© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information security strategy in organisations and I propose a substantive theory for understanding this phenomenon under varying environmental and internal conditions. My original contribution to knowledge includes a definition for information security strategy, criteria for organisational environment and information assessment, a conceptual model of information security strategy, a substantive theory on information security strategy, and a descriptive set of benefits that can be adopted after strategy selection and approval. Organisations are progressively undertaking digital transformation of their products and services to reduce costs, improve customer...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
As the velocity and volume of data breaches increases, information security is a cornerstone to the...
Security was not a major concern of the past in Information Technology Organizations. But presently,...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
In today's globally interconnected economy, information security has become one of the most complex ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
This study presents a synthesis of the literature on information security strategy that identifies t...
Information security is no longer just about security. Today, security is about resource and informa...
The rise of Information Technology over the past decades has contributed to the increase of digital ...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
Purpose: This paper aims to review the information security governance (ISG) literature and emphasis...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
The literature on Information Security suggests that Information Security is a strategic undertaking...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
As the velocity and volume of data breaches increases, information security is a cornerstone to the...
Security was not a major concern of the past in Information Technology Organizations. But presently,...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
In today's globally interconnected economy, information security has become one of the most complex ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
This study presents a synthesis of the literature on information security strategy that identifies t...
Information security is no longer just about security. Today, security is about resource and informa...
The rise of Information Technology over the past decades has contributed to the increase of digital ...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
Purpose: This paper aims to review the information security governance (ISG) literature and emphasis...
Objectives According to the authors, such an assumption requires describing the impact of informatio...
The literature on Information Security suggests that Information Security is a strategic undertaking...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
As the velocity and volume of data breaches increases, information security is a cornerstone to the...
Security was not a major concern of the past in Information Technology Organizations. But presently,...