To see the other types of publications on this topic, follow the link: Governance of security.

Journal articles on the topic 'Governance of security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Governance of security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.

Full text
Abstract:
Food security is one of the greatest challenges that characterises our times. One central argument in related conferences and symposia is the need to increase production for a growing population. However, major international organisations and other research institutions hold instead that food production exceeds current need and the reasons of food insecurity reside more in the complex concurrence and interdependence of poverty, access to food, local economic development and political and socioeconomic circumstances. Governance for sustainability is presented in this article as a process of mul
APA, Harvard, Vancouver, ISO, and other styles
7

Moulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ellison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ball, Nicole. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 509–27. http://dx.doi.org/10.1080/1467880042000320032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Olonisakin, Funmi. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 529–31. http://dx.doi.org/10.1080/1467880042000320041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Leao, Isabela, and Alberto Contaretti. "The security governance approach." Freedom from Fear 2009, no. 2 (2009): 2–3. http://dx.doi.org/10.18356/9b74be53-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Marelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Aarstad, Åsne Kalland. "Who governs Norwegian maritime security? Public facilitation of private security in a fragmented security environment." Cooperation and Conflict 52, no. 2 (2016): 261–79. http://dx.doi.org/10.1177/0010836716652425.

Full text
Abstract:
This article analyses the Norwegian governance of maritime security that surrounds the accommodation of armed private security provision on board Norwegian-registered ships, and questions the role of Norwegian public authorities. In 2011, the Norwegian government introduced a new legal framework that explicitly permitted the use of armed private security for ships transiting piracy-prone waters. Through an in-depth examination of the agenda setting, implementation and evaluation phases of the new policy, the article analyses the roles and responsibilities performed by the involved actors. Comp
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Full text
Abstract:
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decision
APA, Harvard, Vancouver, ISO, and other styles
18

Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.

Full text
Abstract:
Abstract In this article, we analyse the factors underpinning the shift towards hybrid security governance in Africa. Extant scholarship largely attributes this shift to broader global processes, such as histories of colonialism, neoliberalism and transformations in global governance, which have served to legitimize the role of private authority in security provision around sites of resource extraction. Our analysis seeks to understand the relative and relational influence of power and rules in international politics by offering empirical insights about what hybrid security arrangements look l
APA, Harvard, Vancouver, ISO, and other styles
19

von Solms, Basie. "Corporate Governance and Information Security." Computers & Security 20, no. 3 (2001): 215–18. http://dx.doi.org/10.1016/s0167-4048(01)00305-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

SENZAKI, Masao. "Innovating Global Nuclear Security Governance." Journal of the Atomic Energy Society of Japan 54, no. 8 (2012): 535–37. http://dx.doi.org/10.3327/jaesjb.54.8_535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Webber, Mark, Stuart Croft, Jolyon Howorth, Terry Terriff, and Elke Krahmann. "The governance of European security." Review of International Studies 30, no. 1 (2003): 3–26. http://dx.doi.org/10.1017/s0260210504005807.

Full text
Abstract:
This article seeks to develop a concept of ‘security governance’ in the context of post-Cold War Europe. The validity of a governance approach lies in its ability to locate some of the distinctive ways in which European security has been coordinated, managed and regulated. Based on an examination of the way governance is utilised in other political fields of political analysis, the article identifies the concept of security governance as involving the coordinated management and regulation of issues by multiple and separate authorities, the interventions of both public and private actors (depen
APA, Harvard, Vancouver, ISO, and other styles
22

Veiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Baele, Stephane J., Thierry Balzacq, and Philippe Bourbeau. "Numbers in global security governance." European Journal of International Security 3, no. 1 (2017): 22–44. http://dx.doi.org/10.1017/eis.2017.9.

