Skip to main content
— Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases... more
    • by  and +1
    •   6  
      Information SecurityIT SecurityInformation Security ManagementGroup Decision Support Systems
This paper describes the application of Group Support Systems (GSS) in the field of Business Information Security Governance (BISG). The focus is on longitudinal small team collaboration – for instance within Boards of Directors (BoD) and... more
    • by  and +1
    •   9  
      Information SecurityDesign Science researchGroup Decision Support SystemIT Security
— Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases... more
    • by  and +1
    •   9  
      Information SystemsInformation SecurityCorporate GovernanceRisk Management
Hackers and negative social media hypes have proven able to bring proud organizations to their knees, yet many information and communications technology (ICT) security managers lack a strategy to anticipate and overcome such unpredictable... more
    • by 
    •   9  
      Information SystemsInformation SecurityBusiness/IT AlignmentNetwork Security
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
    • by 
    •   8  
      Information TechnologyDesignInformation SecurityComputer Engineering
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
    • by 
    •   6  
      Information TechnologyInformation SecurityDesign ScienceComputer Engineering
Implementing and maintaining Information Security (IS) is cumbersome. Frameworks and models are used to implement IS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design, direct and... more
    • by 
    •   12  
      Business AdministrationInformation TechnologyDesignInformation Security
Group Support for the Board’s Involvement in a Smart Security Decision-making Process Decision making during business meetings is an elusive phenomenon for a couple of reasons. Business meetings have been defined as “…a gathering... more
    • by 
    •   6  
      Decision MakingFocus Group discussionsStrategic ManagementDecision Support Systems
“Het gebruik van een Group Support System in Informatiebeveiliging” Besluitvorming tijdens vergaderingen is een ongrijpbaar fenomeen [1]. Zo definieerde Thomas Kayser vergaderingen als “a gathering where people speak up, say... more
    • by 
VERGADERSYSTEMEN ALS GROUP SUPPORT SYSTEMS KUNNEN DE KWALITEIT VAN VERGADERINGEN EN DE BESLUITVORMING DIE DAARUIT VOORTKOMT STERK VERBETEREN. ZEKER VOOR EEN COMPLEX EN SNEL VERANDEREND VAKGEBIED ALS INFORMATIEBEVEILIGING HEEFT DEZE... more
    • by 
    •   6  
      Information SecurityFocus Group discussionsRisk ManagementDesign Science research
This paper examines a Business Information Security (BIS) artefact, with the focus on a comparison study between two artefacts. Abstract Preventing and responding to cybercrime is becoming an integral part of management practices... more
    • by 
    •   8  
      Information SystemsInformation SecurityDesign ScienceDesign thinking
Implementing and maintaining Business Information Security (BIS) is cumbersome. Frameworks and models are used to implement BIS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design,... more
    • by 
    •   14  
      Information TechnologyInformation SecurityDesign ScienceDecision Making
Implementing and maintaining Business Information Security (BIS) is cumbersome. Frameworks and models are used to implement BIS, but these are perceived as complex and hard to maintain. Most companies still use spreadsheets to design,... more
    • by 
    •   12  
      Information TechnologyKnowledge ManagementInformation SecurityDesign Science
This paper describes the application of Group Support Systems (GSS) in the field of Business Information Security Governance (BISG). The focus is on longitudinal small team collaboration-for instance within Boards of Directors (BoD) and... more
    • by 
    •   12  
      BusinessComputer ScienceEconomicsInformation Security
Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases they... more
    • by 
    •   15  
      Information SystemsComputer ScienceInformation SecurityCorporate Governance
This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the... more
    • by 
    •   7  
      Computer ScienceInformation TechnologyInformation SecurityDesign Science
Industrial Control Systems (ICS) were primarily designed to operate air-gapped; however, the pressure for cost reduction and integration with business systems demanded the adoption of open systems architecture and ended up exposing ICS to... more
    • by 
    •   9  
      BusinessIT GovernanceIndustryCyber Security
Dedico essa dissertação de mestrado à minha mãe que esteve ao meu lado em cada aula que ouvi, que ficou apreensiva em todo seminário que apresentei e que participou muito mais desse trabalho que uma mãe qualquer poderia. VI AGRADECIMENTOS... more
    • by 
Dedico essa dissertação de mestrado à minha mãe que esteve ao meu lado em cada aula que ouvi, que ficou apreensiva em todo seminário que apresentei e que participou muito mais desse trabalho que uma mãe qualquer poderia. VI AGRADECIMENTOS... more
    • by 
This paper proposes research methods for designing and engineering a Business Information Security (BIS) artefact. Defining research methods to establish artefact functions (e.g. dash-boarding, risk register) that reflect the parameters... more
    • by 
    •   3  
      BusinessComputer ScienceDigital security