Evolving benchmarking practices: a review for research perspectives

P Hong, SW Hong, J Jungbae Roh… - … : An International Journal, 2012 - emerald.com
Purpose–The purpose of this study is to review a major section of the literature on
benchmarking practices in order to achieve better perspectives for emerging benchmarking …

[BOOK][B] Utilizing the technology acceptance model to assess employee adoption of information systems security measures

CM Jones - 2009 - search.proquest.com
Companies are increasing their investment in technologies to enable better access to
information and to gain a competitive advantage. Global competition is driving companies to …

Organizational objectives for information security governance: a value focused assessment

S Mishra - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this study is to develop theoretically grounded and empirically
derived organizational security governance (OSG) objectives. Develo** organizational …

[HTML][HTML] Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society

DS Brazevich, ZS Safronova, TN Kosheleva… - Open Journal of Social …, 2020 - scirp.org
The article analyzes the domestic and foreign experience of information security in today's
society. The peculiarities of the research are analyzing the process of information security …

A holistic risk analysis method for identifying information security risks

JL Spears - Security Management, Integrity, and Internal Control in …, 2005 - Springer
Risk analysis is used during the planning of information security to identify security
requirements, and is also often used to determine the economic feasibility of security …

[PDF][PDF] Anchoring information security governance research: sociological groundings and future directions

E McFadzean, JN Ezingeard, D Birchall - Journal of Information System …, 2006 - Citeseer
An important aspect of any system development activity is about ensuring the security of
both the IT infrastructure and all the valuable information contained within the organisation …

Information assurance and corporate strategy: A Delphi study of choices, challenges, and developments for the future

E McFadzean, JN Ezingeard… - Information Systems …, 2011 - Taylor & Francis
In this article, we identified processes associated with strengthening the alignment between
information assurance, information systems and corporate strategies so that organizations …

A Comparative Study of JASO TP15002‐Based Security Risk Assessment Methods for Connected Vehicle System Design

Y Kawanishi, H Nishihara, D Souma… - Security and …, 2019 - Wiley Online Library
In recent years, much attention has been paid to autonomous vehicles and security threats
on such vehicles have become an important issue. One of these examples is a command …

B2B international internet marketing: A benchmarking exercise

R Eid, M Trueman, AM Ahmed - Benchmarking: An International …, 2006 - emerald.com
Purpose–To provide the foundation for further research and good practice in benchmarking
since it combines the best aspects of traditional and new internet marketing activities …

A proposed taxonomy of assets for information security risk assessment (ISRA)

P Shamala, R Ahmad - … 4th World Congress on Information and …, 2014 - ieeexplore.ieee.org
Information security has become a vital entity because organizations across the globe
conduct business in an interconnected and information rich environment. Hence …