Full text
Abstract:
AbstractThe use of numbers has been remarkably effective at pressing global claims. While research has documented the historical processes through which numbers gained such prominence, and has examined the political and ethical consequences of this omnipresence, very little is known regarding the specific ways in which numbers create the outcomes that sustain governance. This article proposes to close that gap. Building on the literature that acknowledges that numbers not only describe things but also have profound impacts on things themselves, this article offers an integrated account of the
APA, Harvard, Vancouver, ISO, and other styles
24

Lee-Koo, Katrina. "Gender, Governance and International Security." Gender & Development 22, no. 1 (2014): 193–95. http://dx.doi.org/10.1080/13552074.2014.889348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lentzos, Filippa. "Synthetic biology, security and governance." BioSocieties 7, no. 4 (2012): 339–51. http://dx.doi.org/10.1057/biosoc.2012.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Byung-Gak Choi. "Internet Governance and Cyber Security." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 457–80. http://dx.doi.org/10.23894/kjccl.2018.19.4.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Huang, Yanzhong. "Infectious Disease, Governance, and Security." International Studies Review 11, no. 4 (2009): 773–75. http://dx.doi.org/10.1111/j.1468-2486.2009.00898.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Howe, John S., and Brett C. Olsen. "Security Choice and Corporate Governance." European Financial Management 15, no. 4 (2009): 814–43. http://dx.doi.org/10.1111/j.1468-036x.2009.00510.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

CAWTHRA, GAVIN. "SECURITY GOVERNANCE IN SOUTH AFRICA." African Security Review 14, no. 3 (2005): 95–105. http://dx.doi.org/10.1080/10246029.2005.9627376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tickell, Crispin. "Security, environment, and global governance." Interdisciplinary Science Reviews 22, no. 3 (1997): 246–50. http://dx.doi.org/10.1179/isr.1997.22.3.246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

von Solms, Rossouw, and S. H. (Basie) von Solms. "Information security governance: Due care." Computers & Security 25, no. 7 (2006): 494–97. http://dx.doi.org/10.1016/j.cose.2006.08.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Knight, W. Andy, and Temitope B. Oriola. "Regional Security Governance in Africa." African Security 13, no. 4 (2020): 297–99. http://dx.doi.org/10.1080/19392206.2020.1871996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ystanes, Margit, and Alexandre Magalhães. "Racialized Governance." Conflict and Society 6, no. 1 (2020): 165–82. http://dx.doi.org/10.3167/arcs.2020.060110.

Full text
Abstract:
Based on ethnographic fieldwork, this article explores the eviction of residents from Vila Autódromo, a neighborhood that was decimated as Rio de Janeiro prepared to host the 2016 Summer Olympics. Inspired by Achille Mbembe’s notion of “necropolitics” and Mindy Fullilove’s concept of “root shock,” we argue that forced evictions in Rio constitute a form of racialized governance. The authorities exclude favela residents from the citizenry security interventions are intended to protect and conceptualize them instead as security risks. This exclusion reflects the spatial expression of racial hiera
APA, Harvard, Vancouver, ISO, and other styles
34

Lippert, Randy, and Daniel O'Connor. "Security Assemblages: Airport Security, Flexible Work, and Liberal Governance." Alternatives: Global, Local, Political 28, no. 3 (2003): 331–58. http://dx.doi.org/10.1177/030437540302800302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Christou, George, Stuart Croft, Michela Ceccorulli, and Sonia Lucarelli. "European Union security governance: putting the ‘security’ back in." European Security 19, no. 3 (2010): 341–59. http://dx.doi.org/10.1080/09662839.2010.526109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yaokumah, Winfred. "Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations." International Journal of IT/Business Alignment and Governance 4, no. 1 (2013): 27–43. http://dx.doi.org/10.4018/jitbag.2013010103.

