2020
DOI: 10.1016/j.cose.2020.102030
|View full text |Cite
|
Sign up to set email alerts
|

Information security governance challenges and critical success factors: Systematic review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
26
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(84 citation statements)
references
References 18 publications
1
26
0
1
Order By: Relevance
“…In other words, in traditional organizations, more security is achieved by more top-down controls and less cross-functional approaches. This finding underlines the important role that modern IT technologies such as ERP can play in enhancing organizational security while improving the agility of the organization (AlGhamdi et al, 2020).…”
Section: Discussionmentioning
confidence: 59%
“…In other words, in traditional organizations, more security is achieved by more top-down controls and less cross-functional approaches. This finding underlines the important role that modern IT technologies such as ERP can play in enhancing organizational security while improving the agility of the organization (AlGhamdi et al, 2020).…”
Section: Discussionmentioning
confidence: 59%
“…Since security is the main concern of any organization, the level of security features available with the access management scheme should be well organized and arranged according to the time requirements. Previous authors [3][4][5][6] are mainly concerned with the analysis of information security components and risk analysis. This research focuses on managing privileged access using Active Directory services to provide an authentic and improved way of identity management for any organization.…”
Section: Introductionmentioning
confidence: 99%
“…This study discusses the problems of loss of flexibility in access and of reduced allocation of resources among users, which are among the most common problems in real system applications [5]. The absence of an exceptionally flexible approval mechanism in existing access control models may impair the resource availability and work time efficiency of current applications, and limit their growth [6].…”
Section: Introductionmentioning
confidence: 99%