Information security governance challenges and critical success factors: Systematic review

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Computers & security, 2020 - Elsevier
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …

What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Governing cybersecurity from the boardroom: challenges, drivers, and ways ahead

M Gale, I Bongiovanni, S Slapnicar - Computers & Security, 2022 - Elsevier
Overall, the responsibility to oversee cyber-risk management in modern organisations lies
with Boards of Directors. However, evidence suggests that boards are not nearly as …

The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks

TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …

The role of the chief information security officer in the management of IT security

E Karanja - Information & Computer Security, 2017 - emerald.com
Purpose The aim of this study is to advance research on the position of the CISO by
investigating the role that CISOs play before and after an IT security breach. There is a …

Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance

C Donalds, C Barclay - European Journal of Information Systems, 2022 - Taylor & Francis
The evolving sophistication of threats and the impact of security breaches have caused
managers to continually grapple with strategies to reduce these risks. One common security …

Understanding security in the government's use of blockchain technology with value focused thinking approach

G Tshering, S Gao - Journal of Enterprise Information Management, 2020 - emerald.com
Purpose The purpose of the research is to assess security concerns in government's use of
Blockchain technology through the lens of value focused thinking (VFT) approach …