2011
DOI: 10.1007/978-3-642-27189-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Information Technology Security Governance Approach Comparison in E-banking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Tsiakis et al (2011) explored whether an IT security governance (ITSG) programme can mitigate e-banking risks. They evaluated ISG frameworks, international standards, “best practices”, principles and risk management methods against standard ISG objectives.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Tsiakis et al (2011) explored whether an IT security governance (ITSG) programme can mitigate e-banking risks. They evaluated ISG frameworks, international standards, “best practices”, principles and risk management methods against standard ISG objectives.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the current information security world, majority of organisations adopt the well-known "Plan-Do-Check-Act" (PDCA) lifecycle model to implement ISMS in their workplace. The PDCA approach emphasizes on the controls required in information security and only limited information is given regarding with the security objectives and potential strategies to be implemented on these objectives [10], [11]. Therefore, the model is unable to give information on any suggestion on how organisations must develop security strategies and objectives [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…The PDCA approach emphasizes on the controls required in information security and only limited information is given regarding with the security objectives and potential strategies to be implemented on these objectives [10], [11]. Therefore, the model is unable to give information on any suggestion on how organisations must develop security strategies and objectives [10], [11]. In addition, since the main reason for developing the PDCA model was to cater to the needs of a methodical methodology when optimizing automated manufacturing processes in the 1950s.…”
Section: Introductionmentioning
confidence: 99%