Empirical Evaluation of Information Security Planning and Integration

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Empirical evaluation of a cloud computing information security governance framework

Context: Cloud computing is a thriving paradigm that supports an efficient way to provide IT services by introducing on-demand services and flexible computing resources. However, significant adoption of cloud services is being hindered by security issues that are inherent to this new paradigm. In previous work, we have proposed ISGcloud, a security governance framework to tackle cloud security ...

متن کامل

Strategic Information Systems Planning: An Empirical Evaluation of Its Dimensions

Strategic management of Information Technology (IT) has long been regarded as a critical component of business performance. This study addresses two objectives. Firstly we investigate the practice and effectiveness of Strategic Information Systems Planning (SISP) as a function of strategic management in 29 large Australian organizations. Secondly we review these results through a theoretical le...

متن کامل

Flexible Integration of Planning and Information Gathering

The evolution of the electronic sources connected through wide area networks like Internet has encouraged the development of new information gathering techniques that go beyond traditional information retrieval and WEB search methods. They use advanced techniques, like planning or constraint programming, to integrate and reason about hetereogeneous information sources. In this paper we describe...

متن کامل

Defining the Information Security Posture: an Empirical Examination of Structure, Integration and Managerial Effectiveness

The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the Association for Information Systems

سال: 2010

ISSN: 1529-3181

DOI: 10.17705/1cais.02613