8,040
Views
129
CrossRef citations to date
0
Altmetric
REGULAR ARTICLES

An Information Security Governance Framework

&
Pages 361-372 | Published online: 10 Dec 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas & Dimitrios Askounis. (2022) A Cyber-Security Culture Framework for Assessing Organization Readiness. Journal of Computer Information Systems 62:3, pages 452-462.
Read now
Lena Y. Connolly, Michael Lang & David S. Wall. (2019) Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees. Information Systems Management 36:4, pages 306-322.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
She-I Chang, I-Cheng Chang, Hsing-Jung Li & Tsung-Han He. (2014) The study of intelligent manufacturing internal control mechanism by using a perspective of the production cycle. Journal of Industrial and Production Engineering 31:3, pages 119-127.
Read now
Abashe Atiku Maidabino & A.N. Zainab. (2012) A holistic approach to collection security implementation in university libraries. Library Collections, Acquisitions, & Technical Services 36:3-4, pages 107-120.
Read now
Elspeth McFadzean, Jean-Noël Ezingeard & David Birchall. (2011) Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future. Information Systems Management 28:2, pages 102-129.
Read now
KevinF. McCrohan, Kathryn Engel & JamesW. Harvey. (2010) Influence of Awareness and Training on Cyber Security. Journal of Internet Commerce 9:1, pages 23-41.
Read now
Randall Young. (2009) Growth Perspective of Information Security. Journal of Information Privacy and Security 5:4, pages 51-67.
Read now

Articles from other publishers (120)

Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, Lorin Schöni, Verena Zimmermann & Melanie Knieps. (2023) Learning from safety science: A way forward for studying cybersecurity incidents in organizations. Computers & Security 134, pages 103435.
Crossref
Sascha Nägele, Nathalie Schenk & Florian Matthes. (2023) The Current State of Security Governance and Compliance in Large-Scale Agile Development: A Systematic Literature Review and Interview Study. The Current State of Security Governance and Compliance in Large-Scale Agile Development: A Systematic Literature Review and Interview Study.
Gurvirender P.S. Tejay & Zareef A. Mohammed. (2023) Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management 60:3, pages 103751.
Crossref
Faheem Ahmed Shaikh & Mikko Siponen. (2023) Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security 124, pages 102974.
Crossref
Peter Langendörfer, Stephan Kornemann, Wael Alsabbagh & Erik Hermann. 2023. The Future of Smart Production for SMEs. The Future of Smart Production for SMEs 335 341 .
Špela Grilc, Kaja Prislan & Anže Mihelič. (2022) Teorije in modeli v vedenjskih informacijskovarnostnih raziskavah. Psihološka obzorja / Horizons of Psychology 31, pages 602-622.
Crossref
Stef Schinagl, Abbas Shahim & Svetlana Khapova. (2022) Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. Computers & Security 122, pages 102903.
Crossref
Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut & Angelo Cavallo. (2022) A quantification mechanism for assessing adherence to information security governance guidelines. Information & Computer Security 30:4, pages 517-548.
Crossref
Tejaswini C. Herath, Hemantha S. B. Herath & David Cullum. (2022) An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks. Information Systems Frontiers.
Crossref
Kathick Raj Elangovan. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 587 610 .
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 213 232 .
Mansour Hammoud Alruwies, Shailendra Mishra & Mohammed Abdul Rahman AlShehri. (2022) Identity Governance Framework for Privileged Users. Computer Systems Science and Engineering 40:3, pages 995-1005.
Crossref
Maha Sroor, Nicky Hickman, Taija Kolehmainen, Gabriella Laatikainen & Pekka Abrahamsson. (2022) How modeling helps in developing self-sovereign identity governance framework: An experience report. Procedia Computer Science 204, pages 267-277.
Crossref
Yang Hoong & Davar Rezania. 2022. Computer Networks, Big Data and IoT. Computer Networks, Big Data and IoT 285 294 .
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia & Manoj Dora. (2020) Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management 34:6, pages 1597-1629.
Crossref
Yongho Kim & Boyoung Kim. (2021) The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework. Information 12:11, pages 446.
Crossref
Marlies Sas, Wim Hardyns, Karolien van Nunen, Genserik Reniers & Koen Ponnet. (2020) Measuring the security culture in organizations: a systematic overview of existing tools. Security Journal 34:2, pages 340-357.
Crossref
Margareth Stoll. 2021. Research Anthology on Privatizing and Securing Data. Research Anthology on Privatizing and Securing Data 304 326 .
