What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Lightweight secure message delivery for E2E S2S communication in the IoT-cloud system

MA Al Sibahee, S Lu, ZA Abduljabbar, X Liu… - IEEe …, 2020 - ieeexplore.ieee.org
The continuous increase in the use of smart devices and the need for E2E smart2smart
(S2S) services in IoT systems play effective and contemporary roles in the field of …

A quantification mechanism for assessing adherence to information security governance guidelines

I Bongiovanni, K Renaud, H Brydon… - … & Computer Security, 2022 - emerald.com
Purpose Boards of Directors and other organisational leaders make decisions about the
information security governance systems to implement in their companies. The increasing …

Information security risks, benefits, and mitigation measures in cloud sourcing

F Wulf, S Strahringer, M Westner - 2019 IEEE 21st Conference …, 2019 - ieeexplore.ieee.org
This paper develops a categorization of cloud security risks, elaborates how they impact
information security, and discusses potential security benefits from cloud sourcing. This …

A conceptual framework of IT security governance and internal controls

N Musa - 2018 Cyber Resilience Conference (CRC), 2018 - ieeexplore.ieee.org
The Board and senior management use internal controls and IT risk governance to ensure
that the corporation's directives such as security policies, standards, procedures, guidelines …

A web service security governance approach based on dedicated micro-services

S Abidi, M Essafi, CG Guegan, M Fakhri, H Witti… - Procedia Computer …, 2019 - Elsevier
Abstract Service-oriented architecture (SOA) is known to be characterized by its openness,
its agility and its composability. Such architecture includes autonomous, interoperable and …

[PDF][PDF] Challenges and issues in ensuring safe cloud based password management to enhance security

S Anand, N Susila, S Balakrishnan - International Journal of Pure …, 2018 - researchgate.net
In the present advanced world, everything has turned out to be modernized. The transaction
that takes place as a part of our daily chores like banking, web based shopping, file access …

Enterprise strategic shift of technology: cloud-based systems verses traditional distributed system

HU Khan, HSIA Samad - International Journal of Enterprise …, 2020 - inderscienceonline.com
Cloud computing can be perceived as an amalgamation of technology, facilitator, source
and as an application that raised the curtain for a shift in the global data management …

Using robust data governance to mitigate the impact of cybercrime

G Onwujekwe, M Thomas… - Proceedings of the 2019 …, 2019 - dl.acm.org
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies,
coupled with a shifting threat profile, are challenging organizations to deal more and more …