Journal articles on the topic 'Chief Information Security Officer (CISO)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 journal articles for your research on the topic 'Chief Information Security Officer (CISO).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Karanja, Erastus. "The role of the chief information security officer in the management of IT security." Information & Computer Security 25, no. 3 (July 10, 2017): 300–329. http://dx.doi.org/10.1108/ics-02-2016-0013.
Full textSchütz, Thorsten. "CHIEF INFORMATION SECURITY OFFICER: Steuermann durch den IT-Sicherheitsprozess." kma - Klinik Management aktuell 25, no. 03 (March 2020): 54–57. http://dx.doi.org/10.1055/s-0040-1709410.
Full textDa Silva, Joseph, and Rikke Bjerg Jensen. ""Cyber security is a dark art": The CISO as Soothsayer." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–31. http://dx.doi.org/10.1145/3555090.
Full textJustice, Connie, and Char Sample. "Future Needs of the Cybersecurity Workforce." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 81–91. http://dx.doi.org/10.34190/iccws.17.1.33.
Full textHaislip, Jacob, Jee-Hae Lim, and Robert Pinsker. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches." Information Systems Research 32, no. 2 (June 2021): 318–34. http://dx.doi.org/10.1287/isre.2020.0986.
Full textFord, Adrian, Ameer Al-Nemrat, Sayed Ali Ghorashi, and Julia Davidson. "Impact of CISO Appointment Announcements on the Market Value of Firms." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 375–84. http://dx.doi.org/10.34190/iccws.17.1.49.
Full textElder, Jonathan, Nicole Jacobson, Natalie Remsen, and Kim Wilmath. "Behind Enemy Lines." Journal of Information Technology Education: Discussion Cases 6 (2017): 12. http://dx.doi.org/10.28945/3928.
Full textBanker, Rajiv D., and Cecilia (Qian) Feng. "The Impact of Information Security Breach Incidents on CIO Turnover." Journal of Information Systems 33, no. 3 (August 1, 2019): 309–29. http://dx.doi.org/10.2308/isys-52532.
Full textBouaynaya, Wafa. "Cloud computing in SMEs: towards delegation of the CIO role." Information & Computer Security 28, no. 2 (May 28, 2020): 199–213. http://dx.doi.org/10.1108/ics-01-2017-0001.
Full textAkhtar, Shahzeb, Pratima Amol Sheorey, Sonali Bhattacharya, and Ajith Kumar V. V. "Cyber Security Solutions for Businesses in Financial Services." International Journal of Business Intelligence Research 12, no. 1 (January 2021): 82–97. http://dx.doi.org/10.4018/ijbir.20210101.oa5.
Full textImoniana, Joshua Onome. "Validity of information security policy models." Transinformação 16, no. 3 (December 2004): 263–74. http://dx.doi.org/10.1590/s0103-37862004000300006.
Full textFraedrich, Laura. "Interview: Interview of Brian Murphy, Former Chief of Intelligence, Department of Homeland Security." Global Trade and Customs Journal 17, Issue 3 (March 1, 2022): 141–44. http://dx.doi.org/10.54648/gtcj2022019.
Full textGolding, Paul, and Lisa Facey-Shaw. "GraceKennedy Group: The new Chief Information Officer and IT Governance." Journal of Information Technology Teaching Cases 9, no. 2 (May 17, 2019): 44–57. http://dx.doi.org/10.1177/2043886919850034.
Full textReni, Gianluigi, Massimo Molteni, Stefano Arlotti, and Francesco Pinciroli. "Chief medical officer actions on information security in an Italian rehabilitation centre." International Journal of Medical Informatics 73, no. 3 (March 2004): 271–79. http://dx.doi.org/10.1016/j.ijmedinf.2003.11.022.
Full textHamilton, Johanna. "The Awe: From the Extraordinary to the Everyday." ITNOW 62, no. 4 (December 1, 2020): 64–65. http://dx.doi.org/10.1093/itnow/bwaa124.
Full textJohansson, Björn, and Mirella Muhic. "Relativism in the Cloud: Cloud Sourcing in virtue of IS Development Outsourcing - A literature review." International Journal of Information Systems and Project Management 5, no. 4 (January 31, 2022): 55–65. http://dx.doi.org/10.12821/ijispm050404.
