University of Antwerp
Applied Economics/Marketing Department
Hackers and negative social media hypes have proven able to bring proud organizations to their knees, yet many information and communications technology (ICT) security managers lack a strategy to anticipate and overcome such unpredictable... more
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
Implementing and maintaining Information Security (IS) is cumbersome. Frameworks and models are used to implement IS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design, direct and... more
Group Support for the Board’s Involvement in a Smart Security Decision-making Process Decision making during business meetings is an elusive phenomenon for a couple of reasons. Business meetings have been defined as “…a gathering... more
“Het gebruik van een Group Support System in Informatiebeveiliging” Besluitvorming tijdens vergaderingen is een ongrijpbaar fenomeen [1]. Zo definieerde Thomas Kayser vergaderingen als “a gathering where people speak up, say... more
- by Yuri Bobbert
VERGADERSYSTEMEN ALS GROUP SUPPORT SYSTEMS KUNNEN DE KWALITEIT VAN VERGADERINGEN EN DE BESLUITVORMING DIE DAARUIT VOORTKOMT STERK VERBETEREN. ZEKER VOOR EEN COMPLEX EN SNEL VERANDEREND VAKGEBIED ALS INFORMATIEBEVEILIGING HEEFT DEZE... more
This paper examines a Business Information Security (BIS) artefact, with the focus on a comparison study between two artefacts. Abstract Preventing and responding to cybercrime is becoming an integral part of management practices... more
Implementing and maintaining Business Information Security (BIS) is cumbersome. Frameworks and models are used to implement BIS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design,... more
Implementing and maintaining Business Information Security (BIS) is cumbersome. Frameworks and models are used to implement BIS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design,... more
This paper describes the application of Group Support Systems (GSS) in the field of Business Information Security Governance (BISG). The focus is on longitudinal small team collaboration-for instance within Boards of Directors (BoD) and... more
Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases they... more
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
Industrial Control Systems (ICS) were primarily designed to operate air-gapped; however, the pressure for cost reduction and integration with business systems demanded the adoption of open systems architecture and ended up exposing ICS to... more
Dedico essa dissertação de mestrado à minha mãe que esteve ao meu lado em cada aula que ouvi, que ficou apreensiva em todo seminário que apresentei e que participou muito mais desse trabalho que uma mãe qualquer poderia. VI AGRADECIMENTOS... more
- by Yuri Bobbert
Dedico essa dissertação de mestrado à minha mãe que esteve ao meu lado em cada aula que ouvi, que ficou apreensiva em todo seminário que apresentei e que participou muito mais desse trabalho que uma mãe qualquer poderia. VI AGRADECIMENTOS... more
- by Yuri Bobbert
This paper proposes research methods for designing and engineering a Business Information Security (BIS) artefact. Defining research methods to establish artefact functions (e.g. dash-boarding, risk register) that reflect the parameters... more