316
Views
15
CrossRef citations to date
0
Altmetric
Security, Ethics, and Legal Issues

A Model of Information Assurance Benefits

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Elspeth McFadzean, Jean-Noël Ezingeard & David Birchall. (2011) Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future. Information Systems Management 28:2, pages 102-129.
Read now
Alice M. Johnson. (2009) Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study. Journal of Information Privacy and Security 5:1, pages 3-27.
Read now

Articles from other publishers (13)

Shouki A. Ebad. (2022) What topics should or should not be included in software security education—Qualitative content analysis. Computer Applications in Engineering Education 30:6, pages 1753-1773.
Crossref
Zahid Rashid, Umara Noor & Jörn Altmann. (2021) Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Future Generation Computer Systems 124, pages 436-466.
Crossref
Mohammad Zarour, Mamdouh Alenezi, Maurice Dawson & Izzat Alsmadi. 2020. 17th International Conference on Information Technology–New Generations (ITNG 2020). 17th International Conference on Information Technology–New Generations (ITNG 2020) 79 85 .
P.K. Paul, A. Bhuimali, P. S. Aithal & R. Rajesh. (2019) Vulnerability in Information Technology and Computing- A Study in Technological Information Assurance. International Journal of Management, Technology, and Social Sciences, pages 87-94.
Crossref
Izzat Alsmadi & Mohammad Zarour. (2018) Cybersecurity Programs in Saudi Arabia: Issues and Recommendations. Cybersecurity Programs in Saudi Arabia: Issues and Recommendations.
Humayun Zafar, Myung S. Ko & Kweku-Muata Osei-Bryson. (2015) The value of the CIO in the top management team on performance in the case of information security breaches. Information Systems Frontiers 18:6, pages 1205-1215.
Crossref
Jiří Urbanec & Hana Urbancová. (2015) The Benefits of Business Continuity Management in Czech Organizations. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 63:3, pages 1061-1071.
Crossref
Akram Jalal‐Karim. (2013) Evaluating the impact of information security on enhancing the business decision‐making process. World Journal of Entrepreneurship, Management and Sustainable Development 9:1, pages 55-64.
Crossref
Jacqueline H. Hall, Shahram Sarkani & Thomas A. Mazzuchi. (2011) Impacts of organizational capabilities in information security. Information Management & Computer Security 19:3, pages 155-176.
Crossref
Sangjae Lee & Kyoung-jae Kim. (2009) Using case-based reasoning for the design of controls for internet-based information systems. Expert Systems with Applications 36:3, pages 5582-5591.
Crossref
Igli Tashi & Solange Ghernaouti-Hélie. (2009) A Security Management Assurance Model to Holistically Assess the Information Security Posture. A Security Management Assurance Model to Holistically Assess the Information Security Posture.
Randall C. Reid & Arthur H. Gilbert. (2007) Managing security from the perspective of the business executive. Managing security from the perspective of the business executive.
Prantosh Paul & P. S. Aithal. (2019) Information Assurance and IT Management: <i>The Key Issues, Solutions in Indian Scenario based on International Trends</i>. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.