The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the nee...
Managing information security within an organization is becoming a very complex task. The informatio...
<div>Information security management (ISM) is a continuous, structured and systematic security appro...
In spite of the wealth of research in IS security, there is very little understanding of what actual...
ABSTRACT: Purpose The purpose of this paper is to expand current knowledge about the security orga...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information technology has dramatically increased online business opportunities; however these oppor...
PhD. (Informatics)Organizations become daily more dependent on information. Information is captured,...
The research problem, research question, research objectives, research approach, and thesis structur...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
Information explosion and pressures are leading organizations to invest heavily in information secur...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Organizations can choose how to integrate information security through planning and structuring of t...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
Managing information security within an organization is becoming a very complex task. The informatio...
<div>Information security management (ISM) is a continuous, structured and systematic security appro...
In spite of the wealth of research in IS security, there is very little understanding of what actual...
ABSTRACT: Purpose The purpose of this paper is to expand current knowledge about the security orga...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information technology has dramatically increased online business opportunities; however these oppor...
PhD. (Informatics)Organizations become daily more dependent on information. Information is captured,...
The research problem, research question, research objectives, research approach, and thesis structur...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
Information explosion and pressures are leading organizations to invest heavily in information secur...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Organizations can choose how to integrate information security through planning and structuring of t...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
Managing information security within an organization is becoming a very complex task. The informatio...
<div>Information security management (ISM) is a continuous, structured and systematic security appro...
In spite of the wealth of research in IS security, there is very little understanding of what actual...