Change search
ReferencesLink to record
Permanent link

Direct link
Can we tune information security management into meeting corporate governance needs?: (invited paper)
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2005 (English)In: SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS / [ed] Dowland, P; Furnell, S; Thuraisingham, B; Wang, XS, 2005, Vol. 193, 237-245 p.Conference paper (Refereed)
Abstract [en]

This paper intends to stimulate discussion, research and new points-of-action for IS/IT security management from the background of corporate governance, contemporary debates of how to express observable consequences of IT and IT security, and of didactic issues. It is concluded that empirical research within IT security management is rare as compared to theoretical approaches but needed in order to have IS/IT security management on par with general management.

Place, publisher, year, edition, pages
2005. Vol. 193, 237-245 p.
, International Federation for Information Processing, ISSN 1571-5736 ; 193
Keyword [en]
IS/IT security management, corporate governance, holistic approach
National Category
Computer and Information Science
URN: urn:nbn:se:kth:diva-42758ISI: 000235172900015ScopusID: 2-s2.0-84883220714ISBN: 0-387-29826-6OAI: diva2:447877
Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems Location: George Mason Univ, Fairfax, VA Date: DEC 01-02, 2005
QC 20111013Available from: 2011-10-13 Created: 2011-10-12 Last updated: 2011-10-13Bibliographically approved

Open Access in DiVA

No full text


Search in DiVA

By author/editor
Yngström, Louise
By organisation
Computer and Systems Sciences, DSV
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 27 hits
ReferencesLink to record
Permanent link

Direct link