To see the other types of publications on this topic, follow the link: IT Security Governance.

Journal articles on the topic 'IT Security Governance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IT Security Governance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.

Full text
Abstract:
Food security is one of the greatest challenges that characterises our times. One central argument in related conferences and symposia is the need to increase production for a growing population. However, major international organisations and other research institutions hold instead that food production exceeds current need and the reasons of food insecurity reside more in the complex concurrence and interdependence of poverty, access to food, local economic development and political and socioeconomic circumstances. Governance for sustainability is presented in this article as a process of mul
APA, Harvard, Vancouver, ISO, and other styles
7

Fair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ellison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ball, Nicole. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 509–27. http://dx.doi.org/10.1080/1467880042000320032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Olonisakin, Funmi. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 529–31. http://dx.doi.org/10.1080/1467880042000320041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Moulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Leao, Isabela, and Alberto Contaretti. "The security governance approach." Freedom from Fear 2009, no. 2 (2009): 2–3. http://dx.doi.org/10.18356/9b74be53-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sharipov, F. F. "China’s food security governance." Vestnik Universiteta, no. 5 (June 26, 2025): 146–52. https://doi.org/10.26425/1816-4277-2025-5-146-152.

Full text
Abstract:
Food, energy, and financial security are the three key security issues facing the modern global economy amid the turbulence of recent years. The subject of the study is the People’s Republic of China’s (hereinafter referred to as PRC, China) current food security system. China, being the home to almost one-fifth of the world’s population, attaches great importance to the issue as a key element of national security. The purpose of the study is to examine the PRC approach to ensuring food security. The food crisis risks and China’s successes in food security have been considered. The issue of de
APA, Harvard, Vancouver, ISO, and other styles
16

Marelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Aarstad, Åsne Kalland. "Who governs Norwegian maritime security? Public facilitation of private security in a fragmented security environment." Cooperation and Conflict 52, no. 2 (2016): 261–79. http://dx.doi.org/10.1177/0010836716652425.

Full text
Abstract:
This article analyses the Norwegian governance of maritime security that surrounds the accommodation of armed private security provision on board Norwegian-registered ships, and questions the role of Norwegian public authorities. In 2011, the Norwegian government introduced a new legal framework that explicitly permitted the use of armed private security for ships transiting piracy-prone waters. Through an in-depth examination of the agenda setting, implementation and evaluation phases of the new policy, the article analyses the roles and responsibilities performed by the involved actors. Comp
APA, Harvard, Vancouver, ISO, and other styles
18

Julio, Natalia, Ricardo Figueroa, and Roberto D. Ponce Oliva. "Water Resources and Governance Approaches: Insights for Achieving Water Security." Water 13, no. 21 (2021): 3063. http://dx.doi.org/10.3390/w13213063.

Full text
Abstract:
Integrated river basin management (IRBM) has been proposed as a means to achieve water security (WS), maximizing economic and social well-being in an equitable manner and maintaining ecosystem sustainability. IRBM is regulated by a governance process that benefits the participation of different actors and institutions; however, it has been difficult to reach a consensus on what good governance means and which governance perspective is better for achieving it. In this paper, we explore the concept of “good water governance” through the analysis of different governance approaches: experimental (
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Full text
Abstract:
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decision
APA, Harvard, Vancouver, ISO, and other styles
20

Sivananda, Reddy Julakanti, Satya Kiranmayee Sattiraju Naga, and Julakanti Rajeswari. "Security by Design: Integrating Governance into Data Systems." International Journal of Communication Networks and Information Security 14, no. 2 (2022): 393–99. https://doi.org/10.5281/zenodo.14714813.

Full text
Abstract:
organizations increasingly rely on data for decision-making and operational efficiency, securing sensitive data has become a critical priority. The concept of “Security by Design” advocates for integrating security measures into the design and architecture of data systems from the outset, rather than treating security as an afterthought. This paper explores the integration of governance and security into data systems, emphasizing the role of data governance in ensuring data privacy, compliance, and protection. By establishing clear governance frameworks, organizations can ensure th
APA, Harvard, Vancouver, ISO, and other styles
21

Muhammad Umar Farooq Baloch. "CYBER SECURITY GOVERNANCE; IMPLICATIONS FOR PAKISTAN’S NATIONAL SECURITY." MAIRAJ 3, no. 1 (2024): 46–54. http://dx.doi.org/10.58760/mairaj.v3i1.38.