Michelle Graham, Katrina Falkner, Claudia Szabo & Yuval Yarom. 2021. Enterprise Information Systems. Enterprise Information Systems 883 904 .
Robert Hoole & Hamid Jahankhani. 2021. Information Security Technologies for Controlling Pandemics. Information Security Technologies for Controlling Pandemics 357 386 .
Sultan AlGhamdi, Khin Than Win & Elena Vlahu-Gjorgievska. (2020) Information security governance challenges and critical success factors: Systematic review. Computers & Security 99, pages 102030.
Crossref
Rainer Diesch, Matthias Pfaff & Helmut Krcmar. (2020) A comprehensive model of information security factors for decision-makers. Computers & Security 92, pages 101747.
Crossref
Adéle da Veiga, Liudmila V. Astakhova, Adéle Botha & Marlien Herselman. (2020) Defining organisational information security culture—Perspectives from academia and industry. Computers & Security 92, pages 101713.
Crossref
Muhammad Imran Tariq, Shakeel Ahmed, Nisar Ahmed Memon, Shahzadi Tayyaba, Muhammad Waseem Ashraf, Mohsin Nazir, Akhtar Hussain, Valentina Emilia Balas & Marius M. Balas. (2020) Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks. Sensors 20:5, pages 1310.
Crossref
Stef Schinagl & Abbas Shahim. (2020) What do we know about information security governance?. Information & Computer Security 28:2, pages 261-292.
Crossref
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2020. Modern Theories and Practices for Cyber Ethics and Security Compliance. Modern Theories and Practices for Cyber Ethics and Security Compliance 152 171 .
Isabella CorradiniIsabella Corradini. 2020. Building a Cybersecurity Culture in Organizations. Building a Cybersecurity Culture in Organizations 63 86 .
Hugo Heredia & Vicente Merchán. 2020. Applied Technologies. Applied Technologies 467 481 .
Wafa Bouaynaya. 2020. ICT for an Inclusive World. ICT for an Inclusive World 527 536 .
Kathick Raj Elangovan. 2019. Handbook of Research on Interdisciplinary Approaches to Decision Making for Sustainable Supply Chains. Handbook of Research on Interdisciplinary Approaches to Decision Making for Sustainable Supply Chains 533 555 .
Mohammad S. Jalali, Michael Siegel & Stuart Madnick. (2019) Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 28:1, pages 66-82.
Crossref
Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid & Syahrul Fahmy. (2019) An analysis on the dimensions of information security culture concept: A review. Journal of Information Security and Applications 44, pages 12-22.
Crossref
Kuo-Chung Chang & Yoke May Seow. (2019) Protective Measures and Security Policy Non-Compliance Intention. Journal of Organizational and End User Computing 31:1, pages 1-21.
Crossref
Margareth Stoll. (2019) A Data Privacy Governance Model. International Journal of IT/Business Alignment and Governance 10:1, pages 74-93.
Crossref
Hemlata Gangwar & Hema Date. 2019. Web Services. Web Services 2041 2059 .
Margareth Stoll. 2019. Censorship, Surveillance, and Privacy. Censorship, Surveillance, and Privacy 219 242 .
Shariq Aziz Butt, Muhammad Imran Tariq, Tauseef Jamal, Arshad Ali, Jorge Luis Diaz Martinez & Emiro De-La-Hoz-Franco. (2019) Predictive Variables for Agile Development Merging Cloud Computing Services. IEEE Access 7, pages 99273-99282.
Crossref
Ahmed I. Al-Darwish & Pilsung Choe. 2019. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 217 229 .
George S. Antoniou. (2018) A Framework for the Governance of Information Security: Can it be Used in an Organization. A Framework for the Governance of Information Security: Can it be Used in an Organization.
Mathew Nicho. (2018) A process model for implementing information systems security governance. Information & Computer Security 26:1, pages 10-38.
Crossref
Hemlata Gangwar & Hema Date. 2018. Cyber Security and Threats. Cyber Security and Threats 544 562 .
Mathews Nkhoma, Duy Dang Pham Thien, Tram Le Hoai & Clara Nkhoma. 2018. Cyber Criminology. Cyber Criminology 341 357 .
Shree Govindji, Gabrielle Peko & David Sundaram. 2018. Context-Aware Systems and Applications, and Nature of Computation and Communication. Context-Aware Systems and Applications, and Nature of Computation and Communication 14 24 .
