Academic literature on the topic 'IT Security Governance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT Security Governance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IT Security Governance"
Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.
Full textKRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full textWilliams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textSajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.
Full textFair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.
Full textEllison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.
Full textDissertations / Theses on the topic "IT Security Governance"
Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textWu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.
Full textMishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.
Full textCullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.
Full textDavis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Full textCoertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textBrand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.
Full textEdwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.
Full textAlqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.
Full textBooks on the topic "IT Security Governance"
Solms, S. H., and Rossouw Solms. Information Security Governance. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-79984-1.
Full textRossouw, Solms, and SpringerLink (Online service), eds. Information Security Governance. Springer Science+Business Media, LLC, 2009.
Find full textBossong, Raphael, and Hendrik Hegemann, eds. European Civil Security Governance. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137481115.
Full textSalman, Asma, and Assem Tharwat, eds. Digital Governance & Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-49302-7.
Full textInstitute, Campbell Public Affairs, and PricewaterhouseCoopers Endowment for the Business of Government., eds. Governance and public security. Campbell Public Affairs Institute, Maxwell School of Citizenship and Public Affairs, Syracuse University, 2003.
Find full textBoggero, Marco. The Governance of Private Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69593-8.
Full textDe Tender, Peter, David Rendon, and Samuel Erskine. Pro Azure Governance and Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4910-9.
Full textNajem, Tom, Michael J. Molloy, Michael Bell, and John Bell, eds. Governance and Security in Jerusalem. Routledge, 2017. http://dx.doi.org/10.4324/9781315619255.
Full textCawthra, Gavin. African security governance: Emerging issues. Wits University Press ; New York, 2009.
Find full textGavin, Cawthra, ed. African security governance: Emerging issues. Wits University Press ; New York, 2009.
Find full textBook chapters on the topic "IT Security Governance"
Cleary, Laura R., and Gemma Collantes-Celador. "Governance." In Managing Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-3.
Full textDavis, Robert E. "Security Governance." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-1.
Full textFrevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-24280-0_6.
Full textFrevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-45718-1_6.
Full textvon Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.
Full textAmadio Viceré, Maria Giulia, and Giulio Venneri. "Maritime Security." In European Administrative Governance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31205-2_8.
Full textAmadio Viceré, Maria Giulia, and Giulio Venneri. "Energy Security." In European Administrative Governance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31205-2_5.
Full textCopeland, Marshall, and Matthew Jacobs. "Security Governance Operations." In Cyber Security on Azure. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6531-4_7.
Full textWaschke, Marvin. "Security and Governance." In Cloud Standards. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4111-9_4.
Full textCitaristi, Ileana. "Governance and Security." In The Europa Directory of International Organizations 2022, 24th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003292548-150.
Full textConference papers on the topic "IT Security Governance"
Namavari, Armin, Barry Wang, Sanketh Menda, et al. "Private Hierarchical Governance for Encrypted Messaging." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00235.
Full textYeboah-Ofori, Abel, Alameen Jafar, Toluwaloju Abisogun, Ian Hilton, Waheed Oseni, and Ahmad Musa. "Data Security and Governance in Multi-Cloud Computing Environment." In 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2024. http://dx.doi.org/10.1109/ficloud62933.2024.00040.
Full textCorriss, Laura. "Information security governance." In the 2010 Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1920320.1920326.
Full textOhki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.
Full textSzenes, Katalin. "Operational security — Security-based corporate governance." In 2013 IEEE 9th International Conference on Computational Cybernetics (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/icccyb.2013.6617622.
Full textde Bruin, Rossouw, and S. H. von Solms. "Modelling Cyber Security Governance Maturity." In 2015 IEEE International Symposium on Technology and Society (ISTAS). IEEE, 2015. http://dx.doi.org/10.1109/istas.2015.7439415.
Full textLeusse, Pierre de, and Theo Dimitrakos. "SOA-Based Security Governance Middleware." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.17.
Full textFahlevi, Mochammad, Moeljadi Moeljadi, Siti Aisjah, and Atim Djazuli. "Blockchain Security and Corporate Governance." In 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS). IEEE, 2022. http://dx.doi.org/10.1109/icoris56080.2022.10031537.
Full textTrammell, Ariane, Benjamin Gehring, Marco Isele, Yvo Spielmann, and Valentin Zahnd. "Towards Automated Information Security Governance." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012357500003648.
Full textKritzinger, Elmarie, and Sebastiaan Von Solms. "E-learning: Incorporating Information Security Governance." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2953.
Full textReports on the topic "IT Security Governance"
Jhaveri, Nayna. Gender, tenure security, and landscape governance. International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134790.
Full textManzoor, Ahmad. Improving the International Governance of Food Security and Trade. International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.
Full textAvant, Deborah, and Lindsay Heger. The New Power Politics: Networks and Transnational Security Governance. One Earth Future Foundation, 2014. http://dx.doi.org/10.18289/oef.2014.006.
Full textBaldwin, Gretchen. Localizing Security Governance in the Democratic Republic of the Congo: Security Committees in Action. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gatg8638.
Full textMishra, Sitakanta, Happymon Jacob, and Shannon Abbott. Nuclear Security Governance in India: Institutions Instruments and Culture (2019). Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1678824.
Full textMcConnell, James. Essex under Cromwell: Security and Local Governance in the Interregnum. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.686.
Full textBartock, Michael, Murugiah Souppaya, Haidong Xia, et al. Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320b-draft.
Full textMcCarthy, Nancy. Tenure security, landscape governance, and climate change: A research agenda. International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134776.
Full textErickson, Sarah, and Almudena Azcárate Ortega. To Space Security and Beyond: Exploring Space Security, Safety, and Sustainability Governance and Implementation Efforts. UNIDIR, 2023. http://dx.doi.org/10.37559/wmd/23/space/06.
Full textChristie, Lorna. AI in policing and security. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs27.
Full text