Full text
Abstract:
Networks for information and communication technologies form the backbone of the global cyberspace. These networks operate across physical borders and hold vital data and information that is essential to the national security of any nation. In the modern digital sphere, these networks are frequently vulnerable to cyber threats and attacks. One of the most important security concerns in the modern world is cyber warfare, which is a term coined to describe this conundrum. In response, the nations are making significant investments to fortify the security of their cyber frontiers and to assemble
APA, Harvard, Vancouver, ISO, and other styles
22

Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.

Full text
Abstract:
Abstract In this article, we analyse the factors underpinning the shift towards hybrid security governance in Africa. Extant scholarship largely attributes this shift to broader global processes, such as histories of colonialism, neoliberalism and transformations in global governance, which have served to legitimize the role of private authority in security provision around sites of resource extraction. Our analysis seeks to understand the relative and relational influence of power and rules in international politics by offering empirical insights about what hybrid security arrangements look l
APA, Harvard, Vancouver, ISO, and other styles
23

Knight, W. Andy, and Temitope B. Oriola. "Regional Security Governance in Africa." African Security 13, no. 4 (2020): 297–99. http://dx.doi.org/10.1080/19392206.2020.1871996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

SENZAKI, Masao. "Innovating Global Nuclear Security Governance." Journal of the Atomic Energy Society of Japan 54, no. 8 (2012): 535–37. http://dx.doi.org/10.3327/jaesjb.54.8_535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Veiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

CAWTHRA, GAVIN. "SECURITY GOVERNANCE IN SOUTH AFRICA." African Security Review 14, no. 3 (2005): 95–105. http://dx.doi.org/10.1080/10246029.2005.9627376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lee-Koo, Katrina. "Gender, Governance and International Security." Gender & Development 22, no. 1 (2014): 193–95. http://dx.doi.org/10.1080/13552074.2014.889348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Webber, Mark, Stuart Croft, Jolyon Howorth, Terry Terriff, and Elke Krahmann. "The governance of European security." Review of International Studies 30, no. 1 (2003): 3–26. http://dx.doi.org/10.1017/s0260210504005807.

Full text
Abstract:
This article seeks to develop a concept of ‘security governance’ in the context of post-Cold War Europe. The validity of a governance approach lies in its ability to locate some of the distinctive ways in which European security has been coordinated, managed and regulated. Based on an examination of the way governance is utilised in other political fields of political analysis, the article identifies the concept of security governance as involving the coordinated management and regulation of issues by multiple and separate authorities, the interventions of both public and private actors (depen
APA, Harvard, Vancouver, ISO, and other styles
29

Baele, Stephane J., Thierry Balzacq, and Philippe Bourbeau. "Numbers in global security governance." European Journal of International Security 3, no. 1 (2017): 22–44. http://dx.doi.org/10.1017/eis.2017.9.

Full text
Abstract:
AbstractThe use of numbers has been remarkably effective at pressing global claims. While research has documented the historical processes through which numbers gained such prominence, and has examined the political and ethical consequences of this omnipresence, very little is known regarding the specific ways in which numbers create the outcomes that sustain governance. This article proposes to close that gap. Building on the literature that acknowledges that numbers not only describe things but also have profound impacts on things themselves, this article offers an integrated account of the
APA, Harvard, Vancouver, ISO, and other styles
30

Lentzos, Filippa. "Synthetic biology, security and governance." BioSocieties 7, no. 4 (2012): 339–51. http://dx.doi.org/10.1057/biosoc.2012.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

von Solms, Basie. "Corporate Governance and Information Security." Computers & Security 20, no. 3 (2001): 215–18. http://dx.doi.org/10.1016/s0167-4048(01)00305-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

