Caldwell, T. (2013). Setting the gold standard. Computer
fraud & security, 2013, 15-19.
Carminati, B., Ferrari, E., & Rondanini, C. (2018).
Blockchain as a platform for secure inter-organizational
business processes. 2018 IEEE 4th International
Conference on Collaboration and Internet Computing
(CIC),
Chorafas, D. N. (2001). The Contribution of External
Auditors to the Internal Control System. Implementing
and Auditing the Internal Control System, 314-336.
Conrad, E., Misenar, S., & Feldman, J. (2014). Domain 10:
Legal, regulations, investigations, and compliance.
Corriss, L. (2010). Information security governance:
Integrating security into the organizational culture.
Proceedings of the 2010 Workshop on Governance of
Technology, Information and Policies,
David, R. J., Tolbert, P. S., & Boghossian, J. (2019).
Institutional Theory in Organization Studies. Oxford
Research Encyclopedia of Business and Management.
Diogo, S. M., Carvalho, T., & Amaral, A. (2015).
Institutionalism and Organizational Change.
Fleischmann, K. R. (2010). Preaching what we practice:
Teaching ethical decision-making to computer security
professionals. International Conference on Financial
Cryptography and Data Security,
Franqueira, V. N., Van Cleeff, A., Van Eck, P., & Wieringa,
R. J. (2013). Engineering security agreements against
external insider threat. Information Resources
Management Journal (IRMJ), 26(4), 66-91.
Freeman, R. E., Fairchild, G. B., Venkataraman, S., Mead,
J., & Chen, M.-J. (2010). Creating Value for
Stakeholders. Stakeholder Management & Stakeholder
Responsibilities eJournal.
Furnell, S., & Bishop, M. (2020). Addressing cyber security
skills: the spectrum, not the silo. Computer fraud &
security, 2020, 6-11.
Gelfond, S., Schwenkel, R. C., & Cohen, H. (2017). Private
Company Boards.
Girn, S. (2022). A Data Driven Approach to Board
Cybersecurity Governance. Pacific Asia Conference on
Information Systems,
Grant, G., & Tan, F. B. (2013). Governing IT in inter-
organizational relationships: Issues and future research.
European Journal of Information Systems, 22(5), 493-
497. https://doi.org/10.1057/ejis.2013.21
Haber, M. J., Chappell, B., & Hills, C. (2022). Regulatory
Compliance. In M. J. Haber, B. Chappell, & C. Hills
(Eds.), Cloud Attack Vectors: Building Effective Cyber-
Defense Strategies to Protect Cloud Resources (pp.
297-373). Apress. https://doi.org/10.1007/978-1-4842-
8236-6_8
Hajdarevic, K., Pattinson, C., Kozaric, K., & Hadzic, A.
(2012). Information security measurement
infrastructure for KPI visualization. 2012 Proceedings
of the 35th International Convention MIPRO,
Hamlen, K. W., & Thuraisingham, B. (2013). Data security
services, solutions and standards for outsourcing.
Computer Standards & Interfaces, 35(1), 1-5.
Hartmann, C., & Carmenate, J. (2021). Academic Research
on the Role of Corporate Governance and IT Expertise
in Addressing Cybersecurity Breaches: Implications for
Practice, Policy and Research. Current Issues in
Auditing.
Hillman, A. J., & Dalziel, T. (2003). Boards of directors and
firm performance: Integrating agency and resource
dependence perspectives. Academy of Management
review, 28(3), 383-396.
Hooper, V. A., & McKissack, J. J. (2016). The emerging
role of the CISO. Business Horizons, 59, 585-591.
Hung, H. (1998). A typology of the theories of the roles of
governing boards. Corporate governance, 6(2), 101-
111.
Kappelman, L., McLean, E. R., Johnson, V. L., Torres, R.,
Maurer, C., Kim, K., Guerra, K., & Snyder, M. (2021).
The 2020 SIM IT Issues and Trends Study. MIS
Quarterly Executive, 20(1).
Kárász, B., & Kollár, C. (2020). Leadership
Responsibilities in Information Security Awareness
Development.
Kaur, K., Gupta, I., & Singh, A. K. (2017). A comparative
study of the approach provided for preventing the data
leakage. International Journal of Network Security &
Its Applications, 9(5), 21-33.
Kjaer, K. N. (2021). Ethics and why they matter. Effective
Directors.
Koskosas, I., Kakoulidis, K., & Siomos, C. (2011).
Information security: Corporate culture and
organizational commitment. International Journal of
Humanities and Social Science, 1(3), 192-195.
Larcker, D. F., Reiss, P. C., & Tayan, B. (2017). Critical
Update Needed: Cybersecurity Expertise in the
Boardroom. Cybersecurity.
Lincke, S. (2015). Complying with Security Regulation and
Standards. Security Planning: An Applied Approach,
39-58.
Mahfuth, A., Yussof, S., Baker, A. A., & Ali, N. a. (2017).
A systematic literature review: Information security
culture. 2017 International Conference on Research and
Innovation in Information Systems (ICRIIS),
McFadzean, E., Ezingeard, J.-N., & Birchall, D. W. (2007).
Perception of risk and the strategic impact of existing
IT on information security strategy at board level.
Online Inf. Rev., 31, 622-660.
Mintzberg, H. (1983). Power in and around organizations.
Musaali, M. (2010). The Board Managment Nexus in
Corporate Governance. Corporate Governance: Actors
& Players eJournal.
Naicker, V., & Mafaiti, M. (2019). The establishment of
collaboration in managing information security through
multisourcing. Computers & Security, 80, 224-237.
Najeeb, A. (2014). Institutional theory and human resource
management.
Nicholson, G., & Newton, C. (2010). The role of the board
of directors: Perceptions of managerial elites. Journal
of Management & Organization
, 16(2), 204-218.
Ogbanufe, O. (2018). The Mediating Role of Psychological
Ownership in Increasing Information Security
Stewardship Behaviors.
Ogbanufe, O., Crossler, R. E., & Biros, D. P. (2021).
Exploring stewardship: A precursor to voluntary