2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) 2019
DOI: 10.1109/icriis48246.2019.9073641
|View full text |Cite
|
Sign up to set email alerts
|

Review of Cybersecurity Audit Management and Execution Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…The rapid development of technology and the increasing usage of new technologies create the need for protection against malicious activities that target information systems (Gordon et al, 2003;Hannaford, 1995). The security of electronic services concerns cyber security between networks (Eling and Schnell, 2016;Zakaria et al, 2019). A key concern of businesses is to have information systems that do not allow unauthorised users access and ensure that information is not vulnerable to spying or other incidents of infringement (Gordon et al, 2003).…”
Section: The Need For a Theoretical Frameworkmentioning
confidence: 99%
“…The rapid development of technology and the increasing usage of new technologies create the need for protection against malicious activities that target information systems (Gordon et al, 2003;Hannaford, 1995). The security of electronic services concerns cyber security between networks (Eling and Schnell, 2016;Zakaria et al, 2019). A key concern of businesses is to have information systems that do not allow unauthorised users access and ensure that information is not vulnerable to spying or other incidents of infringement (Gordon et al, 2003).…”
Section: The Need For a Theoretical Frameworkmentioning
confidence: 99%