and discussed with different terms and topics, but
this is the first research has focused on ISG from a
high-level CSFs that are mapped to the
comprehensive ISG rules of practice which has been
developed based on COBIT for IS and ISO/IEC
27014, and the essential governance areas in order to
show that they are most likely to have an impact on
effective governance of IS.
The proposed framework will need to be reviewed
for application to particular regions to confirm it is a
suitable for local organisational structures and
culture, notably because the framework is subject to
local laws and regulations.
For example, ISG is lacking in Saudi
organisations (Abu-Musa, 2010), therefore the next
step of this research will be exploring the Saudi
cultural factors by reviewing the proposed
framework with experts from the Kingdom of Saudi
Arabia; and then validating it by conducting case
studies in several Saudi organisations in order to
develop a best-practice framework for effective ISG
that supports Saudi organisations in securing their
assets and implementing proven security techniques
and strategies.
REFERENCES
Abu-Musa, A. (2010). Information Security
Governance in Saudi Organizations: an empirical
Study, Information Management & Computer
Security, 18, 226–276.
Allen, J. (2005). Governing for Enterprise Security,
Technical Note. Pittsburgh.
Allen, J. H. (2013). Security Is Not Just a Technical
Issue, US-CERT: Build Security In.
Bobbert, Y., & Mulder, H. (2015). Governance Practices
and Critical Success factors suitable for Business
Information Security, in International Conference on
Computational Intelligence and Communication
Networks.
Bowen, P., Hash
,;
Joan , & Wilson, M. (2006).
Information Security Handbook : A Guide for
Managers. National Institute of Standards and
Technology (NIST).
Bullen, C. V., & Rockart, J. F. (1981). A primer on critical
success factors, The Rise of Management Computing.
de Oliveira Alves, G., de Costa Carmo, L., & de Almeida,
A. (2006). Enterprise Security Governance, 0(C), 71–
80.
Eloff, M. M., & von Solms, S. H. (2000). Information
Security Management: A Hierarchical Framework for
Various Approaches, Computers & Security, 19(3),
243–256.
Entrust (2004). An Essential Element of Corporate
Governance, (April).
ISACA (2012). COBIT 5 for Information Security. IL,
USA. Available at: www.isaca.org/cobit5info-sec.
ISO/IEC 27014. (2013). Governance of Information
Security. Geneva: International Organization for
Standardization and the International Electrotechnical
Commission.
ITGI. (2003). Board Briefing on IT Governance (2nd ed).
ITGI. (2006). Information Security Governance: Guidance
for Boards of Directors and Executive Management
(2nd ed.). IT Governance Institute.
Johnston, A. C. & Hale, R. (2009). Improved Security
Through Information Security Governance,
Communications of the ACM, 52(1), 126.
Lainhart, J. W. (2001) An IT Assurance Framework for
the Future, The Ohio CPA Journal.
Love, P., Reinhard, J., Schwab, A. J. and Spafford, G.
(2010). GTAG Information Security Governance, The
Inistitute of Internal Auditors, 134.
Mears, L., & Von Solms, R. (2004). Corporate
Information Security Governance : A Holistic
Approach.
Moulton, R., & Coles, R. S. (2003). Applying information
security governance, Computers & Security, 22(7),
580–584.
National Cyber Security Summit Task Force (2004).
Information Security Governance
: a Call To Action,
Coroprate Governance Report.
Paul Williams, A. (2001). Information Security
Governance, Information Security Technical Report,
6(3), 60–70.
Rastogi, R., & von Solms, R. (2006). Information Security
Governance-A Re-Definition, Security Management,
Integrity, and Internal Control in Information Systems,
193, 223–236.
Rockart, J., & Van Bullen, C. (1981). A Primer on Critical
Success Factors, Center for Information Systems
Research, Sloan School of Management, MIT,
Cambridge, MA, (February 1981).
von Solms, B. (2001). Corporate governance and
information security, Computers & Security, 20, 215–
218.
von Solms, R., & von Solms, S. H. (Basie). (2006).
Information Security Governance: A model based on
the Direct-Control Cycle, Computers and Security,
25(6), 408–412.
von Solms, S. H., & von Solms, R. (2008). Information
Security Governance. Johannesburg: Springer.
Weill, P., & Ross, J. (2004.) IT Governance, How
Performers Manage IT Decision Rights for Superior
Results. Harvard Business Press.
Westby, J., & Allen, J. (2007). Governing for Enterprise
Security (GES) Implementation Guide, Software
Engineering Institute, CERT, (August), 1–17.