IT Security Governance Innovations: Theory and Research
Daniel Mellado (Spanish Tax Agency, Spain), Luis Enrique Sánchez (University of Castilla-La Mancha, Spain), Eduardo Fernández-Medina (University of Castilla – La Mancha, Spain) and Mario Piattini (University of Castilla - La Mancha, Spain)
Release Date: September, 2012. Copyright © 2013. 390 pages.
You must have an IGI Global account before adding an e-book to your shopping cart.
In Stock. Have it as soon as May. 27 with express shipping*.
DOI: 10.4018/978-1-4666-2083-4, ISBN13: 9781466620834, ISBN10: 1466620838, EISBN13: 9781466620841
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level.
IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.
Table of Contents and List of Contributors
Search this Book:
Theodosios Tsiakis (Alexandrian Technological Educational Institute of Thessaloniki, Greece), Theodoros Kargidis (Alexandrian Technological Educational Institute of Thessaloniki, Greece), Aristeidis Chatzipoulidis (University of Macedonia, Greece)
Most industries have been influenced in different ways by e-commerce, and the banking industry is no exception. Particularly, banks are embracing electronic banking...
Gemma María Minero Alejandre (University Autónoma of Madrid, Spain)
The protection of the investment and creativity made in producing computer programs and databases by intellectual property rights is still not harmonised internation...
Magdalena Arcilla (Universidad Nacional de Educación a Distancia, Spain), Jose A. Calvo-Manzano (Universidad Politécnica de Madrid, Spain), Mercedes de la Cámara (Universidad Politécnica de Madrid, Spain), Javier Sáenz (Universidad Politécnica de Madrid, Spain), Luis Sánchez (Universidad Politécnica de Madrid, Spain)
Nowadays, there is an increasing dependence on information and on the systems that provide such information. So, for many organizations, the information and technolo...
Ioanna Dionysiou (University of Nicosia, Cyprus), Angelika Kokkinaki (University of Nicosia, Cyprus), Skevi Magirou (University of Nicosia, Cyprus), Theodosios Iacovou (University of Nicosia, Cyprus)
This chapter presents the findings of an investigation on current security practices in Cypriot organizations, including enterprises and public sector divisions. In...
Shrikant Tiwari (IT-Banaras Hindu University, India), Sanjay Kumar Singh (IT-Banaras Hindu University, India)
To establish the identity of an individual is very critical with the advancement of technology in networked society. Thus, there is need for reliable user authentica...
Mamoun Alazab (Australian National University, Australia), Sitalakshmi Venkatraman (University of Ballarat, Australia), Paul Watters (University of Ballarat, Australia), Moutaz Alazab (Deakin University, Australia)
Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensic...
Reviews and Testimonials
For technical personnel or non-technical executives in companies, computer and information scientists, some in academia and some in business, compile existing approaches, standards, best practices, and new trends in governing the security of information technology. The topics include electronic banking, legal issues, assessing the maturity of the control objectives for information and related technology framework in the Egyptian banking sector, the adoption of ISO 27001 in Cyprus enterprises, biometrics, ontology-based multi-agent modeling for measuring information security, and the art of detecting hidden malware.
– Book News Inc. Portland, OR
- Auditing IT Security Governance
- IT Security Governance
- IT Security Governance Implantation Models
- IT Security Governance in Case Studies, Real Applications, Implementations in Different Types of Organizations, and Failures
- Resource management
- Risk Management
- Security Metrics
- Security Necessities
- Strategic Alignment
- Value Delivery