{"id":"https://openalex.org/W2310910056","doi":"https://doi.org/10.1145/2670739.2670742","title":"Important of security governance, its dependence on other forms of governance, and its diverse application among industries","display_name":"Important of security governance, its dependence on other forms of governance, and its diverse application among industries","publication_year":2014,"publication_date":"2014-10-11","ids":{"openalex":"https://openalex.org/W2310910056","doi":"https://doi.org/10.1145/2670739.2670742","mag":"2310910056"},"language":"en","primary_location":{"id":"doi:10.1145/2670739.2670742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2670739.2670742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031237093","display_name":"Uchita Shah","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Uchita Shah","raw_affiliation_strings":["Delaronde Court, Sandy, Springs GA"],"affiliations":[{"raw_affiliation_string":"Delaronde Court, Sandy, Springs GA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031237093"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28365742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9549000263214111,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9549000263214111,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.8916028738021851},{"id":"https://openalex.org/keywords/project-governance","display_name":"Project governance","score":0.76996910572052},{"id":"https://openalex.org/keywords/information-governance","display_name":"Information governance","score":0.7690775394439697},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6563416719436646},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5479922890663147},{"id":"https://openalex.org/keywords/corporate-security","display_name":"Corporate security","score":0.43483859300613403},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.3875119686126709},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.2315588891506195},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1776549220085144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15576130151748657},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1526854932308197},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.13883954286575317},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.08853250741958618}],"concepts":[{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.8916028738021851},{"id":"https://openalex.org/C140423589","wikidata":"https://www.wikidata.org/wiki/Q7249406","display_name":"Project governance","level":3,"score":0.76996910572052},{"id":"https://openalex.org/C189922023","wikidata":"https://www.wikidata.org/wiki/Q17056348","display_name":"Information governance","level":4,"score":0.7690775394439697},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6563416719436646},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5479922890663147},{"id":"https://openalex.org/C179681481","wikidata":"https://www.wikidata.org/wiki/Q5172490","display_name":"Corporate security","level":3,"score":0.43483859300613403},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.3875119686126709},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2315588891506195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1776549220085144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15576130151748657},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1526854932308197},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.13883954286575317},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.08853250741958618},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2670739.2670742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2670739.2670742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3158620907","https://openalex.org/W4214629857","https://openalex.org/W2475626025","https://openalex.org/W2389311083","https://openalex.org/W634672656","https://openalex.org/W3131697785","https://openalex.org/W2355969268","https://openalex.org/W1586428566","https://openalex.org/W3009646078","https://openalex.org/W2103065150"],"abstract_inverted_index":{"This":[0],"paper":[1,37,73],"will":[2,19,38,74,95,125,147,169],"discuss":[3],"the":[4,21,66,76,98,119,136,145,162,173,181],"different":[5,156,167],"levels":[6],"of":[7,35,45,68,80,83,123,133,140,153,176,185],"governance":[8,27,46,64,84,104,124,142],"and":[9,25,55,62,78,85,121,138,161,183],"their":[10],"relationship":[11],"to":[12,15,40,90,101,108,171],"each":[13,81],"other---specific":[14],"information":[16,52,56,69,91],"security.":[17],"It":[18,94],"indicate":[20,75],"implications":[22],"that":[23,47,111],"corporate":[24,61],"IT":[26,63],"have":[28],"on":[29,42,144],"security":[30,57,70,92,113,141],"governance.":[31,58,71,93,114],"The":[32,72],"main":[33],"priority":[34],"this":[36,117],"be":[39,126,148],"concentrate":[41],"three":[43],"forms":[44],"impact":[48,65],"an":[49,106,151],"organization---corporate":[50],"governance,":[51,54],"technology":[53],"Specifically,":[59],"how":[60,86,110],"success":[67],"roles":[77],"goals":[79,139],"form":[82],"they":[87],"ultimately":[88],"build":[89],"also":[96],"entail":[97],"methodologies":[99],"used":[100],"implement":[102],"good":[103],"within":[105],"organization":[107],"understand":[109,172],"impacts":[112],"Upon":[115],"reading":[116],"paper,":[118],"value":[120],"importance":[122],"visible.":[127],"There":[128],"is":[129],"a":[130],"varying":[131],"degree":[132],"differences":[134],"with":[135,150],"application":[137],"based":[143],"industry---this":[146],"discussed":[149],"evaluation":[152],"four":[154],"very":[155],"industries---the":[157],"biotechnology,":[158],"e-learning,":[159],"healthcare,":[160],"retail":[163],"industry.":[164],"Comparing":[165],"such":[166],"industries":[168],"help":[170],"wide":[174],"range":[175],"variability":[177],"involved":[178],"in":[179],"discovering":[180],"purpose":[182],"implementation":[184],"Information":[186],"Security":[187],"Governance.":[188]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
