A software gateway to affordable and effective Information Security Governance in SMMEsdoi:10.1109/issa.2013.6641035Jacques CoertzeRossouw von SolmsIEEEInformation Security for South Africa
IT governance, date security & BS 7799/ISO 17799 : a manager's guide to effective information security A Calder,S Watkins - Kogan Page 被引量: 3发表: 2002年 IT Governance: A Manager's Guide to Data Security and BS 7799/ISO 17799 3rd ed. TK Khoo - 《Corporate Governance》 被引量: ...
Nevertheless,ISMbringsstructureandgovernancetotheinformationsecurityfunctionwithinanorganization (Pironti,2005).Italsoallowsbusinesscontinuity,keepingpacewithlegalcompliance,andachieving competitiveadvantagesfororganizations(Babatunde&Selamat,2012).Thus,organizationswillcontinueto DorcasAdebolaBabatunde,Ph.D.,SchoolofAccounti...
they are taken away from higher value work. To be effective, organisations must embrace the approach of “streamline and automate.” Governance and compliance tasks need to be automated to the maximum extent possible so that information security and records management are seamlessly ...
Chapter 29 - Effective motivational factors and comprehensive study of information security and policy challenges 来自 dx.doi.org 喜欢 0 阅读量: 12 作者: M Arvindhan 出版社: Elsevier Inc. 关键词: Information security governance (ISG) Corporate governance Security culture Information security management...
2007. Characteristics of effective security governance. Governing for Enterprise Security (GES) Implementation Guide (CMU/SEI-2007-TN-020). Software Engineering.Brown, Steve. 2011. Characteristics of Effective Security Governance.Allen, J., and Westby, J.R. "Characteristics of Effective Security ...
Information security governance for e-services in southern African developing countries e-Government projects A. Ramtohul, and K. M. S. Soyjaudah, "Information security governance for e-services in southern African developing countries e- Government projects",... A Ramtohul,KMS Soyjaudah - 《...
"By focusing on the legal framework and measures, the white paper underscores the fact that China's counterterrorism efforts consistently operate under the rule of law and are integrated into the country's daily governance," said Yang Haitao, an associate professor at the Criminal Investigation Po...
Around the Network How Will Health Data Privacy, Cyber Regs Shape Up in 2025? Addressing Gen AI Privacy, Security Governance in Healthcare Protecting Highly Sensitive Health Data for Research The Future of CISA in Healthcare in the New Administration ...
The paper also proposes cloud vision for effective governance and describes the ways to enhance the public sector E-governance strategies with Cloud Virtualization and raises security issues in adoption of those strategies.JoshiJoshi, A. (2012). Challenges for Adoption of Secured Effective ...