Статті в журналах з теми "Chief Information Security Officer (CISO)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-48 статей у журналах для дослідження на тему "Chief Information Security Officer (CISO)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Karanja, Erastus. "The role of the chief information security officer in the management of IT security." Information & Computer Security 25, no. 3 (July 10, 2017): 300–329. http://dx.doi.org/10.1108/ics-02-2016-0013.
Повний текст джерелаSchütz, Thorsten. "CHIEF INFORMATION SECURITY OFFICER: Steuermann durch den IT-Sicherheitsprozess." kma - Klinik Management aktuell 25, no. 03 (March 2020): 54–57. http://dx.doi.org/10.1055/s-0040-1709410.
Повний текст джерелаDa Silva, Joseph, and Rikke Bjerg Jensen. ""Cyber security is a dark art": The CISO as Soothsayer." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–31. http://dx.doi.org/10.1145/3555090.
Повний текст джерелаJustice, Connie, and Char Sample. "Future Needs of the Cybersecurity Workforce." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 81–91. http://dx.doi.org/10.34190/iccws.17.1.33.
Повний текст джерелаHaislip, Jacob, Jee-Hae Lim, and Robert Pinsker. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches." Information Systems Research 32, no. 2 (June 2021): 318–34. http://dx.doi.org/10.1287/isre.2020.0986.
Повний текст джерелаFord, Adrian, Ameer Al-Nemrat, Sayed Ali Ghorashi, and Julia Davidson. "Impact of CISO Appointment Announcements on the Market Value of Firms." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 375–84. http://dx.doi.org/10.34190/iccws.17.1.49.
Повний текст джерелаElder, Jonathan, Nicole Jacobson, Natalie Remsen, and Kim Wilmath. "Behind Enemy Lines." Journal of Information Technology Education: Discussion Cases 6 (2017): 12. http://dx.doi.org/10.28945/3928.
Повний текст джерелаBanker, Rajiv D., and Cecilia (Qian) Feng. "The Impact of Information Security Breach Incidents on CIO Turnover." Journal of Information Systems 33, no. 3 (August 1, 2019): 309–29. http://dx.doi.org/10.2308/isys-52532.
Повний текст джерелаBouaynaya, Wafa. "Cloud computing in SMEs: towards delegation of the CIO role." Information & Computer Security 28, no. 2 (May 28, 2020): 199–213. http://dx.doi.org/10.1108/ics-01-2017-0001.
Повний текст джерелаAkhtar, Shahzeb, Pratima Amol Sheorey, Sonali Bhattacharya, and Ajith Kumar V. V. "Cyber Security Solutions for Businesses in Financial Services." International Journal of Business Intelligence Research 12, no. 1 (January 2021): 82–97. http://dx.doi.org/10.4018/ijbir.20210101.oa5.
Повний текст джерелаImoniana, Joshua Onome. "Validity of information security policy models." Transinformação 16, no. 3 (December 2004): 263–74. http://dx.doi.org/10.1590/s0103-37862004000300006.
Повний текст джерелаFraedrich, Laura. "Interview: Interview of Brian Murphy, Former Chief of Intelligence, Department of Homeland Security." Global Trade and Customs Journal 17, Issue 3 (March 1, 2022): 141–44. http://dx.doi.org/10.54648/gtcj2022019.
Повний текст джерелаGolding, Paul, and Lisa Facey-Shaw. "GraceKennedy Group: The new Chief Information Officer and IT Governance." Journal of Information Technology Teaching Cases 9, no. 2 (May 17, 2019): 44–57. http://dx.doi.org/10.1177/2043886919850034.
Повний текст джерелаReni, Gianluigi, Massimo Molteni, Stefano Arlotti, and Francesco Pinciroli. "Chief medical officer actions on information security in an Italian rehabilitation centre." International Journal of Medical Informatics 73, no. 3 (March 2004): 271–79. http://dx.doi.org/10.1016/j.ijmedinf.2003.11.022.
Повний текст джерелаHamilton, Johanna. "The Awe: From the Extraordinary to the Everyday." ITNOW 62, no. 4 (December 1, 2020): 64–65. http://dx.doi.org/10.1093/itnow/bwaa124.
Повний текст джерелаJohansson, Björn, and Mirella Muhic. "Relativism in the Cloud: Cloud Sourcing in virtue of IS Development Outsourcing - A literature review." International Journal of Information Systems and Project Management 5, no. 4 (January 31, 2022): 55–65. http://dx.doi.org/10.12821/ijispm050404.