Shamal FailyShamal Faily. 2018. Designing Usable and Secure Software with IRIS and CAIRIS. Designing Usable and Secure Software with IRIS and CAIRIS 9 53 .
Satya Ranjan Dash, Alo Sen, Pranab Kumar Bharimalla & Bhabani Shankar Prasad Mishra. 2018. Cloud Computing for Optimization: Foundations, Applications, and Challenges. Cloud Computing for Optimization: Foundations, Applications, and Challenges 187 206 .
George W. Jackson & Shawon S. M. Rahman. (2017) Security Governance, Management and Strategic Alignment via Capabilities. Security Governance, Management and Strategic Alignment via Capabilities.
Arash Ghazvini & Zarina Shukur. (2017) Review of information security guidelines for awareness training program in healthcare industry. Review of information security guidelines for awareness training program in healthcare industry.
Zachariah Pabi Gariba & John Andrew Van Der Poll. (2017) Security Failure Trends of Cloud Computing. Security Failure Trends of Cloud Computing.
Martin Brodin. (2017) Security strategies for managing mobile devices in SMEs: A theoretical evaluation. Security strategies for managing mobile devices in SMEs: A theoretical evaluation.
Temesgen Kitaw Damenu & Chris Beaumont. (2017) Analysing information security in a bank using soft systems methodology. Information & Computer Security 25:3, pages 240-258.
Crossref
Duy Dang Pham Thien, Karlheinz Kautz, Siddhi Pittayachawan & Vince Bruno. (2017) A Canonical Action Research Approach to the Effective Diffusion of Information Security with Social Network Analysis. International Journal of Systems and Society 4:2, pages 22-43.
Crossref
Bridget Barnes Page. (2017) Exploring Organizational Culture for Information Security in Healthcare Organizations: A Literature Review. Exploring Organizational Culture for Information Security in Healthcare Organizations: A Literature Review.
Hamid Khajouei, Mehdi Kazemi & Seyed Hamed Moosavirad. (2016) Ranking information security controls by using fuzzy analytic hierarchy process. Information Systems and e-Business Management 15:1, pages 1-19.
Crossref
Isabel Maria Lopes, João Paulo Pereira & Pedro Oliveira. 2017. Recent Advances in Information Systems and Technologies. Recent Advances in Information Systems and Technologies 225 234 .
Hyeri Kim, Yanghoon Kim & Hangbae Chang. (2015) Information security research classification for future multimedia environment. Multimedia Tools and Applications 75:22, pages 14795-14806.
Crossref
Dieter De Smet & Nicolas Mayer. (2016) Integration of it governance and security risk management: A systematic literature review. Integration of it governance and security risk management: A systematic literature review.
Damian Jackson & Paul Hayes. (2016) Ensuring Security of Data and Information Flow in Emergency Response Decision Support. Ensuring Security of Data and Information Flow in Emergency Response Decision Support.
Heidi Wilcox & Maumita Bhattacharya. (2016) A framework to mitigate social engineering through social media within the enterprise. A framework to mitigate social engineering through social media within the enterprise.
Kevin A. Barton, Gurvirender Tejay, Michael Lane & Steve Terrell. (2016) Information system security commitment: A study of external influences on senior management. Computers & Security 59, pages 9-25.
Crossref
Wonhyung Park, Onechul Na & Hangbae Chang. (2014) An exploratory research on advanced smart media security design for sustainable intelligence information system. Multimedia Tools and Applications 75:11, pages 6059-6070.
Crossref
Avinash Ramtohul & K.M.S. Soyjaudah. (2016) Information security governance for e-services in southern African developing countries e-Government projects. Journal of Science and Technology Policy Management 7:1, pages 26-42.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2016. Web-Based Services. Web-Based Services 1283 1315 .
Tesleem Fagade & Theo Tryfonas. 2016. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust 128 139 .
Isabel Lopes & Pedro Oliveira. 2016. New Advances in Information Systems and Technologies. New Advances in Information Systems and Technologies 353 362 .
Angel R. Otero. (2015) An information security control assessment methodology for organizations' financial information. International Journal of Accounting Information Systems 18, pages 26-45.
Crossref
Onechul Na, Hyojik Lee, Soyoung Sung & Hangbae Chang. (2015) A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment. Journal of the Korea Convergence Society 6:4, pages 139-146.
Crossref
Hyojik Lee, Onechul Na, Soyoung Sung & Hangbae Chang. (2015) A Design on Security Governance Framework for Industry Convergence Environment. Journal of the Korea Convergence Society 6:4, pages 33-40.
