Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Stef Schinagl"'
Publikováno v:
Computers and Security, 122:102903, 1-14. Elsevier Ltd
Schinagl, S, Shahim, A & Khapova, S 2022, ' Paradoxical tensions in the implementation of digital security governance : Toward an ambidextrous approach to governing digital security ', Computers and Security, vol. 122, 102903, pp. 1-14 . https://doi.org/10.1016/j.cose.2022.102903
Schinagl, S, Shahim, A & Khapova, S 2022, ' Paradoxical tensions in the implementation of digital security governance : Toward an ambidextrous approach to governing digital security ', Computers and Security, vol. 122, 102903, pp. 1-14 . https://doi.org/10.1016/j.cose.2022.102903
Due to increasing numbers of cyberattacks, security is one of the leading challenges to contemporary organizations. As contradictory demands (e.g., tensions in digital organizations) intensify, organizations increasingly find it difficult to implemen
Autor:
A. Shahim, Stef Schinagl
Publikováno v:
Schinagl, S & Shahim, A 2020, ' What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance ', Information and Computer Security, vol. 28, no. 2, pp. 261-292 . https://doi.org/10.1108/ICS-02-2019-0033
Purpose This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. Design/methodology/ap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f6cd9c0f4d29ae38f50235a06bf0cf3
https://hdl.handle.net/1871.1/ca0547ac-2e9d-4cda-889f-fd6bd193812c
https://hdl.handle.net/1871.1/ca0547ac-2e9d-4cda-889f-fd6bd193812c
Autor:
Stef Schinagl, Ronald Paans
Publikováno v:
Hawaii International Conference on System Sciences (HICSS)
HICSS
HICSS
A major problem in the decision-making process is poor communication regarding threats and risks between information security experts and decision makers. By their nature, experts have a strong interest in operational details and limited insight into
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f09035745de8547b51d54becf54d475
https://research.vu.nl/en/publications/ce9dd3ac-8bd4-40ef-9b44-4ba3b5ad6d06
https://research.vu.nl/en/publications/ce9dd3ac-8bd4-40ef-9b44-4ba3b5ad6d06
Publikováno v:
HICSS
Hawaii International Conference on System Sciences (HICSS), 4041-4050
STARTPAGE=4041;ENDPAGE=4050;TITLE=Hawaii International Conference on System Sciences (HICSS)
Hawaii International Conference on System Sciences (HICSS), 4041-4050
STARTPAGE=4041;ENDPAGE=4050;TITLE=Hawaii International Conference on System Sciences (HICSS)
As risk managers and IT auditors, we are confronted with too many standards and types of certificates for information security and privacy protection (IS&PP). In the scope of Knowledge Management and Enrichment, a critical review has been performed r
Publikováno v:
HICSS
Schinagl, S, Schoon, K C & Paans, R 2015, A Framework for designing a Security Operations Centre (SOC) . in Secure Cyberspace in 21st Century. Proceedings of the Hawaii International Conference on System Sciences (HICSS) . Institute of Electrical and Electronics Engineers (IEEE), Hawai, Hawaii International Conference on System Sciences (HICSS), 8/01/15 . < http://www.computer.org/csdl/proceedings/hicss/2015/7367/00/7367c253.pdf >
Secure Cyberspace in 21st Century. Proceedings of the Hawaii International Conference on System Sciences (HICSS)
Schinagl, S, Schoon, K C & Paans, R 2015, A Framework for designing a Security Operations Centre (SOC) . in Secure Cyberspace in 21st Century. Proceedings of the Hawaii International Conference on System Sciences (HICSS) . Institute of Electrical and Electronics Engineers (IEEE), Hawai, Hawaii International Conference on System Sciences (HICSS), 8/01/15 . < http://www.computer.org/csdl/proceedings/hicss/2015/7367/00/7367c253.pdf >
Secure Cyberspace in 21st Century. Proceedings of the Hawaii International Conference on System Sciences (HICSS)
Owning a SOC is an important status symbol for many organizations. Although the concept of a 'SOC' can be considered a hype, only a few of them are actually effective in counteracting cybercrime and IT abuse. A literature review reveals that there is