Повний текст джерелаPaul, P. K., A. Bhuimali, Krishna Raj, and P. S. Aithal. "Information Scientist and Some Similar Professionals: Their Role as a Caretaker of Security Vis-à-Vis IT Management—An Analysis." IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 14, no. 3 (April 30, 2019): 60. http://dx.doi.org/10.21013/jmss.v14.n3.p1.
Повний текст джерелаLatifi, Fariba, and Somayeh Alizadeh. "The Influence of National Factors on Transferring and Adopting Telemedicine Technology." International Journal of E-Health and Medical Communications 7, no. 3 (July 2016): 52–65. http://dx.doi.org/10.4018/ijehmc.2016070104.
Повний текст джерелаHammar, Julian E. "CFTC amends chief compliance officer duties and annual report requirements." Journal of Investment Compliance 20, no. 1 (May 7, 2019): 10–16. http://dx.doi.org/10.1108/joic-01-2019-0002.
Повний текст джерелаAl-Marsy, Ahmad, Pankaj Chaudhary, and James Allen Rodger. "A Model for Examining Challenges and Opportunities in Use of Cloud Computing for Health Information Systems." Applied System Innovation 4, no. 1 (February 22, 2021): 15. http://dx.doi.org/10.3390/asi4010015.
Повний текст джерелаA. Mohamed, Mona, and Sharma Pillutla. "Cloud computing: a collaborative green platform for the knowledge society." VINE 44, no. 3 (August 5, 2014): 357–74. http://dx.doi.org/10.1108/vine-07-2013-0038.
Повний текст джерелаGirard, Frédéric, Bertrand Meunier, Duan Hua, and Eric Dubois. "A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Information Security Management." International Journal of Secure Software Engineering 1, no. 4 (October 2010): 1–17. http://dx.doi.org/10.4018/jsse.2010100101.
Повний текст джерелаHarumike, Yefi Dian Nofa, and Anam Miftakhul Huda. "THE MODEL OF PUBLIC INFORMATION OPENNESS." JARES (Journal of Academic Research and Sciences) 3, no. 2 (November 22, 2018): 1–9. http://dx.doi.org/10.35457/jares.v3i2.489.
Повний текст джерелаDaneshmandnia, Ali. "The influence of organizational culture on information governance effectiveness." Records Management Journal 29, no. 1/2 (March 11, 2019): 18–41. http://dx.doi.org/10.1108/rmj-09-2018-0033.
Повний текст джерелаCresson Wood, Charles. "Don’t Let Role of Information Security Policies in the Arthur Andersen/Enron Case Go Without Mention to your Chief Executive Officer." Computer Fraud & Security 2002, no. 5 (May 2002): 11–13. http://dx.doi.org/10.1016/s1361-3723(02)00513-4.
Повний текст джерелаSavic, Ana. "Managing IT-related operational risks." Ekonomski anali 53, no. 176 (2008): 88–109. http://dx.doi.org/10.2298/eka0876088s.
Повний текст джерелаFernando, Yudi, Ramanathan R. M. Chidambaram, and Ika Sari Wahyuni-TD. "The impact of Big Data analytics and data security practices on service supply chain performance." Benchmarking: An International Journal 25, no. 9 (November 29, 2018): 4009–34. http://dx.doi.org/10.1108/bij-07-2017-0194.
Повний текст джерелаHarumike, Yefi Dian Nofa, and Anam Miftakhul Huda. "THE MODEL OF PUBLIC INFORMATION OPENNESS “Interactive Broadcast of Memorandum of Understanding (MoU) between Blitar Government and Village Government in the Supervision of the Village Fund Allocation’s Implementation”." Journal of Academic Research and Sciences (JARES) 3, no. 2 (November 22, 2018): 1–9. http://dx.doi.org/10.30957/jares.v3i2.489.
Повний текст джерелаEdirisinghe Vincent, Nishani, and Robert Pinsker. "IT risk management: interrelationships based on strategy implementation." International Journal of Accounting & Information Management 28, no. 3 (March 18, 2020): 553–75. http://dx.doi.org/10.1108/ijaim-08-2019-0093.
Повний текст джерелаRogers, Violet C., and Jack R. Ethridge. "Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies Reaction In 2009 And 2010." American Journal of Business Education (AJBE) 6, no. 6 (October 29, 2013): 577–84. http://dx.doi.org/10.19030/ajbe.v6i6.8161.
Повний текст джерелаRogers, Violet C., and Jack R. Ethridge. "Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies’ Reaction In 2009 And 2010." American Journal of Business Education (AJBE) 9, no. 1 (January 18, 2016): 23–30. http://dx.doi.org/10.19030/ajbe.v9i1.9576.