von Solms, Rossouw, and S. H. (Basie) von Solms. "Information security governance: Due care." Computers & Security 25, no. 7 (2006): 494–97. http://dx.doi.org/10.1016/j.cose.2006.08.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Byung-Gak Choi. "Internet Governance and Cyber Security." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 457–80. http://dx.doi.org/10.23894/kjccl.2018.19.4.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tickell, Crispin. "Security, environment, and global governance." Interdisciplinary Science Reviews 22, no. 3 (1997): 246–50. http://dx.doi.org/10.1179/isr.1997.22.3.246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Howe, John S., and Brett C. Olsen. "Security Choice and Corporate Governance." European Financial Management 15, no. 4 (2009): 814–43. http://dx.doi.org/10.1111/j.1468-036x.2009.00510.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Huang, Yanzhong. "Infectious Disease, Governance, and Security." International Studies Review 11, no. 4 (2009): 773–75. http://dx.doi.org/10.1111/j.1468-2486.2009.00898.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ystanes, Margit, and Alexandre Magalhães. "Racialized Governance." Conflict and Society 6, no. 1 (2020): 165–82. http://dx.doi.org/10.3167/arcs.2020.060110.

Full text
Abstract:
Based on ethnographic fieldwork, this article explores the eviction of residents from Vila Autódromo, a neighborhood that was decimated as Rio de Janeiro prepared to host the 2016 Summer Olympics. Inspired by Achille Mbembe’s notion of “necropolitics” and Mindy Fullilove’s concept of “root shock,” we argue that forced evictions in Rio constitute a form of racialized governance. The authorities exclude favela residents from the citizenry security interventions are intended to protect and conceptualize them instead as security risks. This exclusion reflects the spatial expression of racial hiera
APA, Harvard, Vancouver, ISO, and other styles
38

Yaokumah, Winfred. "Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations." International Journal of IT/Business Alignment and Governance 4, no. 1 (2013): 27–43. http://dx.doi.org/10.4018/jitbag.2013010103.

Full text
Abstract:
The purpose of this empirical study is to evaluate the extent to which information security governance domain practices: strategic alignment, value delivery, resource management, risk management, and performance measurement relate to information security governance effectiveness. Random sampling technique was employed and data were collected via web survey from Ghanaian organizations. Employing three multiple regression models, the results showed there were statistically significant positive linear relationship between information security governance domain practices and information security g
APA, Harvard, Vancouver, ISO, and other styles
39

Lippert, Randy, and Daniel O'Connor. "Security Assemblages: Airport Security, Flexible Work, and Liberal Governance." Alternatives: Global, Local, Political 28, no. 3 (2003): 331–58. http://dx.doi.org/10.1177/030437540302800302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Christou, George, Stuart Croft, Michela Ceccorulli, and Sonia Lucarelli. "European Union security governance: putting the ‘security’ back in." European Security 19, no. 3 (2010): 341–59. http://dx.doi.org/10.1080/09662839.2010.526109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

AYODELE, Johnson Oluwole, and Jane Roll ADEBUSUYI. "X-RAYING COST OF SECURITY SECTOR GOVERNANCE, HUMAN SECURITY AND REFORMS IN NIGERIA." Gusau Journal of Sociology 4, no. 3 (2025): 21–34. https://doi.org/10.57233/gujos.v4i3.2.

Full text
Abstract:
Everywhere, security is the conscious effort to stabilize peace. The quest of the entrepreneurs of terror to profit from lasting violence causes them to weaponize insecurity in Nigeria. This article examines how the cost of security sector governance predisposes citizens to insecurity and justifies reforms in Nigeria. The study qualitatively reviewed secondary data from journal articles, textbooks, newspapers, archival and internet sources for thematic and content analysis. It used the Human Security notion as its theoretical framework to analyze how the cost of security sector governance impa
APA, Harvard, Vancouver, ISO, and other styles
43

Bakker, Karen, and Cynthia Morinville. "The governance dimensions of water security: a review." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 2002 (2013): 20130116. http://dx.doi.org/10.1098/rsta.2013.0116.

Full text
Abstract:
Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power—an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governa
APA, Harvard, Vancouver, ISO, and other styles
44

Caballero-Anthony, Mely. "Security Governance and ASEAN’s Political Security Community: Fragmented but Inclusive Security Communities?" Fudan Journal of the Humanities and Social Sciences 13, no. 1 (2019): 151–67. http://dx.doi.org/10.1007/s40647-019-00269-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.

