Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through agility, efficiencies and cost effectiveness, many organisations have adopted a decentralised IT organisational structure, ena-bling individual business units the autonomy to implement, operate and govern technology. The increase risk that poses organisations through cyber-attacks, raises the question of how IT security could effectively provide the level of organisations governance to counter cyber threats in a decentralised organisational model. In exploring the challenges in the decentralization of IT security, we highlighted that the accountability of such activities would become diluted, with each business unit managing security in thei...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Introduction Information technology security or computing system security is one of the most impor-t...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
At a time when the importance of information and technology is obvious in every aspect of business, ...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
Information technology (IT) security, which is concerned with protecting the confidentiality, integr...
In today’s business environment, almost all information is captured and stored in electronic form. T...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
It is clear that the level and type of threat that managers in organizations are being confronted wi...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
Growing incidents of cyber hacking and security breaches of information systems (e.g., Sony, Target,...
The interest in the security of IT systems has grown in recent years, proportionally to their diffus...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Introduction Information technology security or computing system security is one of the most impor-t...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
At a time when the importance of information and technology is obvious in every aspect of business, ...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
Information technology (IT) security, which is concerned with protecting the confidentiality, integr...
In today’s business environment, almost all information is captured and stored in electronic form. T...
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, d...
It is clear that the level and type of threat that managers in organizations are being confronted wi...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
Growing incidents of cyber hacking and security breaches of information systems (e.g., Sony, Target,...
The interest in the security of IT systems has grown in recent years, proportionally to their diffus...
In a digital world, cybersecurity has become very important for companies, governmentagencies or org...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Introduction Information technology security or computing system security is one of the most impor-t...