-
1Book
المؤلفون: Schinagl, Stef
المصدر: Schinagl , S 2024 , ' Digital Security Governance : From the Basement to the Boardroom ' , PhD , Vrije Universiteit Amsterdam . https://doi.org/10.5463/thesis.594
مصطلحات موضوعية: Digital Security Governance, Cyber Security Governance, Information Security Governance, Digital, Cyber Attack, Cyber Threat
وصف الملف: application/pdf
Relation: urn:ISBN:9789036107556
الاتاحة: https://research.vu.nl/en/publications/1a298339-834c-427d-9bee-85eb4f898b37
https://doi.org/10.5463/thesis.594
https://hdl.handle.net/1871.1/1a298339-834c-427d-9bee-85eb4f898b37
https://research.vu.nl/ws/files/317937696/proefschift%20binnenwerk%20schinagl%20-%206637c429d8185.pdf
https://research.vu.nl/ws/files/317937698/omslag%20proefschrift%20dsg%20schinagl%20-%206637c4451caef.pdf
https://research.vu.nl/ws/files/317937700/schinagl-toc%20-%206639de5de7746.pdf
https://research.vu.nl/ws/files/317937702/titelblad%20-%20schinagl%20-%202024-03-26%20131505%20-%20nl%20-%206602c391a005f.pdf -
2Academic Journal
المصدر: Information & Computer Security, 2022, Vol. 30, Issue 4, pp. 517-548.
-
3Conference
المؤلفون: Florescu, Ana-Maria
المساهمون: Centre d'Études et de Recherche en Gestion d'Aix-Marseille (CERGAM), Aix Marseille Université (AMU)-Université de Toulon (UTLN), Aix Marseille Université (AMU)
المصدر: AIM 2023 Doctoral Consortium ; https://hal.science/hal-04401897 ; AIM 2023 Doctoral Consortium, May 2023, Dijon, France
مصطلحات موضوعية: information security, information security governance, distributed systems, [SHS]Humanities and Social Sciences
Relation: hal-04401897; https://hal.science/hal-04401897; https://hal.science/hal-04401897/document; https://hal.science/hal-04401897/file/AM%20Florescu%20--%20AIM%20--%20Cybersecurity%20Governance.pdf
-
4Book
المؤلفون: Salmenpää, Tomi
المساهمون: Lehto, Martti, Neittaanmäki, Pekka
مصطلحات موضوعية: cybersecurity governance, information security governance, aviation cybersecurity, aviation information security, kyberturvallisuus, tietoturva, infrastruktuurit, tietoturvapolitiikka, ilmailuala
وصف الملف: application/pdf; 315-336; fulltext
Relation: Cyber Security : Critical Infrastructure Protection; Computational Methods in Applied Sciences; CONVID_117622734
-
5Academic Journal
المؤلفون: Schinagl, Stef, Shahim, Abbas
المصدر: Information & Computer Security, 2020, Vol. 28, Issue 2, pp. 261-292.
-
6Conference
المؤلفون: Angelini M., Bonomi S., Ciccotelli C., Palma A.
المساهمون: Angelini, M., Bonomi, S., Ciccotelli, C., Palma, A.
