Journal articles on the topic 'Governance of security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Governance of security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textKRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full textBevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textSajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.
Full textMoulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.
Full textEllison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.
Full textFair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.
Full textBall, Nicole. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 509–27. http://dx.doi.org/10.1080/1467880042000320032.
Full textOlonisakin, Funmi. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 529–31. http://dx.doi.org/10.1080/1467880042000320041.
Full textLeao, Isabela, and Alberto Contaretti. "The security governance approach." Freedom from Fear 2009, no. 2 (2009): 2–3. http://dx.doi.org/10.18356/9b74be53-en.
Full textMarelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.
Full textAarstad, Åsne Kalland. "Who governs Norwegian maritime security? Public facilitation of private security in a fragmented security environment." Cooperation and Conflict 52, no. 2 (2016): 261–79. http://dx.doi.org/10.1177/0010836716652425.
Full textWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Full textEnns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.
Full textvon Solms, Basie. "Corporate Governance and Information Security." Computers & Security 20, no. 3 (2001): 215–18. http://dx.doi.org/10.1016/s0167-4048(01)00305-4.
Full textSENZAKI, Masao. "Innovating Global Nuclear Security Governance." Journal of the Atomic Energy Society of Japan 54, no. 8 (2012): 535–37. http://dx.doi.org/10.3327/jaesjb.54.8_535.
Full textWebber, Mark, Stuart Croft, Jolyon Howorth, Terry Terriff, and Elke Krahmann. "The governance of European security." Review of International Studies 30, no. 1 (2003): 3–26. http://dx.doi.org/10.1017/s0260210504005807.
Full textVeiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.
Full textBaele, Stephane J., Thierry Balzacq, and Philippe Bourbeau. "Numbers in global security governance." European Journal of International Security 3, no. 1 (2017): 22–44. http://dx.doi.org/10.1017/eis.2017.9.
Full textLee-Koo, Katrina. "Gender, Governance and International Security." Gender & Development 22, no. 1 (2014): 193–95. http://dx.doi.org/10.1080/13552074.2014.889348.
Full textLentzos, Filippa. "Synthetic biology, security and governance." BioSocieties 7, no. 4 (2012): 339–51. http://dx.doi.org/10.1057/biosoc.2012.28.
Full textByung-Gak Choi. "Internet Governance and Cyber Security." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 457–80. http://dx.doi.org/10.23894/kjccl.2018.19.4.020.
Full textHuang, Yanzhong. "Infectious Disease, Governance, and Security." International Studies Review 11, no. 4 (2009): 773–75. http://dx.doi.org/10.1111/j.1468-2486.2009.00898.x.
Full textHowe, John S., and Brett C. Olsen. "Security Choice and Corporate Governance." European Financial Management 15, no. 4 (2009): 814–43. http://dx.doi.org/10.1111/j.1468-036x.2009.00510.x.
Full textCAWTHRA, GAVIN. "SECURITY GOVERNANCE IN SOUTH AFRICA." African Security Review 14, no. 3 (2005): 95–105. http://dx.doi.org/10.1080/10246029.2005.9627376.
Full textTickell, Crispin. "Security, environment, and global governance." Interdisciplinary Science Reviews 22, no. 3 (1997): 246–50. http://dx.doi.org/10.1179/isr.1997.22.3.246.
Full textvon Solms, Rossouw, and S. H. (Basie) von Solms. "Information security governance: Due care." Computers & Security 25, no. 7 (2006): 494–97. http://dx.doi.org/10.1016/j.cose.2006.08.013.
Full textKnight, W. Andy, and Temitope B. Oriola. "Regional Security Governance in Africa." African Security 13, no. 4 (2020): 297–99. http://dx.doi.org/10.1080/19392206.2020.1871996.
Full textYstanes, Margit, and Alexandre Magalhães. "Racialized Governance." Conflict and Society 6, no. 1 (2020): 165–82. http://dx.doi.org/10.3167/arcs.2020.060110.
