Journal articles on the topic 'IT Security Governance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IT Security Governance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bevir, Mark. "Decentring security governance." Global Crime 17, no. 3-4 (2016): 227–39. http://dx.doi.org/10.1080/17440572.2016.1197509.
Full textKRAHMANN, ELKE. "Conceptualizing Security Governance." Cooperation and Conflict 38, no. 1 (2003): 5–26. http://dx.doi.org/10.1177/0010836703038001001.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full textWilliams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textSajeva, Maurizio, Mark Lemon, and Parminder Singh Sahota. "Governance for Food Security." International Journal of Food and Beverage Manufacturing and Business Models 2, no. 2 (2017): 67–84. http://dx.doi.org/10.4018/ijfbmbm.2017070104.
Full textFair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.
Full textEllison, Graham, and Mary O'Rawe. "Security governance in transition." Theoretical Criminology 14, no. 1 (2010): 31–57. http://dx.doi.org/10.1177/1362480609354864.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." EDPACS 31, no. 6 (2003): 11–17. http://dx.doi.org/10.1201/1079/43855.31.6.20031201/78849.3.
Full textGarigue, Robert, and Marc Stefaniu. "Information Security Governance Reporting." Information Systems Security 12, no. 4 (2003): 36–40. http://dx.doi.org/10.1201/1086/43648.12.4.20030901/77304.7.
Full textBall, Nicole. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 509–27. http://dx.doi.org/10.1080/1467880042000320032.
Full textOlonisakin, Funmi. "Reforming security sector governance." Conflict, Security & Development 4, no. 3 (2004): 529–31. http://dx.doi.org/10.1080/1467880042000320041.
Full textMoulton, Rolf, and Robert S. Coles. "Applying information security governance." Computers & Security 22, no. 7 (2003): 580–84. http://dx.doi.org/10.1016/s0167-4048(03)00705-3.
Full textLeao, Isabela, and Alberto Contaretti. "The security governance approach." Freedom from Fear 2009, no. 2 (2009): 2–3. http://dx.doi.org/10.18356/9b74be53-en.
Full textSharipov, F. F. "China’s food security governance." Vestnik Universiteta, no. 5 (June 26, 2025): 146–52. https://doi.org/10.26425/1816-4277-2025-5-146-152.
Full textMarelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.
Full textAarstad, Åsne Kalland. "Who governs Norwegian maritime security? Public facilitation of private security in a fragmented security environment." Cooperation and Conflict 52, no. 2 (2016): 261–79. http://dx.doi.org/10.1177/0010836716652425.
Full textJulio, Natalia, Ricardo Figueroa, and Roberto D. Ponce Oliva. "Water Resources and Governance Approaches: Insights for Achieving Water Security." Water 13, no. 21 (2021): 3063. http://dx.doi.org/10.3390/w13213063.
Full textWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Full textSivananda, Reddy Julakanti, Satya Kiranmayee Sattiraju Naga, and Julakanti Rajeswari. "Security by Design: Integrating Governance into Data Systems." International Journal of Communication Networks and Information Security 14, no. 2 (2022): 393–99. https://doi.org/10.5281/zenodo.14714813.
Full textMuhammad Umar Farooq Baloch. "CYBER SECURITY GOVERNANCE; IMPLICATIONS FOR PAKISTAN’S NATIONAL SECURITY." MAIRAJ 3, no. 1 (2024): 46–54. http://dx.doi.org/10.58760/mairaj.v3i1.38.
Full textEnns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.
Full textKnight, W. Andy, and Temitope B. Oriola. "Regional Security Governance in Africa." African Security 13, no. 4 (2020): 297–99. http://dx.doi.org/10.1080/19392206.2020.1871996.
Full textSENZAKI, Masao. "Innovating Global Nuclear Security Governance." Journal of the Atomic Energy Society of Japan 54, no. 8 (2012): 535–37. http://dx.doi.org/10.3327/jaesjb.54.8_535.
Full textVeiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.
Full textCAWTHRA, GAVIN. "SECURITY GOVERNANCE IN SOUTH AFRICA." African Security Review 14, no. 3 (2005): 95–105. http://dx.doi.org/10.1080/10246029.2005.9627376.
Full textLee-Koo, Katrina. "Gender, Governance and International Security." Gender & Development 22, no. 1 (2014): 193–95. http://dx.doi.org/10.1080/13552074.2014.889348.
Full textWebber, Mark, Stuart Croft, Jolyon Howorth, Terry Terriff, and Elke Krahmann. "The governance of European security." Review of International Studies 30, no. 1 (2003): 3–26. http://dx.doi.org/10.1017/s0260210504005807.