Full textPaul, P. K., A. Bhuimali, Krishna Raj, and P. S. Aithal. "Information Scientist and Some Similar Professionals: Their Role as a Caretaker of Security Vis-à-Vis IT Management—An Analysis." IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 14, no. 3 (April 30, 2019): 60. http://dx.doi.org/10.21013/jmss.v14.n3.p1.
Full textLatifi, Fariba, and Somayeh Alizadeh. "The Influence of National Factors on Transferring and Adopting Telemedicine Technology." International Journal of E-Health and Medical Communications 7, no. 3 (July 2016): 52–65. http://dx.doi.org/10.4018/ijehmc.2016070104.
Full textHammar, Julian E. "CFTC amends chief compliance officer duties and annual report requirements." Journal of Investment Compliance 20, no. 1 (May 7, 2019): 10–16. http://dx.doi.org/10.1108/joic-01-2019-0002.
Full textAl-Marsy, Ahmad, Pankaj Chaudhary, and James Allen Rodger. "A Model for Examining Challenges and Opportunities in Use of Cloud Computing for Health Information Systems." Applied System Innovation 4, no. 1 (February 22, 2021): 15. http://dx.doi.org/10.3390/asi4010015.
Full textA. Mohamed, Mona, and Sharma Pillutla. "Cloud computing: a collaborative green platform for the knowledge society." VINE 44, no. 3 (August 5, 2014): 357–74. http://dx.doi.org/10.1108/vine-07-2013-0038.
Full textGirard, Frédéric, Bertrand Meunier, Duan Hua, and Eric Dubois. "A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Information Security Management." International Journal of Secure Software Engineering 1, no. 4 (October 2010): 1–17. http://dx.doi.org/10.4018/jsse.2010100101.
Full textHarumike, Yefi Dian Nofa, and Anam Miftakhul Huda. "THE MODEL OF PUBLIC INFORMATION OPENNESS." JARES (Journal of Academic Research and Sciences) 3, no. 2 (November 22, 2018): 1–9. http://dx.doi.org/10.35457/jares.v3i2.489.
Full textDaneshmandnia, Ali. "The influence of organizational culture on information governance effectiveness." Records Management Journal 29, no. 1/2 (March 11, 2019): 18–41. http://dx.doi.org/10.1108/rmj-09-2018-0033.
Full textCresson Wood, Charles. "Don’t Let Role of Information Security Policies in the Arthur Andersen/Enron Case Go Without Mention to your Chief Executive Officer." Computer Fraud & Security 2002, no. 5 (May 2002): 11–13. http://dx.doi.org/10.1016/s1361-3723(02)00513-4.
Full textSavic, Ana. "Managing IT-related operational risks." Ekonomski anali 53, no. 176 (2008): 88–109. http://dx.doi.org/10.2298/eka0876088s.
Full textFernando, Yudi, Ramanathan R. M. Chidambaram, and Ika Sari Wahyuni-TD. "The impact of Big Data analytics and data security practices on service supply chain performance." Benchmarking: An International Journal 25, no. 9 (November 29, 2018): 4009–34. http://dx.doi.org/10.1108/bij-07-2017-0194.
Full textHarumike, Yefi Dian Nofa, and Anam Miftakhul Huda. "THE MODEL OF PUBLIC INFORMATION OPENNESS “Interactive Broadcast of Memorandum of Understanding (MoU) between Blitar Government and Village Government in the Supervision of the Village Fund Allocation’s Implementation”." Journal of Academic Research and Sciences (JARES) 3, no. 2 (November 22, 2018): 1–9. http://dx.doi.org/10.30957/jares.v3i2.489.
Full textEdirisinghe Vincent, Nishani, and Robert Pinsker. "IT risk management: interrelationships based on strategy implementation." International Journal of Accounting & Information Management 28, no. 3 (March 18, 2020): 553–75. http://dx.doi.org/10.1108/ijaim-08-2019-0093.
Full textRogers, Violet C., and Jack R. Ethridge. "Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies Reaction In 2009 And 2010." American Journal of Business Education (AJBE) 6, no. 6 (October 29, 2013): 577–84. http://dx.doi.org/10.19030/ajbe.v6i6.8161.
Full textRogers, Violet C., and Jack R. Ethridge. "Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies’ Reaction In 2009 And 2010." American Journal of Business Education (AJBE) 9, no. 1 (January 18, 2016): 23–30. http://dx.doi.org/10.19030/ajbe.v9i1.9576.
