2018
DOI: 10.1108/ics-07-2016-0061
|View full text |Cite
|
Sign up to set email alerts
|

A process model for implementing information systems security governance

Abstract: A process model for implementing information systems security governance. 2018 NICHO, M. 2018. A process model for implementing information systems security governance. Information and computer security [online], 26(1), pages 10-38.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(51 citation statements)
references
References 52 publications
0
49
0
2
Order By: Relevance
“…Data or information on the validity of case study instruments and data gathering techniques reflected an interpretive method that illustrates participants' experiences and viewpoints to create meaningful stories (Nicho, 2018). External respondents were asked to analyze and review instrumentation-related information to ensure relevancy and reliability.…”
Section: Validity and Reliabilitymentioning
confidence: 99%
“…Data or information on the validity of case study instruments and data gathering techniques reflected an interpretive method that illustrates participants' experiences and viewpoints to create meaningful stories (Nicho, 2018). External respondents were asked to analyze and review instrumentation-related information to ensure relevancy and reliability.…”
Section: Validity and Reliabilitymentioning
confidence: 99%
“…Due to the large impact this area has suffered with internal or external attacks of any nature, companies are seeking high maturity in their IS governance (Carcary et al, 2016). Looking from an organizational perspective, information security governance is part of the corporate governance, playing a strategic role to ensure that goals will be achieved and risks mitigated (Nicho, 2018).…”
Section: Information Security Governance In the Electricity Industrymentioning
confidence: 99%
“…With this alignment, the top management becomes informed of all security decisions. According to Haqaf and Koyuncu (2018), Nicho (2018), IS governance should be part of corporate governance due to its strategic role, ensuring that the organization objectives will be achieved and risks will be mitigated. That said, this guideline is also corroborated by the study with respondents.…”
Section: Proposals Of Is Governance Guidelinesmentioning
confidence: 99%
“…166 de la Constitución del Ecuador en la que el gobierno ecuatoriano a decretado la adopción de la norma ISO 27002 para la seguridad de la información (Secretaria Nacional del Ecuador -Administracion Pública, 2013). Para la seguridad de la información existen varias normas, siendo una de las más utilizadas la NIST 800-53 (Jackson, 2010;Kavis, 2014;Nicho, 2018). Por consiguiente, el instrumento se basó en la alineación de los controles de seguridad la norma ISO 27002:2013 y NIST 800-53 R4.…”
Section: Conclusionesunclassified