Switch to: References

Add citations

You must login to add citations.
  1. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Notes on a Nonfoundational Phenomenology of Technology.Robert Rosenberger - 2017 - Foundations of Science 22 (3):471-494.
    The emerging school of thought called “postphenomenology” offers a distinct understanding of the ways that people experience technology usage. This perspective combines insights from the philosophical tradition of phenomenology with commitments to the anti-essentialism and nonfoundationalism of American pragmatism. One of postphenomenology’s central positions is that technologies always remain “multistable,” i.e., subject to different uses and meanings. But I suggest that as this perspective matures, philosophical problems are emerging around the notion of multistability, what I call “the problem of invariance” (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations