What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance
S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …
emphasises the tensions that exist at the intersection of the rapidly changing business …
[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …
breaches has largely focused on externally oriented actions such as customer redressal and …
Lightweight secure message delivery for E2E S2S communication in the IoT-cloud system
The continuous increase in the use of smart devices and the need for E2E smart2smart
(S2S) services in IoT systems play effective and contemporary roles in the field of …
(S2S) services in IoT systems play effective and contemporary roles in the field of …
A quantification mechanism for assessing adherence to information security governance guidelines
Purpose Boards of Directors and other organisational leaders make decisions about the
information security governance systems to implement in their companies. The increasing …
information security governance systems to implement in their companies. The increasing …
Information security risks, benefits, and mitigation measures in cloud sourcing
This paper develops a categorization of cloud security risks, elaborates how they impact
information security, and discusses potential security benefits from cloud sourcing. This …
information security, and discusses potential security benefits from cloud sourcing. This …
A conceptual framework of IT security governance and internal controls
N Musa - 2018 Cyber Resilience Conference (CRC), 2018 - ieeexplore.ieee.org
The Board and senior management use internal controls and IT risk governance to ensure
that the corporation's directives such as security policies, standards, procedures, guidelines …
that the corporation's directives such as security policies, standards, procedures, guidelines …
A web service security governance approach based on dedicated micro-services
S Abidi, M Essafi, CG Guegan, M Fakhri, H Witti… - Procedia Computer …, 2019 - Elsevier
Abstract Service-oriented architecture (SOA) is known to be characterized by its openness,
its agility and its composability. Such architecture includes autonomous, interoperable and …
its agility and its composability. Such architecture includes autonomous, interoperable and …
[PDF][PDF] Challenges and issues in ensuring safe cloud based password management to enhance security
In the present advanced world, everything has turned out to be modernized. The transaction
that takes place as a part of our daily chores like banking, web based shopping, file access …
that takes place as a part of our daily chores like banking, web based shopping, file access …
Enterprise strategic shift of technology: cloud-based systems verses traditional distributed system
HU Khan, HSIA Samad - International Journal of Enterprise …, 2020 - inderscienceonline.com
Cloud computing can be perceived as an amalgamation of technology, facilitator, source
and as an application that raised the curtain for a shift in the global data management …
and as an application that raised the curtain for a shift in the global data management …
Using robust data governance to mitigate the impact of cybercrime
G Onwujekwe, M Thomas… - Proceedings of the 2019 …, 2019 - dl.acm.org
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies,
coupled with a shifting threat profile, are challenging organizations to deal more and more …
coupled with a shifting threat profile, are challenging organizations to deal more and more …