Full textBaele, Stephane J., Thierry Balzacq, and Philippe Bourbeau. "Numbers in global security governance." European Journal of International Security 3, no. 1 (2017): 22–44. http://dx.doi.org/10.1017/eis.2017.9.
Full textLentzos, Filippa. "Synthetic biology, security and governance." BioSocieties 7, no. 4 (2012): 339–51. http://dx.doi.org/10.1057/biosoc.2012.28.
Full textvon Solms, Basie. "Corporate Governance and Information Security." Computers & Security 20, no. 3 (2001): 215–18. http://dx.doi.org/10.1016/s0167-4048(01)00305-4.
Full textvon Solms, Rossouw, and S. H. (Basie) von Solms. "Information security governance: Due care." Computers & Security 25, no. 7 (2006): 494–97. http://dx.doi.org/10.1016/j.cose.2006.08.013.
Full textByung-Gak Choi. "Internet Governance and Cyber Security." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 457–80. http://dx.doi.org/10.23894/kjccl.2018.19.4.020.
Full textTickell, Crispin. "Security, environment, and global governance." Interdisciplinary Science Reviews 22, no. 3 (1997): 246–50. http://dx.doi.org/10.1179/isr.1997.22.3.246.
Full textHowe, John S., and Brett C. Olsen. "Security Choice and Corporate Governance." European Financial Management 15, no. 4 (2009): 814–43. http://dx.doi.org/10.1111/j.1468-036x.2009.00510.x.
Full textHuang, Yanzhong. "Infectious Disease, Governance, and Security." International Studies Review 11, no. 4 (2009): 773–75. http://dx.doi.org/10.1111/j.1468-2486.2009.00898.x.
Full textYstanes, Margit, and Alexandre Magalhães. "Racialized Governance." Conflict and Society 6, no. 1 (2020): 165–82. http://dx.doi.org/10.3167/arcs.2020.060110.
Full textYaokumah, Winfred. "Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations." International Journal of IT/Business Alignment and Governance 4, no. 1 (2013): 27–43. http://dx.doi.org/10.4018/jitbag.2013010103.
Full textLippert, Randy, and Daniel O'Connor. "Security Assemblages: Airport Security, Flexible Work, and Liberal Governance." Alternatives: Global, Local, Political 28, no. 3 (2003): 331–58. http://dx.doi.org/10.1177/030437540302800302.
Full textChristou, George, Stuart Croft, Michela Ceccorulli, and Sonia Lucarelli. "European Union security governance: putting the ‘security’ back in." European Security 19, no. 3 (2010): 341–59. http://dx.doi.org/10.1080/09662839.2010.526109.
Full textLee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.
Full textAYODELE, Johnson Oluwole, and Jane Roll ADEBUSUYI. "X-RAYING COST OF SECURITY SECTOR GOVERNANCE, HUMAN SECURITY AND REFORMS IN NIGERIA." Gusau Journal of Sociology 4, no. 3 (2025): 21–34. https://doi.org/10.57233/gujos.v4i3.2.
Full textBakker, Karen, and Cynthia Morinville. "The governance dimensions of water security: a review." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 2002 (2013): 20130116. http://dx.doi.org/10.1098/rsta.2013.0116.
Full textCaballero-Anthony, Mely. "Security Governance and ASEAN’s Political Security Community: Fragmented but Inclusive Security Communities?" Fudan Journal of the Humanities and Social Sciences 13, no. 1 (2019): 151–67. http://dx.doi.org/10.1007/s40647-019-00269-z.
Full textKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Full textPatil, Rajendra, Suman Kumar Swarnkar, Deepak Yashwantrao Bhadane, Govind Mohanlal Poddar, Manesh Prakashrao Patil, and Ritesh C. Sonawane. "Exploring governance frameworks and decision processes in blockchain-based decentralized autonomous organizations." International Journal of Basic and Applied Sciences 14, no. 1 (2025): 166–80. https://doi.org/10.14419/h0y6dw98.
Full textYAN, Ying, and Yaqiong WANG. "On the Analysis of the Optimization of China’s Food Security Governance Path under the New Food Security Concept." Asia-Pacific Journal of Humanities and Social Sciences 3, no. 1 (2023): 113–26. http://dx.doi.org/10.53789/j.1653-0465.2023.0301.013.
Full textIkeke, Mark Omorovie. "Environmental Ethics and Environmental Governance for Security in Africa." European Journal of Sustainable Development 9, no. 3 (2020): 67. http://dx.doi.org/10.14207/ejsd.2020.v9n3p67.
Full textWang, Weiguang. "Growing Power, Security Paradox, and China’s Security Strategy." China Quarterly of International Strategic Studies 01, no. 04 (2015): 609–23. http://dx.doi.org/10.1142/s2377740015500311.
Full textBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Full text