Full text"From Degree to Chief Information Security Officer (CISO): A Framework for Consideration." Journal of Applied Business and Economics 22, no. 11 (December 30, 2020). http://dx.doi.org/10.33423/jabe.v22i11.3748.
Full textShort, Alice, and Roland Carandang. "The modern CISO: where marketing meets security." Computer Fraud & Security 2022, no. 2 (February 1, 2022). http://dx.doi.org/10.12968/s1361-3723(22)70021-8.
Full textShayo, Conrad, and Frank Lin. "An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function." JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 7, no. 1 (2019). http://dx.doi.org/10.15640/jcsit.v7n1a1.
Full text"ReliaQuest: Behind Enemy Lines." Muma Case Review 2 (2017): 001–20. http://dx.doi.org/10.28945/3916.
Full textTodorović, Zdravko, Boris Todorović, and Darko Tomaš. "THE ROLE OF INTERNAL AUDIT IN THE FIGHT AGAINST CYBER CRIME." EMC Review - Časopis za ekonomiju - APEIRON 20, no. 2 (September 21, 2020). http://dx.doi.org/10.7251/emc2002514t.
Full textJ, Anvar Shathik, and Krishna Prasad K. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education, June 30, 2020, 155–71. http://dx.doi.org/10.47992/ijcsbe.2581.6942.0070.
Full textGeorge, Jipson, and Mohammed Nazeh. "Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders." JOIV : International Journal on Informatics Visualization 3, no. 1 (January 9, 2019). http://dx.doi.org/10.30630/joiv.3.1.213.
Full textMaynard, Sean B., Mazino Onibere, and Atif Ahmad. "Defining the Strategic Role of the Chief Information Security Officer." Pacific Asia Journal of the Association for Information Systems, 2018, 61–86. http://dx.doi.org/10.17705/1pais.10303.
Full textKlaus, Jan Philipp, Kevin Kim, Adi Masli, Katia Guerra, and Leon Kappelman. "Prioritizing IT Management Issues and Business Performance." Journal of Information Systems, April 13, 2022. http://dx.doi.org/10.2308/isys-2020-016.
Full textSchlegel, LaVonn. "An interview with Meredith Harper, vice president and chief information security officer at Eli Lilly and Company." Business Horizons, July 2021. http://dx.doi.org/10.1016/j.bushor.2021.07.008.
Full textBaines, Victoria. "Investigating the Case for An EU Chief (Information) Security Officer through a Close Reading of Digital Regulation and Policy." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4158789.
Full textMoraes, Trícia Karla Lacerda, Adrian Kemmer Cernev, and Eduardo Henrique Diniz. "Contact tracing: Achieving equilibrium between blockchain solutions and privacy amid the novel coronavirus pandemic." Journal of Information Technology Teaching Cases, August 4, 2021, 204388692110288. http://dx.doi.org/10.1177/20438869211028869.
Full textLove, Michael, and Marwan Jamal. "Assessing Impacts of 5th Generation (5G) Cellular Telecommunications on Internet of Things (IoT) Deployments." Military Cyber Affairs 4, no. 2 (December 2020). http://dx.doi.org/10.5038/2378-0789.4.2.1066.
Full textQumer, Syeda Maseeha, and Syeda Ikrama. "Poppy Gustafsson: redefining cybersecurity through AI." Case For Women, May 12, 2022, 1–38. http://dx.doi.org/10.1108/cfw.2022.000001.
Full textBradley, Jean Ryberg, Dana A. Forgione, and Joel E. Michalek. "Are federal single audit reports of internal control weaknesses a useful tool for evaluating management? The case of charter schools." Journal of Public Budgeting, Accounting & Financial Management, October 18, 2021. http://dx.doi.org/10.1108/jpbafm-09-2020-0159.
Full textEgan, R., S. Cartagena, R. Mohamed, V. Gosrani, J. Grewal, M. Acharyya, A. Dee, et al. "Cyber operational risk scenarios for insurance companies." British Actuarial Journal 24 (2019). http://dx.doi.org/10.1017/s1357321718000284.
Full textFoith, Michael. "Virtually Witness Augmentation Now: Video Games and the Future of Human Enhancement." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.729.
Full text