Academic literature on the topic 'Governance of security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Governance of security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Governance of security"
Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textKRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full textBevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textSajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.
Full textMoulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.
Full textEllison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.
Full textDissertations / Theses on the topic "Governance of security"
Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textWu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.
Full textMishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.
Full textCullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.
Full textDavis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Full textBrand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.
Full textEdwards, Charles K. "A framework for the governance of information security." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607548.
Full textAlqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.
Full textCoertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textBooks on the topic "Governance of security"
Solms, S. H., and Rossouw Solms. Information Security Governance. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-79984-1.
Full textRossouw, Solms, and SpringerLink (Online service), eds. Information Security Governance. Springer Science+Business Media, LLC, 2009.
Find full textBossong, Raphael, and Hendrik Hegemann, eds. European Civil Security Governance. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137481115.
Full textCawthra, Gavin. African security governance: Emerging issues. Wits University Press ; New York, 2009.
Find full textSosmeña, Gaudioso C. Local governance and national security. Local Government Development Foundation, 2009.
Find full textBoggero, Marco. The Governance of Private Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69593-8.
Full textDe Tender, Peter, David Rendon, and Samuel Erskine. Pro Azure Governance and Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4910-9.
Full textBook chapters on the topic "Governance of security"
Davis, Robert E. "Security Governance." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-1.
Full textFrevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-24280-0_6.
Full textvon Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.
Full textCopeland, Marshall, and Matthew Jacobs. "Security Governance Operations." In Cyber Security on Azure. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6531-4_7.
Full textWaschke, Marvin. "Security and Governance." In Cloud Standards. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4111-9_4.
Full textAshurst, Stephen, and Stefano Tempesta. "Governance and Security." In Blockchain Applied. Productivity Press, 2021. http://dx.doi.org/10.4324/9781003132592-5.
Full textDavis, Robert E. "Security Governance Management." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-3.
Full textDavis, Robert E. "Security Governance Environment." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-2.
Full textDavis, Robert E. "Security Governance Processes." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-4.
Full textPompon, Raymond. "Governance." In IT Security Risk Control Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2140-2_7.
Full textConference papers on the topic "Governance of security"
Corriss, Laura. "Information security governance." In the 2010 Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1920320.1920326.
Full textOhki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.
Full textSzenes, Katalin. "Operational security — Security-based corporate governance." In 2013 IEEE 9th International Conference on Computational Cybernetics (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/icccyb.2013.6617622.
Full textLeusse, Pierre de, and Theo Dimitrakos. "SOA-Based Security Governance Middleware." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.17.
Full textde Bruin, Rossouw, and S. H. von Solms. "Modelling Cyber Security Governance Maturity." In 2015 IEEE International Symposium on Technology and Society (ISTAS). IEEE, 2015. http://dx.doi.org/10.1109/istas.2015.7439415.
Full textKritzinger, Elmarie, and Sebastiaan Von Solms. "E-learning: Incorporating Information Security Governance." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2953.
Full textKim, Na-yun, Rosslin John Robles, Sung-Eon Cho, Yang-Seon Lee, and Tai-hoon Kim. "SOX Act and IT Security Governance." In 2008 International Symposium on Ubiquitous Multimedia Computing (UMC). IEEE, 2008. http://dx.doi.org/10.1109/umc.2008.51.
Full textFalk, Rainer, and Steffen Fries. "Security Governance for Enterprise VoIP Communication." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.25.
Full textGreenPope, Robin A., Emily K. Beaton, Lindsley G. Boiney, et al. "Aviation security collaboration stakeholder governance review." In 2010 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2010. http://dx.doi.org/10.1109/icnsurv.2010.5503332.
Full textAsgarkhani, Mehdi, Eduardo Correia, and Amit Sarkar. "An overview of information security governance." In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET). IEEE, 2017. http://dx.doi.org/10.1109/icammaet.2017.8186666.
Full textReports on the topic "Governance of security"
Manzoor, Ahmad. Improving the International Governance of Food Security and Trade. International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.
Full textAvant, Deborah, and Lindsay Heger. The New Power Politics: Networks and Transnational Security Governance. One Earth Future Foundation, 2014. http://dx.doi.org/10.18289/oef.2014.006.
Full textMcConnell, James. Essex under Cromwell: Security and Local Governance in the Interregnum. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.686.
Full textMishra, Sitakanta, Happymon Jacob, and Shannon Abbott. Nuclear Security Governance in India: Institutions Instruments and Culture (2019). Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1678824.
Full textNabbs-Keller, G., R. Ko, T. Mackay, N. A. Salmawan, W. N. Widodo, and A. H. S. Reksoprodjo. Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. The University of Queensland, 2021. http://dx.doi.org/10.14264/4364b42.
Full textMathieu-Comtois, Sarah. Toward Economic Recovery and Food Security in Post-DAESH Iraq: A Framework for Governance Moving Forward. American University of Iraq, Sulaimani, 2017. http://dx.doi.org/10.26598/auis_iris_2017_12_07.
Full textHerbert, Sian. Covid-19, Conflict, and Governance Evidence Summary No.29. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.020.
Full textMeinzen-Dick, Ruth Suseela, Jagdeesh Puppala Rao, Rahul Chaturvedi, et al. Securing the commons in India: Mapping polycentric governance. International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.133794.
Full textBaker, James E. A DPA for the 21st Century. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20190021.
Full textChaimite, Egidio, Salvador Forquilha, and Alex Shankland. Who Can We Count On? Authority, Empowerment and Accountability in Mozambique. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.019.
Full text