Can we tune information security management into meeting corporate governance needs?: (invited paper)
2005 (English)In: SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS / [ed] Dowland, P; Furnell, S; Thuraisingham, B; Wang, XS, 2005, Vol. 193, 237-245 p.Conference paper (Refereed)
This paper intends to stimulate discussion, research and new points-of-action for IS/IT security management from the background of corporate governance, contemporary debates of how to express observable consequences of IT and IT security, and of didactic issues. It is concluded that empirical research within IT security management is rare as compared to theoretical approaches but needed in order to have IS/IT security management on par with general management.
Place, publisher, year, edition, pages
2005. Vol. 193, 237-245 p.
, International Federation for Information Processing, ISSN 1571-5736 ; 193
IS/IT security management, corporate governance, holistic approach
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-42758ISI: 000235172900015ScopusID: 2-s2.0-84883220714ISBN: 0-387-29826-6OAI: oai:DiVA.org:kth-42758DiVA: diva2:447877
Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems Location: George Mason Univ, Fairfax, VA Date: DEC 01-02, 2005
QC 201110132011-10-132011-10-122011-10-13Bibliographically approved