What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

Recent security challenges in cloud computing

N Subramanian, A Jeyaraj - Computers & Electrical Engineering, 2018 - Elsevier
Cloud computing is an archetype that enables access to a shared pool of computing
resources for cloud users in an on-demand or pay-per-use, fashion. Cloud computing offers …

The security issues and challenges in cloud computing

H Akbar, M Zubair, MS Malik - International Journal for Electronic …, 2023 - ijeci.lgu.edu.pk
A cloud computing model allows customers to use a pool of shared computer resources on-
demand or pay-per-use basis. In terms of capital investment and operational cost reductions …

A process model for implementing information systems security governance

M Nicho - Information & Computer Security, 2018 - emerald.com
Purpose The frequent and increasingly potent cyber-attacks because of lack of an optimal
mix of technical as well as non-technical IT controls has led to increased adoption of security …

Towards a user-centric theory of value-driven information security compliance

NF Doherty, ST Tajuddin - Information Technology & People, 2018 - emerald.com
Purpose The purpose of this paper is to fill a gap in the literature, by investigating the
relationship between users' perceptions of the value of the information that they are …

新一代电力信息网络安全架构的思考

王栋, 陈传鹏, 颜佳, 郭靓, 来风刚 - 电力系统自动化, 2016 - epjournal.csee.org.cn
能源互联网的崛起正在迅速改变电力信息网络系统架构, 电力信息网络面临着一系列新的安全
挑战. 以满足未来更高级别安全能力为出发点, 秉承继承创新, 自主可控, 协同对抗 …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

One quantifiable security evaluation model for cloud computing platform

A Sun, G Gao, T Ji, X Tu - … on advanced cloud and big data …, 2018 - ieeexplore.ieee.org
Whatever one public cloud, private cloud or a mixed cloud, the users lack of effective
security quantifiable evaluation methods to grasp the security situation of its own information …

Data security and privacy information challenges in cloud computing

W Kong, Y Lei, J Ma - International Journal of …, 2018 - inderscienceonline.com
Cloud computing is becoming the hotspot in the area of information technology. However,
when examining its convenience and strong ability in data processing, we also find that …

A systematic mapping study of empirical studies on software cloud testing methods

AAS Ahmad, P Brereton… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Context: Software has become more complicated, dynamic, and asynchronous than ever,
making testing more challenging. With the increasing interest in the development of cloud …