مصطلحات موضوعية: Information Security Governance, ISO 27001, Multi-layer model, Risk assessment
Relation: ispartofbook:Cyber-Physical Security for Critical Infrastructures Protection; 1st International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020 in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020; volume:12618; firstpage:171; lastpage:187; numberofpages:17; serie:LECTURE NOTES IN ARTIFICIAL INTELLIGENCE; https://hdl.handle.net/11573/1541379; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85102735468
-
7Conference
المؤلفون: Schinagl, Stef, Khapova, Svetlana, Shahim, Abbas
المساهمون: Audun Jøsang, Lynn Futcher, Janne Hagen, TC 11
المصدر: IFIP Advances in Information and Communication Technology ; 36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC) ; https://inria.hal.science/hal-03746037 ; 36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.430-445, ⟨10.1007/978-3-030-78120-0_28⟩
مصطلحات موضوعية: Information security governance, Information security implementation, Digital security, Digital transformation, Digital security governance, [INFO]Computer Science [cs]
Relation: hal-03746037; https://inria.hal.science/hal-03746037; https://inria.hal.science/hal-03746037/document; https://inria.hal.science/hal-03746037/file/512098_1_En_28_Chapter.pdf
-
8Academic Journal
المؤلفون: Amri Jamil, Zawiyah Mohammad Yusof
المصدر: Asia-Pacific Journal of Information Technology and Multimedia, Vol 7, Iss 02, Pp 85-98 (2018)
مصطلحات موضوعية: information security, information security governance, information security governance framework, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
9Dissertation/ Thesis
المؤلفون: Shaaban, Hussein Khamis
-
10Dissertation/ Thesis
المؤلفون: Alkaabi, Ahmed
-
11Academic Journal
المؤلفون: Schinagl, Stef, Van Den Hooff, Bart, Shahim, Abbas, Khapova, Svetlana
المصدر: Hawaii International Conference on System Sciences 2024 (HICSS-57)
مصطلحات موضوعية: cybersecurity, digital security governance, effectiveness, governance modes, information security governance
وصف الملف: application/pdf
Relation: https://aisel.aisnet.org/hicss-57/os/it_governance/4; https://aisel.aisnet.org/context/hicss-57/article/1883/viewcontent/content.pdf
-
12Academic Journal
المؤلفون: von Solms, Basie, von Solms, Rossouw
المصدر: Information & Computer Security, 2018, Vol. 26, Issue 1, pp. 2-9.
-
13Academic Journal
المؤلفون: Nicho, Mathew
المصدر: Information & Computer Security, 2018, Vol. 26, Issue 1, pp. 10-38.
-
14Academic Journal
المؤلفون: Bob Hardian Syahbuddin, Wachid Yoga Afrida, Fatimah Azzahro, Achmad Nizar Hidayanto, Kongkiti Phusavat
المصدر: Jurnal Sistem Informasi, Vol 16, Iss 2 (2020)
مصطلحات موضوعية: information security governance, multiple ISG frameworks, ISO 17799, IT Risk Framework, COSO, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
15Conference
المؤلفون: Sönmez, Ferda Özdemir
مصطلحات موضوعية: Information Security Governance, Security, Efficiency, Metric, Productivity
وصف الملف: application/pdf
Relation: 188; 181; https://hdl.handle.net/11511/58147; 160; WOS:000515510100023
-
16
المؤلفون: Silva, Maria Helena Ferreira da Cruz e
المساهمون: Silva, Tito Santos, Veritati - Repositório Institucional da Universidade Católica Portuguesa
مصطلحات موضوعية: Informação, Segurança da informação, Governação corporativa, Governação das TI, Governação da Segurança da Informação, Cultura de segurança da informação, Information, Information security, Corporative governance, IT governance, Information security governance, Information security culture, Domínio/Área Científica::Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática
وصف الملف: application/pdf
الاتاحة: http://hdl.handle.net/10400.14/15263
-
17Academic Journal
المؤلفون: Bahl, Sanjay, Wali, O.P.
المصدر: Information Management & Computer Security, 2014, Vol. 22, Issue 1, pp. 2-23.
-
18Academic Journal
المؤلفون: Saneei Moghadam, Reza, Colomo-Palacios, Ricardo
المصدر: 401-408 ; 138 ; Procedia Computer Science
مصطلحات موضوعية: information security governance, big data, framework, systematic mapping, VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
Relation: https://www.sciencedirect.com/science/article/pii/S1877050918316909; Procedia Computer Science. 2018, 138, 401-408.; urn:issn:1877-0509; http://hdl.handle.net/11250/2578106; https://doi.org/10.1016/j.procs.2018.10.057; cristin:1639115
-
19Academic Journal
المؤلفون: Silic, Mario, Back, Andrea
المصدر: Records Management Journal, 2013, Vol. 23, Issue 2, pp. 73-89.
-
20Academic Journal
المصدر: Baltic journal of modern computing, Ryga : University of Latvia, 2017, Vol. 5, no. 1, p. 107-123 ; ISSN 2255-8942 ; eISSN 2255-8950