literature on the ISO/IEC 27001, the most renowned standard for information security and the …

What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management

R Rajan, NP Rana, N Parameswar, S Dhir… - … Forecasting and Social …, 2021 - Elsevier
Cybersecurity is a serious issue that many organizations face these days. Therefore,
cybersecurity management is very important for any organization. Organizations should …

Information technology governance: Reflections on the past and future directions

CL Wilkin, RH Chenhall - Journal of Information Systems, 2020 - publications.aaahq.org
This study investigates the extant literature concerned with Information Technology
Governance (ITG), published in leading accounting and management information systems …

How do organizations learn from information system incidents? A synthesis of the past, present, and future

MHR Mehrizi, D Nicolini, JR Modol - MIS quarterly, 2022 - research.vu.nl
We review the literature on how organizations learn from information system (IS) incidents.
We identify three modes of learning depending on the practices that constitute the learning …

To outsource or not: The impact of information leakage risk on information security strategy

N Feng, Y Chen, H Feng, D Li, M Li - Information & Management, 2020 - Elsevier
Emerging studies advocate that firms shall completely outsource their information security
for cost and technical advantages. However, the risk of information leakage in outsourcing to …

Vendor selection in the wake of data breaches: A longitudinal study

Q Wang, S Jiang, EWT Ngai… - Journal of Operations …, 2024 - Wiley Online Library
With the increasing digitization and networking of medical data and personal health
information, information security has become a critical factor in vendor selection. However …

Firm diversity and data breach risk: a longitudinal study

Q Wang, EWT Ngai - The Journal of Strategic Information Systems, 2022 - Elsevier
Research has extensively investigated the rationale of firm diversity from the economic
perspective, but little is known about how such a strategy may affect information security …

A systematic review of recent developments in IT outsourcing research

M Könning, M Westner, S Strahringer - Information Systems …, 2019 - Taylor & Francis
Incomplete conceptualization of the information technology outsourcing (ITO) literature
represents a challenge for navigating extant research and engaging into purposeful …

IT vendor integration as catalyst of IT outsourcing success

AJ Navarro-Paule, MM Romerosa-Martínez… - Journal of Business & …, 2023 - emerald.com
Purpose This paper aims to explain how small-and medium-sized firms (SMEs) create
information technology (IT) business value through blended IT outsourcing (ITO). The …