This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today\u27s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements/or security management and governa...
Part 5: Policy Compliance and ObligationsInternational audienceThe academic literature offers many d...
Purpose: This paper aims to review the information security governance (ISG) literature and emphasis...
Security practitioners must be able to build cost-effective security programs while also complying w...
M.Comm.This study will point out the need for information security governance. Since the risk that a...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
ABSTRACT As the penetration of electronic commerce (e-commerce) and electronic business (e-business)...
A corporate governance system is not based solely on enforcement actions and incentives in order to ...
Ensuring security for e-business information exchange is essential as it entails exchange of sensiti...
Organisations are increasingly dependent on their information. Compromise to this information in ter...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
The road to information security goes through corporate governance. America cannot solve its cyber s...
Information security is a critical aspect of information systems usage in current organizations. Oft...
The road to information security goes through corporate governance. America cannot solve its cyber s...
Abstract: The lack of a fully inclusive guideline document to assist the functioning of sufficient I...
The use of the Internet in organisations and companies for carrying out various business activities ...
Part 5: Policy Compliance and ObligationsInternational audienceThe academic literature offers many d...
Purpose: This paper aims to review the information security governance (ISG) literature and emphasis...
Security practitioners must be able to build cost-effective security programs while also complying w...
M.Comm.This study will point out the need for information security governance. Since the risk that a...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
ABSTRACT As the penetration of electronic commerce (e-commerce) and electronic business (e-business)...
A corporate governance system is not based solely on enforcement actions and incentives in order to ...
Ensuring security for e-business information exchange is essential as it entails exchange of sensiti...
Organisations are increasingly dependent on their information. Compromise to this information in ter...
Abstract. Against the backdrop of organisational needs to derive value from IT Organisations through...
The road to information security goes through corporate governance. America cannot solve its cyber s...
Information security is a critical aspect of information systems usage in current organizations. Oft...
The road to information security goes through corporate governance. America cannot solve its cyber s...
Abstract: The lack of a fully inclusive guideline document to assist the functioning of sufficient I...
The use of the Internet in organisations and companies for carrying out various business activities ...
Part 5: Policy Compliance and ObligationsInternational audienceThe academic literature offers many d...
Purpose: This paper aims to review the information security governance (ISG) literature and emphasis...
Security practitioners must be able to build cost-effective security programs while also complying w...