Crossref
Sushma Mishra. (2015) Organizational objectives for information security governance: a value focused assessment. Information & Computer Security 23:2, pages 122-144.
Crossref
Adéle Da Veiga & Nico Martins. (2015) Information security culture and information protection culture: A validated assessment instrument. Computer Law & Security Review 31:2, pages 243-256.
Crossref
Adéle da Veiga & Nico Martins. (2015) Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, pages 162-176.
Crossref
Hemlata Gangwar & Hema Date. (2015) Exploring Information Security Governance in Cloud Computing Organisation. International Journal of Applied Management Sciences and Engineering 2:1, pages 44-61.
Crossref
Margareth Stoll. 2015. Handbook of Research on Emerging Developments in Data Privacy. Handbook of Research on Emerging Developments in Data Privacy 216 238 .
Theodosios Tsiakis, Theodoros Kargidis & Aristeidis Chatzipoulidis. 2015. Banking, Finance, and Accounting. Banking, Finance, and Accounting 247 281 .
Andrei Ioan Hohan, Marieta Olaru & Ionela Carmen Pirnea. (2015) Assessment and Continuous Improvement of Information Security Based on TQM and Business Excellence Principles. Procedia Economics and Finance 32, pages 352-359.
Crossref
Margareth Stoll. 2015. Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering 9 16 .
Nedher AL-Safwani, Suhaidi Hassan & Norliza Katuk. (2014) On Multi Attribute Decision Making Methods: Prioritizing Information Security Controls. Journal of Applied Sciences 14:16, pages 1865-1870.
Crossref
Jinho Yoo & Hangbae Chang. (2014) Public IT service strategy for social information security in the intelligence all-things environment. Electronic Commerce Research 14:3, pages 293-319.
Crossref
Waldo Rocha Flores, Egil Antonsen & Mathias Ekstedt. (2014) Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security 43, pages 90-110.
Crossref
She-I Chang, David C. Yen, I-Cheng Chang & Derek Jan. (2014) Internal control framework for a compliant ERP system. Information & Management 51:2, pages 187-205.
Crossref
N. R. Mukundan & L. Prakash Sai. (2013) Perceived information security of internal users in Indian IT services industry. Information Technology and Management 15:1, pages 1-8.
Crossref
Jinho Yoo. (2014) Comparison of Information Security Controls by Leadership of Top Management. The Journal of Society for e-Business Studies 19:1, pages 63-78.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2014. Handbook of Research on Architectural Trends in Service-Driven Computing. Handbook of Research on Architectural Trends in Service-Driven Computing 554 588 .
Isabel Lopes & Pedro Oliveira. 2014. New Perspectives in Information Systems and Technologies, Volume 1. New Perspectives in Information Systems and Technologies, Volume 1 277 286 .
Susan P. Williams, Catherine A. Hardy & Janine A. Holgate. (2013) Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective. Electronic Markets 23:4, pages 341-354.
Crossref
Subrata Biswas, Jin Ho Yoo & Chul Yong Jung. (2013) A Study on Priorities of the Components of Big Data Information Security Service by AHP. The Journal of Society for e-Business Studies 18:4, pages 301-314.
Crossref
Karin Hedström, Fredrik Karlsson & Ella Kolkowska. (2013) Social action theory for understanding information security non-compliance in hospitals. Information Management & Computer Security 21:4, pages 266-287.
Crossref
Yu “Andy” Wu & Carol Stoak Saunders. 2013. Managing Information Resources and Technology. Managing Information Resources and Technology 29 45 .
Theodosios Tsiakis, Theodoros Kargidis & Aristeidis Chatzipoulidis. 2013. IT Security Governance Innovations. IT Security Governance Innovations 13 46 .
Gurvirender P.S. Tejay & Kevin A. Barton. (2013) Information System Security Commitment: A Pilot Study of External Influences on Senior Management. Information System Security Commitment: A Pilot Study of External Influences on Senior Management.
Ezzat Alqurashi, Gary Wills & Lester Gilbert. 2013. Security and Privacy Protection in Information Processing Systems. Security and Privacy Protection in Information Processing Systems 245 256 .
Peggy E. Chaudhry, Sohail S. Chaudhry, Kevin D. Clark & Darryl S. Jones. 2013. Enterprise Information Systems of the Future. Enterprise Information Systems of the Future 206 214 .
Margareth Stoll. 2013. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering 25 37 .
Margareth Stoll & Ruth Breu. 2013. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering 11 23 .