Full text
Abstract:
The purpose of this empirical study is to evaluate the extent to which information security governance domain practices: strategic alignment, value delivery, resource management, risk management, and performance measurement relate to information security governance effectiveness. Random sampling technique was employed and data were collected via web survey from Ghanaian organizations. Employing three multiple regression models, the results showed there were statistically significant positive linear relationship between information security governance domain practices and information security g
APA, Harvard, Vancouver, ISO, and other styles
37

Caballero-Anthony, Mely. "Security Governance and ASEAN’s Political Security Community: Fragmented but Inclusive Security Communities?" Fudan Journal of the Humanities and Social Sciences 13, no. 1 (2019): 151–67. http://dx.doi.org/10.1007/s40647-019-00269-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Vargas Portillo, Patricia. "Cyberdiplomacy: Managing Security and Governance Online." Harvard Deusto Business Research 9, no. 2 (2020): 255–57. http://dx.doi.org/10.48132/hdbr.307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Knight, W. Andy, and Randolph B. Persaud. "Subsidiarity, Regional Governance, and Caribbean Security." Latin American Politics and Society 43, no. 1 (2001): 29. http://dx.doi.org/10.2307/3177012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Venkatraman, Sitalakshmi. "Autonomic Framework for IT Security Governance." International Journal of Managing Information Technology 9, no. 3 (2017): 1–11. http://dx.doi.org/10.5121/ijmit.2017.9301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kritzinger, E., and S. H. Von Solms. "E-learning: Incorporating Information Security Governance." Issues in Informing Science and Information Technology 3 (2006): 319–25. http://dx.doi.org/10.28945/894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

SUKMA, RIZAL. "Democratic Governance and Security in Indonesia." Japanese Journal of Political Science 4, no. 2 (2003): 241–55. http://dx.doi.org/10.1017/s1468109903001129.

Full text
Abstract:
As Indonesia democratises, a key feature of the country's political life has been a mixture of turmoil, hope and uncertainty. When Suharto's authoritarian regime collapsed in May 1998, Indonesia was experiencing the worst political and economic crises in more than three decades. On the political front, Suharto's collapse was preceded by communal violence, political turmoil, and state terrorism. Economically, the financial crisis, which came to Indonesia in December 1997, brought down the foundations of growth and pushed the country on to the brink of economic collapse. All these problems, whic
APA, Harvard, Vancouver, ISO, and other styles
43

Busser, Els De, and Ester Herlin-Karnell. "EU Security Governance and Financial Crimes." German Law Journal 19, no. 5 (2018): 1117–23. http://dx.doi.org/10.1017/s2071832200022963.

Full text
Abstract:
This special issue aims to investigate the regulatory challenges facing the EU with regard to security governance in the broad area of the fight against financial crimes and by adopting a wider outlook on how to map and understand these phenomena in their salient contexts. In recent years, security as a key word can be witnessed as increasingly penetrating policies on a national, international, and supranational level. This development is also visible in EU policies, inter alia in the EU's policy concerning the area of freedom, security, and justice (AFSJ). Coupling the word security to the co
APA, Harvard, Vancouver, ISO, and other styles
44

Wilson, Piers. "Governance and security: side by side." Computer Fraud & Security 2007, no. 4 (2007): 15–16. http://dx.doi.org/10.1016/s1361-3723(07)70060-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Danspeckgruber, Wolfgang. "Self-Determination, Self-Governance and Security." International Relations 15, no. 1 (2000): 11–21. http://dx.doi.org/10.1177/0047117800015001003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nesadurai, Helen E. S. "Introduction: economic security, globalization and governance." Pacific Review 17, no. 4 (2004): 459–84. http://dx.doi.org/10.1080/0951274042000326023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Banerjee, Dipankar. "Security Sector Governance in South Asia." South Asian Survey 16, no. 2 (2009): 171–85. http://dx.doi.org/10.1177/097152310901600202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Redding, Lee S. "Social Security Reform and Corporate Governance." Journal of Policy Reform 9, no. 3 (2006): 235–46. http://dx.doi.org/10.1080/13841280600911642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bagayoko, Niagalé. "Introduction: Hybrid Security Governance in Africa." IDS Bulletin 43, no. 4 (2012): 1–13. http://dx.doi.org/10.1111/j.1759-5436.2012.00330.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Duggan, Niall, and Teemu Naarajärvi. "China in Global Food Security Governance." Journal of Contemporary China 24, no. 95 (2015): 943–60. http://dx.doi.org/10.1080/10670564.2015.1013381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!