Academic literature on the topic 'IT Security Governance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT Security Governance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IT Security Governance"

1

Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.

Full text
Abstract:
Food security is one of the greatest challenges that characterises our times. One central argument in related conferences and symposia is the need to increase production for a growing population. However, major international organisations and other research institutions hold instead that food production exceeds current need and the reasons of food insecurity reside more in the complex concurrence and interdependence of poverty, access to food, local economic development and political and socioeconomic circumstances. Governance for sustainability is presented in this article as a process of mul
APA, Harvard, Vancouver, ISO, and other styles
7

Fair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ellison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IT Security Governance"

1

Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.

Full text
Abstract:
This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms – process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands business requirements for information security and strives to fulfill them. An explanation is offered a
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.

Full text
Abstract:
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine
APA, Harvard, Vancouver, ISO, and other styles
4

Cullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.

Full text
Abstract:
This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security's continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.

Full text
Abstract:
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance
APA, Harvard, Vancouver, ISO, and other styles
6

Coertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.

Full text
Abstract:
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This re
APA, Harvard, Vancouver, ISO, and other styles
7

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
8

Brand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide gu
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.

Full text
Abstract:
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human commitment
APA, Harvard, Vancouver, ISO, and other styles
10

Alqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.

Full text
Abstract:
Information security governance (ISG) has emerged as a new information security (IS) discipline and is considered one of the critical areas of research for enhancing the viability of organisations. This research proposes a viable system model (VSM) for ISG (VSMISG) and investigates its effects. The investigation involves studying the effects of the VSMISG in small, medium and large organisations facing low, medium and high security threat intensity over different time scales. This study also analyses the costs and benefits of changing from the baseline ISG model to the VSMISG. From reviewing t
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IT Security Governance"

1

Solms, S. H., and Rossouw Solms. Information Security Governance. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-79984-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rossouw, Solms, and SpringerLink (Online service), eds. Information Security Governance. Springer Science+Business Media, LLC, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bossong, Raphael, and Hendrik Hegemann, eds. European Civil Security Governance. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137481115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salman, Asma, and Assem Tharwat, eds. Digital Governance & Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-49302-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Institute, Campbell Public Affairs, and PricewaterhouseCoopers Endowment for the Business of Government., eds. Governance and public security. Campbell Public Affairs Institute, Maxwell School of Citizenship and Public Affairs, Syracuse University, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boggero, Marco. The Governance of Private Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69593-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

De Tender, Peter, David Rendon, and Samuel Erskine. Pro Azure Governance and Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4910-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Najem, Tom, Michael J. Molloy, Michael Bell, and John Bell, eds. Governance and Security in Jerusalem. Routledge, 2017. http://dx.doi.org/10.4324/9781315619255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cawthra, Gavin. African security governance: Emerging issues. Wits University Press ; New York, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gavin, Cawthra, ed. African security governance: Emerging issues. Wits University Press ; New York, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IT Security Governance"

1

Cleary, Laura R., and Gemma Collantes-Celador. "Governance." In Managing Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, Robert E. "Security Governance." In Auditing Information and Cyber Security Governance. CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-24280-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Frevel, Bernhard, and Verena Schulze. "Local Security Governance." In Governance. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-45718-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amadio Viceré, Maria Giulia, and Giulio Venneri. "Maritime Security." In European Administrative Governance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31205-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amadio Viceré, Maria Giulia, and Giulio Venneri. "Energy Security." In European Administrative Governance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31205-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Copeland, Marshall, and Matthew Jacobs. "Security Governance Operations." In Cyber Security on Azure. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6531-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Waschke, Marvin. "Security and Governance." In Cloud Standards. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4111-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Citaristi, Ileana. "Governance and Security." In The Europa Directory of International Organizations 2022, 24th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003292548-150.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IT Security Governance"

1

Namavari, Armin, Barry Wang, Sanketh Menda, et al. "Private Hierarchical Governance for Encrypted Messaging." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yeboah-Ofori, Abel, Alameen Jafar, Toluwaloju Abisogun, Ian Hilton, Waheed Oseni, and Ahmad Musa. "Data Security and Governance in Multi-Cloud Computing Environment." In 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2024. http://dx.doi.org/10.1109/ficloud62933.2024.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Corriss, Laura. "Information security governance." In the 2010 Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1920320.1920326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ohki, Eijiroh, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, and Tetsuyuki Kagaya. "Information security governance framework." In the first ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Szenes, Katalin. "Operational security — Security-based corporate governance." In 2013 IEEE 9th International Conference on Computational Cybernetics (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/icccyb.2013.6617622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Bruin, Rossouw, and S. H. von Solms. "Modelling Cyber Security Governance Maturity." In 2015 IEEE International Symposium on Technology and Society (ISTAS). IEEE, 2015. http://dx.doi.org/10.1109/istas.2015.7439415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leusse, Pierre de, and Theo Dimitrakos. "SOA-Based Security Governance Middleware." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fahlevi, Mochammad, Moeljadi Moeljadi, Siti Aisjah, and Atim Djazuli. "Blockchain Security and Corporate Governance." In 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS). IEEE, 2022. http://dx.doi.org/10.1109/icoris56080.2022.10031537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Trammell, Ariane, Benjamin Gehring, Marco Isele, Yvo Spielmann, and Valentin Zahnd. "Towards Automated Information Security Governance." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012357500003648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kritzinger, Elmarie, and Sebastiaan Von Solms. "E-learning: Incorporating Information Security Governance." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2953.

Full text
Abstract:
The global society is living in the electronic age where electronic transactions such as e-mail, e-banking, e-commerce and e-learning are becoming more and more prominent. This paper primarily focuses on e-learning and how important it is to ensure that proper Information Security measures are put in place to ensure that all information within the e-learning environment is properly protected. This paper highlights four Information Security pillars that could be used to achieve this.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IT Security Governance"

1

Jhaveri, Nayna. Gender, tenure security, and landscape governance. International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manzoor, Ahmad. Improving the International Governance of Food Security and Trade. International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Avant, Deborah, and Lindsay Heger. The New Power Politics: Networks and Transnational Security Governance. One Earth Future Foundation, 2014. http://dx.doi.org/10.18289/oef.2014.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baldwin, Gretchen. Localizing Security Governance in the Democratic Republic of the Congo: Security Committees in Action. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gatg8638.

Full text
Abstract:
In the Democratic Republic of the Congo (DRC), localizing security governance has been increasingly highlighted as an important tool to address security concerns. This can be done, over time, by strengthening the social contract, improving a people-centred security approach and restoring state authority through inclusive and participatory community engagement. A network of local security committees is at the core of the Congolese Government’s effort and policy on localization. These committees identify security concerns facing the population in areas affected by armed conflict—particularly in
APA, Harvard, Vancouver, ISO, and other styles
5

Mishra, Sitakanta, Happymon Jacob, and Shannon Abbott. Nuclear Security Governance in India: Institutions Instruments and Culture (2019). Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1678824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McConnell, James. Essex under Cromwell: Security and Local Governance in the Interregnum. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bartock, Michael, Murugiah Souppaya, Haidong Xia, et al. Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320b-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McCarthy, Nancy. Tenure security, landscape governance, and climate change: A research agenda. International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Erickson, Sarah, and Almudena Azcárate Ortega. To Space Security and Beyond: Exploring Space Security, Safety, and Sustainability Governance and Implementation Efforts. UNIDIR, 2023. http://dx.doi.org/10.37559/wmd/23/space/06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christie, Lorna. AI in policing and security. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!