Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through agility, efficiencies and cost effectiveness, many organisations have adopted a decentralised IT organisational structure, ena-bling individual business units the autonomy to implement, operate and govern technology. The increase risk that poses organisations through cyber-attacks, raises the question of how IT security could effectively provide the level of organisations governance to counter cyber threats in a decentralised organisational model. In exploring the challenges in the decentralization of IT security, we highlighted that the accountability of such activities would become diluted, with each business unit managing security in thei...
In recent years, information technology (IT) has grown from an enabling technology to an important t...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
The purpose of this section is to review specific types of national cyber security (NCS) areas (also...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
At a time when the importance of information and technology is obvious in every aspect of business, ...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Introduction Information technology security or computing system security is one of the most impor-t...
Growing incidents of cyber hacking and security breaches of information systems (e.g., Sony, Target,...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
The development of the entire IT sector is very dynamic and its consequences penetrate into all sphe...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
The identification of the major information technology (IT) access control policies is required to d...
It is clear that the level and type of threat that managers in organizations are being confronted wi...
In recent years, information technology (IT) has grown from an enabling technology to an important t...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
The purpose of this section is to review specific types of national cyber security (NCS) areas (also...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
At a time when the importance of information and technology is obvious in every aspect of business, ...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Introduction Information technology security or computing system security is one of the most impor-t...
Growing incidents of cyber hacking and security breaches of information systems (e.g., Sony, Target,...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
The development of the entire IT sector is very dynamic and its consequences penetrate into all sphe...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
The identification of the major information technology (IT) access control policies is required to d...
It is clear that the level and type of threat that managers in organizations are being confronted wi...
In recent years, information technology (IT) has grown from an enabling technology to an important t...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
The purpose of this section is to review specific types of national cyber security (NCS) areas (also...