Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences continue to indicate that attacks are still escalating on organisations when conducting these information-based activities. Clearly, more research is needed to better understand how organisations should formulate strategy to secure their information. Through a thematic review of academic security literature, we (1) analyse the antecedent conditions that motivate the potential adoption of a comprehensive information security strategy, (2) the current perspectives of strategy and (3) the yiel...
Aligned with the strategy-as-practice research tradition, this article investigates how organisation...
Proliferation of computers and networks in the age of the Internet has not only enabled novel servic...
Three deficiencies exist in information security under prevailing practices: organisations tend to f...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This study presents a synthesis of the literature on information security strategy that identifies t...
In today's globally interconnected economy, information security has become one of the most complex ...
Security governance influences the quality of strategic decision-making towards ensuring that invest...
The pervasiveness of information-based organizations, combined with the escalating number of securit...
The importance of information security in a pervasive networked environment is undeniable, yet there...
The literature on Information Security suggests that Information Security is a strategic undertaking...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Previous, mainly quantitative, research has indicated that information security threats and incident...
Aligned with the strategy-as-practice research tradition, this article investigates how organisation...
Proliferation of computers and networks in the age of the Internet has not only enabled novel servic...
Three deficiencies exist in information security under prevailing practices: organisations tend to f...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This study presents a synthesis of the literature on information security strategy that identifies t...
In today's globally interconnected economy, information security has become one of the most complex ...
Security governance influences the quality of strategic decision-making towards ensuring that invest...
The pervasiveness of information-based organizations, combined with the escalating number of securit...
The importance of information security in a pervasive networked environment is undeniable, yet there...
The literature on Information Security suggests that Information Security is a strategic undertaking...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Previous, mainly quantitative, research has indicated that information security threats and incident...
Aligned with the strategy-as-practice research tradition, this article investigates how organisation...
Proliferation of computers and networks in the age of the Internet has not only enabled novel servic...
Three deficiencies exist in information security under prevailing practices: organisations tend to f...