• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4630704)   Today's Articles (2445)   Subscriber (49805)
For: Schinagl S, Shahim A. What do we know about information security governance? ICS 2020. [DOI: 10.1108/ics-02-2019-0033] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Tian Z, Han M, Jiang C. Research on platform data security governance strategy based on three-party evolutionary game. Heliyon 2024;10:e36391. [PMID: 39263047 PMCID: PMC11385774 DOI: 10.1016/j.heliyon.2024.e36391] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/06/2023] [Revised: 08/14/2024] [Accepted: 08/14/2024] [Indexed: 09/13/2024]  Open
2
Gale M, Bongiovanni I, Slapnicar S. Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102840] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
3
Schinagl S, Shahim A, Khapova S. Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102903] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
4
Bongiovanni I, Renaud K, Brydon H, Blignaut R, Cavallo A. A quantification mechanism for assessing adherence to information security governance guidelines. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-08-2021-0112] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Hijji M, Alam G. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2021;9:7152-7169. [PMID: 34786300 PMCID: PMC8545234 DOI: 10.1109/access.2020.3048839] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/08/2020] [Accepted: 12/28/2020] [Indexed: 06/13/2023]
6
AlGhamdi S, Win KT, Vlahu-Gjorgievska E. Information security governance challenges and critical success factors: Systematic review. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102030] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA