Academic literature on the topic 'Governance of security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Governance of security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Governance of security"

1

Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.

Full text
Abstract:
Food security is one of the greatest challenges that characterises our times. One central argument in related conferences and symposia is the need to increase production for a growing population. However, major international organisations and other research institutions hold instead that food production exceeds current need and the reasons of food insecurity reside more in the complex concurrence and interdependence of poverty, access to food, local economic development and political and socioeconomic circumstances. Governance for sustainability is presented in this article as a process of mul
APA, Harvard, Vancouver, ISO, and other styles
7

Moulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ellison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Governance of security"

1

Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.

Full text
Abstract:
This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms – process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands business requirements for information security and strives to fulfill them. An explanation is offered a
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.

Full text
Abstract:
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine
APA, Harvard, Vancouver, ISO, and other styles
4

Cullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.

Full text
Abstract:
This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security's continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.

Full text
Abstract:
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance
APA, Harvard, Vancouver, ISO, and other styles
6

Brand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide gu
APA, Harvard, Vancouver, ISO, and other styles
7

Edwards, Charles K. "A framework for the governance of information security." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607548.

Full text
Abstract:
<p> Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human co
APA, Harvard, Vancouver, ISO, and other styles
8

Alqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.

Full text
Abstract:
Information security governance (ISG) has emerged as a new information security (IS) discipline and is considered one of the critical areas of research for enhancing the viability of organisations. This research proposes a viable system model (VSM) for ISG (VSMISG) and investigates its effects. The investigation involves studying the effects of the VSMISG in small, medium and large organisations facing low, medium and high security threat intensity over different time scales. This study also analyses the costs and benefits of changing from the baseline ISG model to the VSMISG. From reviewing t
APA, Harvard, Vancouver, ISO, and other styles
9

Coertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.

Full text
Abstract:
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This re
APA, Harvard, Vancouver, ISO, and other styles
10

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Governance of security"

1

Solms, S. H., and Rossouw Solms. Information Security Governance. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-79984-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rossouw, Solms, and SpringerLink (Online service), eds. Information Security Governance. Springer Science+Business Media, LLC, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Comparative regional security governance. Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security governance in Botswana. Friedrich Ebert Stiftung, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bossong, Raphael, and Hendrik Hegemann, eds. European Civil Security Governance. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137481115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cawthra, Gavin. African security governance: Emerging issues. Wits University Press ; New York, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sperling, James. Handbook of governance and security. Edward Elgar, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sosmeña, Gaudioso C. Local governance and national security. Local Government Development Foundation, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boggero, Marco. The Governance of Private Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69593-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

De Tender, Peter, David Rendon, and Samuel Erskine. Pro Azure Governance and Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4910-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Governance of security"

1

Davis, Robert E. "Security Governance." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-24280-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Copeland, Marshall, and Matthew Jacobs. "Security Governance Operations." In Cyber Security on Azure. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6531-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Waschke, Marvin. "Security and Governance." In Cloud Standards. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4111-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ashurst, Stephen, and Stefano Tempesta. "Governance and Security." In Blockchain Applied. Productivity Press, 2021. http://dx.doi.org/10.4324/9781003132592-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Robert E. "Security Governance Management." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Robert E. "Security Governance Environment." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Davis, Robert E. "Security Governance Processes." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pompon, Raymond. "Governance." In IT Security Risk Control Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2140-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Governance of security"

1

Corriss, Laura. "Information security governance." In the 2010 Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1920320.1920326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ohki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Szenes, Katalin. "Operational security — Security-based corporate governance." In 2013 IEEE 9th International Conference on Computational Cybernetics (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/icccyb.2013.6617622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leusse, Pierre de, and Theo Dimitrakos. "SOA-Based Security Governance Middleware." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Bruin, Rossouw, and S. H. von Solms. "Modelling Cyber Security Governance Maturity." In 2015 IEEE International Symposium on Technology and Society (ISTAS). IEEE, 2015. http://dx.doi.org/10.1109/istas.2015.7439415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kritzinger, Elmarie, and Sebastiaan Von Solms. "E-learning: Incorporating Information Security Governance." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2953.