Повний текст джерела"From Degree to Chief Information Security Officer (CISO): A Framework for Consideration." Journal of Applied Business and Economics 22, no. 11 (December 30, 2020). http://dx.doi.org/10.33423/jabe.v22i11.3748.
Повний текст джерелаShort, Alice, and Roland Carandang. "The modern CISO: where marketing meets security." Computer Fraud & Security 2022, no. 2 (February 1, 2022). http://dx.doi.org/10.12968/s1361-3723(22)70021-8.
Повний текст джерелаShayo, Conrad, and Frank Lin. "An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function." JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 7, no. 1 (2019). http://dx.doi.org/10.15640/jcsit.v7n1a1.
Повний текст джерела"ReliaQuest: Behind Enemy Lines." Muma Case Review 2 (2017): 001–20. http://dx.doi.org/10.28945/3916.
Повний текст джерелаTodorović, Zdravko, Boris Todorović, and Darko Tomaš. "THE ROLE OF INTERNAL AUDIT IN THE FIGHT AGAINST CYBER CRIME." EMC Review - Časopis za ekonomiju - APEIRON 20, no. 2 (September 21, 2020). http://dx.doi.org/10.7251/emc2002514t.
Повний текст джерелаJ, Anvar Shathik, and Krishna Prasad K. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education, June 30, 2020, 155–71. http://dx.doi.org/10.47992/ijcsbe.2581.6942.0070.
Повний текст джерелаGeorge, Jipson, and Mohammed Nazeh. "Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders." JOIV : International Journal on Informatics Visualization 3, no. 1 (January 9, 2019). http://dx.doi.org/10.30630/joiv.3.1.213.
Повний текст джерелаMaynard, Sean B., Mazino Onibere, and Atif Ahmad. "Defining the Strategic Role of the Chief Information Security Officer." Pacific Asia Journal of the Association for Information Systems, 2018, 61–86. http://dx.doi.org/10.17705/1pais.10303.
Повний текст джерелаKlaus, Jan Philipp, Kevin Kim, Adi Masli, Katia Guerra, and Leon Kappelman. "Prioritizing IT Management Issues and Business Performance." Journal of Information Systems, April 13, 2022. http://dx.doi.org/10.2308/isys-2020-016.
Повний текст джерелаSchlegel, LaVonn. "An interview with Meredith Harper, vice president and chief information security officer at Eli Lilly and Company." Business Horizons, July 2021. http://dx.doi.org/10.1016/j.bushor.2021.07.008.
Повний текст джерелаBaines, Victoria. "Investigating the Case for An EU Chief (Information) Security Officer through a Close Reading of Digital Regulation and Policy." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4158789.
Повний текст джерелаMoraes, Trícia Karla Lacerda, Adrian Kemmer Cernev, and Eduardo Henrique Diniz. "Contact tracing: Achieving equilibrium between blockchain solutions and privacy amid the novel coronavirus pandemic." Journal of Information Technology Teaching Cases, August 4, 2021, 204388692110288. http://dx.doi.org/10.1177/20438869211028869.
Повний текст джерелаLove, Michael, and Marwan Jamal. "Assessing Impacts of 5th Generation (5G) Cellular Telecommunications on Internet of Things (IoT) Deployments." Military Cyber Affairs 4, no. 2 (December 2020). http://dx.doi.org/10.5038/2378-0789.4.2.1066.
Повний текст джерелаQumer, Syeda Maseeha, and Syeda Ikrama. "Poppy Gustafsson: redefining cybersecurity through AI." Case For Women, May 12, 2022, 1–38. http://dx.doi.org/10.1108/cfw.2022.000001.
Повний текст джерелаBradley, Jean Ryberg, Dana A. Forgione, and Joel E. Michalek. "Are federal single audit reports of internal control weaknesses a useful tool for evaluating management? The case of charter schools." Journal of Public Budgeting, Accounting & Financial Management, October 18, 2021. http://dx.doi.org/10.1108/jpbafm-09-2020-0159.
Повний текст джерелаEgan, R., S. Cartagena, R. Mohamed, V. Gosrani, J. Grewal, M. Acharyya, A. Dee, et al. "Cyber operational risk scenarios for insurance companies." British Actuarial Journal 24 (2019). http://dx.doi.org/10.1017/s1357321718000284.
Повний текст джерелаFoith, Michael. "Virtually Witness Augmentation Now: Video Games and the Future of Human Enhancement." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.729.
Повний текст джерела