Full textLippert, Randy, and Daniel O'Connor. "Security Assemblages: Airport Security, Flexible Work, and Liberal Governance." Alternatives: Global, Local, Political 28, no. 3 (2003): 331–58. http://dx.doi.org/10.1177/030437540302800302.
Full textChristou, George, Stuart Croft, Michela Ceccorulli, and Sonia Lucarelli. "European Union security governance: putting the ‘security’ back in." European Security 19, no. 3 (2010): 341–59. http://dx.doi.org/10.1080/09662839.2010.526109.
Full textYaokumah, Winfred. "Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations." International Journal of IT/Business Alignment and Governance 4, no. 1 (2013): 27–43. http://dx.doi.org/10.4018/jitbag.2013010103.
Full textCaballero-Anthony, Mely. "Security Governance and ASEAN’s Political Security Community: Fragmented but Inclusive Security Communities?" Fudan Journal of the Humanities and Social Sciences 13, no. 1 (2019): 151–67. http://dx.doi.org/10.1007/s40647-019-00269-z.
Full textVargas Portillo, Patricia. "Cyberdiplomacy: Managing Security and Governance Online." Harvard Deusto Business Research 9, no. 2 (2020): 255–57. http://dx.doi.org/10.48132/hdbr.307.
Full textKnight, W. Andy, and Randolph B. Persaud. "Subsidiarity, Regional Governance, and Caribbean Security." Latin American Politics and Society 43, no. 1 (2001): 29. http://dx.doi.org/10.2307/3177012.
Full textVenkatraman, Sitalakshmi. "Autonomic Framework for IT Security Governance." International Journal of Managing Information Technology 9, no. 3 (2017): 1–11. http://dx.doi.org/10.5121/ijmit.2017.9301.
Full textKritzinger, E., and S. H. Von Solms. "E-learning: Incorporating Information Security Governance." Issues in Informing Science and Information Technology 3 (2006): 319–25. http://dx.doi.org/10.28945/894.
Full textSUKMA, RIZAL. "Democratic Governance and Security in Indonesia." Japanese Journal of Political Science 4, no. 2 (2003): 241–55. http://dx.doi.org/10.1017/s1468109903001129.
Full textBusser, Els De, and Ester Herlin-Karnell. "EU Security Governance and Financial Crimes." German Law Journal 19, no. 5 (2018): 1117–23. http://dx.doi.org/10.1017/s2071832200022963.
Full textWilson, Piers. "Governance and security: side by side." Computer Fraud & Security 2007, no. 4 (2007): 15–16. http://dx.doi.org/10.1016/s1361-3723(07)70060-x.
Full textDanspeckgruber, Wolfgang. "Self-Determination, Self-Governance and Security." International Relations 15, no. 1 (2000): 11–21. http://dx.doi.org/10.1177/0047117800015001003.
Full textNesadurai, Helen E. S. "Introduction: economic security, globalization and governance." Pacific Review 17, no. 4 (2004): 459–84. http://dx.doi.org/10.1080/0951274042000326023.
Full textBanerjee, Dipankar. "Security Sector Governance in South Asia." South Asian Survey 16, no. 2 (2009): 171–85. http://dx.doi.org/10.1177/097152310901600202.
Full textRedding, Lee S. "Social Security Reform and Corporate Governance." Journal of Policy Reform 9, no. 3 (2006): 235–46. http://dx.doi.org/10.1080/13841280600911642.
Full textBagayoko, Niagalé. "Introduction: Hybrid Security Governance in Africa." IDS Bulletin 43, no. 4 (2012): 1–13. http://dx.doi.org/10.1111/j.1759-5436.2012.00330.x.
Full textDuggan, Niall, and Teemu Naarajärvi. "China in Global Food Security Governance." Journal of Contemporary China 24, no. 95 (2015): 943–60. http://dx.doi.org/10.1080/10670564.2015.1013381.
Full text