Full text
Abstract:
The global society is living in the electronic age where electronic transactions such as e-mail, e-banking, e-commerce and e-learning are becoming more and more prominent. This paper primarily focuses on e-learning and how important it is to ensure that proper Information Security measures are put in place to ensure that all information within the e-learning environment is properly protected. This paper highlights four Information Security pillars that could be used to achieve this.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Na-yun, Rosslin John Robles, Sung-Eon Cho, Yang-Seon Lee, and Tai-hoon Kim. "SOX Act and IT Security Governance." In 2008 International Symposium on Ubiquitous Multimedia Computing (UMC). IEEE, 2008. http://dx.doi.org/10.1109/umc.2008.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Falk, Rainer, and Steffen Fries. "Security Governance for Enterprise VoIP Communication." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

GreenPope, Robin A., Emily K. Beaton, Lindsley G. Boiney, et al. "Aviation security collaboration stakeholder governance review." In 2010 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2010. http://dx.doi.org/10.1109/icnsurv.2010.5503332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Asgarkhani, Mehdi, Eduardo Correia, and Amit Sarkar. "An overview of information security governance." In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET). IEEE, 2017. http://dx.doi.org/10.1109/icammaet.2017.8186666.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Governance of security"

1

Manzoor, Ahmad. Improving the International Governance of Food Security and Trade. International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Avant, Deborah, and Lindsay Heger. The New Power Politics: Networks and Transnational Security Governance. One Earth Future Foundation, 2014. http://dx.doi.org/10.18289/oef.2014.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McConnell, James. Essex under Cromwell: Security and Local Governance in the Interregnum. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mishra, Sitakanta, Happymon Jacob, and Shannon Abbott. Nuclear Security Governance in India: Institutions Instruments and Culture (2019). Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1678824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nabbs-Keller, G., R. Ko, T. Mackay, N. A. Salmawan, W. N. Widodo, and A. H. S. Reksoprodjo. Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. The University of Queensland, 2021. http://dx.doi.org/10.14264/4364b42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mathieu-Comtois, Sarah. Toward Economic Recovery and Food Security in Post-DAESH Iraq: A Framework for Governance Moving Forward. American University of Iraq, Sulaimani, 2017. http://dx.doi.org/10.26598/auis_iris_2017_12_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Herbert, Sian. Covid-19, Conflict, and Governance Evidence Summary No.29. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.020.

Full text
Abstract:
This fortnightly Covid-19, Conflict, and Governance Evidence Summary aims to signpost the UK Foreign, Commonwealth and Development Office (FCDO) and other UK government departments to the latest evidence and opinions on Covid-19 (C19), to inform and support their responses. Based on feedback from the recent survey, and analysis by the Xcept project, this edition, as a trial, focusses less on the challenges that C19 poses, and more on more on the policy responses to these challenges. The below summary features resources on legislative leadership during the C19 crisis; and the heightening of ris
APA, Harvard, Vancouver, ISO, and other styles
8

Meinzen-Dick, Ruth Suseela, Jagdeesh Puppala Rao, Rahul Chaturvedi, et al. Securing the commons in India: Mapping polycentric governance. International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.133794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baker, James E. A DPA for the 21st Century. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20190021.

Full text
Abstract:
The Defense Production Act can be an effective tool to bring U.S. industrial might to bear on broader national security challenges, including those in technology. If updated and used to its full effect, the DPA could be leveraged to encourage development and governance of artificial intelligence. And debate about the DPA’s use for AI purposes can serve to shape and condition expectations about the role the law’s authorities should or could play, as well as to identify essential legislative gaps.
APA, Harvard, Vancouver, ISO, and other styles
10

Chaimite, Egidio, Salvador Forquilha, and Alex Shankland. Who Can We Count On? Authority, Empowerment and Accountability in Mozambique. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.019.

Full text
Abstract:
In this paper, we explore the use of a governance diaries methodology to investigate poor households’ interactions with authority in fragile, conflict and violence-affected settings in Mozambique. The research questioned the meanings of empowerment and accountability from the point of view of poor and marginalised people, with the aim of understanding what both mean for them, and how that changes over time, based on their experiences with governance. The study also sought to record how poor and marginalised households view the multiple institutions that govern their lives; providing basic publ
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!