2022
DOI: 10.1108/ics-08-2021-0112
|View full text |Cite
|
Sign up to set email alerts
|

A quantification mechanism for assessing adherence to information security governance guidelines

Abstract: Purpose Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of cyber-breaches targeting businesses makes this activity inescapable. Recently, researchers have published comprehensive lists of recommended cyber measures, specifically to inform organisational boards. However, the young cybersecurity industry has still to confirm and refine these guidelines. As a starting point, it would be hel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 53 publications
1
3
0
Order By: Relevance
“…This is also consistent with IT decision making and communication within overall governance responsibilities (Shaikh and Siponen, 2023; Bongiovanni et al , 2022) and decision-making under time pressure and workload requirements (Chen et al , 2022; Gyllensten et al , 2021; Chowdhury et al , 2019; Chowdhury et al , 2022; Giger and Pochwatko, 2008).…”
Section: Theory and Calculationsupporting
confidence: 74%
See 3 more Smart Citations
“…This is also consistent with IT decision making and communication within overall governance responsibilities (Shaikh and Siponen, 2023; Bongiovanni et al , 2022) and decision-making under time pressure and workload requirements (Chen et al , 2022; Gyllensten et al , 2021; Chowdhury et al , 2019; Chowdhury et al , 2022; Giger and Pochwatko, 2008).…”
Section: Theory and Calculationsupporting
confidence: 74%
“…The ERP Manager faces a conundrum as they manage the upper layers of the technology stack focusing on business processes and applications and the vulnerabilities are typically identified at the lower layers of the technology stack. The outcome of our approach allows the ERP Manager to set priorities for vulnerability remediation by establishing the significance of the threat or vulnerability along with identifying the specific systems that are vulnerable or exposed, adding a pragmatic approach to enhancing the governance process (Bongiovanni et al , 2022).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Last, the current ISG literature lacks thorough explanations regarding its effectiveness in digital environments. Studies on ISG effectiveness in general are scarce and lack empirical grounding (Bongiovanni et al 2022). The limited studies that do address ISG effectiveness tend to view it as an isolated, one-sided security perspective, focusing solely on in what manner the governance of security reduces security risks, breaches, and incidents (Liu et al 2020).…”
Section: Theoretical Background: Digital Security Governance 1backgro...mentioning
confidence: 99%