Information security governance challenges and critical success factors: Systematic review

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Computers & security, 2020 - Elsevier
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …

Systematic literature review on variables impacting organization's zero accident vision in occupational safety and health perspectives

MA Ahamad, K Arifin, A Abas, M Mahfudz, MB Cyio… - Sustainability, 2022 - mdpi.com
The zero-accident vision has sparked debate in the fields of occupational safety and health.
While many organizations and policymakers have successfully implemented the zero …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks

TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …

Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

The power of interpretation: Qualitative methods in cybersecurity research

D Fujs, A Mihelič, SLR Vrhovec - … of the 14th International Conference on …, 2019 - dl.acm.org
Cybersecurity is a hot topic and researchers have published extensively on studies
conducted using a variety of different research methods. This paper aims to determine which …

Validation of a socio-technical management process for optimising cybersecurity practices

M Malatji, A Marnewick, S von Solms - Computers & Security, 2020 - Elsevier
This study developed a socio-technical management process to optimise both technical and
non-technical security measures to provide optimal, rather than adequate, enterprise …

The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid …

FA Almaqtari, NHS Farhan, AT Yahya… - … Security Journal: A …, 2023 - Taylor & Francis
The present study aims to assess the mediating role of IT governance between corporate
governance mechanisms and business continuity, and transparency & disclosure during the …