Keywords
- Information Security Governance (ISG)
- Information Technology Governance (ITG)
- Unmitigated Risk
- Front Property
- Tactical Level
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Von Solms R, von Solms, SH (2006) Information Security Governance: A Model Based on the Direct–Control Cycle. Computers & Security, 25(6), 408–412
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). Introducing the Information Security Governance Model. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_4
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)