TITLE

EDITORIAL

AUTHOR(S)
Dhillon, Gurpreet
PUB. DATE
January 2014
SOURCE
Journal of Information System Security;2014, Vol. 10 Issue 1, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
An introduction is presented in which the editor discusses topics within the issue including need of information security in business enterprises, surveys on cyber-security, generative control theory and losses in information security.
ACCESSION #
100545215

 

Related Articles

  • Managing Cyber Risks. Murgai, Charu // Dataquest;11/15/2014, Vol. 32 Issue 21/22, p77 

    Several charts and diagrams are presented depicting the global state of information security in 2015, including security incidents, security spending, and security practices.

  • Under the Microscope. LANZ, JOEL // Trusted Professional;Mar2015, Vol. 18 Issue 3, p6 

    The article offers suggestions on testing the cybersecurity risk management program of an organization and discusses the significance of information security assessment.

  • Editorial Preface. Bagchi, Kallol // Journal of Information Privacy & Security;2014, Vol. 10 Issue 3, p111 

    An introduction is presented in which the editor discusses various reports within the issue on topics including social network privacy, risks in cyberspace, and information security.

  • The Need of Cyber Security for Digital India. Malik, Alok // Dataquest;11/15/2015, Vol. 33 Issue 21, p46 

    The article highlights the need of cyber security for the Indian government's Digital India campaign, and mentions the measures to be undertaken which include information security awareness training and programs, access control mechanism, and risk assessment and treatment.

  • A PERSPECTIVE ON THE EVOLUTION OF INFORMATION SYSTEM SECURITY AUDITS: CHALLENGES AND IMPLICATIONS. Goel, Sunita; Garnsey, Margaret; Qi Liu; Fisher, Ingrid // Journal of Information System Security;2016, Vol. 12 Issue 1, p45 

    Advances in technology have made it possible to capture vast amounts of financial and non-financial information, whilst at the same time shifting more control from the producers and assurers of information to the recipients of information. As a result, threats to Information System (IS) have...

  • Why Cybersecurity Leapt From the Basement to the Board Room. Cohen, Gidi // Information-management.com;12/27/2016, p1 

    Over the last five years, there has been a marked shift in how businesses view cybersecurity. As evidence, cybersecurity spending has soared.

  • Security Budgets are Growing, But Still Too Slowly.  // Security: Solutions for Enterprise Security Leaders;Jun2016, Vol. 53 Issue 6, p14 

    The article reports on the increasing security budgets due to cybersecurity risks increase across various industries in the U.S., according to a survey conducted by the nonprofit body Institute of Information Security Professionals (IISP).

  • FEDERATED IDENTITY MANAGEMENT AND THE NSTIC: CO-MANAGING INFORMATION PRIVACY. Craig, Amanda // Journal of Law, Technology & Policy;Spring2014, Vol. 2014 Issue 1, p177 

    An essay is presented on consumer-focused federated identity management (FIM) and the National Strategy for Trusted Identities in Cyberspace (NSTIC) in the U.S. Topics include the potential efficacy and representation of consumer-focused FIM in achieving the balancing act of information privacy...

  • Influence of delays decision action for information protection on information security risks. Kononovich, V.; Kononovich, I.; Kopytin, Yu.; Staikutsa, S. // Ukrainian Scientific Journal of Information Security;2014, Vol. 20 Issue 1, p83 

    The article analyzes the main causes of delay in taking measures to protect the information. Determined that the existing models of risk assessment overwhelmingly is based on statistical approaches, guided by static models and doesn't take into account the dynamic nature of interactions in...

  • CISO Rising: New Roles and Responsibilities. Lakhani, Al; Beer, William // Baseline;6/6/2014, p1 

    The article discusses issues regarding an increase in power and presence of chief information security officers (CISOs). Topics discussed include increase in jobs of CISOs in the corporate sector, widening of CISOs role in risk management and corporate governance and reporting of CISOs to chief...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics