Evolving benchmarking practices: a review for research perspectives
Purpose–The purpose of this study is to review a major section of the literature on
benchmarking practices in order to achieve better perspectives for emerging benchmarking …
benchmarking practices in order to achieve better perspectives for emerging benchmarking …
[BOOK][B] Utilizing the technology acceptance model to assess employee adoption of information systems security measures
CM Jones - 2009 - search.proquest.com
Companies are increasing their investment in technologies to enable better access to
information and to gain a competitive advantage. Global competition is driving companies to …
information and to gain a competitive advantage. Global competition is driving companies to …
Organizational objectives for information security governance: a value focused assessment
S Mishra - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this study is to develop theoretically grounded and empirically
derived organizational security governance (OSG) objectives. Develo** organizational …
derived organizational security governance (OSG) objectives. Develo** organizational …
[HTML][HTML] Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
DS Brazevich, ZS Safronova, TN Kosheleva… - Open Journal of Social …, 2020 - scirp.org
The article analyzes the domestic and foreign experience of information security in today's
society. The peculiarities of the research are analyzing the process of information security …
society. The peculiarities of the research are analyzing the process of information security …
A holistic risk analysis method for identifying information security risks
JL Spears - Security Management, Integrity, and Internal Control in …, 2005 - Springer
Risk analysis is used during the planning of information security to identify security
requirements, and is also often used to determine the economic feasibility of security …
requirements, and is also often used to determine the economic feasibility of security …
[PDF][PDF] Anchoring information security governance research: sociological groundings and future directions
E McFadzean, JN Ezingeard, D Birchall - Journal of Information System …, 2006 - Citeseer
An important aspect of any system development activity is about ensuring the security of
both the IT infrastructure and all the valuable information contained within the organisation …
both the IT infrastructure and all the valuable information contained within the organisation …
Information assurance and corporate strategy: A Delphi study of choices, challenges, and developments for the future
E McFadzean, JN Ezingeard… - Information Systems …, 2011 - Taylor & Francis
In this article, we identified processes associated with strengthening the alignment between
information assurance, information systems and corporate strategies so that organizations …
information assurance, information systems and corporate strategies so that organizations …
A Comparative Study of JASO TP15002‐Based Security Risk Assessment Methods for Connected Vehicle System Design
Y Kawanishi, H Nishihara, D Souma… - Security and …, 2019 - Wiley Online Library
In recent years, much attention has been paid to autonomous vehicles and security threats
on such vehicles have become an important issue. One of these examples is a command …
on such vehicles have become an important issue. One of these examples is a command …
B2B international internet marketing: A benchmarking exercise
Purpose–To provide the foundation for further research and good practice in benchmarking
since it combines the best aspects of traditional and new internet marketing activities …
since it combines the best aspects of traditional and new internet marketing activities …
A proposed taxonomy of assets for information security risk assessment (ISRA)
Information security has become a vital entity because organizations across the globe
conduct business in an interconnected and information rich environment. Hence …
conduct business in an interconnected and information rich environment. Hence …