Full text
Abstract:
This study examines the dual role of artificial intelligence (AI) in advancing and challenging global information governance and data security. By leveraging methodologies such as Hierarchical Cluster Analysis (HCA), Principal Component Analysis (PCA), Structural Equation Modeling (SEM), and Multi-Criteria Decision Analysis (MCDA), the study investigates AI-specific vulnerabilities, governance gaps, and the effectiveness of compliance frameworks. Data from the MITRE ATT&CK Framework, AI Incident Database, Global Cybersecurity Index (GCI), and National Vulnerability Database (NVD) form the
APA, Harvard, Vancouver, ISO, and other styles
46

Patil, Rajendra, Suman Kumar Swarnkar, Deepak Yashwantrao Bhadane, Govind Mohanlal Poddar, Manesh Prakashrao Patil, and Ritesh C. Sonawane. "Exploring governance frameworks and decision processes in ‎blockchain-based decentralized autonomous organizations." International Journal of Basic and Applied Sciences 14, no. 1 (2025): 166–80. https://doi.org/10.14419/h0y6dw98.

Full text
Abstract:
Decentralized Autonomous Organizations (DAOs), which employ smart contracts and blockchain technology to facilitate decentral-ized, ‎democratic, and transparent decision-making, are an innovative change in organizational governance. This study examines the basic architecture of DAOs in the larger blockchain ecosystem, emphasizing how smart contracts help automate governance proce-dures. On-chain and ‎off-chain governance models are the main topics of this thorough analysis of DAO governance systems. Off-chain governance refers to the ‎decision-making process that happens outside the blockchain
APA, Harvard, Vancouver, ISO, and other styles
47

YAN, Ying, and Yaqiong WANG. "On the Analysis of the Optimization of China’s Food Security Governance Path under the New Food Security Concept." Asia-Pacific Journal of Humanities and Social Sciences 3, no. 1 (2023): 113–26. http://dx.doi.org/10.53789/j.1653-0465.2023.0301.013.

Full text
Abstract:
The current international situation has undergone profound changes, coupled with the unprecedented epidemic in a century. The international and domestic environment of my country’s grain market has emerged with new features and faced new challenges. The instability and uncertainties of the food security system have increased significantly. This paper focuses on food security issues under the great changes in the domestic and foreign environment in the new era. Starting from the analysis of the food security concept with Chinese characteristics, it is proposed that my country,s food security go
APA, Harvard, Vancouver, ISO, and other styles
48

Ikeke, Mark Omorovie. "Environmental Ethics and Environmental Governance for Security in Africa." European Journal of Sustainable Development 9, no. 3 (2020): 67. http://dx.doi.org/10.14207/ejsd.2020.v9n3p67.

Full text
Abstract:
The paper argues that an important aspect of security is environmental security. Without environmental security every other form of security is impeded. There need to be effective environmental governance if there is to be stable environmental security. The paper equally argues that environmental governance should be based on non-anthropocentric environmental ethics. Environmental governance is here understood to imply bringing human and governmental policies and legal frameworks to bear on the management of environmental resources. All over Africa there are a lot of environmental problems suc
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Weiguang. "Growing Power, Security Paradox, and China’s Security Strategy." China Quarterly of International Strategic Studies 01, no. 04 (2015): 609–23. http://dx.doi.org/10.1142/s2377740015500311.

Full text
Abstract:
China’s rapid rise has characterized the decades since the end of the Cold War. China’s growing comprehensive power has obviously given it more leverage and resources to pursue its goals and national interests. However, more power does not naturally translate into more security. To a great extent, China is facing a paradox between its security governance and increasingly broadened and complicated security agenda. Against this background, there are some changes in China’s security governance approach which are seen by some observers as China’s attempt to seek global hegemony and expansion. The
APA, Harvard, Vancouver, ISO, and other styles
50

Bin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.

Full text
Abstract:
The increasing integration of Artificial Intelligence (AI) within Security Information Systems (SIS) presents a significant shift in digital governance, where governments rely heavily on secure digital infrastructures to manage public services. The escalating threat landscape has necessitated a proactive approach to cybersecurity, and AI is proving crucial in enhancing threat detection, automating responses, and minimizing human error. However, many governments, particularly in developing nations, are struggling to bridge the gap between their current security measures and the complex challeng
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!