2022
DOI: 10.1007/s10796-022-10246-9
|View full text |Cite
|
Sign up to set email alerts
|

An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 69 publications
0
10
0
Order By: Relevance
“…Whereas literature (see Table 1) shows that organisations have tried to implement technical security practices like proper configuration of firewalls, locking down servers, implementation of intrusion detection services, cryptographic solutions, network security etc., available studies have equally demonstrated that less attention has been given to managerial information security practices such as the implementation of policy, awareness and training, compliance with security standards, etc. (Alshaikh, 2016;Ahimbisibwe and Nabende, 2022;Herath et al, 2022).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Whereas literature (see Table 1) shows that organisations have tried to implement technical security practices like proper configuration of firewalls, locking down servers, implementation of intrusion detection services, cryptographic solutions, network security etc., available studies have equally demonstrated that less attention has been given to managerial information security practices such as the implementation of policy, awareness and training, compliance with security standards, etc. (Alshaikh, 2016;Ahimbisibwe and Nabende, 2022;Herath et al, 2022).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Information Security Management Practices (ISMPs) in organisations have become one of the major concerns as evidenced by some studies (Whitman and Mattord, 2014;Alshaikh et al, 2014;Carcary et al, 2016;Maynard et al, 2018;Schinag and Shahim, 2020;Culot et al, 2021;Ahimbisibwe and Nabende 2022;Herath et al, 2022). Findings from these studies demonstrate that not all organisations implement the recommendations suggested.…”
Section: Introductionmentioning
confidence: 99%
“…IT refers to technology that is capable of enhancing enterprises' productivity and market competitiveness, including devices, systems, networks, data, etc. When an enterprise sustains its operation by relying on IT, it must build a mechanism to control and protect it [6,7]. Otherwise, the exposure of enterprises to threat will increase.…”
Section: Research Background and Motivementioning
confidence: 99%
“…The cybersecurity governance framework should mainly focus on the responsibilities and practices that should be exercised and addressed by top-level management of organizations (board and executive management) having the following main goals: provide strategic direction towards securing the IT system that supports the business operation; ensuring that security objectives are well defined and achieved; making sure that security risks are analyzed and managed appropriately; and validating that company resources are optimally used and spent for securing the company assets [6,7].…”
Section: Introductionmentioning
confidence: 99%