Margareth Stoll, Michael Felderer & Ruth Breu. 2013. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering. Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering 211 224 .
Margareth Stoll. 2013. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering 241 253 .
Margareth Stoll. 2013. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering 227 239 .
Angel R. Otero, Gurvirender Tejay, Luis Daniel Otero & Alex J. Ruiz-Torres. (2012) A fuzzy logic-based information security control assessment for organizations. A fuzzy logic-based information security control assessment for organizations.
Sandy A. Lamp, Kathleen M. Hargiss & Caroline Howard. (2012) Information Technology Process Improvement Decision-Making. International Journal of Strategic Information Technology and Applications 3:2, pages 18-35.
Crossref
Margareth Stoll & Ruth Breu. 2012. Strategic and Practical Approaches for Information Security Governance. Strategic and Practical Approaches for Information Security Governance 261 282 .
Kimberley Dunkerley & Gurvirender Tejay. 2012. Measuring Organizational Information Systems Success. Measuring Organizational Information Systems Success 341 366 .
Peggy E. Chaudhry, Sohail S. Chaudhry, Ronald Reese & Darryl S. Jones. 2012. Re-conceptualizing Enterprise Information Systems. Re-conceptualizing Enterprise Information Systems 118 128 .
T. Vinnakota. (2011) Systems approach to Information Security Governance: An imperative need for sustainability of enterprises. Systems approach to Information Security Governance: An imperative need for sustainability of enterprises.
Angel R. Otero, Abdel Ejnioui, Carlos E. Otero & Gurvirender Tejay. (2011) Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. International Journal of Dependable and Trustworthy Information Systems 2:3, pages 36-54.
Crossref
Solange Ghernaouti-Hélie. 2011. Information Security Evaluation. Information Security Evaluation 195 198 .
Linda Wallace, Hui Lin & Meghann Abell Cefaratti. (2011) Information Security and Sarbanes-Oxley Compliance: An Exploratory Study. Journal of Information Systems 25:1, pages 185-211.
Crossref
Yu ’Andy’ Wu & Carol Stoak Saunders. (2011) Governing Information Security. Information Resources Management Journal 24:1, pages 28-45.
Crossref
Kimberley D Dunkerley & Gurvirender Tejay. (2011) A Confirmatory Analysis of Information Systems Security Success Factors. A Confirmatory Analysis of Information Systems Security Success Factors.
J W Brady. (2011) Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers. Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers.
Theodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis & Athanasios Belidis. 2011. Security Technology. Security Technology 75 84 .
Ahmad Abu‐Musa. (2010) Information security governance in Saudi organizations: an empirical study. Information Management & Computer Security 18:4, pages 226-276.
Crossref
Liang Xu, Cao Zeng, Gui-sheng Liao & Jun Li. (2010) DOA Estimation for Strong and Weak Signals in the Presence of Array Gain and Phase Mismatch. DOA Estimation for Strong and Weak Signals in the Presence of Array Gain and Phase Mismatch.
Teresa Susana Mendes Pereira & Henrique Santos. (2010) A Security Framework for Audit and Manage Information System Security. A Security Framework for Audit and Manage Information System Security.
Ming‐Kuen Chen & Shih‐Ching Wang. (2010) A hybrid Delphi‐Bayesian method to establish business data integrity policy. Kybernetes 39:5, pages 800-824.
Crossref
A. Da Veiga & J.H.P. Eloff. (2010) A framework and assessment instrument for information security culture. Computers & Security 29:2, pages 196-207.
Crossref
Senem Guney & Anthony M. Cresswell. (2010) IT Governance As Organizing: Playing the Game. IT Governance As Organizing: Playing the Game.
Teresa Pereira & Henrique Santos. 2010. Global Security, Safety, and Sustainability. Global Security, Safety, and Sustainability 9 18 .
M. K. Chen & Shih-Ching Wang. 2009. Global Perspective for Competitive Enterprise, Economy and Ecology. Global Perspective for Competitive Enterprise, Economy and Ecology 701 712 .
Amitava Dutta & Rahul Roy. (2008) Dynamics of organizational information security. System Dynamics Review 24:3, pages 349-375.
Crossref
Mohammad Jalali, Michael Siegel & Stuart E. Madnick. (2018) Decision-Making and Biases in Cybersecurity Capability Development: Evidence From a Simulation Game Experiment. SSRN Electronic Journal.
Crossref
Mohammad S. Jalali, Michael Siegel & Stuart Madnick. (2017) Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.